How to Build a Breach Plan

Reacting Quickly When PHI is Compromised

Log in to access this.

Full access to this content is reserved for Health Care IT Advisor members.
Log in or learn how membership works.

View the On-Demand Presentation

Download PDF Download PDF (Updated as of 10/15)

Watch the videoStream video recording

About the Webconference

In 2012 alone, the Office of Civil Rights reported over 100 separate breach incidents, each compromising the PHI of 500 or more individuals. Recently, even RSA, Google, and Nasdaq have experienced breaches.

The speed and honesty with which an organization responds can have a great impact on limiting the damage. In this webconference, we focus on the most important things to have in place before a breach occurs.

Topics: HIPAA, Standards and Regulatory Policy, Information Technology, HITECH, Privacy and Security