Subscribe to Events Feeds

236 Results Found

Hack Night
7/29/2014 6:00 PM - 10:00 PM
Assembly Coworking Space Calgary Canada
Event Listing

Every Tuesday night from 6pm to 10pm, “Hack Nights” come alive with hustlers, hackers and hipsters coming together to work on their start-up ideas. If you are working on something tech related, and are in the pre-investment stage, this event is for you!

Weekly Open Make Night
7/29/2014 6:00 PM - 9:00 PM
Tampa Hackerspace Tampa, Florida United States
Event Listing

Lets get together to build some cool projects and meet some very cool people. Join us to work on your stuff, bounce ideas off of members and socialize.

Occasionally, we'll throw in a small class.

21 CFR Part 820 Quality System Regulation Applying Principles of Lean Documents
7/30/2014 10:00 AM - 11:00 AM
Online Event Fremont, California United States
Event Listing

All life science businesses are required to maintain their Quality Management System (QMS) processes in a state of control, via controlled documents and objective evidence in the form of records. Medical device manufacturing plants, required to follow 21 CFR Part 820, have the additional responsibility to ensure that each and every step of the manufacturing process is controlled by work instructions, SOPs, set-up instructions, equipment maintenance, and support functions, and that evidence of this work is maintained by controlled records.

Combination Products FDAs Proposed Rule for GMP Requirements and Introduction and Expectations for
7/30/2014 10:00 AM - 11:00 AM
Online Event Fremont, California United States
Event Listing

What is a combination product? What are some examples of combination products? How are combination products assigned for review? Where can I find guidance for how master files can be used in the submission of information relevant to my combination product? Determine which Center will review my combination or non-combination product?

HIPAA Compliance Though Policies
7/30/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing

Overview: The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and its regulations (the "Privacy Rule" and the "Security Rule") protect the privacy of an individual's health information and govern the way that covered entities and now business associates collect, maintain, use, and disclose protected health information ("PHI"). Creation and implementation of policies and procedures are a requirement for HIPAA compliance.

For HIPAA, if it is not in writing, it is not. This maxim holds true for all covered entities and business associates when creating and implementing HIPAA compliance policies and procedures. To ensure compliance with HIPAA regulations, an organization must have written documentation as set forth by HIPAA's administrative requirements. Now that DHHS is considering breaches involving lack of a policy (even if HIPAA does not say that you must have a policy concerning that activity) as willful neglect, which carries the stiffest civil money penalties, you must consider what policies you need.

In this webinar, we will discuss what the required policies are, policies that you must have if they are reasonable and appropriate, and other policies that are not mentioned in HIPAA but that DHHS may nonetheless consider as being necessary. Learn what a policy should contain and how to draft a policy.

Areas Covered in the Session:

The HIPAA requirement to have policies and procedures

Required policies

Addressable policies

Other policies that may be necessary

Contents of HIPAA policies

How to write a policy

Training on policies

Retention of policies

Who Will Benefit:

HIPAA Compliance Officers

HIPAA Security Officers

HIPAA Privacy Officers, CFOs


Medical Records Personnel

Health Information Management Professionals

Health Care Attorneys

Billing Services

Jonathan P. Tomes , J.D., is a health care attorney and partner in the law firm of TOMES & DVORAK, CHARTERED. He has written more than 50 books, including The Compliance Guide to HIPAA and the DHHS Regulations, and dozens of articles in the area of HIPAA compliance.


Roger Steven

Phone No: 800-385-1607

FaX: 302-288-6884

Event Link:

San Jose Making the Leap from Employee to Employer
7/30/2014 6:30 PM - 8:30 PM
Otoya San Jose Centro Costa Rica
Event Listing

Every day millions of people got to jobs they don't enjoy, but few do something about it. At the “Employee to Entrepreneur” event, you can hear the stories, tips, and best practices of those who left their jobs to pursue their own startup company.

San Jose Making the Leap from Employee to Employer
7/30/2014 6:30 PM
Otoya San Jose Centro Costa Rica
Event Listing

Do you want to start your own technology company, but don't know where to get started? You are not alone.

Presentation USDA Small Business Innovation Research Program
7/31/2014 8:00 AM - 5:00 PM
University of Nebraska - Lincoln East Union Lincoln, Nebraska United States
Event Listing

Anyone interested in learning more about USDA's Small Business Innovation Research (SBIR), including small business owners, researchers, state and local government representatives, and academics are welcome.

2day Inperson Seminar on Global Medical Device Regulation at Denver CO
7/31/2014 9:00 AM - 8/1/2014 6:00 PM
Event Listing

This course provides an overview of international medical device regulations. Beginning with a discussion of the similarity of global requirements, including both voluntary and mandatory standards and directives, and progressing to in-depth analyses of market specific requirements, the course provides the student with resources to meet the regulatory requirements for the largest world markets.

ProcuretoPay Fraud Detecting and Preventing Purchasing Receiving and Disbursement Fraud
7/31/2014 9:00 AM - 8/1/2014 6:00 PM
Hilton Garden Inn Denver Downtown Denver, Colorado United States
Event Listing


Procure to pay is the target for fraudsters of many kinds both inside and outside your organization. Consider the possibility of receiving a perfectly legitimately-looking invoice which gets approved and processed before it is determined that the sender of the invoice is a "ghost" vendor with nothing more than a postal box for an address.

Or-the case of the large retailer whose Accounts Payable department honored the E-mail request of a "vendor" to switch from check payment to ACH payment, only to learn several millions dollars in fraudulent payments later, that the sender was a fraudster.

Why should you attend:

Understand how common procurement, receiving and disbursement frauds are perpetrated

Understand who the primary perpetrators of purchasing, receiving and disbursement fraud are

Understand why purchasing, receiving and accounts payable employees commit fraud

Learn how not to manage P2P from important case studies of frauds committing in this area

Recognize the red flags of common P2P frauds

Know how to apply best P2P fraud detection tools and techniques

Learn to correct P2P control deficiencies in favor of a robust anti-fraud control framework

Events Map