Family Educational Rights and Privacy Act (FERPA)
This course examines regulations related to the access of student educational records according to the Family Educational Rights and Privacy Act (FERPA). This course focuses on students who are under 18 years old. Since 1974, FERPA has been a federal law in the United States.
This course aligns with the training requirements specified in the Accreditation Association for Ambulatory HealthCare (AAAHC) Accreditation Handbook.
Family Educational Rights and Privacy Act (FERPA)
This course examines regulations related to the access of student educational records according to the Family Educational Rights and Privacy Act (FERPA). This course focuses on students who are under 18 years old. Since 1974, FERPA has been a federal law in the United States.
This course aligns with the training requirements specified in the Accreditation Association for Ambulatory HealthCare (AAAHC) Accreditation Handbook.
Information Blocking FAQ
Information blocking means a practice that except as required by law or covered by an exception, is likely to interfere with access, exchange, or use of electronic health information (EHI); and if conducted by a health information technology developer, health information network or health information exchange, such developer, network or exchange knows, or should know, that such practice is likely to interfere with access, exchange, or use of EHI; or if conducted by a health care provider, such provider knows that such practice is unreasonable and is likely to interfere with the access, exchange, or use of EHI. Until date specified in 45 CFR 171.103(b), EHI for purposes of 171.103(a) is limited to the EHI identified by the data elements represented in the USCDI standard adopted in 170.213.
Information Blocking FAQ
Information blocking means a practice that except as required by law or covered by an exception, is likely to interfere with access, exchange, or use of electronic health information (EHI); and if conducted by a health information technology developer, health information network or health information exchange, such developer, network or exchange knows, or should know, that such practice is likely to interfere with access, exchange, or use of EHI; or if conducted by a health care provider, such provider knows that such practice is unreasonable and is likely to interfere with the access, exchange, or use of EHI. Until date specified in 45 CFR 171.103(b), EHI for purposes of 171.103(a) is limited to the EHI identified by the data elements represented in the USCDI standard adopted in 170.213.
HHS Security 101: Security Risk Analysis and Contingency Planning
As a small or medium healthcare provider, the Electronic Protected Health Information (ePHI) you maintain or send to others is critical to your business and vital to the care of your patients. Healthcare providers face major problems if their patients ePHI is lost, stolen or misused, so a well-planned security management process is crucial and contingency planning is necessary to protect this data. The purpose of this course is to provide an overview of a security risk analysis and understand what contingency planning is and identify its importance to protecting ePHI.
HHS Security 101: Security Risk Analysis and Contingency Planning
As a small or medium healthcare provider, the Electronic Protected Health Information (ePHI) you maintain or send to others is critical to your business and vital to the care of your patients. Healthcare providers face major problems if their patients ePHI is lost, stolen or misused, so a well-planned security management process is crucial and contingency planning is necessary to protect this data. The purpose of this course is to provide an overview of a security risk analysis and understand what contingency planning is and identify its importance to protecting ePHI.
Cyber Security Training and Awareness
Course overview
This course provides a comprehensive introduction to the field of cybersecurity, encompassing key concepts and terminology related to various types of threats and attacks. The primary emphasis of the course revolves around promoting security awareness among employees, equipping them with the best practices necessary to safeguard both themselves and the company from potential cyber-attacks. Participants will gain valuable insights into identifying and mitigating threats, as well as effectively responding to and reporting cyber incidents.
Goal
This course is designed for healthcare workers who may have access to devices that store or can be used to view protected health information and electronic health records, prioritize security awareness among employees, equipping them with the necessary knowledge and best practices to protect themselves and the company against cyber-attacks.
Cyber Security Training and Awareness
Course overview
This course provides a comprehensive introduction to the field of cybersecurity, encompassing key concepts and terminology related to various types of threats and attacks. The primary emphasis of the course revolves around promoting security awareness among employees, equipping them with the best practices necessary to safeguard both themselves and the company from potential cyber-attacks. Participants will gain valuable insights into identifying and mitigating threats, as well as effectively responding to and reporting cyber incidents.
Goal
This course is designed for healthcare workers who may have access to devices that store or can be used to view protected health information and electronic health records, prioritize security awareness among employees, equipping them with the necessary knowledge and best practices to protect themselves and the company against cyber-attacks.
Ley de Portabilidad y Responsabilidad de Seguros Medicos
La Regla de Privacidad de HIPAA proporciona proteccion a nivel federal para informacion de salud personal identificable en poder de entidades cubiertas y sus socios comerciales, dando a los pacientes una gama de derechos con respecto a dicha informacion. Al mismo tiempo, la Regla de Privacidad es balanceada a fin de permitir la divulgacion de la informacion de salud requerida para el cuidado de los pacientes y otros objetivos importantes.
Ley de Portabilidad y Responsabilidad de Seguros Medicos
La Regla de Privacidad de HIPAA proporciona proteccion a nivel federal para informacion de salud personal identificable en poder de entidades cubiertas y sus socios comerciales, dando a los pacientes una gama de derechos con respecto a dicha informacion. Al mismo tiempo, la Regla de Privacidad es balanceada a fin de permitir la divulgacion de la informacion de salud requerida para el cuidado de los pacientes y otros objetivos importantes.
Texas House Bill 300
Texas Legislature passed House Bill 300 (H.B. 300) in an effort to enhance the safeguards for Protected Health Information (PHI). This law serves to increase the number of entities that are required to be HIPAA compliant, expands upon the guidelines that they must follow, and increases the penalties if they are found to not be in compliance. During this course, we will discuss the specific requirements that have been set forth through the enactment of the Texas House Bill 300 (HB 300). Topics covered include the legislations background, the description of covered entities as defined by HB 300, training requirements, and applicable penalties.
Texas House Bill 300
Texas Legislature passed House Bill 300 (H.B. 300) in an effort to enhance the safeguards for Protected Health Information (PHI). This law serves to increase the number of entities that are required to be HIPAA compliant, expands upon the guidelines that they must follow, and increases the penalties if they are found to not be in compliance. During this course, we will discuss the specific requirements that have been set forth through the enactment of the Texas House Bill 300 (HB 300). Topics covered include the legislations background, the description of covered entities as defined by HB 300, training requirements, and applicable penalties.
Identity Theft Protection
Identity theft is an intentional misuse of any type of sensitive personal information. Federal regulations were enacted to combat identity theft and provide consumers with protection. This course will cover the serious issue of identity theft, its impact on consumers and businesses, regulations designed to combat identity theft, and identity theft prevention.
Identity Theft Protection
Identity theft is an intentional misuse of any type of sensitive personal information. Federal regulations were enacted to combat identity theft and provide consumers with protection. This course will cover the serious issue of identity theft, its impact on consumers and businesses, regulations designed to combat identity theft, and identity theft prevention.
HIPAA Basics for Dental Practices
The Health Insurance Portability and Accountability Act is a federal law enacted in 1996. The HIPAA law has established rules for sharing individual medical and dental information and protecting this information from any unauthorized use. The main goals of HIPAA are to improve efficiency within healthcare as well as to improve the manageability of health and dental insurance. Additionally, HIPAA aims to protect patient privacy and ensure health and dental information is safeguarded from unauthorized use.
This course reviews HIPAA compliance and how individual rights are protected under the law. Key elements of the HIPAA Privacy Rule, HIPAA Security Rule, and HIPAA Enforcement Rule will be identified, and best practices will be discussed.
HIPAA Basics for Dental Practices
The Health Insurance Portability and Accountability Act is a federal law enacted in 1996. The HIPAA law has established rules for sharing individual medical and dental information and protecting this information from any unauthorized use. The main goals of HIPAA are to improve efficiency within healthcare as well as to improve the manageability of health and dental insurance. Additionally, HIPAA aims to protect patient privacy and ensure health and dental information is safeguarded from unauthorized use.
This course reviews HIPAA compliance and how individual rights are protected under the law. Key elements of the HIPAA Privacy Rule, HIPAA Security Rule, and HIPAA Enforcement Rule will be identified, and best practices will be discussed.
HIPAA for Supervisors and Managers
HIPAA training for managers and supervisors provides an overview of HIPAA laws as they apply to Covered Entities and Employers. The course provides insightful examples on how to effectively manage HIPAA issues when a patient is also an employee. Management and employee responsibilities for HIPAA compliance is provided, along with breach notification requirements for covered entities and business associates. You will also cover Security and Privacy rules, PHI disposal, civil penalties under HIPAA, and HIPAA compliance deficiencies.
HIPAA for Supervisors and Managers
HIPAA training for managers and supervisors provides an overview of HIPAA laws as they apply to Covered Entities and Employers. The course provides insightful examples on how to effectively manage HIPAA issues when a patient is also an employee. Management and employee responsibilities for HIPAA compliance is provided, along with breach notification requirements for covered entities and business associates. You will also cover Security and Privacy rules, PHI disposal, civil penalties under HIPAA, and HIPAA compliance deficiencies.