This 30-minute interactive course is designed for employees of covered entities and business associates with access to Protected Health Information (PHI). After taking this course, you will understand how to protect PHI under HIPAA’s Privacy Rule (including limits on the use and disclosure of PHI) and under HIPAA’s Security Rule (using appropriate administrative, physical, and technical safeguards). You will also learn about what must happen following a data breach following HIPAA’s Breach Notification Rule. The course covers HIPAA as amended by the HITECH Act and Texas-specific rules under the Texas Medical Practice Act (TMPA).
Overview
COURSE DIFFICULTY
Skills Learned
After completing this online training course, students will be able to:
Understand HIPAA, TMPA, and PHI
Document and report disclosures of PHI
Understand what a breach is
Report a breach
01. HIPAA fundamentals
- What is Health Insurance Portability and Accountability Act (HIPAA)?
- What is Texas Medical Practice Act (TMPA)?
- Who are covered entities and business associates?
- What is protected health information (PHI)?
02. The privacy rule
- Authorized access
- Documenting and reporting disclosures of PHI
- Written authorization
- Minimum necessary standard
03. The security rule
- Security risks
- Safeguards (administrative, physical, technical)
04. The breach notification rule
- What is a breach?
- Reporting breaches
- Prohibition on retaliation related to reporting
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Understand HIPAA, TMPA, and PHI
Document and report disclosures of PHI
Understand what a breach is
Report a breach
COURSE OUTLINE
01. HIPAA fundamentals
- What is Health Insurance Portability and Accountability Act (HIPAA)?
- What is Texas Medical Practice Act (TMPA)?
- Who are covered entities and business associates?
- What is protected health information (PHI)?
02. The privacy rule
- Authorized access
- Documenting and reporting disclosures of PHI
- Written authorization
- Minimum necessary standard
03. The security rule
- Security risks
- Safeguards (administrative, physical, technical)
04. The breach notification rule
- What is a breach?
- Reporting breaches
- Prohibition on retaliation related to reporting