CMS – Documentation Standards for Medical Records
Course overview
This course will provide learners with an in-depth understanding of the rationale for developing and implementing a medical documentation system at a healthcare facility and achieving high standards of quality and accuracy. Additionally, participants will learn about strategies to implement the FACT criteria for medical documentation and the legal and regulatory implication of accurate medical documentation. Clinical documentation is needed across various healthcare settings, including diagnosing patients and prescribing medications, and the accuracy of this documentation is one of the key indicators of quality of services identified by CMS.
Goal This is designed to equip health professionals with best practices related to documentation standards for medical records. Course expiration date: 6/28/2025
CMS – Documentation Standards for Medical Records
Course overview
This course will provide learners with an in-depth understanding of the rationale for developing and implementing a medical documentation system at a healthcare facility and achieving high standards of quality and accuracy. Additionally, participants will learn about strategies to implement the FACT criteria for medical documentation and the legal and regulatory implication of accurate medical documentation. Clinical documentation is needed across various healthcare settings, including diagnosing patients and prescribing medications, and the accuracy of this documentation is one of the key indicators of quality of services identified by CMS.
Goal This is designed to equip health professionals with best practices related to documentation standards for medical records. Course expiration date: 6/28/2025
Medical Chaperone Training
Course overview
This course delivers a comprehensive understanding of a medical chaperone’s role and responsibilities. It highlights their critical part in preserving patient-provider interaction integrity, patient advocacy, and adherence to ethical and legal norms. Course content covers chaperone responsibilities, interaction best practices, gowning and draping procedures, appropriate communication, handling intimate examinations, maintaining professional boundaries, and harassment scenarios. It includes HIPAA regulations education and details on documentation and reporting. Upon course completion, students will possess the necessary skills to effectively act as medical chaperones, supporting patients while maintaining professionalism and legal compliance.
Goal
This course is designed to train students on the role of the medical chaperone. Course expiration date: 6/20/2026
Medical Chaperone Training
Course overview
This course delivers a comprehensive understanding of a medical chaperone’s role and responsibilities. It highlights their critical part in preserving patient-provider interaction integrity, patient advocacy, and adherence to ethical and legal norms. Course content covers chaperone responsibilities, interaction best practices, gowning and draping procedures, appropriate communication, handling intimate examinations, maintaining professional boundaries, and harassment scenarios. It includes HIPAA regulations education and details on documentation and reporting. Upon course completion, students will possess the necessary skills to effectively act as medical chaperones, supporting patients while maintaining professionalism and legal compliance.
Goal
This course is designed to train students on the role of the medical chaperone. Course expiration date: 6/20/2026
Understanding the Requirements and Best Practices for Compliance
Healthcare compliance is the complex process of strictly following the legal and professional standards applicable to a healthcare setting. It involves the development of numerous regulations and procedures to promote ethical conduct and monitor adherence to these rules. Training is a key process in raising awareness of compliance in all healthcare organizations. In this course, we will discuss the various requirements that must be met to be compliant in a healthcare setting. We will review the compliance training programs provided by HIPAA and OSHA that address specific rules, codes, and policies for healthcare providers.
Understanding the Requirements and Best Practices for Compliance
Healthcare compliance is the complex process of strictly following the legal and professional standards applicable to a healthcare setting. It involves the development of numerous regulations and procedures to promote ethical conduct and monitor adherence to these rules. Training is a key process in raising awareness of compliance in all healthcare organizations. In this course, we will discuss the various requirements that must be met to be compliant in a healthcare setting. We will review the compliance training programs provided by HIPAA and OSHA that address specific rules, codes, and policies for healthcare providers.
Cyber Security & HIPAA: Electronics and Cloud-Based Systems
The storage of medical records on cloud-based systems comes with a risk that health care institutions must be able to recognize and address daily. Covered entities must continually assess how current technologies impact HIPAA guidelines, and cloud service providers must familiarize themselves with HIPAA regulations. This microlearning course examines different types of electronics where cloud-based systems are used.
Cyber Security & HIPAA: Electronics and Cloud-Based Systems
The storage of medical records on cloud-based systems comes with a risk that health care institutions must be able to recognize and address daily. Covered entities must continually assess how current technologies impact HIPAA guidelines, and cloud service providers must familiarize themselves with HIPAA regulations. This microlearning course examines different types of electronics where cloud-based systems are used.
COVID-19: HIPAA Matters: Privacy and Security Expectations During a Crisis
The Health Information Portability and Accountability Act (HIPAA) and subsequent amendments are based on privacy and security rules. During a local or national crisis, additional rules and safeguards may apply. The President declared the Coronavirus (COVID-19) a national emergency on March 13, 2020.
On March 19, 2020, the Office for Civil Rights (OCR) announced that the department will exercise its enforcement discretion and will not impose penalties for noncompliance with the regulatory requirements under the HIPAA Rules against covered healthcare providers in connection with the good faith provision of telehealth during the COVID-19 nationwide public health emergency. This notification is effective immediately.
The webinar will focus on the CMS guidelines for telehealth and the potential payment delays and legal ramifications that can result if organizations are not fully prepared. We will review the compliance elements required for written guidelines and training for providers and staff, appropriate settings for drive-through services, and how to update patient privacy notices. We will also review other liabilities that should be considered when adopting these exceptions, such as other conflicting state privacy laws, avoiding the use of unsecured social media, and training that will be helpful for providers and staff. Course expiration date: 4/1/2026
COVID-19: HIPAA Matters: Privacy and Security Expectations During a Crisis
The Health Information Portability and Accountability Act (HIPAA) and subsequent amendments are based on privacy and security rules. During a local or national crisis, additional rules and safeguards may apply. The President declared the Coronavirus (COVID-19) a national emergency on March 13, 2020.
On March 19, 2020, the Office for Civil Rights (OCR) announced that the department will exercise its enforcement discretion and will not impose penalties for noncompliance with the regulatory requirements under the HIPAA Rules against covered healthcare providers in connection with the good faith provision of telehealth during the COVID-19 nationwide public health emergency. This notification is effective immediately.
The webinar will focus on the CMS guidelines for telehealth and the potential payment delays and legal ramifications that can result if organizations are not fully prepared. We will review the compliance elements required for written guidelines and training for providers and staff, appropriate settings for drive-through services, and how to update patient privacy notices. We will also review other liabilities that should be considered when adopting these exceptions, such as other conflicting state privacy laws, avoiding the use of unsecured social media, and training that will be helpful for providers and staff. Course expiration date: 4/1/2026
Cyber Security & HIPAA: Ransomware, Phishing, and Cyberattacks
Course overview
This microlearning course focuses on the components of HIPAA related to ransomware, phishing, and cyberattacks. Participants will gain a comprehensive understanding of each topic, including the impact on healthcare organizations and patient data security. The course provides a high-level overview of these cybersecurity threats, explores breach notification requirements involving the media and the Federal Trade Commission (FTC), and examines a real-world scenario for practical application. By completing this course, participants will enhance their knowledge of HIPAA compliance and develop the skills to mitigate cybersecurity risks in healthcare settings.
Goal
This course is designed to equip participants with a comprehensive understanding of HIPAA regulations related to ransomware, phishing, and cyberattacks. Develop their knowledge of breach notification requirements involving the media and the FTC, and enhance their ability to handle real-world scenarios.
Cyber Security & HIPAA: Ransomware, Phishing, and Cyberattacks
Course overview
This microlearning course focuses on the components of HIPAA related to ransomware, phishing, and cyberattacks. Participants will gain a comprehensive understanding of each topic, including the impact on healthcare organizations and patient data security. The course provides a high-level overview of these cybersecurity threats, explores breach notification requirements involving the media and the Federal Trade Commission (FTC), and examines a real-world scenario for practical application. By completing this course, participants will enhance their knowledge of HIPAA compliance and develop the skills to mitigate cybersecurity risks in healthcare settings.
Goal
This course is designed to equip participants with a comprehensive understanding of HIPAA regulations related to ransomware, phishing, and cyberattacks. Develop their knowledge of breach notification requirements involving the media and the FTC, and enhance their ability to handle real-world scenarios.
SRA Tool Version 2.0 Tutorial
Course overview
This course offers a comprehensive overview of the Security Risk Assessment (SRA) tool developed by the Office of the National Coordinator for Health IT. The tool serves as a valuable resource for healthcare providers to assess risks and ensure compliance with the HIPAA Security Rule. Participants will learn how to access and navigate the SRA tool online, enabling them to conduct a thorough risk assessment analysis. By identifying areas where protected health information may be at risk, this assessment plays a vital role in safeguarding patient data and maintaining HIPAA compliance within healthcare practices.
Goal
The goal of this course is to enable healthcare providers to effectively use the Security Risk Assessment (SRA) tool developed by the Office of the National Coordinator for Health IT. Participants will learn how to assess risks and ensure compliance with the HIPAA Security Rule to protect patient information.
SRA Tool Version 2.0 Tutorial
Course overview
This course offers a comprehensive overview of the Security Risk Assessment (SRA) tool developed by the Office of the National Coordinator for Health IT. The tool serves as a valuable resource for healthcare providers to assess risks and ensure compliance with the HIPAA Security Rule. Participants will learn how to access and navigate the SRA tool online, enabling them to conduct a thorough risk assessment analysis. By identifying areas where protected health information may be at risk, this assessment plays a vital role in safeguarding patient data and maintaining HIPAA compliance within healthcare practices.
Goal
The goal of this course is to enable healthcare providers to effectively use the Security Risk Assessment (SRA) tool developed by the Office of the National Coordinator for Health IT. Participants will learn how to assess risks and ensure compliance with the HIPAA Security Rule to protect patient information.
Information Security and Awareness
Course overview
The objective of this course is to orient healthcare workers to the role of information security in healthcare. This course provides a broad overview of basic computer security terminology, explains common security threats that may affect healthcare organizations, and provides recommendations for creating and implementing a security policy.
Goal
This course is designed for healthcare workers who may have access to devices that store or can be used to view protected health information and electronic health records. This basic training must be accompanied with a detailed HIPAA security risk assessment, and training related to the organization?? specific security threats and mitigation policies.
Information Security and Awareness
Course overview
The objective of this course is to orient healthcare workers to the role of information security in healthcare. This course provides a broad overview of basic computer security terminology, explains common security threats that may affect healthcare organizations, and provides recommendations for creating and implementing a security policy.
Goal
This course is designed for healthcare workers who may have access to devices that store or can be used to view protected health information and electronic health records. This basic training must be accompanied with a detailed HIPAA security risk assessment, and training related to the organization?? specific security threats and mitigation policies.
The HIPAA Privacy Rule
Course overview
This microlearning course offers a comprehensive overview of the HIPAA Privacy Rule, a fundamental component of HIPAA law. Participants will gain a deep understanding of how the rule governs the use and release of protected health information (PHI), ensuring the confidentiality and privacy of patient information. The course covers key provisions of the Privacy Rule and provides practical insights through a real-world scenario. By completing this course, participants will possess the knowledge and skills necessary to navigate and comply with the HIPAA Privacy Rule, safeguarding patient privacy in healthcare settings.
Goal
The goal of this microlearning course is to provide healthcare workers with the essential knowledge and skills required to handle protected health information (PHI) and electronic health records (EHR) in compliance with HIPAA regulations. Participants will learn to securely access, handle, and protect PHI on devices, ensuring confidentiality and mitigating security threats.
The HIPAA Privacy Rule
Course overview
This microlearning course offers a comprehensive overview of the HIPAA Privacy Rule, a fundamental component of HIPAA law. Participants will gain a deep understanding of how the rule governs the use and release of protected health information (PHI), ensuring the confidentiality and privacy of patient information. The course covers key provisions of the Privacy Rule and provides practical insights through a real-world scenario. By completing this course, participants will possess the knowledge and skills necessary to navigate and comply with the HIPAA Privacy Rule, safeguarding patient privacy in healthcare settings.
Goal
The goal of this microlearning course is to provide healthcare workers with the essential knowledge and skills required to handle protected health information (PHI) and electronic health records (EHR) in compliance with HIPAA regulations. Participants will learn to securely access, handle, and protect PHI on devices, ensuring confidentiality and mitigating security threats.