e-Learning course
Health Insurance Portability and Accountability Act (HIPAA)

A customizable HIPAA Security Awareness Training course to guide employees in safeguarding Protected Health Information (PHI).
Audience: All/ End-Users, Learning time: 25-30minutes
Customize this course
Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.

Feature your logo

Choose case-studies

Choose topics

Add information classification

Add incident reporting information

Translate the course (optional)
Course data
The HIPAA Security Awareness Training course provides an understanding of HIPAA regulations, focusing on their applications at work. The course also helps employees understand the importance of safeguarding Protected Health Information (PHI) through real-world case studies. In addition, best practices for protecting PHI and reporting security breaches are covered.
Section 1: HIPAA Security Breaches – Real Case Studie
This section covers real-world case studies of breaches related to the HIPAA Security and Privacy Rule. Further, these case studies help employees understand the importance of safeguarding Protected Health Information (PHI) and the potential consequences of non-compliance.

Section 2: Introduction to HIPAA
This section provides employees with an introduction to HIPAA, focusing on its key components. They will understand the fundamentals of HIPAA, including the definition of Protected Health Information (PHI), Electronic Protected Health Information (ePHI), their examples, the HIPAA Security & Privacy Rule, and the significance of safeguarding PHI.
- What is HIPAA?
- · HIPAA Security & Privacy Rule
- · What is PHI?
- · Examples of PHI
- · What is ePHI?
- · Why is Protecting PHI Important

Section 3: Protecting ePHI
This section consists of six scenario-based challenges based on the best practices in protecting ePHI.
- Safeguarding ePHI while Working Remotely
- · Securing Access Credentials to Protect ePHI
- · Safe Internet Browsing Practices to Protect ePHI
- · Securing ePHI while Using Emails and Collaboration Platforms
- · Protecting ePHI while Using AI Apps
- · Secure Storage and Transfer of ePH

Section 4: Reporting Security Breaches
This section includes examples of HIPAA security breaches and guides employees on effectively reporting such incidents.
- What is a Security Breach?
- · Examples of Security Breaches
- · How to Report a Security Breach

Section 5: Summary and Assessment
This section wraps up the key points covered in the course, followed by an assessment
- Summary
- Assessment
