Full HIPAA Training – Optional Module Selection

    Full HIPAA Training DURATION
    HIPAA Overview 3:50 SELECT MODULE
    HIPAA Definitions & Lexicon 7:10 SELECT MODULE
    The HITECH Act 2:43 SELECT MODULE
    Main HIPAA Regulatory Rules 2:54 SELECT MODULE
    HIPAA Omnibus Final Rule 2:06 SELECT MODULE
    HIPAA Privacy Rule Basics 2:56 SELECT MODULE
    HIPAA Security Rule Basics 2:39 SELECT MODULE
    HIPAA Patient Rights 3:07 SELECT MODULE
    HIPAA Disclosure Rules 7:17 SELECT MODULE
    HIPAA Violation Consequences 6:31 SELECT MODULE
    Preventing HIPAA Violations 7:51 SELECT MODULE
    Being a HIPAA Compliant Employee 3:07 SELECT MODULE
    HIPAA Training Summary 3:50 SELECT MODULE
    HIPAA Timeline 5:02 SELECT MODULE
    Threats to Patient Data 5:45 SELECT MODULE
    Computer Safety Rules 2:26 SELECT MODULE
    HIPAA and Social Media 7:52 SELECT MODULE
    HIPAA and Emergency Situations 1:59 SELECT MODULE
    HIPAA Officer 2:05 SELECT MODULE
    HIPAA Compliance Checklist 3:55 SELECT MODULE
    Recent HIPAA Updates 5:47 SELECT MODULE
    Total 1 Hr 30 Min 41
    Optional Extended Modules
    Texas HB 300 for Healthcare Professionals and Students (Only Required in Texas) DURATION
    Texas Medical Records Privacy Act and HB 300 16:09 SELECT MODULE
    SUMMARY:
    The Texas Medical Records Privacy Act, HB 300 and HIPAA
    The Definition of Protected Health Information in Texas
    The Definition of Covered Entities in Texas
    Medical Record Access by Employees
    Patient Access to Electronic Health Records
    Patient Authorizations for Electronic Disclosures of PHI
    Breach Notification Requirements in Texas
    Enforcement Authorities and Violation Penalties
    What You Need to Remember about HB 300
    Cybersecurity Dangers Encountered Healthcare Professionals (designed for front line staff) DURATION
    Cybersecurity Dangers Encountered by Healthcare Professionals 14:56 SELECT MODULE
    SUMMARY:
    Cybersecurity dangers
    Why is Cybersecurity Important?
    Major Cybersecurity Threats
    Malware
    Ransomware
    Social Engineering
    phishing
    Business Email Compromise
    Unauthorized Hardware, Software and Apps
    Insider Threats
    How Healthcare Staff can Protect PHI from Cyber Threats (designed for front line staff) DURATION
    How to Protect PHI from Cyber Threats 16:10 SELECT MODULE
    SUMMARY:
    Protect PHI from Cyber Threats
    Physical Security
    Email Security
    phishing
    Tips for Identifying
    internet Security
    HTTPS, Truths and Myths
    Public Wi-Fi Networks
    Password Security
    Personal Devices and Removable Media
    Safe and Secure
    File Sharing

    Order Full Training