Full HIPAA Training |
DURATION |
|
HIPAA Overview |
3:50 |
SELECT MODULE |
HIPAA Definitions & Lexicon |
7:10 |
SELECT MODULE |
The HITECH Act |
2:43 |
SELECT MODULE |
Main HIPAA Regulatory Rules |
2:54 |
SELECT MODULE |
HIPAA Omnibus Final Rule |
2:06 |
SELECT MODULE |
HIPAA Privacy Rule Basics |
2:56 |
SELECT MODULE |
HIPAA Security Rule Basics |
2:39 |
SELECT MODULE |
HIPAA Patient Rights |
3:07 |
SELECT MODULE |
HIPAA Disclosure Rules |
7:17 |
SELECT MODULE |
HIPAA Violation Consequences |
6:31 |
SELECT MODULE |
Preventing HIPAA Violations |
7:51 |
SELECT MODULE |
Being a HIPAA Compliant Employee |
3:07 |
SELECT MODULE |
HIPAA Training Summary |
3:50 |
SELECT MODULE |
HIPAA Timeline |
5:02 |
SELECT MODULE |
Threats to Patient Data |
5:45 |
SELECT MODULE |
Computer Safety Rules |
2:26 |
SELECT MODULE |
HIPAA and Social Media |
7:52 |
SELECT MODULE |
HIPAA and Emergency Situations |
1:59 |
SELECT MODULE |
HIPAA Officer |
2:05 |
SELECT MODULE |
HIPAA Compliance Checklist |
3:55 |
SELECT MODULE |
Recent HIPAA Updates |
5:47 |
SELECT MODULE |
Total |
1 Hr 30 Min 41 |
|
|
|
|
Optional Extended Modules |
|
|
Texas HB 300 for Healthcare Professionals and Students (Only Required in Texas) |
DURATION |
|
Texas Medical Records Privacy Act and HB 300 |
16:09 |
SELECT MODULE |
SUMMARY: |
|
|
The Texas Medical Records Privacy Act, HB 300 and HIPAA |
|
The Definition of Protected Health Information in Texas |
|
The Definition of Covered Entities in Texas |
|
Medical Record Access by Employees |
|
Patient Access to Electronic Health Records |
|
Patient Authorizations for Electronic Disclosures of PHI |
|
Breach Notification Requirements in Texas |
|
Enforcement Authorities and Violation Penalties |
|
What You Need to Remember about HB 300 |
|
|
|
|
Cybersecurity Dangers Encountered Healthcare Professionals (designed for front line staff) |
DURATION |
|
Cybersecurity Dangers Encountered by Healthcare Professionals |
14:56 |
SELECT MODULE |
SUMMARY: |
|
|
Cybersecurity dangers |
|
Why is Cybersecurity Important? |
|
Major Cybersecurity Threats |
|
Malware |
|
Ransomware |
|
Social Engineering |
|
phishing |
|
Business Email Compromise |
|
Unauthorized Hardware, Software and Apps |
|
Insider Threats |
|
|
|
|
How Healthcare Staff can Protect PHI from Cyber Threats (designed for front line staff) |
DURATION |
|
How to Protect PHI from Cyber Threats |
16:10 |
SELECT MODULE |
SUMMARY: |
|
|
Protect PHI from Cyber Threats |
|
Physical Security |
|
Email Security |
|
phishing |
|
Tips for Identifying |
|
internet Security |
|
HTTPS, Truths and Myths |
|
Public Wi-Fi Networks |
|
Password Security |
|
Personal Devices and Removable Media |
|
Safe and Secure |
|
File Sharing |
|