Oct 14 , 2016 Session 77: Our first review! And must we protect information from potential clients? View Session coachingcomputer encryptionconduitcovered entitycrmEmailemail marketingencrypted emailHIPAApropriateness reviewinforming of risksMailChimppauboxphipotential clientssecure messagingsignalsmartphone encryptionswitch to coachingtextingtouch idtwo-factor authenticationvideoconferencing echovideoconferencing Internetvideoconferencing ipadvideoconferencing monitor sizevideoconferencing recordingvideoconferencing tablet
Mar 17 , 2016 Session 50: Review of Protecting Laptops and Smartphones In a Variety of Situations View Session Android securityBAAbilling companiesdeidentificationfull device encryptionfull disk encryptionHIPAA ScopeinitialsiPhone securitymacintosh antimalwaremacintosh antivirusmobile officephiscopesubcontractorsynchronizationvoipvpnwifi hotspot
Dec 17 , 2015 Session 39: Special Presentation: "Safety-ize Your Gear With Encryption, Avoid a Common HIPAA Mistake" View Session backupbitlockercontact bookcontactsEncryptionexternal hard driveFileVaultfull disk encryptionhipaa policy retentionmacintoshoff site backuppeer supervisionphipolicies and proceduresrecovery keythumb driveupgrading computersusb driveusb stickwhat is phiwindowswindows 10
Sep 25 , 2015 Session 29: Contractors in Group Practices, "Workforce," and Responsibility for Safety of PHI View Session BAAbusiness associatecall logscontractorcontractorsgroup practiceHIPAA business associateinterninternsphiphone companyphone logsprotected health informationra scoperisk analysis scopescopetraining clinictraining clinicsworkforceworkshops
Mar 20 , 2015 Session 9: What Does "In Scope" Mean? View Session accepting risksappointment remindersBAAbackupsde-identificationelectronic vs paperEmailhangoutshelp outsiCloudiCloud syncinformation vs documentsoff-site storageoffice to homeoffice to officephiPIIscopeshredding documentssite to sitetexting