Summary of Presentation:
Inappropriate access to private information remains a leading cause of HIPAA violations. Under regulations, access should be limited on a need-to-know basis only. But studies and actual cases point to weak or non-existent access controls as a common scenario. This presentation will focus on how to control and monitor access in all places where private information resides. That includes emails, text messages, electronic devices, portable media, fax machines, laptops (sometimes in remote locations), and in downloads from databases.
Learning objectives/Competency Building in:
Content and activities: