Online Courses HIPAA Compliance HIPAA Compliance Training HIPAA Privacy and Security for Covered Entities (40 Minutes)

HIPAA Privacy and Security for Covered Entities (40 Minutes)

Created by: TeachPrivacy
5.0 2759 views
English
30-Day Money Back Guarantee
Full Lifetime Access
Self-Paced
Finish in
40 mins!
Made for for
Employees
only
Certificate
of Completion
Mobile -
Friendly
Access

What you'll learn

HIPAA PRIVACY
HIPAA and Health Privacy
Protected Health Information (PHI)
Confidentiality
Snooping
Individual Rights
Authorization
Disclosures
Accounting for Disclosures
The Minimum Necessary Rule
Enforcement
HIPAA SECURITY
Data Security Overview
Encryption
Passwords
Social Engineering
Phishing
Physical Access
Portable Devices and Remote Access
Data Disposal
Data Breach

Description

This course covers HIPAA privacy and HIPAA security for covered entities.  It consists of two modules: HIPAA Privacy (approximately 20 minutes) and HIPAA Security (approximately 20 minutes).  Each module has 10 interactive quiz questions interspersed with short video segments. Trainees must score at least 70% correct on the quiz questions to pass each module.


NOTE: This is the 40-minute version of this course.  We also have a 60-minute version of this course, which contains 30-minute versions of the HIPAA Privacy and HIPAA Security modules.  The 60-minute course covers the same topics but in more detail with more examples.


Topics covered:

HIPAA PRIVACY

• HIPAA and Health Privacy
• Protected Health Information (PHI)
• Confidentiality
• Snooping
• Individual Rights
• Authorization
• Disclosures
• Accounting for Disclosures
• The Minimum Necessary Rule
• Enforcement


HIPAA SECURITY

• Data Security Overview
• Encryption
• Passwords
• Social Engineering
• Phishing
• Physical Access
• Portable Devices and Remote Access
• Data Disposal
• Data Breach

Table of Contents

HIPAA PRIVACY


• HIPAA and Health Privacy
• Protected Health Information (PHI)
• Confidentiality
• Snooping
• Individual Rights
• Authorization
• Disclosures
• Accounting for Disclosures
• The Minimum Necessary Rule
• Enforcement

HIPAA SECURITY


• Data Security Overview
• Encryption
• Passwords
• Social Engineering
• Phishing
• Physical Access
• Portable Devices and Remote Access
• Data Disposal
• Data Breach

Author

TeachPrivacy

4 Courses

Founded by a leading privacy law expert, Professor Daniel Solove, TeachPrivacy provides computer-based privacy and data security training.  Our training incorporates video, quizzing, and interactive elements such as games and activities, and it is highly engaging. We cover 50+ training topics, including:

HIPAA
privacy awareness
data security
phishing
FERPA
GLBA
financial privacy
Red Flags
European Union privacy law
global privacy law
Privacy by Design
social media

This is a training that your employees will actually enjoy and they will learn more from it too. Our philosophy: Training should make you think and make you care.

Our clients include Fortune 500 companies, large universities, hospitals, law firms, and businesses in a wide array of industries.

Website: http://teachprivacy.com

HIPAA Privacy and Security for Covered Entities (40 Minutes)

HIPAA Privacy for Covered Entities in 20 Minutes
HIPAA Privacy for Covered Entities in 20 Minutes

This training module covers HIPAA Privacy for covered entities. It contains a series of videos with 10 quiz questions mixed in.  It takes approximately 20 minutes to complete.  Trainees must score at least 70% correct to pass.

Topics covered:

• HIPAA and Health Privacy
• Protected Health Information (PHI)
• Confidentiality
• Snooping
• Individual Rights
• Authorization
• Disclosures
• Accounting for Disclosures
• The Minimum Necessary Rule
• Enforcement

HIPAA Security in 20 Minutes
HIPAA Security in 20 Minutes

This training module covers HIPAA Security for covered entities and business associates. It contains a series of videos with 15 quiz questions mixed in.  The module takes approximately 20 minutes to complete.  Trainees must score at least 70% correct to pass.

Topics covered:

• Data Security Overview
• Encryption
• Passwords
• Social Engineering
• Phishing
• Physical Access
• Portable Devices and Remote Access
• Data Disposal
• Data Breach

Courses Handpicked for you