In 2011, hospitals and physicians can apply for HITECH Act incentive payments for using certified electronic health records software.
To be certified as qualifying for the Medicare and Medicaid incentive program, EHR software must have numerous security capabilities that, until now, have often been missing from clinical information systems.
What do healthcare information security professionals need to do to leverage these enhancements?
Join us for this exclusive session, which will offer in-depth guidance including:
An explanation of all the required security functions for certified EHR software;
An action plan for the next steps that hospitals and physician group practices should take to leverage these security controls;
A detailed description of how to conduct a risk assessment to meet the incentive program's meaningful use requirements and prioritize security projects.
The HITECH Act, part of the massive economic stimulus package, will provide as much as $27 billion in incentives to hospitals and physician groups that implement certified electronic health records software and put it to meaningful use.
The meaningful use requirements include conducting a risk assessment and using appropriate security controls to mitigate those risks.
Electronic health records software must include specific security controls to be certified for the incentive program. Until now, these controls have often been missing from clinical information systems. So many organizations applying for EHR incentives have limited experience in adopting these security measures.
How can your organization rapidly develop a plan for making the most of the security controls in certified EHRs? And what's the best way to set your security priorities?
In this session, a leading healthcare information security specialist will provide timely, practical tips. You'll get:
A detailed explanation of all of the required security functions for certified EHR software;
An action plan for all the steps to take to leverage the security controls;
A detailed description of how to conduct a risk assessment on a tight deadline to meet the incentive program's meaningful use requirements and help prioritize security projects;
Tips on how to assign security responsibilities during and after an EHR rollout;
Insights on other relevant aspects of the meaningful use requirements, including providing patients with electronic copies of their records.
Premium Members Only
OnDemand access to this webinar is restricted to Premium Members.
Tom Walsh, CISSP, is the Founder and Managing Partner of tw-Security, a nationally recognized healthcare security firm that began in 2003. Tom is a co-author of four books on healthcare information security. He is frequently a speaker at national conventions and is often quoted in trade journals. Tom has over 28 years of information security experience.