< All HIPAA Training Notes

tsirhCdneM | HIPAA Training | HIPAA

By: Raul Pop | Related Course: HIPAA Training | Published: June 15, 2017 | Modified: June 15, 2017
Join Cybrary

NotepadHIPAA Introduction

Health Insurance Portability and Accountability Act

 

Why,What,How,and Whom

 

Why do we need HIPAAA

 

What is HIPAA

WHAT IS PHI

Privacy Rule

NOPP notice of Privacy Practice

Security rule

 

How does HIPPA Help us Protect PHI

Physical

Administrative

Technical Safeguards

 

To Whom does HIPAA apply

Covered Entities

Business Associate 

Subcontractors

 

Can PHI be shared?

To the individual patient

Treatment

Payment

Health care operations activities


NotepadHIPAA What is Privacy Rule

HIPPA

Health Insurance Portability and Accountability Act

Federally enacted in 1996 and strictly enforced since 2003

Protects PHI(Protected Health Information)

Two Main Elements

Privacy Rule

Security Rule

 

What is Protected Health Information(PHI)

Health information,including demographic information

Relates to an individual’s physical or mental health or the provision of or payment for health care

Identifies the individual

 

Eighteen elements considered PHI

HIPPA-The privacy Rule

Also known as Standards for Privacy of Individually Identifiable Health

Issued by the Department of Health and Human Services(HHS)


NotepadHIPPA Why?

Why?

 

Prior to 1996 there was no legislation restricting the manner in which a patient’s healthcare related information was shared,distributed,stored, or protected

To protect the individual protect the interests and dignity of individuals.

To benefit society through furthering research ethically

Protecting patients involved in research from harm and preserving their rights is essential to ethical research


NotepadSecurity Rule

Protect the privacy of individual’ health information

Allow enough flexibility to allow for growth and new technologies

Requires appropriate administrative physical and technical safeguards to ensure the confidentiality integrity and security of electronic protected health information

 

Four basic requirements

Ensure the CIA of all e-PHI they create receive maintain or transmit

Identify and protect against reasonably anticipated threats to the security or integrity of information

Protect against reasonably anticipated impermissible uses or disclosures;

Ensure compliance by their workforce


< All HIPAA Training Notes
Join Cybrary

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel