Managerial Primer for Ensuring Information Security and Privacy of EHR's

Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology. Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate - after passing the 198........


The government enforced healthcare mandates continuously intersect with organizational formations to ensure appropriate goods or services delivered. For most affected enterprises, government interaction directly or indirectly reflects permissible activities, recognized structures, and social responsibility. In the regulatory arena, an adverse finding, coupled with prompt corrective actions can mitigate civil and criminal enforcement penalties, thereby potentially reducing or avoiding legal risks. Thus, given government-imposed mandates, organizational personnel should diligently pursue sustaining currency with applicable information security laws and regulations addressing electronic healthcare records.

Why should you attend this webinar?

Instituting and sustaining information security governance (ISG) requires comprehensive planning and organizing; robust acquisitions and implementations; effective delivery and support; as well as continuous monitoring and evaluation to address the myriad of managerial, operational, and technical issues that can thwart satisfying an enterprise's declared mission. Consequently, information security requires an adaptive balance between sound management and applied technology. Sound management enables assuring adequate asset safeguarding while applied technology can introduce efficiencies for addressing potential external or internal threats.

Information security design, deployment, and assurance require dedication to continuous improvement to ensure optimum effectiveness and efficiency. Whereby, confirmation of compliance with healthcare legislation, regulations, policies, directives, procedures, standards, and rules enable asserting preferred ISG. Nonetheless, monitoring and evaluating the current state of implemented controls may take a variety of forms; including control self-assessments and information technology (IT) audits. Furthermore, an IT auditor may not be the individual who executes an organization?s information security internal control review (ICR). However, an IT auditor may subsequently assess an ICR for effectiveness and/or efficiency. In the regulatory arena, an adverse finding, coupled with prompt corrective actions can mitigate civilly and criminal enforcement penalties, thereby potentially reducing or avoiding legal risks.

Areas Covered in the Session:

Who can Benefit:

As health organizations become more critically dependent on information systems to support care delivery, it has become increasingly evident that events in which losses of confidentiality, integrity, and availability may have a significant clinical effect. Consequently, issues arising from such information-related events are typically perceived to represent failures in the managerial obligations inherent in the duty of care.

All countries and jurisdictions will undoubtedly have case studies in which information breaches have led to misdiagnoses, deaths or protracted recoveries. Clinical governance frameworks, therefore, need to treat effective information security management as equal in importance to care treatment plans, infection management strategies and other core clinical management matters.

  • Healthcare

  • Target audience, role/designation.
  • Audit committee members
  • Risk management managers
  • External auditors
  • Internal auditors
  • Chief Executive Officers
  • Chief Information Officers
  • Compliance managers
  • Chief Information Security Officers
  • Information technology professionals
  • Control Self-Assessment personnel

Webinar Id: HIPRED104

Training Options:

Duration: 60 mins


 10:00 AM PT | 01:00 PM ET

 Single Attendee: [Only for one participant]

$129 (Live)                    $180 (Live + Recorded)

 Multiple Attendee: [For a group of 2-5 participants]

$268 (Live)                    $469 (Live + Recorded)

 Corporate Attendee: [For a group of 6-10 Participants]

$536 (Live)                    $787 (Live + Recorded)

 Recorded: [Six month unlimited access]

$151 (Single Attendee) $399 (Unlimited Attendee)

Refund Policy
Upcoming Webinar of Dr. Robert E. Davis
Managerial Primer for Ensuring....
Presenter: Dr. Robert E. Davis
When: 09/11/2019 | 10:00 AM PT |01:00 PM ET
Price: $129

More Webinar

Past Webinar of Dr. Robert E. Davis
How ISO/IEC 27001 can help ach....
Presenter: Dr. Robert E. Davis
6 months unlimited
Price: $167

More Webinar

Upcoming Webinar: HIPAA
HIPAA: How to Handle the Press....
Presenter: Jonathan P. Tomes
When: 08/28/2019 | 10 A.M PT |01:00 P.M ET
Price: $179

More Webinar

Past Webinar: HIPAA
HIPAA Update 2019-20: What's N....
Presenter: Mark Norby
6 months unlimited
Price: $241
How to Conduct a HIPAA Risk As....
Presenter: Brian L Tuttle
6 months unlimited
Price: $301

More Webinar

PayPal Logo   PayPal Verified Logo   GoDaddy Certified Image
Copyright © 2019 HIPAA Ijona . All Rights Reserved.