This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate email and texting into your organization in a compliant way. The process, including the use of information security risk analysis, will be explained, and the policies needed to support the process will be described. There has long been a HIPAA requirement for covered entities to do their best to meet the requests of their patients for particular modes of communication, and using email or texting is no exception.
The session will discuss: the requirements, the risks, and the issues of the increasing use of email and texting for patient and provider communications and provide a road map for how to use them safely and effectively, to increase the quality of health care and patient satisfaction. In addition, the session will discuss how to be prepared for the eventuality that there is a breach, so that compliance can be assured.
· Understand the rules surrounding patient communications and access of information under HIPAA.
· Know how to explain the risks of insecure communications to patients.
· Manage and audit the use of insecure communications made at the request of patients.
· Know when secure communications are required and what must be done to secure communications and devices.