HIPAA Awareness Training

HIPAA Awareness Training

Get up to speed on the fundamentals of the HIPAA- fast.

$110.00

All-Access Subscription (All Courses, 1 Year)

$1,000.00
Or log in to access your purchased courses

Syllabus

Lesson 1: What is HIPAA?

Goal- For you to understand the basics about what HIPAA is, why its important and who has to follow the HIPAA rules.


Key Questions Included

  1. What is the overall summary of the law?
  2. What is the purpose and why is it needed?
  3. What does HIPAA compliance mean?
  4. What is the impact of a HIPAA security breach on individuals?
  5. What is the impact of a HIPAA security breach on companies in terms of fines and penalties?
  6. What is the impact of a HIPAA security breach on companies besides fines and penalties?
  7. What is a Covered Enity?
  8. What is a Business Associate?
  9. What are some of the specific things health plans should consider as part of their HIPAA compliance strategy?
  10. What are some of the specific things data professionals (such as technology vendors or researchers) should consider as part of their HIPAA compliance strategy?
  11. What are some of the specific things healthcare providers should consider as part of their HIPAA compliance strategy?
Lesson 2: What are the 3 major rules of HIPAA?

Goal- For you to become familiar with the major components of HIPAA, including the Privacy Rule, The Security Rule and the Minimum Necessary Rule.


Key Questions Included

  1. What does the Privacy Rule do?
  2. What is the Security Rule?
  3. Who needs to comply with the Security Rule?
  4. How is minimum necessary defined?
  5. How does an entity determine who should have access to PHI?
Lesson 3: Protected Health Information (PHI) Deep Dive

Goal: For you to become familiar with the criteria for determining whether data should be considered Protected Health Information (PHI) and concepts related to data encryption.


Key questions included:

  1. What does Protected Health Information (PHI) mean? What does "identifiable" data mean?
  2. What is encryption / de-encryption?

 

Modules