In this course you will learn why cyber criminals want protected health information, also known as PHI. And you'll gain an understanding of the HIPAA/HITECH requirement and the current state of HIPAA compliance.
This course will showcase, why PHI is so valuable to cybercriminals, current data breaches, current industry fines, the importance of encrypted email and your responsibilities under the law.
In the leadership portion, you will learn why a risk assessment is required, what is the HITECH regulation of 2009, and the omnibus rule of 2013. We will also cover the importance of customized policies and procedures to create your Book of Evidence, and why a business associate agreement is required.
We will also review the types of violations we see in the industry today, and why you as the compliance or privacy officer are key to winning with compliance. We will also review how to handle a complaint and an audit from the Office for Civil Rights or attorneys.
The course objective is to educate you on the importance of understating the government requirement, the current state of HIPAA/ HITECH and the obligations under the law. You will come away with an understanding of how to protect and properly handle PHI and ePHI.
HIPAA Privacy and Rights and Protected Health Information
What is a Covered Entity?
What is PHI?
Privacy and Security Rules
What are Patients' Rights with PHI?
HIPAA Breaches, Violations & Penalties and how to be Compliant
HIPAA Breaches, Violations and Penalties
Why Cybercriminals Want PHI
HIPAA & Social Media, Mobile Devices, Email and Faxes
How to be Proactive to be HIPAA Compliant
HIPAA Foundation Conclusion
HITECH, Risk Assessments, Business Associates and Covered Entities
Welcome to ProHIPAA Leadership
Proper Transportation of PHI and ePHI
What is a Business Associate?
What is HITECH?
What is a Risk Assessment?
Policies, Data Breaches, Violations and Requirements
Policies, Procedures and the Book of Evidence
What is a Business Associate Agreement?
How to Handle a Data Breach and Violations
What Penalties Apply to Violations of Privacy Rule Requirements?
Officers, Complaints and Audits
Do I need a Privacy Officer or Security Officer?
What do I do if I get a HIPAA Complaint?
What is an Audit and how do I handle it?
Conclusion
What People are Saying
What people are saying about this course
“I feel much more confident in my knowledge and understanding of HIPAA laws, rules and implementation
”
- Travis, Medical Assistant Instructor from TX
“This course provided a nice overview of HIPAA guidelines. I liked the 2nd portion for Leaders and what they should be aware of for HIPAA and if a data breach occurs”