HIPAA Training Overview
Our web-based HIPAA compliance training course is intended to satisfy the mandatory HIPAA and HITECH training component for an organization's staff. This course will prepare learners to comply with the most up-to-date privacy and security requirements as mandated in:
By recognizing personal health information and taking appropriate steps to safeguard it, not only will your staff be able to comply with HIPAA regulations, they will also protect individuals from negative outcomes related to misuse of their health information. The course provides an overview of the regulations and teaches learners how to recognize and protect Personal Health Information (PHI) in oral, written and electronic forms. Scenario-based examples and practice activities illustrate and reinforce how compliance applies to varied business settings.
Audience: This course is designed for a general audience and is relevant to any professional who may come in contact with, process, or make decisions about how to handle PHI.
Length: Estimated seat time is 30 to 45 minutes depending on the learner’s pace.
Given a situation involving the protection or security of personal health information, learners will be able to recognize PHI and take the appropriate steps to safeguard it, in compliance with HIPAA and HITECH regulations.
Meet Compliance and Stay Protected
This course provides detailed guidelines regarding the types of organizations that must comply with the regulations, and how they must do so. These "covered entities" -- and their employees and business associates -- may incur civil and criminal penalties for violating its provisions. This course explains who is responsible for complying with HIPAA, the safeguards they must establish to protect personal health information and the consequences they may experience if they fail to do so.
The Health Insurance Portability and Accountability Act (HIPAA)
HIPAA purpose & goals
Individually Identifiable Information
Compliance and Consequences
Covered entities & business associates
Violations and penalties
Using and Disclosing PHI
The right to privacy
Use and disclosure guidelines
Information security goals
Oral and written communications
Computer and internet data
HITECH & Omnibus Privacy breach requirements