New Patients are vital for growing and sustaining a Health Care Provider’s Practice. Patient attraction has become an enormous business resulting in highly visible Internet-based HIPAA violations and risks for providers. Websites, social media, patient satisfaction surveys, email and text messaging sold by vendors including Business Associates are all subject to HIPAA rules that are frequently overlooked or ignored.
HIPAA Rules for the most common patient attraction tools are clear and unequivocal. One look at a health care provider’s website can provide undeniable evidence of a HIPAA violation and indications of other violations to be investigated.
There are widespread violations of the HIPAA Rules for communicating with patients for patient engagement as well. These violations are being made by Providers and Business Associates primarily through unencrypted email and text message. A simple appointment reminder is, by definition, PHI even though it may not contain diagnostic specific information. So are Happy Birthday wishes, reminders that a patient is overdue for a checkup or has an outstanding balance on a bill.
You (Provider and Business Associate) must know how you can maximize your use of key patient engagement tools while protecting yourself and your organization from government penalties and patient lawsuits.
Health Care Providers have a mandatory “duty to warn” patients of risks associated with unencrypted email. A patient may refuse to receive unencrypted emails after being warned. Health Care Providers and Business Associates must strictly follow the patient’s restriction.
WHY SHOULD YOU ATTEND?
The information that makes a message subject to HIPAA- what is PHI? How can you have compliant behaviors in Social Media?
The “safe harbor” – How Health Care Providers may obtain consent from patients to send PHI in unencrypted email and unencrypted text messages and not be responsible for unauthorized access to the PHI in transmission or when received by the patient
What a Health Care Provider must do if a patient does not agree to receive PHI in unencrypted email or unencrypted text message
The requirements for a Business Associate to be able to communicate by email or text message with a patient on behalf of a Health Care Provider
How a Business Associate may protect itself from liability for violating HIPAA Rules about email and text messages in its Business Associate Agreement
What a Health Care Provider must do if a patient does not agree to receive PHI in unencrypted emails or text messages
How Health Care Providers and Business Associates may prove they are compliant with the HIPAA Rules through documentation
The Policies and Procedures Health Care Providers and Business Associates must have in place to comply with HIPAA Rules concerning communication with patients through email and text message
AREA COVERED
- Communication is key throughout Patient Attraction and Patient Engagement. This webinar will demonstrate effective ways to communicate while following the HIPAA Rules. This webinar also focus on HIPAA Rules for transmitting informational email and text messages to patients over an electronic communications network. We will
- Patient Engagement Tips: Protect Patients’ Privacy and PHI, Build the Relationship
- Policies and Procedures for your HIPAA Compliance Program
- Social Media: Reviews, Testimonials, and Likes
- Marketing & Patient Communication: Phone Calls, Emails, and Text Messages
- Websites: What to Post and Not to Post
- Portable Devices and Electronic Communications Network
- How Health Care Providers and Business Associates can work together to avoid violating HIPAA Rules about email and text message communications with patients
LEARNING OBJECTIVES
- Patient Engagement Tips: Protect Patients’ Privacy and PHI, Build the Relationship
- Policies and Procedures for your HIPAA Compliance Program
- Social Media: Reviews, Testimonials, and Likes
- Marketing & Patient Communication: Phone Calls, Emails, and Text Messages
- Websites: What to Post and Not to Post
- Portable Devices and Electronic Communications Network
- How Health Care Providers and Business Associates can work together to avoid violating HIPAA Rules about email and text message communications with patients
WHO WILL BENEFIT?
- HIPAA Compliance Official (HIPAA Officer)
- Compliance Director
- Practice Manager
- Privacy Officer
- Security Officer
- CEO,CFO,COO
- Chief Information Officer
- Information Systems Manager
- Health Information Manager
- Healthcare Counsel/lawyer
- Office Manager
- Contracts Manager
- Chief Clinical Officer
- Human Resources
The information that makes a message subject to HIPAA- what is PHI? How can you have compliant behaviors in Social Media?
The “safe harbor” – How Health Care Providers may obtain consent from patients to send PHI in unencrypted email and unencrypted text messages and not be responsible for unauthorized access to the PHI in transmission or when received by the patient
What a Health Care Provider must do if a patient does not agree to receive PHI in unencrypted email or unencrypted text message
The requirements for a Business Associate to be able to communicate by email or text message with a patient on behalf of a Health Care Provider
How a Business Associate may protect itself from liability for violating HIPAA Rules about email and text messages in its Business Associate Agreement
What a Health Care Provider must do if a patient does not agree to receive PHI in unencrypted emails or text messages
How Health Care Providers and Business Associates may prove they are compliant with the HIPAA Rules through documentation
The Policies and Procedures Health Care Providers and Business Associates must have in place to comply with HIPAA Rules concerning communication with patients through email and text message
- Communication is key throughout Patient Attraction and Patient Engagement. This webinar will demonstrate effective ways to communicate while following the HIPAA Rules. This webinar also focus on HIPAA Rules for transmitting informational email and text messages to patients over an electronic communications network. We will
- Patient Engagement Tips: Protect Patients’ Privacy and PHI, Build the Relationship
- Policies and Procedures for your HIPAA Compliance Program
- Social Media: Reviews, Testimonials, and Likes
- Marketing & Patient Communication: Phone Calls, Emails, and Text Messages
- Websites: What to Post and Not to Post
- Portable Devices and Electronic Communications Network
- How Health Care Providers and Business Associates can work together to avoid violating HIPAA Rules about email and text message communications with patients
- Patient Engagement Tips: Protect Patients’ Privacy and PHI, Build the Relationship
- Policies and Procedures for your HIPAA Compliance Program
- Social Media: Reviews, Testimonials, and Likes
- Marketing & Patient Communication: Phone Calls, Emails, and Text Messages
- Websites: What to Post and Not to Post
- Portable Devices and Electronic Communications Network
- How Health Care Providers and Business Associates can work together to avoid violating HIPAA Rules about email and text message communications with patients
- HIPAA Compliance Official (HIPAA Officer)
- Compliance Director
- Practice Manager
- Privacy Officer
- Security Officer
- CEO,CFO,COO
- Chief Information Officer
- Information Systems Manager
- Health Information Manager
- Healthcare Counsel/lawyer
- Office Manager
- Contracts Manager
- Chief Clinical Officer
- Human Resources
Speaker Profile
"Paul Hales received his Juris Doctor degree from Columbia University Law School and is licensed to practice law before the Supreme Court of the United States. He is an expert on HIPAA Privacy, Security, Breach Notification and Enforcement Rules with a national HIPAA consulting practice based in St. Louis. Paul is the author of all content in The HIPAA E-Tool, an Internet-based, Software as a Service product for health care providers and business associates."
Upcoming Webinars
Updated Metro 2®, e-OSCAR and the New Tougher FCRA/CFPB Com…
Conquer Toxic People - Learn To Protect Yourself And Get Yo…
Introduction to Generative AI for Accountants
Dealing With Difficult People In Life & Work
Surviving and Thriving Organizational Change and Loss: The …
Impact Assessment and Risk Management for Change Control
How to Write Effective Audit Observations: The Principles f…
Excel Deep Dive: Advanced Tips & Techniques – A 3-hour Work…
FDA Regulation of Artificial Intelligence/ Machine Learning
Coming Soon - New Minimum Salary Levels for Exempt Employee…
Marijuana: Compliance and Safety in the Workplace
Stressed Out: How to Handle Conflict, Difficult People and …
2025 Top Employment Regulations That Will Impact Employers!
How to Handle Workplace Conversations Around Politics and R…
Data Integrity: Compliance with 21 CFR Part 11, SaaS-Cloud,…
How to Give Corrective Feedback: The CARE Model - Eliminati…
Improving Employee Engagement & Retention Through Stay Inte…
SOPs - How to Write Them to Satisfy those Inspectors
Why EBITDA Doesn't Spell Cash Flow and What Does
Marketing to Medicare or Medicaid Beneficiaries - What You …
With Mandatory Paid Leave Gaining Ground Is It Time To Do A…
Human Error Reduction Techniques for Floor Supervisors
Documenting Misconduct that Will Stand Up in Court
Tattoos, hijabs, piercings, and pink hair: The challenges …
Trial Master File (TMF)/eTMF, & FDAs Draft Guidance for Ele…
Project Management for Non-Project Managers - How to commun…
OSHA Requirements for Supervisors, Project Leaders & HR - W…
Unlock Employee Loyalty: Stay Interviews Will Keep Them Eng…
Sunshine Act Reporting - Clarification for Clinical Research
FFIEC BSA/AML Examination Manual: What Compliance Officers …
Female to Female Hostility @Workplace: All you Need to Know
Humane Layoffs: How to Let People Go with Compassion and De…
Onboarding is NOT Orientation - How to Improve the New Empl…
Managing Toxic & Other Employees Who Have Attitude Issues
Building GMP Excellence: A Guide to Implementing Compliant …
Excel Power Skills: Master Functions, Formulas, and Macros …