Subscribe to Events Feeds

252 Results Found

Marketing Made Lean
9/3/2014 1:00 PM - 9/24/2014 5:00 PM
FVTC Waupaca Regional Center Waupaca United States
Event Listing
Summary:

The FVTC Venture Center Team has developed a 4-part, 16 hour workshop series, Marketing Made Lean for micro and small businesses.Marketing Made Lean will enable you to gain and retain customers while increasing sales and profit.

Eseed Entrepreneurship Training
9/10/2014 6:00 AM - 12/8/2014 9:00 AM
FVTC Waupaca Regional Center Waupaca United States
Event Listing
Summary:

E-seed™ provides practical tools to prepare a business plan that can be applied immediately to your start-up or existing business. Gain awareness and expand your entrepreneurial and small business skills with these hands-on and interactive series.

Understanding and Implementing the Medical Device Directive 2Day Inperson Seminar
7/25/2014 8:30 AM - 4:00 PM
Courtyard Chicago Downtown/River North chicago, Arizona United States
Event Listing
Summary:

This course will address the details of the MDD and includes other significant issues such as the Quality Management System (EN ISO 13485:2012), Risk Management (EN ISO 14971:2012), Clinical Evaluation (MDD Annex X), the role of harmonized standards, and the vigilance system.

Seminar on How to create a company harassment policy By TrainHR
7/24/2014 9:00 AM - 7/25/2014 6:00 PM
DoubleTree by Hilton Hotel San Francisco Airport Burlingame, California United States
Event Listing
Summary:

Overview:

The workshop will start by assessing the group's "IQ" on what is workplace harassment by reviewing several scenarios. When a male supervisor harasses a male subordinate by engaging in verbal abuse and taunting gestures, does this constitute harassment? If an employee reports harassment and the complaint is immediately addressed, however, the harassment continues - does the employee have a case for harassment? When two employees are engaged in consensual relations, can this create a sexual harassment claim? The answers may surprise you. The purpose of this exercise is to heighten participants' awareness that harassment is not always black and white.

Why should you attend:

Harassment is very damaging to the work environment and business. It results in lost productivity, negative public relations, unnecessary litigation, excessive costs and ultimately damages employee morale. From January to September 2010, the EEOC received 99,992 charges which is the highest number of charges in the agency's 45 year history. Over this same time period the agency collect over $319 million in monetary benefits for individuals - which is the highest collected through administrative enforcement in the Commission's history (source: www.eeoc.gov/eeoc/statistics/enforcement/sexualharassment.ofm). Another alarming statistic is that with every 1.5% increase in unemployment, there is a 21% increase in litigation.

While just "general" harassment in the workplace is not actionable, employees do have rights with regard to harassment if the harassment is based on what is called a "protected class". Protected classes include protection from harassment based on sex, age, race, handicap/disability, national origin and religion. Therefore, if an employer subjects an employee to harassment because the employee is a member of a protected class, it could cost hundreds of thousands of dollars (in some cases over $1 million).

Areas Covered in the Session:

Legislation overseeing harassment & discrimination

Examples of harassment

Creating a company harassment policy

Conducting an investigation

Workplace factors that impact harassment

HR management

21 CFR Part 820 Quality System Regulation Applying Principles of Lean Documents
7/30/2014 10:00 AM - 11:00 AM
Online Event Fremont, California United States
Event Listing
Summary:

All life science businesses are required to maintain their Quality Management System (QMS) processes in a state of control, via controlled documents and objective evidence in the form of records. Medical device manufacturing plants, required to follow 21 CFR Part 820, have the additional responsibility to ensure that each and every step of the manufacturing process is controlled by work instructions, SOPs, set-up instructions, equipment maintenance, and support functions, and that evidence of this work is maintained by controlled records.

Best Practices in Supplier Management
7/29/2014 10:00 AM - 11:00 AM
Online Event Fremont, California United States
Event Listing
Summary:

Many companies spend a great deal of time and money in pursuit of compliance with this. Many companies can spend MUCH LESS time and money, and still be in control of their suppliers and in compliance with the regulations. This presentation will review the QSR and ISO requirements for supplier evaluation and assessment, and provide cost efficient, equally compliant options to many of the most common practices.

Combination Products FDAs Proposed Rule for GMP Requirements and Introduction and Expectations for
7/30/2014 10:00 AM - 11:00 AM
Online Event Fremont, California United States
Event Listing
Summary:

What is a combination product? What are some examples of combination products? How are combination products assigned for review? Where can I find guidance for how master files can be used in the submission of information relevant to my combination product? Determine which Center will review my combination or non-combination product?

FDA Device Software Regulation
7/29/2014 10:00 AM - 11:00 AM
Online Event Fremont, California United States
Event Listing
Summary:

Software's level of complexity and use is expanding at exponential levels. Likewise the potential risks to health follow suit. Problems with software create a number of different hurdles. Software may be a standalone device, control a device's performance, make calculations, identify treatment options or begin to play a more active role in making clinical decisions regarding patient management and treatment.

HIPAA Compliance Though Policies
7/30/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and its regulations (the "Privacy Rule" and the "Security Rule") protect the privacy of an individual's health information and govern the way that covered entities and now business associates collect, maintain, use, and disclose protected health information ("PHI"). Creation and implementation of policies and procedures are a requirement for HIPAA compliance.

For HIPAA, if it is not in writing, it is not. This maxim holds true for all covered entities and business associates when creating and implementing HIPAA compliance policies and procedures. To ensure compliance with HIPAA regulations, an organization must have written documentation as set forth by HIPAA's administrative requirements. Now that DHHS is considering breaches involving lack of a policy (even if HIPAA does not say that you must have a policy concerning that activity) as willful neglect, which carries the stiffest civil money penalties, you must consider what policies you need.

In this webinar, we will discuss what the required policies are, policies that you must have if they are reasonable and appropriate, and other policies that are not mentioned in HIPAA but that DHHS may nonetheless consider as being necessary. Learn what a policy should contain and how to draft a policy.

Areas Covered in the Session:

The HIPAA requirement to have policies and procedures

Required policies

Addressable policies

Other policies that may be necessary

Contents of HIPAA policies

How to write a policy

Training on policies

Retention of policies

Who Will Benefit:

HIPAA Compliance Officers

HIPAA Security Officers

HIPAA Privacy Officers, CFOs

CIOs

Medical Records Personnel

Health Information Management Professionals

Health Care Attorneys

Billing Services

Jonathan P. Tomes , J.D., is a health care attorney and partner in the law firm of TOMES & DVORAK, CHARTERED. He has written more than 50 books, including The Compliance Guide to HIPAA and the DHHS Regulations, and dozens of articles in the area of HIPAA compliance.

MentorHealth

Roger Steven

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1ptrhGu

http://www.mentorhealth.com/

Texting and Email With Patients Under HIPAA
7/24/2014 10:00 AM - 11:30 AM
online event Fremont, California United States
Event Listing
Summary:

Overview: This session will focus on the rights of individuals to communicate in the manner they desire, and how a medical office can decide what is an acceptable process for communications with individuals. The session will explain how to discuss communications options with individuals so that you can best meet their needs and desires, while preserving their rights under the rules.

With the new HIPAA random audit program now getting under way, and increases in enforcement actions following breaches, now is the time to ensure your organization is in compliance with the regulations and meeting the e-mail and texting communication needs and desires of its providers and patients. You need the proper privacy protections for health information, and the necessary documented policies and procedures, as well as documentation of any actions taken pursuant to your policies and procedures. Your policies and procedures will probably need major revisions to maintain compliance in areas such as individual access of records, accounting of disclosures, and breach notification. And, of course, you will need to train your staff in all the new policies and procedures.

E-mail has long been a staple of people's lives, but as we move into the new digital age, it seems everyone is moving to a new smart phone and wants to use it in all the incredible ways it can be used for health care purposes, including the use of e-mail and texting. Doctors are finding that texting is far more flexible, convenient, and effective than paging, and patients want to be able to use short message texting for handling of appointments, updates, and the like, where even e-mail or the telephone would seem inconvenient.

In order to integrate the use of e-mail and texting into patient communications, it is essential to perform the proper steps in an information security compliance process to evaluate and address the risks of using the technology. This session will describe the information security compliance process, how it works, and how it can help you decide how to integrate e-mail and texting into your organization in a compliant way. The process, including the use of information security risk analysis, will be explained, and the policies needed to support the process will be described.

But the process must also include consideration of various patient access requirements in the HIPAA Privacy Rule. There are new requirements to provide patients electronic access of electronically held PHI which raise new questions of how that access will be provided and how the information will be protected during and after access. And there has long been a HIPAA requirement for covered entities to do their best to meet the requests of their patients for particular modes of communication, and using e-mail or texting is no exception.

The stakes are high - any improper exposure of PHI may result in an official breach that must be reported to the individual and to the US Department of Health and Human Services, at great cost and with the potential to bring fines and other enforcement actions if a violation of rules is involved. Likewise, complaints by a patient if they are not afforded the access they desire can bring about HHS inquiries and enforcement actions, so it is essential to find the right balance of access and control.

HHS compliance audit activity and enforcement penalties are both increased, especially in instances of willful neglect of compliance, if, for instance, your organization hasn't adopted the complete suite of policies and procedures needed for compliance, or hasn’t adequately considered the impact of e-mail or texting on your compliance.

The session will discuss the requirements, the risks, and the issues of the increasing use of e-mail and texting for patient and provider communications and provide a road map for how to use them safely and effectively, to increase the quality of health care and patient satisfaction. In addition, the session will discuss how to be prepared for the eventuality that there is a breach, so that compliance can be assured.

Why should you attend:

The HIPAA Omnibus Update rules contain numerous changes to HIPAA Privacy, Security, and Breach Notification rules that affect communication with patients and clients of health care services, who often ask to communicate with health care offices via e-mail or text message. Many of the policies and procedures in place at every health care-related organization will need to be reviewed and updated to meet the new requirements. Organizations need to understand the various ways that health care communications can take place, and how patient communications fit in with the HIPAA rules. They need to design and implement a patient communication policy and plan, and train their staff on it, or they may face significant new fines for noncompliance.

E-mail and texting present new challenges to health care providers, as there are simultaneously new requirements to share information with patients, and a new enforcement effort to ensure the privacy and security of Protected Health Information (PHI). Meeting both challenges requires careful consideration of all the regulations and technologies, as well as patient preferences and work flow.

Most HIPAA covered entities now face difficult choices between compliance and ease of communication. Most organizations haven’t updated their information security risk analysis or policies and procedures and run the risk of breaches, rule violations, and fines in the event of mishandling of PHI using these new technologies.

Areas Covered in the Session:

Find out the ways that patients want to use their e-mail and texting to communicate with providers, and the ways providers want to use e-mail and texting to enable better patient care

Learn what are the risks of using e-mail and texting, what can go wrong, and what can result when it does

Find out about HIPAA requirements for access and patient preferences, as well as the requirements to protect PHI

Learn how to use an information security management process to evaluate risks and make decisions about how best to protect PHI and meet patient needs and desires

Find out what policies and procedures you should have in place for dealing with e-mail and texting, as well as any new technology

Learn about the training and education that must take place to ensure your staff uses e-mail and texting properly and does not risk exposure of PHI

Find out the steps that must be followed in the event of a breach of PHI

Learn about how the HIPAA audit and enforcement activities are now being increased and what you need to do to survive a HIPAA audit

Who Will Benefit:

Compliance Director

CEO

CFO

Privacy Officer

Security Officer

Information Systems Manager

HIPAA Officer

Chief Information Officer

Health Information Manager

Healthcare Counsel/lawyer

Office Manager

Jim Sheldon-Dean is the founder and director of compliance services at Lewis Creek Systems, LLC, a Vermont-based consulting firm founded in 1982, providing information privacy and security regulatory compliance services to a wide variety of health care entities.

MentorHealth

Roger Steven

Phone No: 800-385-1607

FaX: 302-288-6884

webinars@mentorhealth.com

Event Link: http://bit.ly/1kaP5df

http://www.mentorhealth.com/

Events Map