< All HIPAA Training Notes

tsirhCdneM | HIPAA Training | HIPAA

By: Raul Pop | Related Course: HIPAA Training | Published: June 15, 2017 | Modified: June 15, 2017
Join Cybrary

NotepadHIPAA Introduction

Health Insurance Portability and Accountability Act


Why,What,How,and Whom


Why do we need HIPAAA


What is HIPAA


Privacy Rule

NOPP notice of Privacy Practice

Security rule


How does HIPPA Help us Protect PHI



Technical Safeguards


To Whom does HIPAA apply

Covered Entities

Business Associate 



Can PHI be shared?

To the individual patient



Health care operations activities

NotepadHIPAA What is Privacy Rule


Health Insurance Portability and Accountability Act

Federally enacted in 1996 and strictly enforced since 2003

Protects PHI(Protected Health Information)

Two Main Elements

Privacy Rule

Security Rule


What is Protected Health Information(PHI)

Health information,including demographic information

Relates to an individual’s physical or mental health or the provision of or payment for health care

Identifies the individual


Eighteen elements considered PHI

HIPPA-The privacy Rule

Also known as Standards for Privacy of Individually Identifiable Health

Issued by the Department of Health and Human Services(HHS)

NotepadHIPPA Why?



Prior to 1996 there was no legislation restricting the manner in which a patient’s healthcare related information was shared,distributed,stored, or protected

To protect the individual protect the interests and dignity of individuals.

To benefit society through furthering research ethically

Protecting patients involved in research from harm and preserving their rights is essential to ethical research

NotepadSecurity Rule

Protect the privacy of individual’ health information

Allow enough flexibility to allow for growth and new technologies

Requires appropriate administrative physical and technical safeguards to ensure the confidentiality integrity and security of electronic protected health information


Four basic requirements

Ensure the CIA of all e-PHI they create receive maintain or transmit

Identify and protect against reasonably anticipated threats to the security or integrity of information

Protect against reasonably anticipated impermissible uses or disclosures;

Ensure compliance by their workforce

< All HIPAA Training Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?