"While PHIPA has served Ontarians well over the last decade, rapid changes in technology and communications are demanding that we keep pace. With the growing use of electronic health records, the province needs a legislative framework that addresses the rights of individuals and the duties and obligations of health care providers in an electronic environment. Modernizing PHIPA will pave the way for a smooth and seamless transition toward 21st century health care while protecting our privacy. "   - Brian Beamish, Information and Privacy Commissioner of Ontario

Verney Conference Management and the Community-Based Advisory Committee are proud to present the “2016 PHIPA Connections Summit - Access, Privacy, Security, & Records Management”.

This summit aims to provide, at a very reasonable cost, the most useful and practical information for organizations regulated by the Personal Health Information Protection Act in Ontario. It is intended to help such organizations understand the Connections between access to health information, privacy, information security, and records management in order to more effectively manage their privacy risks up-front, and respond more effectively if things go wrong.

The Advisory Committee for the 2016 PHIPA Connections Summit has identified the program streams for this event, which are set out below. The Advisory Committee is inviting individuals to submit proposals for presentations to be heard at the Summit that relate to the program stream topics. The 2016 PHIPA Connections Summit will offer 1.5 days of plenary and breakout sessions, plus a half-day of optional in-depth workshops.

 

Click Here for the Attendee Justification Toolkit

Please note: This website has been optimized for current mobile web design standards, as well as the latest requirements for PCI Compliance.  Therefore to ensure the best experience we suggest using up to date versions of Firefox, Chrome, or Internet Explorer v.11.  Internet Explorer v.10 or less will not work properly with this web site as they pose a security threat to users.

This article explains further: http://www.cbc.ca/news/technology/internet-explorer-1.3391812