1
After completing this course, you will have gained a clear understanding of the origins of the HIPAA
legislation, be able to define "Personal Health Information" as outlined by HIPAA, and comprehend the
types of information that are protected under HIPAA.
After completing this course, you will have gained a clear understanding of the origins of the HIPAA
legislation, be able to define "Personal Health Information" as outlined by HIPAA, and comprehend the
types of information that are protected under HIPAA. You will also be aware of the penalties and
consequences associated with non-compliance with HIPAA guidelines. Furthermore, as a health and
human services worker, you will learn the necessary actions and precautions to take in order to
safeguard individuals' privacy.
Course Currilcum
-
- Instructions Unlimited
- Ransomware and HIPAA Unlimited
- Can HIPAA compliance help covered entities and business associates prevent infections of malware, including ransomware? Unlimited
- Can HIPAA compliance help covered entities and business associates recover from infections of malware, including ransomware? Unlimited
- How can covered entities or business associates detect if their computer systems are infected with ransomware? Unlimited
- What should covered entities or business associates do if their computer systems are infected with ransomware? Unlimited
- Is it a HIPAA breach if ransomware infects a covered entity’s or business associate’s computer system? Unlimited
- How can covered entities or business associates demonstrate “…that there is a low probability that the PHI has been compromised” such that breach notification would not be required? Unlimited
- Is it a reportable breach if the ePHI encrypted by the ransomware was already encrypted to comply with HIPAA? Unlimited
- Completion Message Unlimited
-
- Final Exam 01:00:00