The HHS Breach Final Rule Is Out What s Next?

Similar documents
The Impact of the Stimulus Act on HIPAA Privacy and Security

45 CFR Part 164. Interim Final Rule Breach Notification for Unsecured Protected Health Information

Interim Date: July 21, 2015 Revised: July 1, 2015

Changes to HIPAA Privacy and Security Rules

BREACH NOTIFICATION POLICY

OCR Phase II Audit Protocol Breach Notification. HIPAA COW Spring Conference 2017 Page 1 Boerner Consulting, LLC

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES

HIPAA OMNIBUS FINAL RULE

H E A L T H C A R E L A W U P D A T E

AFTER THE OMNIBUS RULE

OVERVIEW OF RECENT CHANGES IN HIPAA AND OHIO PRIVACY LAWS

HITECH and HIPAA: Highlights for Health Departments. Aimee Wall UNC School of Government

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

New. To comply with HIPAA notice requirements, all Providence covered entities shall follow, at a minimum, the specifications described below.

HIPAA Breach Notice Rules New notice requirements for HIPAA covered entities when there is a breach of Protected Health Information (PHI)

The Guild for Exceptional Children HIPAA Breach Notification Policy and Procedure

ARRA s Amendments to HIPAA Privacy & Security Rules

HIPAA: Final Omnibus Rule is Here Arizona Society for Healthcare Risk Managers November 15, 2013

New HIPAA Breach Rules NAHU presents the WHAT and WHYs. Agenda

Omnibus HIPAA Rule: Impact on Covered Entities

Patient Breach Letter Content Requirements

[Name of Organization] HIPAA Incident/Breach Investigation Procedure 4

Breach Policy. Applicable Standards from the HITRUST Common Security Framework. Applicable Standards from the HIPAA Security Rule

HITECH and Stimulus Payment Update

HIPAA Training. HOPE Health Facility Administrators June 2013 Isaac Willett and Jason Schnabel

Containing the Outbreak: HIPAA Implications of a Data Breach. Jason S. Rimes. Orlando, Florida

Fifth National HIPAA Summit West

OMNIBUS RULE ARRIVES

NOTIFICATION OF PRIVACY AND SECURITY BREACHES

HITECH Privacy, Security, Enforcement, Breach, and GINA The Final Rule

The American Recovery Reinvestment Act. and Health Care Reform Puzzle

x Major revision of existing policy Reaffirmation of existing policy

HIPAA Breach Notification Case Studies on What to Do and When to Report

An Overview of the Impact of the American Recovery and Reinvestment Act of 2009 on the HIPAA Medical Privacy and Security Rules

Management Alert Final HIPAA Regulations Issued

Compliance Steps for the Final HIPAA Rule

CLIENT UPDATE. HIPAA s Final Rule: The Impact on Covered Entities, Business Associates and Subcontractors

HIPAA Omnibus Rule. Critical Changes for Providers Presented by Susan A. Miller, JD. Hosted by

HIPAA Basic Training for Health & Welfare Plan Administrators

NPRM: Modifications to the HIPAA Privacy, Security, and Enforcement Rules under HITECH

Coping with, and Taking Advantage of, HIPAA s New Rules!! Deven McGraw Director, Health Privacy Project April 19, 2013!

ALERT. November 20, 2009

HIPAA STUDENT ASSOCIATE AGREEMENT

The Impact of Final Omnibus HIPAA/HITECH Rules. Presented by Eileen Coyne Clark Niki McCoy September 19, 2013

The HIPAA Omnibus Rule

Legal and Privacy Implications of the HIPAA Final Omnibus Rule

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

HIPAA BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATES AND SUBCONTRACTORS

2011 Miller Johnson. All rights reserved. 1. HIPAA Compliance: Privacy and Security Changes under HITECH HITECH. What is HITECH? Mary V.

HIPAA: Impact on Corporate Compliance

HIPAA, HITECH & Meaningful Use

HIPAA Compliance Under the Magnifying Glass

Privacy Sleuths: Solving the Mystery of Wellness Program Privacy Compliance. Agenda. Health Data Exposure National Wellness Conference

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Changes to HIPAA Under the Omnibus Final Rule

Compliance Steps for the Final HIPAA Rule

Getting a Grip on HIPAA

HIPAA Privacy Overview

HIPAA PRIVACY REQUIREMENTS. Dana L. Thrasher Robert S. Ellerbrock, III Constangy, Brooks & Smith, LLP

HIPAA OMNIBUS RULE. The rule makes it easier for parents and others to give permission to share proof of a child s immunization with a school

HIPAA The Health Insurance Portability and Accountability Act of 1996

Safeguarding Your HIPAA and Personal Health Information Data. Robert Hess, Office of General Counsel Steve Cosentino, Stinson Morrison Hecker

2016 Business Associate Workforce Member HIPAA Training Handbook

HITECH Poses Important Challenges... Are You Compliant?

HTKT.book Page 1 Monday, July 13, :59 PM HIPAA Tool Kit 2017

MEMORANDUM. Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Nancy Davis, Ministry Health Care Peg Schmidt, Aurora Health Care Teresa Smithrud, Mercy Health System

Assessing and Mitigating Risk Under the HIPAA Omnibus Rule

Assessing and Mitigating Risk Under the HIPAA Omnibus Rule

AMA Practice Management Center, What you need to know about the new health privacy and security requirements

Interpreters Associates Inc. Division of Intérpretes Brasil

View the Replay on YouTube. HIPAA Enforcement 2.0: Minimizing Exposure with Affirmative Defense

HIPAA Update. Jamie Sorley U.S. Department of Health and Human Services Office for Civil Rights

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies

HEALTH & HUMAN SERVICES OFFICE FOR CIVIL RIGHTS HIPAA COMPLIANCE AUDITS. What do I need to know?

HIPAA Privacy & Security Plan October 2016

The wait is over HHS releases final omnibus HIPAA privacy and security regulations

Texas Tech University Health Sciences Center HIPAA Privacy Policies

GUIDE TO THE OMNIBUS HIPAA RULE: What You Need to Know and Do

Business Associate Agreement

503 SURVIVING A HIPAA BREACH INVESTIGATION

Individual and Third-Party Access to Medical Records

New HIPAA Rules and Implications for the Industry January 29, 2013

Omnibus Components. Not in Omnibus. HIPAA/HITECH Omnibus Final Rule

HIPAA Privacy and Security for Employers in the Age of Common Data Breaches. April 30, 2015

MONTCLAIR STATE UNIVERSITY HIPAA PRIVACY POLICY. Approved by the Montclair State University Board of Trustees on April 3, 2014

HIPAA PRIVACY AND SECURITY RULES APPLY TO YOU! ARE YOU COMPLYING? RHODE ISLAND INTERLOCAL TRUST LINN F. FREEDMAN, ESQ. JANUARY 29, 2015.

HITECH Breach Notification for Unsecured Protected Health Information Rulemaking

SUBCONTRACTOR BUSINESS ASSOCIATE AGREEMENT

AROC 2015 HIPAA PRIVACY AND SECURITY RULES

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP

HIPAA HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT

LEGAL ISSUES IN HEALTH IT SECURITY

Colorado Medical Society. June 3, Presented by David A. Ginsberg President, PrivaPlan Associates, Inc.

RISK TRACK. Privacy and Data Protection

The HIPAA/HITECH Final Rule: Time to Get More Serious About Compliance. Patricia A. Markus, Esq.

True or False? HIPAA Update: Avoiding Penalties. Preliminaries. Kim C. Stanger IHCA (7/15)

ICAHN Presentation. Final Omnibus Rule and Security Risk Analysis. July 26, David Ginsberg

HIPAA PRIVACY COMPLIANCE MANUAL DISCLAIMER

Preparing for a HIPAA Audit & Hot Topics in Health Care Reform

Transcription:

The HHS Breach Final Rule Is Out What s Next? Webinar September 16, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.

Disclaimer The American Health Information Management Association makes no representation or guarantee with respect to the contents herein and specifically disclaims any implied guarantee of suitability for any specific purpose. AHIMA has no liability or responsibility to any person or entity with respect to any loss or damage caused by the use of this audio seminar, including but not limited to any loss of revenue, interruption of service, loss of business, or indirect damages resulting from the use of this program. AHIMA makes no guarantee that the use of this program will prevent differences of opinion or disputes with Medicare or other third party payers as to the amount that will be paid to providers of service. As a provider of continuing education the American Health Information Management Association (AHIMA) must assure balance, independence, objectivity and scientific rigor in all of its endeavors. AHIMA is solely responsible for control of program objectives and content and the selection of presenters. All speakers and planning committee members are expected to disclose to the audience: (1) any significant financial interest or other relationships with the manufacturer(s) or provider(s) of any commercial product(s) or services(s) discussed in an educational presentation; (2) any significant financial interest or other relationship with any companies providing commercial support for the activity; and (3) if the presentation will include discussion of investigational or unlabeled uses of a product. The intent of this requirement is not to prevent a speaker with commercial affiliations from presenting, but rather to provide the participants with information from which they may make their own judgments. This seminar's faculty have made no such disclosures. AHIMA 2009 HIM Webinar Series i

Faculty Harry Rhodes, MBA, RHIA, CHP, CHPS Harry Rhodes, MBA, RHIA, CHP, CHPS, is director of practice leadership at AHIMA, serving as a professional resource to HIM professionals and organizations, and the media on health information professional practice guidelines. Mr. Rhodes is an active member of the Health Information Technology Standards Panel (HITSP) serving on the Security, Privacy, and Infrastructure Technical Committee. He also received the Illinois Health Information Management Association's 2003 Professional Achievement Award and the 2003 Chicago Area Health Information Association Distinguished Member Award. AHIMA 2009 HIM Webinar Series ii

Table of Contents Disclaimer... i Faculty... ii Polling Question #1: Who s Here... 1 Our Agenda... 1 Eye on the Prize... 2 Challenge Defining: Access & Disclosure... 2 Breach as Defined in ARRA... 3 Breach of Unsecured PHI... 3 The Harm Threshold... 4 Polling Question #2: Harmful Breach... 4 Unsecured PHI... 5 Limited Data Set Not Protected... 5 Defining the Scope of Information... 6 NIST Healthcare Guidance... 6 HHS Regs Now Part of HIPAA... 7 Effective Dates... 8 180 Day Pre-compliance Period... 8 The Planning Process... 9 Revising BA Agreements... 9 Agent versus Contractor... 10 Staff Training, Education, & Rights 164.530 Administrative Requirements... 10 Risk Assessment... 11 Risk Assessment Factors... 11 Security Incident Response Team... 12 Polling Question #3: Response Team... 12 Notification Methodology... 13 Required Notification Content... 13 Notification Format & Media... 14 Substitute Notice... 14 Delivery to Proxy/Personal Representative... 15 Notification of the Media... 15-16 Notification to Secretary 164.408... 16 Walking the Line... 17 Expanding Scope of Protected Data in State Breach Law... 17 Variation Between HHS, FTC, & State... 18 SB 20: California Notification Letter Requirements... 18 Breach Notification Triggers... 19 Resource/Reference List... 19 Audience Questions... 20 Audio Seminar Discussion... 20 AHIMA 2009 HIM Webinar Series (CONTINUED)

Table of Contents Become an AHIMA Member Today!... 21 Audio Seminar Information Online... 21 Upcoming Audio Seminars... 22 AHIMA Distance Education online courses... 22 Thank You/Evaluation Form and CE Certificate (Web Address)... 23 Appendix... 24 Resource/Reference List... 25 CE Certificate Instructions AHIMA 2009 HIM Webinar Series

Polling Question #1: Who s Here Your status under HIPAA/ARRA: a) Work for covered entity b) Work for business associate c) Consult/advise CEs and/or BAs d) Work for PHR vendor/related business e) Work for EHR software vendor f) Work for HIE g) None of the above 1 Our Agenda Areas of HIM most affected by Breach Notification Identify unsecure PHI Understand risk assessment & related harm thresholds Security guidance for breach prevention What we should do first Open Q&A 2 AHIMA 2009 HIM Webinar Series 1

Eye on the Prize Moreover, requiring breach notification creates an incentive on all covered entities to invest in data security improvements in efforts to minimize the possibility of reportable data breaches. 3 Challenge Defining: Access & Disclosure From the Privacy Rule: 164.524 Access by individuals to protected health information To inspect and obtain from the designated record set 160.103 Definitions - Disclosure The release, transfer, provision of, access to, or divulging in any other manner of information outside the entity holding the information 4 AHIMA 2009 HIM Webinar Series 2

Breach as Defined in ARRA Unauthorized acquisition, access, use, or disclosure that compromises the privacy or security of the information, except where the party would not reasonably have been able to retain the information 5 Breach of Unsecured PHI The acquisition, access, use, or disclosure of PHI in a manner not permitted [by the privacy rule], which compromises the security or privacy of the PHI Except where: Unintentional acquisition, access, or use of PHI by workforce member or person acting under authority of CE or BA, if such acquisition/access/use was made in good faith and within the scope of authority, and does not result in further use of disclosures in a manner not permitted [by the privacy rule]; Inadvertent disclosure of PHI between persons authorized to access PHI in the same CE or BA, or within the same OHCA, and the information is not further use of disclosed in a manner not permitted [by the privacy rule]; A disclosure of PHI where a CE/BA has good faith belief that an unauthorized person to whom the disclosure was made would not reasonably have been able to retain it. 6 AHIMA 2009 HIM Webinar Series 3

The Harm Threshold State laws require harm thresholds be met before providing notification. HHS clarifies - a breach is a use or disclosure that compromises the security or privacy of the protected health information means poses a significant risk of financial, reputational, or other harm to the individual. Must perform & document a risk assessment Burden of proof on CE/BA 7 Polling Question #2: Harmful Breach Has your organization ever experienced an harmful breach event? a) Never b) Not that I know of c) Yes, Financial harm d) Yes, Reputational harm e) Yes, Other harm to the individual f) Yes, All of the above 8 AHIMA 2009 HIM Webinar Series 4

Unsecured PHI PHI that is not secured through the use of a technology or methodology specified by the Secretary in guidance (to render PHI unusable, unreadable, or indecipherable to unauthorized individuals). CE and BA that implement the specified technologies and methodologies with respect to PHI are not required to provide notification in the event of a breach of such information. 9 Limited Data Set Not Protected LDS Contains: Dates Zip codes City /town High risk of possible re-identification If breached risk assessment required LDS may only be used or disclosed as permitted by the Privacy Rule (data use agreements) 10 AHIMA 2009 HIM Webinar Series 5

Defining the Scope of Information NIST Guidance: Data in motion Moving thru a network, includes wireless & e- mail Data at rest Databases, file systems, flash drives, memory Data in use CRUD created, retrieved, updated, deleted Data disposed Includes discarded paper or recycled electronic media 11 NIST Healthcare Guidance NIST SP 800-111, Encryption Guidance NIST SP 800-52, Transport Layer Security (TLS) NIST SP 800-77, Guide to IPsec VPNs NIST SP 800-113, Guide to SSL VPNs NIST SP 800 66 Rev 1, An Introductory Resource Guide for Implementing the HIPAA Security Rule. http://www.csrc.nist.gov 12 AHIMA 2009 HIM Webinar Series 6

HHS Regs Now Part of HIPAA Rule adopted terminology to conform with HIPAA Expansion of certain HIPAA provisions to business associates Personal health record information protections Regional privacy advisors for HHS regional offices, education campaign Breach notification requirements 13 HHS Regs Now Part of HIPAA Restriction requests Accounting of Disclosure obligation expands Access to information in electronic format Use of limited data set, and coming changes to minimum necessary Stiffer enforcement 14 AHIMA 2009 HIM Webinar Series 7

Effective Dates HHS September 23, 2009 FTC September 24, 2009 Section 164.400 Rule applies to breaches occurring on or after 30 days from the interim final rule publication date 15 180 Day Pre-compliance Period HHS to employ enforcement discretion to not impose sanctions for failure to provide the required notifications for breaches that are discovered before 180 calendar days from the publication of the rule, or February 22, 2010 Will work with CE: Technical Assistance Voluntary corrective action 16 AHIMA 2009 HIM Webinar Series 8

The Planning Process BA contracting process Volume of BA contracts Focus on required elements of BAA Security administration Converting requirements into Policies and Procedures Documentation requirements Breach planning, training, and education Triggers Investigation Communication 17 Revising BA Agreements All BAAs should be reviewed Two difference opinions: No need to revise if BAA contains clause that BA will comply with all present and future laws and regulations. All BAA must be updated to address requirements of breach notification rule. 18 AHIMA 2009 HIM Webinar Series 9

Agent versus Contractor Federal common law of agency BA as agent breach imputed to CE; 60 days begins with discovery BA as independent contractor 60 days begins with notification of CE Revise notification timing in BA contracts BA provides CE immediate notification of breach FU with detailed information about individuals 19 Staff Training, Education, & Rights 164.530 Administrative Requirements CE required to train workforce on breach policies and procedures, in line with their duties (policies and procedures must be complaint with rules) As employees change duties, they must be trained within a reasonable period of time of the change CE must establish a process to allow employees to complain about CE s security breach policies and procedures CE must establish an employee sanctions procedure for breach notification non-compliance CE must establish a policy to protect employees exercising their rights to file complaints, and may not require individuals to waive any of these rights CE demonstrate compliance through documentation sufficient to support burden of proof 20 AHIMA 2009 HIM Webinar Series 10

Risk Assessment Prepare policies and procedures for the detection and investigation of data breaches, for determining whether they are reportable, and identifying the individuals involved in mitigation. A premium is placed on effective detection and investigation of possible breaches. CE & BA must document risk assessments and demonstrate, if necessary, that no notification was required. 21 Risk Assessment Factors To whom the data was disclosed Whether or not immediate mitigation was possible Type and amount of information breached 22 AHIMA 2009 HIM Webinar Series 11

Security Incident Response Team HIM Privacy officer Information systems IT security Risk management/legal Physical security Admitting staff Nurse auditors Compliance staff Clinicians involved in chart clean-up issues Administration 23 Polling Question #3: Response Team Does your organization have a Security Incident Response Team established under HIPAA? a) Yes b) No 24 AHIMA 2009 HIM Webinar Series 12

Notification Methodology Following discovery of a breach of unsecured PHI notify each individual whose info has been (or reasonably believed by CE to have been) accessed, acquired, used, or disclosed as a result of that breach 60 day discovery calendar starts the first day the CE is aware of the breach or would have been aware had it exercised reasonable diligence. Notification must be made without unreasonable delay and never later than 60 calendar days after discovery, unless there s a law enforcement delay 25 Required Notification Content Written in Plain language; Brief description of what happened, including date of breach and discovery (if known); Description of types of unsecured PHI involved in the breach; Steps individual(s) should take to protection themselves; Brief description of what the CE is doing to investigate, mitigate harm, and protect against further breaches; and Contact procedures for questions or more information (shall include toll-free telephone, email address, web site, or postal address). Note: these elements may be provided in one or more mailings as information is available. (Need not be all in one.) 26 AHIMA 2009 HIM Webinar Series 13

Notification Format & Media Written notice by first-class mail to individual at last-known address or, if individual agrees, by email. Provisions for substitute notice methods if contact information is unknown or out of date (telephone, posting on home page, broadcast media, etc., method options vary with number of people affected by breach) Provide translating the notice into frequently encountered languages. Make notice available in alternate formats, such as Braille, large print, or audio. 27 Substitute Notice Substitute notice should be provided as soon as reasonably possible after the covered entity is aware that it has insufficient or outof-date contact information for one or more affected individuals. For fewer than 10 individuals e-mail or telephone call is appropriate. For 10 or more individuals substitute notice through the Web site or media requires the covered entity to have a toll-free phone number, active for 90 days. 28 AHIMA 2009 HIM Webinar Series 14

Delivery to Proxy/Personal Representative Notice to parent if individual is a minor Notice to proxy or personal representative if individual lacks legal capacity due to mental or physical condition Notice to next of kin or personal representative if individual is deceased 29 Notification of the Media If breach involves 500 or more individuals of any one State or jurisdiction BA with multiple CE is only required to report breach of 500 or more occurring at one CE Notice provided to prominent media serving State or Jurisdiction Intended to supplement not substitute the individual notice 30 AHIMA 2009 HIM Webinar Series 15

Notification of the Media Must be within the 60 days following discovery Media notice differs from substitute media notice 31 Notification to Secretary 164.408 500 or more individuals immediately Less than 500 individuals annually In manner specified on HHS Website Notification to Secretary still required if 500 or more individuals split between more than one State CE must maintain internal log or documentation for 6 years 32 AHIMA 2009 HIM Webinar Series 16

Walking the Line Balancing breach response between: HHS Breach Notification Rule FTC Breach Notification Rule State Breach Notification Laws 33 Expanding Scope of Protected Data in State Breach Law Personal information Individually identifiable health information Health insurance information Genetic information Biometric data 34 AHIMA 2009 HIM Webinar Series 17

Variation Between HHS, FTC, & State Definition of protected information Identification of individuals and/or agencies to be notified Process for breach notification Triggers for reporting and providing consumer notice of security breach 35 SB 20: California Notification Letter Requirements Whether there was a delay in notification because of investigations Estimated number of persons affected Contact info for credit reporting agencies 36 AHIMA 2009 HIM Webinar Series 18

Breach Notification Triggers Acquisition-based triggers Risk-based triggers 37 Resource/Reference List AHIMA s ARRA website www.ahima.org/arra/ ARRA (the law itself) http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=111_cong_bills&docid=f%3ah1enr.t xt.pdf HHS ARRA Resources http://healthit.hhs.gov/portal/server.pt?open=512&objid=1 233&parentname=CommunityPage&parentid=3&mode=2&in _hi_userid=10741&cached=true 38 AHIMA 2009 HIM Webinar Series 19

Audience Questions Audio Seminar Discussion Following today s live seminar Available to AHIMA members at www.ahima.org Members Only Communities of Practice (CoP) AHIMA Member ID number and password required Join the e-him Community from your Personal Page. Look under Community Discussions for the Audio Seminar Forum You will be able to: Discuss seminar topics Network with other AHIMA members Enhance your learning experience AHIMA 2009 HIM Webinar Series 20

Become an AHIMA Member Today! To learn more about becoming a member of AHIMA, please visit our website at www.ahima.org/membership to join now! AHIMA Audio Seminars and Webinars Visit our Web site http://campus.ahima.org for information on the 2009 seminar schedule. While online, you can also register for seminars and webinars or order CDs, MP3s, and webcasts of past seminars. AHIMA 2009 HIM Webinar Series 21

Upcoming Webinars Managing Privacy through Systems Access Policy: Mitigating Medical Identity Theft September 22, 2009 Curriculum Approval to Accommodate ICD-10-CM/PCS October 13, 2009 Transitional Instructional Design to Accommodate ICD-10-CM/PCS October 15, 2009 AHIMA Distance Education Anyone interested in learning more about e-him should consider one of AHIMA s web-based training courses. For more information visit http://campus.ahima.org AHIMA 2009 HIM Webinar Series 22

Thank you for joining us today! Remember visit the AHIMA Audio Seminars/Webinars Web site to complete your evaluation form and receive your CE Certificate online at: http://campus.ahima.org/audio/2009seminars.html Each person seeking CE credit must complete the sign-in form and evaluation in order to view and print their CE certificate. Certificates will be awarded for AHIMA CEUs. AHIMA 2009 HIM Webinar Series 23

Appendix Resource/Reference List... 25 CE Certificate Instructions AHIMA 2009 HIM Webinar Series 24

Appendix Resource/Reference List www.ahima.org/arra/ http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=111_cong_bills&docid=f%3ah1enr.txt.pdf http://healthit.hhs.gov/portal/server.pt?open=512&objid=1233&parentname=communitypage&parentid =3&mode=2&in_hi_userid=10741&cached=true AHIMA 2009 HIM Webinar Series 25

To receive your CE Certificate Please go to the AHIMA Web site http://campus.ahima.org/audio/2009seminars.html click on the link to Sign In and Complete Online Evaluation listed for this webinar. You will be automatically linked to the CE certificate for this webinar after completing the evaluation. Each participant expecting to receive continuing education credit must complete the online evaluation and sign-in information after the webinar, in order to view and print the CE certificate.