Full HIPAA Training
|
DURATION
|
|
HIPAA Overview
|
3:50
|
SELECT MODULE
|
HIPAA Definitions & Lexicon
|
7:10
|
SELECT MODULE
|
The HITECH Act
|
2:43
|
SELECT MODULE
|
Main HIPAA Regulatory Rules
|
2:54
|
SELECT MODULE
|
HIPAA Omnibus Final Rule
|
2:06
|
SELECT MODULE
|
HIPAA Privacy Rule Basics
|
2:56
|
SELECT MODULE
|
HIPAA Security Rule Basics
|
2:39
|
SELECT MODULE
|
HIPAA Patient Rights
|
3:07
|
SELECT MODULE
|
HIPAA Disclosure Rules
|
7:17
|
SELECT MODULE
|
HIPAA Violation Consequences
|
6:31
|
SELECT MODULE
|
Preventing HIPAA Violations
|
7:51
|
SELECT MODULE
|
Being a HIPAA Compliant Employee
|
3:07
|
SELECT MODULE
|
HIPAA Training Summary
|
3:50
|
SELECT MODULE
|
HIPAA Timeline
|
5:02
|
SELECT MODULE
|
Threats to Patient Data
|
5:45
|
SELECT MODULE
|
Computer Safety Rules
|
2:26
|
SELECT MODULE
|
HIPAA and Social Media
|
7:52
|
SELECT MODULE
|
HIPAA and Emergency Situations
|
1:59
|
SELECT MODULE
|
HIPAA Officer
|
2:05
|
SELECT MODULE
|
HIPAA Compliance Checklist
|
3:55
|
SELECT MODULE
|
Recent HIPAA Updates
|
5:47
|
SELECT MODULE
|
Total
|
1 Hr 30 Min 41
|
|
|
|
|
Optional Extended Modules
|
|
|
Texas HB 300 for Healthcare Professionals and Students (Only Required in Texas)
|
DURATION
|
|
Texas Medical Records Privacy Act and HB 300
|
16:09
|
SELECT MODULE
|
SUMMARY:
|
|
|
The Texas Medical Records Privacy Act, HB 300 and HIPAA
|
|
The Definition of Protected Health Information in Texas
|
|
The Definition of Covered Entities in Texas
|
|
Medical Record Access by Employees
|
|
Patient Access to Electronic Health Records
|
|
Patient Authorizations for Electronic Disclosures of PHI
|
|
Breach Notification Requirements in Texas
|
|
Enforcement Authorities and Violation Penalties
|
|
What You Need to Remember about HB 300
|
|
|
|
|
Cybersecurity Dangers Encountered Healthcare Professionals (designed for front line staff)
|
DURATION
|
|
Cybersecurity Dangers Encountered by Healthcare Professionals
|
14:56
|
SELECT MODULE
|
SUMMARY:
|
|
|
Cybersecurity dangers
|
|
Why is Cybersecurity Important?
|
|
Major Cybersecurity Threats
|
|
Malware
|
|
Ransomware
|
|
Social Engineering
|
|
phishing
|
|
Business Email Compromise
|
|
Unauthorized Hardware, Software and Apps
|
|
Insider Threats
|
|
|
|
|
How Healthcare Staff can Protect PHI from Cyber Threats (designed for front line staff)
|
DURATION
|
|
How to Protect PHI from Cyber Threats
|
16:10
|
SELECT MODULE
|
SUMMARY:
|
|
|
Protect PHI from Cyber Threats
|
|
Physical Security
|
|
Email Security
|
|
phishing
|
|
Tips for Identifying
|
|
internet Security
|
|
HTTPS, Truths and Myths
|
|
Public Wi-Fi Networks
|
|
Password Security
|
|
Personal Devices and Removable Media
|
|
Safe and Secure
|
|
File Sharing
|
|