Health Insurance Portability and Accountability Act

HIPAA Training Course

Create a Free Account
Health Insurance Portability and Accountability Act

HIPAA Training Course

Create a Free Account

Description

An Overview of Health Insurance and Portability Act (HIPAA) for all covered entities and business associates.

With the healthcare industry adopting new technologies rapidly, they are increasingly becoming susceptible to cyberthreats. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard to improve the health insurance system. Compliance to HIPAA regulations ensures privacy, reduce fraudulent activities and improve data systems. This well-crafted course with case studies and interactive scenarios provides an engaging learning experience to the workforce.

Course Overview

Ransomware, along with phishing attacks and insider threats, led to some of the biggest breaches in the healthcare sector. The course starts with an overview of healthcare data, expanding threat landscape along with recent data breaches in the healthcare industry. Further, the course will help you to learn about the importance of HIPAA, HITECH, security and privacy rules, protecting and handling PHI.

The learner will then proceed to understand healthcare provider responsibilities, security breaches, and how to report possible breaches.

The e-Learning course ends with a mandatory 10 question assessment that the learner must score a minimum of 80% to pass. Learners who fail will be guided to re-take the assessment.

What will you learn?

Healthcare Data

1. What is healthcare data?

2. Expanding threat landscape

3. Recent data breaches

Introduction to HIPAA 9

1. What is HIPAA?

2. What is HITECH?

3. HIPAA rules

4. The healthcare ecosystem

5. Who are Business associates?

How to Protect PHI?

1. What information should be protected?

2. Protecting PHI

3. Principle of least privilege and need-to-know principle

4. Handling PHI

5. General security measures

Healthcare Provider Responsibilities

1. Sharing health information

2. Examples of Healthcare security violations

3. Security breaches

4. How to report Healthcare security violations?

Summary and assessment

Summary

Cybersecurity assessment

Specifications

Learning time
20-25 minutes

Target audience
End-User

Target audience
End-User

Web format
HTML5

Device compatibility
Mobile and PC

Package format
SCORM 1.2

Narration
Human voice**

Assessment
Mandatory, 80% to pass***

Customization
Branding, translation and voice narration on request***

Request a demo

We want you to understand our products deeply before purchasing.

Request Demo 

Get Pricing

For any questions regarding pricing, our sales team is here to help.

Get Pricing

Get in touch

For queries regarding our products, our support team is always available.

Get in touch