0% found this document useful (0 votes)
375 views21 pages

HIPAA Audit Guide TeachPrivacy HIPAA Training

The document provides an overview of the two-phase HIPAA audit process conducted by the Office for Civil Rights (OCR). Phase 1 involved 115 pilot audits of covered entities from 2011-2012. Phase 2 began in 2016 and audits both covered entities and business associates. The audits assess compliance with the Privacy, Security, and Breach Notification rules through a questionnaire process. The first round of Phase 2 audits found that over half of audited entities failed to complete required risk assessments and many did not address weaknesses identified.

Uploaded by

w.suraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
375 views21 pages

HIPAA Audit Guide TeachPrivacy HIPAA Training

The document provides an overview of the two-phase HIPAA audit process conducted by the Office for Civil Rights (OCR). Phase 1 involved 115 pilot audits of covered entities from 2011-2012. Phase 2 began in 2016 and audits both covered entities and business associates. The audits assess compliance with the Privacy, Security, and Breach Notification rules through a questionnaire process. The first round of Phase 2 audits found that over half of audited entities failed to complete required risk assessments and many did not address weaknesses identified.

Uploaded by

w.suraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

AUDIT GUIDE

by Maggie Gloeckle
and Daniel J. Solove
HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Table of Contents
Introduction ...............................................................................................................2
Audit Phases ...............................................................................................................3
Phase 1 .................................................................................................................................................. 3
Phase 2 .................................................................................................................................................. 4
Audit Process ..............................................................................................................4
OCR Verification of Customer Contact Information .......................................................................... 4
Potential Auditees ................................................................................................................................. 4
OCR Communication to Covered Entities and Business Associates ..................................................... 5
Questionnaire........................................................................................................................................ 7
Contact /Entity Info ........................................................................................................................... 7
Questions ........................................................................................................................................... 7
Review and Submit .......................................................................................................................... 12
Documenting Business Associates ...................................................................................................... 12
How the Audit Program Works .................................................................................13
Selection of Auditees .......................................................................................................................... 13
Type of Audits ..................................................................................................................................... 13
Desk Audits ...................................................................................................................................... 13
Topics Covered in the Audit ............................................................................................................. 13
Desk Audit Completion .................................................................................................................... 13
Onsite Audits ................................................................................................................................... 13
Approach ......................................................................................................................................... 13
Failure of an Entity to Respond to OCRs Request for Information .................................................... 14
Timeline ............................................................................................................................................... 14
Desk Audits ...................................................................................................................................... 14
Onsite Audits ................................................................................................................................... 15
Further Investigation ........................................................................................................................... 15
After the Audit .................................................................................................................................... 15
Appendix ..................................................................................................................16
Business Associates Sample Template ................................................................................................ 16
Useful Links ......................................................................................................................................... 17
Compliance and Enforcement Case Examples .................................................................................... 18

TeachPrivacy HIPAA Training www.teachprivacy.com 1


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Introduction
The Health Insurance Portability and Accountability Act (HIPAA) and the Health Information
Technology for Economic and Clinical Health Act (HITECH) includes national standards for the privacy
of protected health information, the security of electronic protected health information, and breach
notification to consumers.

HITECH also requires that periodic audits be performed of covered entities and business associates to
ensure compliance with the HIPAA Privacy (45 CFR Part 160 and Subparts A and E of Part 164),
Security (45 CFR Part 160 and Subparts A and C of Part 164) and Breach Notification Rule (45 CFR Part
164 Subpart D)

As of December 2016, according to the Office for Civil Rights (OCR) senior advisor Linda Sanches,
there are more than 200 audits ongoing 167 focused on providers and 48 focused on business
associates.

OCR is looking for evidence that policies and procedures are being implemented.

Sanches has acknowledged that they are seeing two huge problems with implementation of risk
analysis and risk management.1

In a recent article by Tammy Worth, published December 13, 2016, the first round of HIPAA audits by
the US Department of Health & Human Services (HHS) Office for Civil Rights (OCR) found that
providers are still not doing some of the most basic tasks required by the law.

More than half of those audited failed to complete a risk assessment, a main tenet of HIPAA. Many
are not addressing weaknesses found in a risk analysis. And others still do not have required business
associate agreements in place with vendors.2

1Source: http://www.healthcareitnews.com/news/ocr-onsite-hipaa-audits-coming-2017
2Source: http://www.renalandurologynews.com/hipaa-compliance/first-round-of-hipaa-audits-exposes-providers-
weaknesses/article/578688/

TeachPrivacy HIPAA Training www.teachprivacy.com 2


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Audit Phases
The audits are being conducted in two phases. Phase One was completed in December 2012 and
began with a pilot program in 2011. The more recent Phase Two began in the fall of 2016.

Phase 1
In 2011, HHS Office of Civil Rights (OCR) established a pilot program to conduct assessments to
determine the controls and processes that covered entities had put in place to comply with the
Privacy, Security and Breach Notification rule.

OCR established a program and instructions that were used to assess 115 covered entities.

The Audits provided an opportunity to look at mechanisms for compliance, identify best practices,
and discover risks and vulnerabilities that may not have previously been discovered through ongoing
complaint investigations and compliance reviews.

Included in the audit were covered entities.

Covered entities ranged from covered individual and organizational providers of health services,
health plans of all sizes and functions, and health care clearinghouses.

The pilot program was a three-step process:

1. Develop the audit protocols.

2. Test the protocols by performing a limited number of audits, of which the results would be used to
perform the rest of the audits.

3. Complete the remaining audits using the revised protocols.

TeachPrivacy HIPAA Training www.teachprivacy.com 3


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Phase 2
HHS has initiated the second phase of its HIPAA audits. Covered entities were notified July 11, 2016
and business associates received notification in the fall of 2016.

The 2016 Phase 2 HIPAA Audit Program will review policies and procedures adopted and
implemented by both covered entities and their business associates to adhere to the standards of the
Privacy, Security and Breach Notification Rules.

The audit program is organized by Rule and regulatory provision and addresses separately the
elements of the Privacy, Security and Breach Notification.

The audit will assess the compliance with the selected requirements and will vary based on the type
of covered entity or business associated selected for review.

The protocols for the audits are included in a separate Excel document.

Similar to Phase 1, the Phase 2 audit provides an opportunity to observe the mechanism for
compliance, identify best practices and identify risk and vulnerabilities which may not have previously
been discovered through OCRs ongoing complaint review process.

Audit Process
OCR Verification of Customer Contact Information
Prior to sending out notification letters, OCR conducted an exercise to obtain and verify contact
information for both covered entities and business associates. This information was then used to
determine a list of potential auditees.

Potential Auditees
Potential auditees consist of a wide range of health care providers, health plans, health care
clearinghouses and business associates.

The sampling criteria for auditees include:


a) Size of the entity
b) Affiliation with other health organizations
c) The type of entity and its relationship to individuals.
d) Public versus private
e) Geographical factors
f) Present enforcement activity with OCR.

Note: Entities that currently have open complaint investigation or are currently involved in a
compliance review will not be included in the audit.

TeachPrivacy HIPAA Training www.teachprivacy.com 4


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

By selecting from a large audit pool, OCR can make an assessment of HIPAA compliance and
determine its effectiveness.

OCR Communication to Covered Entities and Business Associates


OCR will be contacting organizations via email. The email will be sent from the following address
OSOCRAudit@hhs.gov. It is important to confirm that the email has not been blocked by your spam
filter or flagged by your organizations antivirus software.

The hhs.gov website recently reported (November 28, 2016) that a phishing email has been
circulating disguised as Official OCR Audit communication. The phishing email address that is being
used is OSOCRAudit@hhs-gov.us and directs individuals to a URL at http://www.hhs-gov.us.

If you do receive an email from this address, please contact HHS using the correct email
OSOCRAudit@hhs.gov.

A sample of the email letter is below.

The letter is time sensitive. Upon receipt of the letter, an entity has fourteen (14) days to confirm
their identity and email address, or provide updated primary and secondary contact information.3

3 http://www.hhs.gov/sites/default/files/ocr-address-verification-email.pdf

TeachPrivacy HIPAA Training www.teachprivacy.com 5


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

TeachPrivacy HIPAA Training www.teachprivacy.com 6


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Questionnaire
When an organization (covered entity, business associate) is contacted by OCR and their contact
information has been confirmed, a questionnaire is sent.

The purpose of the questionnaire is to gather information about the size, type and operations of the
potential auditees.

The data will be used along with other information to develop pools of potential auditees.

The questionnaire is made up of 4 parts:


1. Instructions
2. Contact/Entity Info
3. Questions
4. Review and Submit

Contact /Entity Info

As part of the questionnaire, review and update Contact/Entity information.

Questions

Every question requires a response. A message will be displayed indicating the information that is
still required if questionnaire is not fully completed.

The pre-screening questionnaires are listed below.

TeachPrivacy HIPAA Training www.teachprivacy.com 7


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Basic Description Information about Your Organization

Question Answer Choices


Public
Question 1: Entity is:
Privacy
Single location only (the primary operations and
any support activities are co-located)
Question 2: Entity is: Multi-location (the organization has multiple
service delivery sites and/or separate support
facilities)
Question 3: Is your organization part
of, affiliated with, or otherwise owned Yes
or controlled by another No
organization?
Question 4: If your organization is a
part of, affiliated with, or otherwise
owned or controlled by another
Nature of relationship
organization, identify the organization
Name of other organization
and describe the relationship to your
entity: (If your answer to #3 is No,
enter N/A for the relationship and
organization)

TeachPrivacy HIPAA Training www.teachprivacy.com 8


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Healthcare Providers

Question Answer Choices


Question 5: Are you a HIPAA covered entity Yes
No
Question 6: Does your organization or another Yes
entity on your behalf, conduct health care No
transactions (such as submitting a claim for
payment, checking patient health plan
eligibility or benefit coverage, or receipt of
payment or remittance advice) in electronic
form?
Question 7: What type of health care provider Fill in response
are you (hospital, urgent care, skilled nursing,
etc.)?
Question 8: How many patient visits in the Fill in response
prior fiscal year?
Question 9: How many patient beds do you Fill in response
have (if applicable)?
Question 10: What is the current number of Fill in response
clinicians on staff or with privileges in the
facility(ies)?
Question 11: Do you maintain or transmit Yes
protected health information in electronic No
format?
Question 12: Do you use electronic medical Yes
records? No
Question 13: What is the total revenue for the Fill in response
most recent fiscal year?

TeachPrivacy HIPAA Training www.teachprivacy.com 9


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Health Plans

Question Answer Choices


Question 14: Are you a Group Health Plan Yes
sponsor responding on its behalf? No
Question 15: What is the total number of
Fill in response
members within your health plan(s)?
Question 16: What is the average number of
claims processed monthly in the most recent Fill in response
fiscal year?
Question 17: What is the total revenue for the
Fill in response
most recent fiscal year?
No
Yes (Note: Selecting Yes will require you
to supply the following information: If
Question 18: Do you utilize a third party
yes, please provide the name, address,
administrator (TPA) or other entity to perform
email address, phone number, an
most of the health plan functions?
alternate contact and an appropriate
contact person at the TPA or other entity
(e.g., health insurance issuer or HMO):
Question 19: If you are a group health plan
Yes
sponsor, do you receive only summary data
No
from the group health plan, health insurance
N/A
issuer, or HMO?

Healthcare Clearing House

Question Answer Choices


Question 20: What is the total number of
transactions processed monthly in the most Fill in response
recent fiscal year?
Question 21: What is the current number of
healthcare providers, health plans, and other Fill in response
entities served?
Question 22: What is the total revenue for the
Fill in response
most recent fiscal year?
Question 23: Do you operate only as a
business associate and do not maintain
protected health information or perform Fill in response
covered functions as a covered entity apart
from your activities as a business associate?

TeachPrivacy HIPAA Training www.teachprivacy.com 10


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Business Associates

Question Answer Choices


Question 24: Please briefly describe the
nature of your business associate activities
(e.g., billing, third party administrator, Fill in response
information technology support, legal
services, etc.).
Question 25: Identify the type(s) of covered Health Care Provider
entity(ies) for which you provide business Health Plan
associate functions (choose all that apply). Heath Care Clearinghouse
Question 26: Identify whether any of the
covered entity(ies) for which you provide OHCA
business associate functions are Organized ACE
Health Care Arrangements (OHCA) or Neither
Affiliated Covered Entities (ACE) (choose all Not sure
that apply).
Question 27: Identify the approximate
number of each type of covered entity for
which you provide business associate
functions: (please indicate a number for each
Health Care Provider
option selected): NOTE: If you provide
Health Plan
business associate functions for OHCAs or
Health Care Clearinghouse
ACEs, please add the component covered
entities separately into the totals below. For
example, if you are a business associate to an
OCHA comprised of 10 covered providers, add
10 to the covered provider total option below)
Question 28: Do your business associate Yes
activities involve maintaining or transmitting No
protected health information in electronic
form?
Question 29: Do you perform business Fill in response
associate functions in more than one state?
Question 30: What is the approximate total Fill in response
revenue from all of your business associate
activities in the most recent fiscal year?

TeachPrivacy HIPAA Training www.teachprivacy.com 11


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Review and Submit

Upon completion of the questionnaire, the system will display all questions with the completed
responses. Keep a copy of your responses for your records and then submit your responses. Once
submitted, the questionnaire is no longer available for review.

Documenting Business Associates


As part the questionnaire process, covered entities should identify and document a list of their
business associates including contact information. The contact information is required in the event
that OCR selects an entity to receive a questionnaire.

Below is a link and a copy of a sample template supplied by OCR to document a list of business
associates. The use of this template is optional.

http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/audit/batemplate/index.html

Refer to the appendix for a list of items requested in the template.

TeachPrivacy HIPAA Training www.teachprivacy.com 12


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

How the Audit Program Works


Selection of Auditees
The selection process is through random sampling of the audit pool.

Once selected, the auditees will be notified of their participation in the audit process.

Type of Audits

Desk Audits

Desk and onsite audits will be conducted for both covered entities and their business associates:
Round 1 Desk audits of covered entities
Round 2 Desk audits of business associates.

Topics Covered in the Audit

The audit will examine compliance with specific requirements of:


Privacy
Security or
Breach Notification Rule

*Auditees will be notified of the subject(s) of their audit in a document request letter.

Desk Audit Completion

According to HHS, desk audit completion was targeted to be the end of December 2016.

Onsite Audits

Onsite audits will review a broader scope of requirements than desk audits.

Auditees who may have recently had a desk side audit may also be subject of an onsite audit.

Approach

Entities selected for an audit will be sent an email notification. The letter will:
Introduce the audit team
Explain the audit process
Discuss OCRs expectations in more detail.
Request initial documentation

TeachPrivacy HIPAA Training www.teachprivacy.com 13


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Entities will be asked to provide documents and other data in response to a document request letter.

Auditees will submit the documents via an audit portal on OCRs website.

Auditors will review documentation and provide draft findings to the entity.

Auditees will be provided an opportunity to respond to the draft findings. These responses will be
included as part of the final report. The audit report will describe how the audit was conducted,
discuss any findings, and contain entity responses to the draft findings.

During the audit process, auditees should be ready for an onsite visit as requested by OCR.

Failure of an Entity to Respond to OCRs Request for Information


If an entity does not respond to request for information from OCR, including address verification pre-
screening audit questionnaire and the document request, OCR will use publicly available information
for its audit pool. Even if an entity does not respond to OCR, it may still be selected for an audit or
subject to a compliance review.

Timeline
Desk Audits

The process is as follows:

OCR request for information sent via email to the entity.

Entity to submit requested information (in digital format) via the OCR secure portal within 10
days from the data requested.

Information reviewed by the auditor who will issue draft findings to the auditee.

Auditee has 10 days to review and provide any written updates to auditor.

Auditor has 30 days from auditees response to complete a final report.

A final copy of the report from OCR will be shared with the audited entity.

The same process for notification and document requests is also applicable to business associates.

A final copy of the report from OCR will be shared with the audited business associate.

TeachPrivacy HIPAA Training www.teachprivacy.com 14


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Onsite Audits

The process is as follows:

OCR notification via email.

Auditors will schedule an entrance conference to provide details of the onsite audit process
and expectations.

On site audit from OCR can range from three (3) to five (5) days depending on the size of the
entity.

Information reviewed by the auditor who will issue draft findings to the auditee.

Auditee has 10 days to review and provide any written updates to auditor.

Auditor has 30 days from auditees response to complete a final report.

A final copy of the report from OCR will be shared with the audited entity.

Onsite audits are comprehensive covering a wider range of requirements from the HIPAA rules.

Further Investigation
If an audit indicates a compliance issue, OCR may initiate a compliance review to further investigate

After the Audit


Once the audits are conducted, OCR will review and analyze the information from both the desk and
onsite audits.

This information will then be used to:

determine types of technical assistance that should be developed


determine types of corrective actions that would be helpful
develop tools and guidance to assist with compliance self-evaluation
prevent breaches.
find risks and vulnerabilities the government is neither aware of otherwise nor likely to learn
about through filed complaints4

4
http://www.healthcareitnews.com/news/ocr-onsite-hipaa-audits-coming-2017

TeachPrivacy HIPAA Training www.teachprivacy.com 15


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Appendix
Business Associates Sample Template
The following is a list of the specific information that OCR is requesting:

1. Covered entities should provide the requested information to the best of their knowledge and
include the name and types of services provided by each business associate.

2. Include a secondary point of contact if that information is available.

3. Covered entities responding to the request should identify each element for each business
associate.

Question Responsive Elements


1 Business Associate Name
2 Type of Service(s) provided
3 First Point of Contact Title
4 First Point of Contact First Name
5 First Point of Contact Last Name
6 First Point of Contact Address
7 First Point of Contact Address Continued ( if needed)
8 First Point of Contact City
9 First Point of Contact State
10 First Point of Contact Zip
11 First Point of Contact Phone
12 First Point of Contact Phone Extension( if needed)
13 First Point of Contact Fax
14 First Point of Contact Email
15 Second Point of Contact Title
16 Second Point of Contact First Name
17 Second Point of Contact Last Name
18 Second Point of Contact Address
19 Second Point of Contact Address Continued (if needed)
20 Second Point of Contact City
21 Second Point of Contact State
22 Second Point of Contact Zip
23 Second Point of Contact Phone
24 Second Point of Contact Phone Extension (if needed)
25 Second Point of Contact Fax
26 Second Point of Contact Email
27 Website URL

TeachPrivacy HIPAA Training www.teachprivacy.com 16


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Useful Links

Topic Link
HIPAA Privacy Rule https://www.hhs.gov/hipaa/for-professionals/privacy/index.html

HIPAA Security Rule https://www.hhs.gov/hipaa/for-professionals/security/index.html

HIPAA Breach Notification https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html


Rule

Selected Protocol Elements https://www.hhs.gov/sites/default/files/2016HIPAADeskAuditAuditeeGuidance.pdf


with associated document
submission requests and
related Q&As - PDF

Slides from audited entity https://www.hhs.gov/sites/default/files/OCRDeskAuditOpeningMeetingWebinar.pdf


webinar held July 13,2016-
PDF

Comprehensive question and https://www.hhs.gov/sites/default/files/OCRDeskAuditOpeningMeetingWebinar.pdf


answer listing- PDF

Audit Protocol - Updated https://www.hhs.gov/hipaa/for-professionals/compliance-


April 2016 enforcement/audit/protocol/index.html

Sample Business Associates http://www.hhs.gov/hipaa/for-professionals/covered-entities/sample-business-


Agreement - Published associate-agreement-provisions/index.html
January 25, 2013

Guide to Privacy and Security https://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-


of Electronic Health guide.pdf
Information

HIPAA Journal Breach http://www.hipaajournal.com/category/hipaa-breach-news/


News

Breaches Affecting 500 or https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf


More Individuals

OCR: Onsite HIPAA audits


coming in 2017 Published http://www.healthcareitnews.com/news/ocr-onsite-hipaa-audits-coming-2017
December 7,2016

First Round of HIPAA Audits http://www.renalandurologynews.com/hipaa-compliance/first-round-of-hipaa-


Exposes Providers' audits-exposes-providers-weaknesses/article/578688/
Weaknesses
Published December
7,2016

TeachPrivacy HIPAA Training www.teachprivacy.com 17


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Compliance and Enforcement Case Examples


Covered Entity
General Hospitals
Health Care Providers
Health Plans/ HMOs
Outpatient Facilities
Pharmacies
Private Practices

Organized by Issue
Access
Authorizations
Business Associates
Conditioning Compliance with the Privacy Rule
Confidential Communications
Disclosure to Avert a Serious Threat to Health or Safety
Impermissible Uses and Disclosures
Minimum Necessary
Notice
Safeguards5

Woman & Infants Hospital of Rhode Island (WIH), a covered entity member
of Care New England Health System (CNE)6

Violation: Privacy and Security rules by not reviewing and updating as necessary business associate
agreements.

Summary: From September 23, 2014 until August 28, 2015, WIH disclosed protected health
information (PHI) and allowed its business associate, CNE, to create, receive, maintain, or transmit
PHI on its behalf, without obtaining satisfactory assurances as required under HIPAA. WIH failed to
renew or modify its existing written business associate agreement with CNE to include the applicable
implementation specifications required by the HIPAA Privacy and Security Rules.

From September 23, 2014, until August 28, 2015, WIH impermissibly disclosed the PHI of at least
14,004 individuals to its business associate when WIH provided CNE with access to PHI without
obtaining satisfactory assurances, in the form of a written business associate agreement, that CNE
would appropriately safeguard the PHI.

Settlement: Monetary Amount: $400,000 and corrective action plan

5 The case examples are at http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/examples/index.html


6 http://www.hhs.gov/about/news/2016/09/23/hipaa-settlement-illustrates-importance-of-reviewing-updating-business-
associate-agreements.html

TeachPrivacy HIPAA Training www.teachprivacy.com 18


HIPAA Audit Guide by Maggie Gloeckle and Daniel J. Solove

Catholic Health Care Services of the Archdiocese of Philadelphia (CHCS)7

Violation: Business Associates Failure to Safeguard Nursing Home Residents PHI

Summary: Violation of the HIPAA Security rule after the theft of a mobile device that compromised
the protected health information (PHI) of hundreds of nursing home residents, 412 in total.

Settlement: Monetary Amount: $650,000 and corrective action plan

7 http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/cathoic-health-care-

services/index.html?language=es

TeachPrivacy HIPAA Training www.teachprivacy.com 19


About the Authors
Maggie Gloeckle, CIPP/US, CIPT, CIPM PMP, is Senior Privacy Officer in the financial services industry.
Previously she has worked as Global Privacy Program Manager and held positions in Operations and
Service Delivery Organizations. She holds a JD as well as Masters degrees in business and technology.
Daniel J. Solove is the John Marshall Harlan Research Professor of Law at the George Washington
University Law School. One of the worlds leading experts in privacy law, Solove has taught privacy and
security law for 15 years, has published 10 books and more than 50 articles, including the leading
textbook on privacy law and a short guidebook on the subject.
Professor Solove has spoken at hundreds of universities, federal agencies, and other organizations. He
has given keynote addresses at many conferences, including one organized by the U.S. Department of
Health and Human Services.
His LinkedIn blog has more than 1 million followers:
http://www.linkedin.com/today/post/articles/2259773
Professor Solove organizes many events per year, including the Privacy + Security Forum, Oct.
4-6, 2017 in Washington, DC: http://privacyandsecurityforum.com

About TeachPrivacy
TeachPrivacy was founded by Professor Daniel J. Solove. He is deeply involved in the creation of all
training programs because he believes that training works best when made by subject-matter experts
and by people with extensive teaching experience.
TeachPrivacy has a library of nearly 100 training courses that cover a wide array of privacy and security
topics including HIPAA, FERPA, PCI, phishing, social engineering, and many others.

Professor Soloves HIPAA Training

www.teachprivacy.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy