Training

HITECH Tips: Using EHR Security Functions for Protecting Patient Information

HITECH Tips: Using EHR Security Functions for Protecting Patient Information
In 2011, hospitals and physicians can apply for HITECH Act incentive payments for using certified electronic health records software.

To be certified as qualifying for the Medicare and Medicaid incentive program, EHR software must have numerous security capabilities that, until now, have often been missing from clinical information systems.

What do healthcare information security professionals need to do to leverage these enhancements?

Join us for this exclusive session, which will offer in-depth guidance including:

  • An explanation of all the required security functions for certified EHR software;
  • An action plan for the next steps that hospitals and physician group practices should take to leverage these security controls;
  • A detailed description of how to conduct a risk assessment to meet the incentive program's meaningful use requirements and prioritize security projects.

Background

The HITECH Act, part of the massive economic stimulus package, will provide as much as $27 billion in incentives to hospitals and physician groups that implement certified electronic health records software and put it to meaningful use.

The meaningful use requirements include conducting a risk assessment and using appropriate security controls to mitigate those risks.

Electronic health records software must include specific security controls to be certified for the incentive program. Until now, these controls have often been missing from clinical information systems. So many organizations applying for EHR incentives have limited experience in adopting these security measures.

How can your organization rapidly develop a plan for making the most of the security controls in certified EHRs? And what's the best way to set your security priorities?

In this session, a leading healthcare information security specialist will provide timely, practical tips. You'll get:

  • A detailed explanation of all of the required security functions for certified EHR software;
  • An action plan for all the steps to take to leverage the security controls;
  • A detailed description of how to conduct a risk assessment on a tight deadline to meet the incentive program's meaningful use requirements and help prioritize security projects;
  • Tips on how to assign security responsibilities during and after an EHR rollout;
  • Insights on other relevant aspects of the meaningful use requirements, including providing patients with electronic copies of their records.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.