Knowledge Library Polish Off Your Privacy Monitoring Program
Tuesday, February 13, 2018

Polish Off Your Privacy Monitoring Program

More than ever, healthcare organizations are at a greater risk of falling short on patient privacy requirements. Since the Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996, the healthcare industry has seen a steady stream of regulations, such as the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 and the HIPAA Breach Notification Rule of 2013.

Join Nadia Fahim-Koster, CISSP, HCISPP, as she outlines how to implement a privacy monitoring program that will position your organization to both proactively identify when there is risk of a data breach, and align you with HIPAA/HITECH auditing requirements. Privacy monitoring includes both application-level access to PHI as well as any supporting infrastructure, such as servers, workstations, network devices, etc.

Gain a better understanding of:

  • Requirements driving the need for continuous logging and monitoring
  • Implications of the HIPAA Breach Notification Rule
  • Methods to proactively position your organization to monitor risks of data breaches
  • Steps to establishing a scalable monitoring program
  • Aspects of a clear and accountable communication plan

Nadia Fahim-Koster, CISSP, HCISPP is an experienced information Privacy and Security leader, bringing over 15 years of directly relevant, operational experience in healthcare privacy and security to her clients. Prior to joining Meditology, Nadia served for almost six years as the CISO at Piedmont Healthcare, one of Atlanta’s premier health systems and as Chief Privacy Officer in her last year with Piedmont. Prior to that, she led the Information Security and Privacy department at Gwinnett Health System, a large regional provider. She has deep experience in the development, implementation, and operation of a corporate information privacy and security compliance programs, including identifying and addressing all applicable regulatory requirements, including HIPAA, HITECH, and PCI, and identifying and integrating privacy and security best practices.

Webinar replays are not eligible for CEU credit.

To view the webinar replay, please click the link below and complete the information. You will receive an email with a link to the webinar.