New Patients are vital for growing and sustaining a Health Care Provider’s Practice. Patient attraction has become an enormous business resulting in highly visible Internet-based HIPAA violations and risks for providers. Websites, social media, patient satisfaction surveys, email and text messaging sold by vendors including Business Associates are all subject to HIPAA rules that are frequently overlooked or ignored.
HIPAA Rules for the most common patient attraction tools are clear and unequivocal. One look at a health care provider’s website can provide undeniable evidence of a HIPAA violation and indications of other violations to be investigated.
There are widespread violations of the HIPAA Rules for communicating with patients for patient engagement as well. These violations are being made by Providers and Business Associates primarily through unencrypted email and text message. A simple appointment reminder is, by definition, PHI even though it may not contain diagnostic specific information. So are Happy Birthday wishes, reminders that a patient is overdue for a checkup or has an outstanding balance on a bill.
You (Provider and Business Associate) must know how you can maximize your use of key patient engagement tools while protecting yourself and your organization from government penalties and patient lawsuits.
Health Care Providers have a mandatory “duty to warn” patients of risks associated with unencrypted email. A patient may refuse to receive unencrypted emails after being warned. Health Care Providers and Business Associates must strictly follow the patient’s restriction.
WHY SHOULD YOU ATTEND?
The information that makes a message subject to HIPAA- what is PHI? How can you have compliant behaviors in Social Media?
The “safe harbor” – How Health Care Providers may obtain consent from patients to send PHI in unencrypted email and unencrypted text messages and not be responsible for unauthorized access to the PHI in transmission or when received by the patient
What a Health Care Provider must do if a patient does not agree to receive PHI in unencrypted email or unencrypted text message
The requirements for a Business Associate to be able to communicate by email or text message with a patient on behalf of a Health Care Provider
How a Business Associate may protect itself from liability for violating HIPAA Rules about email and text messages in its Business Associate Agreement
What a Health Care Provider must do if a patient does not agree to receive PHI in unencrypted emails or text messages
How Health Care Providers and Business Associates may prove they are compliant with the HIPAA Rules through documentation
The Policies and Procedures Health Care Providers and Business Associates must have in place to comply with HIPAA Rules concerning communication with patients through email and text message
AREA COVERED
- Communication is key throughout Patient Attraction and Patient Engagement. This webinar will demonstrate effective ways to communicate while following the HIPAA Rules. This webinar also focus on HIPAA Rules for transmitting informational email and text messages to patients over an electronic communications network. We will
- Patient Engagement Tips: Protect Patients’ Privacy and PHI, Build the Relationship
- Policies and Procedures for your HIPAA Compliance Program
- Social Media: Reviews, Testimonials, and Likes
- Marketing & Patient Communication: Phone Calls, Emails, and Text Messages
- Websites: What to Post and Not to Post
- Portable Devices and Electronic Communications Network
- How Health Care Providers and Business Associates can work together to avoid violating HIPAA Rules about email and text message communications with patients
LEARNING OBJECTIVES
- Patient Engagement Tips: Protect Patients’ Privacy and PHI, Build the Relationship
- Policies and Procedures for your HIPAA Compliance Program
- Social Media: Reviews, Testimonials, and Likes
- Marketing & Patient Communication: Phone Calls, Emails, and Text Messages
- Websites: What to Post and Not to Post
- Portable Devices and Electronic Communications Network
- How Health Care Providers and Business Associates can work together to avoid violating HIPAA Rules about email and text message communications with patients
WHO WILL BENEFIT?
- HIPAA Compliance Official (HIPAA Officer)
- Compliance Director
- Practice Manager
- Privacy Officer
- Security Officer
- CEO,CFO,COO
- Chief Information Officer
- Information Systems Manager
- Health Information Manager
- Healthcare Counsel/lawyer
- Office Manager
- Contracts Manager
- Chief Clinical Officer
- Human Resources
The information that makes a message subject to HIPAA- what is PHI? How can you have compliant behaviors in Social Media?
The “safe harbor” – How Health Care Providers may obtain consent from patients to send PHI in unencrypted email and unencrypted text messages and not be responsible for unauthorized access to the PHI in transmission or when received by the patient
What a Health Care Provider must do if a patient does not agree to receive PHI in unencrypted email or unencrypted text message
The requirements for a Business Associate to be able to communicate by email or text message with a patient on behalf of a Health Care Provider
How a Business Associate may protect itself from liability for violating HIPAA Rules about email and text messages in its Business Associate Agreement
What a Health Care Provider must do if a patient does not agree to receive PHI in unencrypted emails or text messages
How Health Care Providers and Business Associates may prove they are compliant with the HIPAA Rules through documentation
The Policies and Procedures Health Care Providers and Business Associates must have in place to comply with HIPAA Rules concerning communication with patients through email and text message
- Communication is key throughout Patient Attraction and Patient Engagement. This webinar will demonstrate effective ways to communicate while following the HIPAA Rules. This webinar also focus on HIPAA Rules for transmitting informational email and text messages to patients over an electronic communications network. We will
- Patient Engagement Tips: Protect Patients’ Privacy and PHI, Build the Relationship
- Policies and Procedures for your HIPAA Compliance Program
- Social Media: Reviews, Testimonials, and Likes
- Marketing & Patient Communication: Phone Calls, Emails, and Text Messages
- Websites: What to Post and Not to Post
- Portable Devices and Electronic Communications Network
- How Health Care Providers and Business Associates can work together to avoid violating HIPAA Rules about email and text message communications with patients
- Patient Engagement Tips: Protect Patients’ Privacy and PHI, Build the Relationship
- Policies and Procedures for your HIPAA Compliance Program
- Social Media: Reviews, Testimonials, and Likes
- Marketing & Patient Communication: Phone Calls, Emails, and Text Messages
- Websites: What to Post and Not to Post
- Portable Devices and Electronic Communications Network
- How Health Care Providers and Business Associates can work together to avoid violating HIPAA Rules about email and text message communications with patients
- HIPAA Compliance Official (HIPAA Officer)
- Compliance Director
- Practice Manager
- Privacy Officer
- Security Officer
- CEO,CFO,COO
- Chief Information Officer
- Information Systems Manager
- Health Information Manager
- Healthcare Counsel/lawyer
- Office Manager
- Contracts Manager
- Chief Clinical Officer
- Human Resources
Speaker Profile
Paul R Hales
"Paul Hales received his Juris Doctor degree from Columbia University Law School and is licensed to practice law before the Supreme Court of the United States. He is an expert on HIPAA Privacy, Security, Breach Notification and Enforcement Rules with a national HIPAA consulting practice based in St. Louis. Paul is the author of all content in The HIPAA E-Tool, an Internet-based, Software as a Service product for health care providers and business associates."
Upcoming Webinars
Treating Employees Like Adults: Discipline versus Empowerme…
7 Ways To Beat Burnout: Without Quitting Your Job
How to Write Procedures to Avoid Human Errors
Ethical Terminations: Navigating Employee Exits with Legal …
Understanding EBITDA – Definition, Formula & Calculation
Handbook Overhaul 2026: Compliance, OBBB Act & Beyond
FDA Proposes Framework to Advance Credibility of AI Models
Project Management for Non-Project Managers - Scheduling yo…
Data Integrity and Privacy: Compliance with 21 CFR Part 11,…
4-Hour Virtual Seminar on Hidden Secrets of Selling & Marke…
Validation Statistics for Non-Statisticians
Work Shouldn’t Feel Like A Soap Opera: Less Drama. More Foc…
Offboarding with Care: Conducting Legal & Ethical Employee …
The Alphabet Soup: When the FMLA, ADA, COBRA, and Workers' …
2-Hour Virtual Seminar on How to Conduct an Internal Harass…
Managing Toxic & Other Employees Who have Attitude Issues
Payments Fraud Detect & Prevent Check, ACH and P-Card Schem…
Reduce Stress in the Workplace: Effective Ways to Handle Co…
Language is Code - Intro to AI - Generative AI - ChatGPT an…
GROUPBY and PIVOTBY functions. Pivot table killers?
How to Prepare for a Regulatory Inspection: FDA, EMA, and N…
Excel - Reporting Simplified - Learn Pivot Tables from Scra…
The Power of Trust: Why It Should Matter to All Leaders & H…
California Meal and Rest Breaks: What You Don't Know Can Co…
How to Reduce Human Error in a GMP Manufacturing Floor
2-Hour Virtual Seminar on the 6 Most Common Problems in FDA…
Maximizing Productivity with ChatGPT: AI Solutions for HR, …
Excel - Pivot Tables - The Key To Modern Data Analysis and …
Re-imagine Finance & Accounting Made Simple. Three Webinars…
Form W-9 Compliance to Avoid Penalties: TIN Verification, B…
21 CFR Part 11 - Compliance for Electronic Records and Sign…
New EEOC Report: Workplace Harassment Prevention Not Workin…
Transforming Change and Conflict into Diverse-Inclusive-Col…
ChatGPT and Project Management: Leveraging AI for Project M…
Excel Power Skills: Master Functions, Formulas, and Macros …
Construction Lending And Real Credit Administration: Evalua…
Develop People Intelligence: Is Your Communication Style as…