Course name:
HIPAA Managers
Description:
This detailed review of the Health Insurance Portability and Accountability Act (HIPAA) provides administrators, supervisors, and managers with the tools they need for developing and reviewing their HIPAA privacy and security programs.
Duration:
30 Minutes
Audience:
Administrators, Supervisors, and Managers
Prerequisites:
None
Course outline:
<p class="Heading1-Text"><span style="font-size: 12.0pt; mso-bidi-font-family: Arial;">This detailed review of the Health Insurance Portability and Accountability Act (HIPAA) provides administrators, supervisors, and managers with the tools they need for developing and reviewing their HIPAA privacy and security programs.&nbsp; This course also explains and illustrates the basic legal requirements for implementation, with examples and scenarios in a variety of settings.</span></p> <p class="Heading1-Text"><span style="font-size: 12.0pt; mso-bidi-font-family: Arial;">&nbsp;</span></p> <p class="Heading1-Text"><span style="font-size: 12.0pt; mso-bidi-font-family: Arial;">Learning Objectives:</span></p> <p class="Heading1-Text" style="margin-left: 1.0in; text-indent: -.25in; mso-list: l0 level1 lfo1;"><!--[if !supportLists]--><span style="font-size: 12.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;">&middot;<span style="font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><span style="font-size: 12.0pt; mso-bidi-font-family: Arial;">How to create policies and procedures, and the role of the Privacy Officer.</span></p> <p class="Heading1-Text" style="margin-left: 1.0in; text-indent: -.25in; mso-list: l0 level1 lfo1;"><!--[if !supportLists]--><span style="font-size: 12.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;">&middot;<span style="font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><span style="font-size: 12.0pt; mso-bidi-font-family: Arial;">Definition of HIPAA-related terms, such as business associate agreements, the minimum necessary rule, and the six categories of &ldquo;must&rdquo; and &ldquo;may&rdquo; disclosures.</span></p> <p class="Heading1-Text" style="margin-left: 1.0in; text-indent: -.25in; mso-list: l0 level1 lfo1;"><!--[if !supportLists]--><span style="font-size: 12.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;">&middot;<span style="font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><span style="font-size: 12.0pt; mso-bidi-font-family: Arial;">How to conduct a security assessment and analysis.</span></p> <p class="Heading1-Text" style="margin-left: 1.0in; text-indent: -.25in; mso-list: l0 level1 lfo1;"><!--[if !supportLists]--><span style="font-size: 12.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;">&middot;<span style="font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><span style="font-size: 12.0pt; mso-bidi-font-family: Arial;">Explanation of patient rights.</span></p> <p class="Heading1-Text" style="margin-left: 1.0in; text-indent: -.25in; mso-list: l0 level1 lfo1;"><!--[if !supportLists]--><span style="font-size: 12.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;">&middot;<span style="font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><span style="font-size: 12.0pt; mso-bidi-font-family: Arial;">How to identify a reportable breach and requirements for reporting.</span></p> <p>&nbsp;</p> <p class="Heading1-Text" style="margin-left: 1.0in; text-indent: -.25in; mso-list: l0 level1 lfo1;"><!--[if !supportLists]--><span style="font-size: 12.0pt; font-family: Symbol; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol;">&middot;<span style="font-variant-numeric: normal; font-stretch: normal; font-size: 7pt; line-height: normal; font-family: 'Times New Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </span></span><!--[endif]--><span style="font-size: 12.0pt; mso-bidi-font-family: Arial;">The three exceptions to a reportable breach.</span></p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.