HIPAA - Security Rule for Business Associates
- 6 topics | 33m
- Up to 30 languages
- Transcripts
This course provides employees of business associates (as defined by HIPAA) with an overview of the security obligations that apply to their organizations with respect to electronically stored and transmitted PHI. It explains the importance of compliance, the different kinds of safeguards that business associates are required to put in place, and the role of individual employees in preventing data breaches. Employees are advised on best practices to reduce risks to e-PHI, including how to achieve better security when e-mailing, browsing the web, or remotely accessing e-PHI.This course was developed with subject matter support provided by Baker, Donelson, Bearman, Caldwell & Berkowitz, PC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.
WHAT YOU WILL LEARN
-
HIPAA - Security Rule for Business Associates
-
recognize the goals of HIPAA's Security Rule
-
recognize examples of the types of safeguards required by the HIPAA Security Rule
-
handle e-PHI appropriately, according to the HIPAA Security Rule
-
identify security practices for e-mail and remote access
-
Knowledge Check: Complying with the Security Rule
IN THIS COURSE
-
HIPAA - Security Rule for Business Associates1m
-
The HIPAA Security Rule and e-PHI6m
-
HIPAA Security Rule Safeguards8m
-
Basic Security for e-PHI5m
-
Security Practices for E-mail and Remote Access5m
-
Knowledge Check: Complying with the Security Rule5m
YOU MIGHT ALSO LIKE
COMPLIANCE-COURSE
Overcoming Your Own Unconscious Biases
COMPLIANCE-COURSE
A Manager's Guide to Discipline and Documentation
COMPLIANCE-COURSE
Procurement Integrity