Get certified in HIPAA for just $29.95.
To view this video please enable JavaScript, and consider upgrading to a web browser that supports HTML5 video
OFFICE MANAGER MARY: Hey, Joy. Don’t forget you need to call Beverly Smith about her diabetes diagnosis. NURSE JOY: Oh, right. Do you have her number? OFFICE MANAGER MARY: Mmhmm, it’s 555-8012. NURSE JOY: Okay, yeah, I’ll make sure to give her a call. OFFICE MANAGER MARY: Okay good, and I’ll text her doctor to let her know we reached out. NURSE JOY: Okay, thanks, see ya later. OFFICE MANAGER MARY: Thank you. ROB: Welcome to your HIPAA Compliance training! My name is Rob Van Buskirk, and I am excited to be your compliance guide for this HIPAA course. The reason you are here is that you are a trusted medical professional or a business associate that needs to understand the importance of protecting PHI. In this course you will learn why cyber criminals want Protected Health Information, also known as PHI. And you’ll gain an understanding of the HIPAA/HITECH requirement and the current state of HIPAA compliance. This course will showcase, why PHI is so valuable to cybercriminals, current data breaches, current industry fines, the importance of encrypted email and your responsibilities under the law. The course objective is to educate you on the importance of understating the Government Requirement, the current state of HIPAA/ HITECH and the obligations under the law. You will come away with an understanding of how to protect and properly handle PHI and ePHI. Thank you for choosing ProHIPAA! Let’s get started.
Welcome to your HIPAA compliance training course at ProHIPAA. This course is for anyone who needs a greater understanding of the importance of safeguarding Protected Health Information (PHI) and the ways in which you can do that, whether you're a trusted medical professional or a business associate who supports a medical professional or healthcare organization.
In this course, you'll learn:
This course also includes sections on:
Keep these in mind as you proceed through this course, as well as a few important course objectives:
Thanks for choosing ProHIPAA. Let's begin!
Since safeguarding PHI is the entire reason for HIPAA's existence, let's take a closer look at what constitutes Protected Health Information.
PHI is that health information that can identify an individual to whom the information belongs to. HIPAA's Privacy Rule was established to help protect PHI while in the care of either covered entities or business associates. This includes whether a covered entity or business associate is sending, receiving, or storing this information.
A covered entity is:
The most common examples of a covered entity are your doctor's office and your dentist's office.
HHS.gov defines a business associate as, “A person or entity (other than a member of the covered entity's workforce) that performs certain functions or activities on behalf of, or provides certain services to, a covered entity that involve the use or disclosure of protected health information.”
A common example of a business associate would be a third-party billing service that handles payment transactions on behalf of your doctor's or dentist's office.
The two key elements to whether or not a piece of information can be considered PHI are:
Common pieces of information that are identifiable are names, addresses, dates of birth, and social security numbers. Everything an identity thief needs.
There are actually 18 HIPAA identifiers, which will be listed at the end of this section.
Protected Health Information can include:
PHI can be found in three forms:
Remember that for information to be considered PHI, it must be identifiable. Here are 18 identifiers as outlined in the Privacy Rule.