<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Certifications Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/certifications/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/certifications/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 12 Jun 2019 18:41:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Certifications Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/certifications/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Reduce the Burden of HIPAA While Increasing Your Protection</title>
		<link>https://thirdrock.com/blog/2016/05/02/reduce-the-burden-of-hipaa-while-increasing-your-protection/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Mon, 02 May 2016 14:00:55 +0000</pubDate>
				<category><![CDATA[Certifications]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<category><![CDATA[SRA]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1449</guid>

					<description><![CDATA[<p>If you missed our recent webinar on Reduce the Burden of HIPAA While Increasing Your Protection you can watch it on-line now. Ed Jones, Third Rock&#8217;s Chief Compliance Officer, keeps [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/05/02/reduce-the-burden-of-hipaa-while-increasing-your-protection/">Reduce the Burden of HIPAA While Increasing Your Protection</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you missed our recent webinar on <em><strong>Reduce the Burden of HIPAA While Increasing Your Protection</strong></em> you can watch it on-line now.</p>
<p>Ed Jones, Third Rock&#8217;s Chief Compliance Officer, keeps this presentation updated to help your stay current on HIPAA and cyber-security.  We offer the course to professional associations and local healthcare societies, board of directors and executives and as a Continuing Education (CE) course.  Contact us if you&#8217;re interested in a private webinar with Q&amp;A.</p>
<p>Please join Ed Jones, Chief Compliance Officer and Robert Felps, CEO of Third Rock for a recording of our interactive webinar, from April 28th, that will help you understand:</p>
<ul>
<li>How to reduce the burden of HIPAA Compliance</li>
<li>The reality of cyber-breaches.</li>
<li>Why reducing discovery time of a breach is critical.</li>
<li>Why recent HIPAA regulation changes are important to understand.</li>
<li>How to reduce potential fines for HIPAA non-compliance.</li>
<li>Protecting the equity you’ve built into your business!</li>
</ul>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Practice. Protect Yourself.</strong></p>
<p><iframe title="HIPAA - Reduce the Burden, Increase Your Protection" width="1080" height="608" src="https://www.youtube.com/embed/lR2slfr7MwQ?feature=oembed"  allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>You may visit our videos page on our web site or our YouTube channel for other videos.</p>
<p>The post <a href="https://thirdrock.com/blog/2016/05/02/reduce-the-burden-of-hipaa-while-increasing-your-protection/">Reduce the Burden of HIPAA While Increasing Your Protection</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1449</post-id>	</item>
		<item>
		<title>5 Benefits of HIPAA Privacy and Security Training</title>
		<link>https://thirdrock.com/blog/2016/02/09/5-benefits-of-hipaa-privacy-and-security-training/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Tue, 09 Feb 2016 15:00:25 +0000</pubDate>
				<category><![CDATA[Certifications]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1247</guid>

					<description><![CDATA[<p>HIPAA law requires that all workforce members with any access to PHI receive training in basic privacy and security practices. “Workforce” includes housekeeping staff, dietary workers, clerical staff, and contract workers [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/09/5-benefits-of-hipaa-privacy-and-security-training/">5 Benefits of HIPAA Privacy and Security Training</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>HIPAA law requires that all workforce members with any access to PHI receive training in basic privacy and security practices. “Workforce” includes housekeeping staff, dietary workers, clerical staff, <em>and</em> contract workers in addition to all members of the clinical staff. But “compliance” is not the only reason to ensure that all workforce members understand and follow basic privacy and security protocols – here are 5 more:</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li style="list-style-type: none;">
<ol>
<li><strong> Training provides the basis for a “human firewall” against PHI loss.</strong><br />
Healthcare staff members interact with patients’ protected health information (PHI) dozens of times per shift. Every interaction is an opportunity to either protect or expose patients’ PHI. Ensuring that every member of a healthcare organization understands the practices necessary to protect both the <em>privacy</em> and <em>security</em> of patients’ PHI creates a ‘human firewall’ against a data breach.</li>
<li><strong> Training increases awareness of risks to patients’ well-being.</strong><br />
A surprising number of well-meaning healthcare staff members are naïve about the risks posed to patients through careless handling of PHI. Training increases their awareness and provides specific instruction about <em>how</em> to keep their patients’ records safe.</li>
<li><strong>HIPAA Training reinforces initiatives to develop a “patient safety” culture.<br />
</strong>If designed and delivered well, a HIPAA Privacy and Security course will teach staff that protecting patients’ PHI is just another aspect of keeping patients safe – as important as infection control, fall-prevention, and medication safety measures. Training fosters a common understanding of “the right way” to handle patient information so that an error or misconduct by one staff member is more likely to be noticed and corrected before any patients’ records are compromised.</li>
<li><strong> Careful handling of PHI improves patient and family satisfaction.</strong><br />
Security breaches in the headlines have members of the public paying more attention to staff handling of their personal information. In fact, approximately 25-30% of the HIPAA Audits conducted annually by the OCR each year are triggered by a patient or family member complaint. Patients and families are now more likely to notice &#8211; and appreciate – careful handling of their PHI.</li>
<li><strong> CYA &#8211; HIPAA Training reduces executive and organizational liability.</strong><br />
In addition to protecting your patients’ PHI, staff training is also essential for protecting yourself and your organization. <strong><em>Staff training is required by law</em></strong>. If a breach occurs and you are the executive responsible for information security, you could be found personally negligent if you have not ensured your staff is properly trained. Alternatively, if your staff has been trained, your personal liability will be minimized, and the penalty levied by the OCR will be less severe.</li>
</ol>
</li>
</ol>
</li>
</ol>
<p>Protect yourself, your organization, and your patients by making staff training a high priority.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1187" style="margin-right: 8px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training_billboard.jpg?resize=177%2C132&#038;ssl=1" alt="Training - Green Billboard on the Rising Sun Background." width="177" height="132" /> <em>Julie Rennecker, PhD, BSN, is the founder of </em><a href="http://www.themanagementdoc.com"><em>The Management Doc, LLC</em></a><em>, and Chair of Third Rock’s Clinical</em></p>
<p>Contact us at <a href="mailto:compliance@thirdrock.com?Subject=HIPAA%20Training&amp;Hi, I'm interested in your training course.">compliance@thirdrock.com</a> to learn more about Third Rock’s <strong>Worry-free Training </strong><strong>Solution:</strong></p>
<p>✔   <strong>C</strong><strong>omprehensive</strong> – Covers Privacy, Security, and Breach Notification Rules<br />
✔   <strong>Fast and Easy-to-use</strong> – Entire course can be completed in about an hour<br />
✔   <strong>Self-paced</strong> – Participants can log in and out as time permits<br />
✔   <strong>Convenient and Flexible</strong> – Can be completed from a PC, smartphone, or tablet<br />
✔   <strong>Easy to Manage</strong> – Issues reminders to staff and automatically tracks course completion<br />
✔   <strong>Executive Reporting</strong> – Dashboard readily tracks each individual’s training status<br />
✔   <strong>Individual Transcripts</strong> – Downloadable transcripts document personal training history</p>
<p style="text-align: center;"><strong>Promotional pricing available until February 19, 2016.</strong></p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/09/5-benefits-of-hipaa-privacy-and-security-training/">5 Benefits of HIPAA Privacy and Security Training</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1247</post-id>	</item>
		<item>
		<title>Create a Human Firewall &#8211; HIPAA Training</title>
		<link>https://thirdrock.com/blog/2016/02/04/create-a-human-firewall-hipaa-training/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 04 Feb 2016 17:54:55 +0000</pubDate>
				<category><![CDATA[Certifications]]></category>
		<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[PHI]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1237</guid>

					<description><![CDATA[<p>Cyber breaches in healthcare are in the headlines and on the rise. Last year, over 112.8 million people’s “protected” health information was stolen or improperly disclosed! That is approximately one [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/04/create-a-human-firewall-hipaa-training/">Create a Human Firewall &#8211; HIPAA Training</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cyber breaches in healthcare are in the headlines and on the rise. Last year, over 112<em>.8 million </em>people’s “protected” health information was stolen or improperly disclosed! That is approximately one third of the total U.S. population &#8211; <em>in just one year</em>!  The big news makers are the large cyber breaches where millions of records are stolen electronically. But the “weak link” in many breaches is the human being.</p>
<p><strong>“IT security starts with people.”</strong></p>
<p>While your IT staff and advanced technologies play a significant role in protecting your organization and patients from cyber threats, it is often the day-to-day actions of staff that put an organization at risk. Here’s a sampling of breaches traced to “human error” from the Identity Theft Resource Center’s 2015 Breach Report:</p>
<ul style="margin-left: 10pt;">
<li>Improperly disposed patient records were found in open dumpsters, along roadsides, and other insecure locations. (multiple incidents)<img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-1185 alignright" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/training_futuristic.png?resize=159%2C119&#038;ssl=1" alt="training_futuristic" width="159" height="119" /></li>
<li>Billing staff mailed statements containing PHI to the wrong addresses.</li>
<li>Clinical staff lost possession of laptop computers containing unencrypted PHI. (multiple)</li>
<li>Clerical staff intending to attach a survey to an email sent to all patients attached a spreadsheet containing patient information instead.</li>
<li>Multiple staff members fall victim to “phishing” messages, giving hackers access to the organization’s electronic systems.</li>
</ul>
<p>A breach can result from an error or misconduct by a team member in any function or department. To the poor soul who learns his identity has been stolen from a bill collector or when his credit application is denied, it doesn’t matter whether it was a sophisticated cyber-attack or a careless worker tossing medical records into an unsecured dumpster &#8211; the end result is the same. A person whose records have been compromised will spend months – if not years! – putting his or her financial life back in order. Thus it’s critical that <em>every</em> staff member receives Privacy <em>and</em> Security training.</p>
<p><em>It’s also the law</em> – HIPAA requires all workforce members to receive training on information privacy and security. “Workforce” includes all employees, contractor workers, and “business associates,” or vendors.”</p>
<p><strong>Don’t delay!</strong></p>
<p style="text-align: left; margin-bottom: 0pt;">Each employee accesses PHI dozens of times daily, and cyber criminals work 24/7. Protect yourself, your organization, and your patients by taking the first step to create a human firewall.</p>
<p style="text-align: right;"><em>Julie Rennecker, PhD, BSN, is the founder of </em><a href="http://www.themanagementdoc.com" target="_blank" rel="noopener noreferrer"><em>The Management Doc, LLC</em></a><em>, and </em><br />
<em>Chair of Third Rock’s Clinical Advisory Board.</em></p>
<p>Contact us at <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a> to learn more about Third Rock’s <strong>Worry-free Training</strong><strong> Solution</strong>:</p>
<p>✔   <strong>C</strong><strong>omprehensive</strong> – Covers Privacy, Security, and Breach Notification Rules<br />
✔   <strong>Fast and Easy-to-use</strong> – Entire course can be completed in about an hour<br />
✔   <strong>Self-paced</strong> – Participants can log in and out as time permits<br />
✔   <strong>Convenient and Flexible</strong> – Can be completed from a PC, smartphone or tablet<br />
✔   <strong>Easy to Manage</strong> – Issues reminders to staff and automatically tracks course completion<br />
✔   <strong>Executive Reporting</strong> – Dashboard readily tracks each individual’s training status<br />
✔   <strong>Individual Transcripts</strong> – Downloadable transcripts document personal training history<br />
<strong>Promotional pricing available until February 19th, 2016.</strong></p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/04/create-a-human-firewall-hipaa-training/">Create a Human Firewall &#8211; HIPAA Training</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1237</post-id>	</item>
		<item>
		<title>PMP or Not &#8211; Two key observations</title>
		<link>https://thirdrock.com/blog/2014/02/20/pmp-or-not-two-key-observations/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 20 Feb 2014 12:30:22 +0000</pubDate>
				<category><![CDATA[Certifications]]></category>
		<category><![CDATA[Project Management]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[certifications]]></category>
		<category><![CDATA[pmi]]></category>
		<category><![CDATA[pmp]]></category>
		<category><![CDATA[project management]]></category>
		<category><![CDATA[schedule]]></category>
		<category><![CDATA[scope]]></category>
		<category><![CDATA[stakeholders]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=151</guid>

					<description><![CDATA[<p>I keep hearing people say you have to have a PMP or it&#8217;s required for the job.  I&#8217;ve been an &#8220;ad hoc&#8221; project manager for a few years, ok, more [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2014/02/20/pmp-or-not-two-key-observations/">PMP or Not &#8211; Two key observations</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I keep hearing people say you have to have a PMP or it&#8217;s required for the job.  I&#8217;ve been an &#8220;ad hoc&#8221; project manager for a few years, ok, more than I&#8217;m going to admit to, let&#8217;s just say more than 25 years.</p>
<p>I&#8217;ve been credited with saving &#8220;lost&#8221; projects, turning around massively behind schedule and over budget projects and actually launching and completing &#8220;mission impossible&#8221; projects.  Most of them required some severe bleeding on my part, but working closely with people, being honest with the sponsors and stakeholders and forcing communications among all involved righted the ships and improved the sailing.  And I was able to do those things because I have been a programmer, developer, systems analyst, business analyst, system administrator, network administration/architect, application architect, solution architect, team lead, integration lead/officer, disaster recovery manager &amp; consultant, vCIO and held various other jobs.  I basically knew when a person wasn&#8217;t understanding the requirements or able to deliver the &#8220;goods&#8221;.  I was willing to force issues out on the table and have them resolved no matter how difficult the discussion.  More importantly, I was willing to tell the stake holders, customer and sponsors the project was not on schedule or within budget.  And often I told them changing the scope was the problem.</p>
<p>I&#8217;ve never been a big believer of certifications.  They are too heavily based on academic learning and not near enough on experiential knowledge.  Although, there is one certification I keep thinking I should pursue, the PMP.  I definitely agree with the benefits of standard terminology, processes and procedures to help a team function and perform better.  I have to assume the PMI is trying to remove some of the issues of projects such as the politics and lack of communications by creating a process that works in many cases.</p>
<p>However, I was in a meeting the other day with many project managers who were asking me questions and I was asking them questions.  After leaving the meeting it dawned on me the struggles they were having were not because of the management of the project itself, but the lack of management or handling of the politics driving the business through the projects.  The stakeholders were not willingly on board, they were being forced down the path by sponsors and external forces.  That has to be brought out and resolved are the project will struggle at best, but more likely fail.</p>
<p>I also realized, most of the project managers did not have experiential knowledge of the actual work they were managing.  That is, the project manager over the network enhancements and new build-out had never been a network architect, network engineer or network administrator.  He simply had no clue if the network staff was actually doing the right things in the right order with the right equipment.  How could he possibly know if the project was truly on track.</p>
<p>Of course, the reality is, the PMP is a great &#8220;tool&#8221; to have on your tool belt, but the best tool does not make a master carpenter.  I might add, it appears the PMP has become much more real world over the years making it an even better tool and learning experience for project managers.</p>
<p>For more information on the PMP visit the PMI web site at http://www.pmi.org/Certification/Project-Management-Professional-PMP.aspx</p>
<p>The post <a href="https://thirdrock.com/blog/2014/02/20/pmp-or-not-two-key-observations/">PMP or Not &#8211; Two key observations</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">151</post-id>	</item>
	</channel>
</rss>
