HIPAA - Security Rule for Business Associates

  • 6 topics | 33m
  • Up to 30 languages
  • Transcripts
This course provides employees of business associates (as defined by HIPAA) with an overview of the security obligations that apply to their organizations with respect to electronically stored and transmitted PHI. It explains the importance of compliance, the different kinds of safeguards that business associates are required to put in place, and the role of individual employees in preventing data breaches. Employees are advised on best practices to reduce risks to e-PHI, including how to achieve better security when e-mailing, browsing the web, or remotely accessing e-PHI.This course was developed with subject matter support provided by Baker, Donelson, Bearman, Caldwell & Berkowitz, PC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with statutes, regulations, or other legal authority. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.

WHAT YOU WILL LEARN

  • HIPAA - Security Rule for Business Associates
  • recognize the goals of HIPAA's Security Rule
  • recognize examples of the types of safeguards required by the HIPAA Security Rule
  • handle e-PHI appropriately, according to the HIPAA Security Rule
  • identify security practices for e-mail and remote access
  • Knowledge Check: Complying with the Security Rule

IN THIS COURSE

  • HIPAA - Security Rule for Business Associates
    1m
  • The HIPAA Security Rule and e-PHI
    6m
  • HIPAA Security Rule Safeguards
    8m
  • Basic Security for e-PHI
    5m
  • Security Practices for E-mail and Remote Access
    5m
  • Knowledge Check: Complying with the Security Rule
    5m

YOU MIGHT ALSO LIKE