Return-Path: <marketing@audio-educator.com>
Received: from vps.transocean.com
	by vps.transocean.com with LMTP id 8CVUHS1Kslp5TQAAInt2oQ
	; Wed, 21 Mar 2018 05:03:57 -0700
Return-path: <marketing@audio-educator.com>
Envelope-to: john@transocean.com
Delivery-date: Wed, 21 Mar 2018 05:03:57 -0700
Received: from app15.hraudiotrainings.com ([209.220.97.207]:2736)
	by vps.transocean.com with esmtp (Exim 4.89_1)
	(envelope-from <marketing@audio-educator.com>)
	id 1eycT7-00058P-S3
	for john@transocean.com; Wed, 21 Mar 2018 05:03:57 -0700
Received: by app15.hraudiotrainings.com with SMTP id 332340D2F.97
    for <john@transocean.com>; Wed, 21 Mar 2018 08:03:09 -0400
To: john <john@transocean.com>
From: "HIPAA Boot Camp" <marketing@audio-educator.com>
Reply-To: <marketing@audioeducatormail.com>
Subject: 2018 HIPAA compliance boot camp - 4 AAPC CEUs
Date: Wed, 21 Mar 2018 08:03:09 -0400
Message-ID: <B639F9..@hraudiotrainings.com>
MIME-Version: 1.0
Content-type: text/html
X-Spam-Status: No, score=1.5
X-Spam-Score: 15
X-Spam-Bar: +
X-Ham-Report: Spam detection software, running on the system "vps.transocean.com",
 has NOT identified this incoming email as spam.  The original
 message has been attached to this so you can view it or label
 similar future email.  If you have any questions, see
 root\@localhost for details.
 
 Content preview:  2018 HIPAA Compliance Virtual Boot Camp Presented By: Jim
    Sheldon-Dean Pre-Recorded Event | Duration: 4 Hrs | CEUs: 4 AAPC CEU Approved
    ORDER NOW Apply EASTER50 and get $50 Off Medical offices have powerful new
    tools available to them for reaching out to their patients for purposes such
    as reminders and the announcement of new services, and to describe products
    and services that patients could be interested in. Texting and e-mail offer
    new opportunitìes for communication that patients are coming to expect and
    providers are eager to use. However, there are limitations on the use of
   protected health information (PHI) for continuation of care versus marketing
    purposes, and limitations under other laws such as the Telephone Consumer
    Protection Act of 1991 (TCPA), the CAN-SPAM Act that limit contacting patients
    on their cell phones, via texts, or email. [...] 
 
 Content analysis details:   (1.5 points, 3.0 required)
 
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
  0.0 URIBL_BLOCKED          ADMINISTRATOR NOTICE: The query to URIBL was blocked.
                             See
                             http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
                              for more information.
                             [URIs: audioeducator.com]
  0.0 T_SPF_PERMERROR        SPF: test of record failed (permerror)
  0.8 BAYES_50               BODY: Bayes spam probability is 40 to 60%
                             [score: 0.5000]
  0.0 HTML_FONT_SIZE_LARGE   BODY: HTML font size is large
  0.7 MIME_HTML_ONLY         BODY: Message only has text/html MIME parts
  0.0 HTML_MESSAGE           BODY: HTML included in message
  0.0 T_HTML_TAG_BALANCE_CENTER Malformatted HTML
X-Spam-Flag: NO








<html xmlns="http://www.w3.org/1999/xhtml">
<head><link rel="stylesheet" type="text/css" href="http://app15.hraudiotrainings.com/V/4/162639/104492" media="screen"/>
<meta content="text/html;charset=UTF-8" http-equiv="content-type" />
<title></title>
                <style>
body {margin:0px; padding: 0px;}
      table {border-collapse: collapse;}
      td {color: #000000;}
	  .responsive-image img {
          height: auto !important;
          max-width: 100% !important;
          width: 100% !important;
        }
		
		a {
		text-decoration:none;
	}
		
@media only screen and (max-width: 595px) {
        body,table,td,p,a,li,blockquote {
          -webkit-text-size-adjust:none !important;
        }
        table {width: 100% !important;}

        .responsive-image img {
          height: auto !important;
          max-width: 100% !important;
          width: 100% !important;
        }
		.removeborder
		{ border:none !important;
		}
      }
                </style>
</head>

<body>
<table width="100%" border="0" cellpadding="0" cellspacing="0">
  <tr>
    <td align="center" style="padding:10px;"><font face="Verdana" size="6" color="#00599c">2018 HIPAA Compliance Virtual Boot Camp </font></td>
  </tr>
   <tr>
    <td align="center" style="padding:10px 0px;"><font face="Verdana" size="3" color="#000000">


<strong>Presented By: Jim Sheldon-Dean</strong> <br />
<strong>Pre-Recorded Event</strong> | <strong>Duration:</strong> 4 Hrs  | <strong>CEUs</strong>: 4 AAPC CEU Approved</font></td>
  </tr>

   <tr>
    <td align="center" style="padding:10px 0px;"><strong><font face="Verdana" size="4" color="#00599c"><a href="http://app15.hraudiotrainings.com/C/14122/162639/104492/utm_medium=email&utm_source=Sheldon_032118&utm_campaign=E99NVTEMOR" style="color:#00599c; text-decoration:underline;"><em> ORDER NOW</em></a></font></strong></td>
  </tr>
   <tr>
    <td align="center" style="padding: 10px;"><font face="Verdana" size="3" color="#000000">
Apply </font><font face="Verdana" size="3" color="#ff3300"><strong>EASTER50</strong></font><font face="Verdana" size="3" color="#000000"> and get </font><font face="Verdana" size="3" color="#ff3300"><strong>$50 Off</strong></font></td>
  </tr> 
  <tr>
    <td style="padding:5px 10px 10px 10px;"><font face="Verdana" size="3" color="#000000"> Medical offices have powerful new tools available to them for reaching out to their patients for purposes such as reminders and the announcement of new services, and to describe products and services that patients could be interested in. Texting and e-mail offer new opportunit&igrave;es for communication that patients are coming to expect and providers are eager to use. However, there are limitations on the use of protected health information (PHI) for continuation of care versus marketing purposes, and limitations under other laws such as the Telephone Consumer Protection Act of 1991 (TCPA), the CAN-SPAM Act that limit contacting patients on their cell phones, via texts, or email.<br /><br />

There are times when it is useful and/or important to share health information. However, it is also important to prot&egrave;ct the identity of the individuals whose information is involved. Such circumstances call for de-identification of PHI, which is not an easy process. Sometimes, for research purposes, a partially de-identified Limited Data Set may be needed. De-identification must be considered carefully, especially since HIPAA requirements for de-identification do not allow the use of patient initials to “de-identify” information.<br /><br />
HIPAA has been a law for more than twenty years now, and the rules in place call for extensive policies and procedures to ensure compliance with the HIPAA Security Rule. However, not all entities have done the work necessary to conduct an accurate and thorough assessment of the risks to the security of PHI, and to develop and implement their security policies and procedures. Even if they have all the best practices in place, entities must have the supporting policies and procedures to ensure consistency in service and compliance with the law, and they need to be aware of the risks they face and be ready to respond to changes in the risk landscape.<br /><br />

This <a href="http://app15.hraudiotrainings.com/C/14122/162639/104492/utm_medium=email&amp;utm_source=Sheldon_032118&amp;utm_campaign=E99NVTEMOR"><strong>2018 HIPAA Compliance Virtual Boot Camp</strong></a> with expert <strong>Jim Sheldon-Dean</strong> will focus on these three areas of HIPAA compliance that all healthcare entities must address today or face serious consequences.</font></td>
  </tr>
  <tr>
    <td style="padding:0px 10px 10px 10px;"><strong><font face="Verdana" size="3" color="#000000">Session Agenda</font></strong></td>
  </tr>
  <tr>
<td style="padding:10px; padding-top:0px;"><strong><font face="Verdana" size="3" color="#000000">Session 1: 2018 HIPAA Issues in Patient Communications: Texting, E-mail, Reminders, and Marketing Done the Right Way</font></strong></td>
</tr>
<tr>
<td style="padding:10px; padding-top:0px;"><font face="Verdana" size="3" color="#000000"> <strong>Length:</strong> 90 minutes </font></td>
</tr>
<tr>
<td style="padding:10px; padding-top:0px;">
         <ul>
		
    <li><font face="Verdana" size="3" color="#000000">The ways in which patients want to use their e-mail and texting to communicate with providers</font></li>
    <li><font face="Verdana" size="3" color="#000000">The ways in which providers want to use e-mail and texting to reach out to their patients and enabl&egrave; better patient care</font></li>
    <li><font face="Verdana" size="3" color="#000000">The risks of using e-mail and texting: What can go wrong and what can it r&egrave;sult in</font></li>
    <li><font face="Verdana" size="3" color="#000000">HIPAA requirements about the use of PHI for marketing purposes</font></li>
    <li><font face="Verdana" size="3" color="#000000">What is marketing and what is providing patient care or treatment alternatives</font></li>
    <li><font face="Verdana" size="3" color="#000000">How the Telephone Consumer Protection Act of 1991 limits how you may reach out to patients' cell phones for various purposes, and how a simple consent can reduce the issues</font></li>
    <li><font face="Verdana" size="3" color="#000000">How the CAN-SPAM Act limits your communications for marketing purposes</font></li>
    <li><font face="Verdana" size="3" color="#000000">How you must respect your patients' desires to not receive unwanted e-mail</font></li>
    <li><font face="Verdana" size="3" color="#000000">The policies and procedures you should have in place for dealing with e-mail and texting, as well as with any new technology</font></li>
    <li><font face="Verdana" size="3" color="#000000">The steps to follow in the event of a breach of PHI</font></li>

</ul>
</td>
</tr>
  <tr>
    <td style="padding:0px 10px 10px 10px;"><strong><font face="Verdana" size="3" color="#000000">Session 2: 2018 De-Identification of Protected Health Information: Removing Identifiers of PHI is Harder than it Looks </font></strong></td>
  </tr>
  <tr>
<td style="padding:10px; padding-top:0px;"><font face="Verdana" size="3" color="#000000"> <strong>Length:</strong> 60 minutes</font></td>
</tr>
  <tr>
    <td style="padding:0px 10px 10px 10px;"><ul>
                                 
    <li><font face="Verdana" size="3" color="#000000">De-identification and its rationale</font></li>
    <li><font face="Verdana" size="3" color="#000000">The de-identification standard</font></li>
    <li><font face="Verdana" size="3" color="#000000">Preparation for de-identification</font></li>
    <li><font face="Verdana" size="3" color="#000000">Guidance on satisfying the expert determination method</font></li>
    <li><font face="Verdana" size="3" color="#000000">Who is an expert and how do experts assess the risk of identification of information</font></li>
    <li><font face="Verdana" size="3" color="#000000">What are the approaches by which an expert assesses the risk that health information can be identified</font></li>
    <li><font face="Verdana" size="3" color="#000000">What are the approaches by which an expert mitigates the risk of identification of an individual in health information</font></li>
    <li><font face="Verdana" size="3" color="#000000">Guidance on satisfying the safe harbor method</font></li>
    <li><font face="Verdana" size="3" color="#000000">Examples of dates that are not permitted according to the safe harbor method</font></li>
    <li><font face="Verdana" size="3" color="#000000">What constitutes "any other unique identifying number, characteristic, or cod&egrave;" with respect to the safe harbor method of the Pr&igrave;vacy Rule</font></li>
    <li><font face="Verdana" size="3" color="#000000">What is "actual knowledge that the remaining information could be used either alone or in combination with other information to identify an individual who is a subject of the information” under the Pr&igrave;vacy Rule</font></li>

								 
         </ul></td>
  </tr>
  <tr>
    <td style="padding:0px 10px 10px 10px;"><strong><font face="Verdana" size="3" color="#000000">Session 3: 2018 HIPAA Security Rule Risk Analysis, Policies, and Procedures: Being Prepared and Avoiding Security Incidents</font></strong></td>
  </tr>
   <tr>
<td style="padding:10px; padding-top:0px;"><font face="Verdana" size="3" color="#000000"> <strong>Length:</strong> 90 minutes </font></td>
</tr>
  <tr>
    <td style="padding:0px 10px 10px 10px;"><ul>
                                 
    <li><font face="Verdana" size="3" color="#000000">What the HIPAA Security Rule requires</font></li>
    <li><font face="Verdana" size="3" color="#000000">What a HIPAA security risk analysis is, how you can conduct one, and what you can learn from it</font></li>
    <li><font face="Verdana" size="3" color="#000000">What a good risk analysis is and what is not</font></li>
   <li><font face="Verdana" size="3" color="#000000">Risk analysis tools and methods</font></li>
   <li><font face="Verdana" size="3" color="#000000">Essential policies and procedures for HIPAA Security Rule compliance</font></li>
    <li><font face="Verdana" size="3" color="#000000">Finding and filling any gaps in your policies and procedures</font></li>
    <li><font face="Verdana" size="3" color="#000000">The difference between policies and procedures, and what belongs in each</font></li>
    <li><font face="Verdana" size="3" color="#000000">The importance of comparing your policies and procedures to your actual practices and making the necessary adjustments to synchronize them</font></li>
    <li><font face="Verdana" size="3" color="#000000">Planning the continuing management of your risks</font></li>
    <li><font face="Verdana" size="3" color="#000000">Planning your next reviews and your information security management process</font></li>
    <li><font face="Verdana" size="3" color="#000000">How to consider new information security risks and what can cause them</font></li>

                                    
    
      
    </ul> </td>
  </tr>
  <tr>
    <td align="center" style="padding: 10px;"><font face="Verdana" size="3" color="#000000">
Apply </font><font face="Verdana" size="3" color="#ff3300"><strong>EASTER50</strong></font><font face="Verdana" size="3" color="#000000"> and get </font><font face="Verdana" size="3" color="#ff3300"><strong>$50 Off</strong></font><font face="Verdana" size="2" color="#000000">&nbsp;
</font></td>
  </tr>
  <tr>
    <td align="center"><strong><font face="Verdana" size="5" color="#00599c"><a href="http://app15.hraudiotrainings.com/C/14122/162639/104492/utm_medium=email&utm_source=Sheldon_032118&utm_campaign=E99NVTEMOR" style="color:#00599c; text-decoration:underline;"><em>ORDER NOW</em></a></font></strong></td>
  </tr>
  <tr>
    <td style="padding:10px;" align="center"><font face="Verdana" size="3" color="#000000">✆ Call now at <strong>1-866-251-3060 </strong>
or email at 
 <a href="mailto:virtualbootcamp@audioeducator.com" style="color:#000000; text-decoration:underline;">virtualbootcamp@audioeducator.com </a>  (Reference cod&egrave;: <strong>E99NVTEM</strong>)</font></td>
  </tr>
</table><p align="center"><font color="#000000" size="1" face="Arial">We hope you found this message to be useful.<br/>If you don’t wish to receive any further communication, please click the unsubscribe link below. 
Your request will be processed within 10 days. <br />
This message has been sent by Audio Educator.</font></p>
</body><center><a href="http://app15.hraudiotrainings.com/C/9558/162639/104492/e=john@transocean.com&c=&d1=E99NVTEMOR&d2=&id=-1&n=_&t=HC_Audio"><br>Unsubscribe here</a>
</html>
