Subscribe to Events Feeds

264 Results Found

Everywhere Else Tennessee National Startup Conference
4/30/2014 7:00 PM - 5/2/2014 11:00 PM
409 South Main Building Memphis, Tennessee United States
Event Listing
Summary:

Three day summit style conference with hundreds of entrepreneurs, investors, & creatives. National recognized speakers, a Startup Showdown and plenty of after hours events.

FDA Acceptance of Foreign Clinical Studies Not Conducted Under An IND
4/25/2014 10:00 AM - 11:30 AM
Online Event Fremont, California United States
Event Listing
Summary:

This session covers the various licensing methods (for Drugs, Biologics & Combination Products) by which applicants can file for product licenses (Marketing Authorizations) in one or multiple Member States, as well as fully across all Member States of the European Union. This course specifically outlines and discusses the structure of the regulatory agencies at the EU-level and across specific Member States. Course content will explain which procedures are available for which products and then will follow the license processing steps for each pathway.

Founder Talk Frank White Decoding the Investment Term Sheet
4/23/2014 12:00 PM - 1:30 AM
CIE Pensacola, Florida United States
Event Listing
Summary:

Decoding the

Term Sheet- addressing typical structures and legal terms

in angel and VC investments

Price: FREE

FredLug Meetup
4/26/2014 9:00 AM - 11:00 AM
England Run Library Fredericksburg, Virginia United States
Event Listing
Summary:

A Linux Users Group to meet and talk about Open Source and Linux. We discuss a variety of subjects from very technical to high level all concentrated in providing IT solutions using Open Source and Linux.

From Enterprise Service Bus ESB to Internet Service Bus ISB
5/21/2014 10:00 AM - 11:30 AM
Online Event Fremont, California United States
Event Listing
Summary:

We have successfully built and integrated service based applications. Now we want to deploy them in the cloud and take advantage of commercial, cloud-based applications, but the integration challenges become much more complicated than between on-premise applications. Recent surveys show, for example, that companies abandon SaaS solutions because of problems integrating SaaS with on-premise applications.

G60 Pitch Contest 21C Bentonville
4/21/2014 5:30 PM - 7:30 PM
21c Museum Hotel Bentonville, Arkansas United States
Event Listing
Summary:

The G60 Pitch Contest is an event created to promote startups, improve founder communication skills, and to increase "creative collisions" in emerging entrepreneurial ecosystems.

Gateway to Innovation Conference
4/23/2014 7:00 AM - 4:15 PM
Hyatt Regency St. Louis at the Arch St. Louis, Missouri United States
Event Listing
Summary:

The 2014 Gateway to Innovation Conference brings IT Leaders and thinkers together from across the nation to inspire, collaborate and gain the competitive edge in an industry that demands more for less.

Price: 350

GeekWire Awards 2014
5/8/2014 6:00 PM - 9:00 PM
EMP Museum Seattle, Washington United States
Event Listing
Summary:

Join us for one of the region’s most-anticipated and hotly-contested tech events: the GeekWire Awards, presented by Wave Business Solutions. Continuing this great tradition, we’ll reveal the winners of the Pacific Northwest’s annual startup and technology awards, as nominated and chosen by GeekWire readers.

Google Glass with Wes Hardaker Linux Users Group of Davis Lugod
4/21/2014 7:00 PM - 9:00 PM
Davis Public Library Davis, California United States
Event Listing
Summary:

Google Glass is a wearable computer with an optical head-mounted display (OHMD) that is being developed by Google in the Project Glass research and development project, with a mission of producing a mass-market ubiquitous computer. Google Glass displays information in a smartphone-like hands-free format, that can communicate with the Internet via natural language voice commands.

HIPAA Enforcement and Portable Devices Today
5/13/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: It seems everyone is moving to a new smart phone and wants to use it in all the incredible ways it can be used, including for health care purposes. New health care apps are being released all the time, and even good old e-mail is being used more and more to communicate, by providers and patients alike.

In order to integrate the use of mobile technology into patient communications, it is essential to perform the proper steps in an information security compliance process to evaluate and address the risks of using the technology. This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate mobile technology into your organization in a compliant way. The process, including the use of information security risk analysis, will be explained, and the policies needed to support the process will be described.

But the process must also include consideration of various patient access requirements in the HIPAA Privacy Rule. There are new requirements to provide patients electronic access of electronically held PHI which raise new questions of how that access will be provided and how the information will be protected during and after access. And there has long been a HIPAA requirement for covered entities to do their best to meet the requests of their patients for particular modes of communication, and using a mobile device is no exception.

The stakes are high – any improper exposure of PHI may result in an official breach that must be reported to the individual and to the US Department of Health and Human Services, at great cost and with the potential to bring fines and other enforcement actions if a violation of rules is involved. Likewise, complaints by a patient if they are not afforded the access they desire can bring about HHS inquiries and enforcement actions, so it is essential to find the right balance of access and control.

HHS compliance audit activity and enforcement penalties are both increased, especially in instances of willful neglect of compliance, if, for instance, your organization hasn't adopted the complete suite of policies and procedures needed for compliance, or hasn’t adequately considered the impact of mobile devices on your compliance. Given that mobile devices are a leading source of breaches of PHI, it is essential to consider these devices and how their use affects the privacy and security of PHI; not doing so is inviting enforcement action by HHS.

The session will discuss the requirements, the risks, and the issues of the increasing use of mobile devices for patient communications and provide a road map for how to use them safely and effectively, to increase the quality of health care and patient satisfaction.

Areas Covered in the Session:

Find out the ways that patients want to use their mobile technology to communicate with providers, and the ways providers want to use their mobile technology to enable better patient care.

Learn what are the risks of using mobile technology, what can go wrong, and what can result when it does.

Find out about HIPAA requirements for access and patient preferences, as well as the requirements to protect PHI.

Learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires.

Find out what policies and procedures you should have in place for dealing with mobile devices and any new technology.

Learn about the training and education that must take place to ensure your staff uses mobile devices properly and does not risk exposure of PHI.

Find out the steps that must be followed in the event of a breach of PHI.

Learn about how the HIPAA audit and enforcement activities are now being increased and what you need to do to survive a HIPAA audit.

Who Will Benefit:

Compliance Director

CEO

CFO

Privacy Officer

Security Officer

Information Systems Manager

HIPAA Officer

Chief Information Officer

Health Information Manager

Healthcare Counsel/lawyer

Office Manager

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.

MentorHealth

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1hyxw9X

http://www.mentorhealth.com/

Events Map