In 2011, hospitals and physicians can apply for HITECH Act incentive payments for using certified electronic health records software.
To be certified as qualifying for the Medicare and Medicaid incentive program, EHR software must have numerous security capabilities that, until now, have often been missing from clinical information systems.
What do healthcare information security professionals need to do to leverage these enhancements?
Join us for this exclusive session, which will offer in-depth guidance including:
An explanation of all the required security functions for certified EHR software;
An action plan for the next steps that hospitals and physician group practices should take to leverage these security controls;
A detailed description of how to conduct a risk assessment to meet the incentive program's meaningful use requirements and prioritize security projects.
The HITECH Act, part of the massive economic stimulus package, will provide as much as $27 billion in incentives to hospitals and physician groups that implement certified electronic health records software and put it to meaningful use.
The meaningful use requirements include conducting a risk assessment and using appropriate security controls to mitigate those risks.
Electronic health records software must include specific security controls to be certified for the incentive program. Until now, these controls have often been missing from clinical information systems. So many organizations applying for EHR incentives have limited experience in adopting these security measures.
How can your organization rapidly develop a plan for making the most of the security controls in certified EHRs? And what's the best way to set your security priorities?
In this session, a leading healthcare information security specialist will provide timely, practical tips. You'll get:
A detailed explanation of all of the required security functions for certified EHR software;
An action plan for all the steps to take to leverage the security controls;
A detailed description of how to conduct a risk assessment on a tight deadline to meet the incentive program's meaningful use requirements and help prioritize security projects;
Tips on how to assign security responsibilities during and after an EHR rollout;
Insights on other relevant aspects of the meaningful use requirements, including providing patients with electronic copies of their records.
Premium Members Only
OnDemand access to this webinar is restricted to Premium Members.
Walsh, CISSP, is president of Tom Walsh Consulting firm that advises healthcare organizations on risk management strategies, risk analysis, disaster recovery planning, security training, and remediation activities. Walsh also serves as information security officer at San Antonio Community Hospital on an outsourced basis. He serves as the information security consultant for several organizations including a community-based hospital, a multi-hospital health system, and a large physician organization. Prior to starting his own business nine years ago, Walsh's experience included being the first information security manager for a large, multi-hospital healthcare system in Kansas City.