Comprehensive HIPAA Privacy and Intermediate Security Training

To better understand the implications of HIPAA legislation and identify critical compliance requirements for your business/client, our 2-days classroom HIPAA training program is very helpful. Our Training includes changes to the HIPAA regulations due to the Health Information Technology for Economic and Clinical Health (HITECH) Act which is part of the American Recovery and Reinvestment Act of 2009 (ARRA) and Omnibus rule published in 2013. Our HIPAA Instructors/Consultants help organizations to better understand the steps to meet HIPAA audit requirements (checklists etc.) issued by the Department of Health and Human Services (DHHS) Office of e-Health Standards and Services. They will also help you to better understand HIPAA’s Administrative Simplification Act and HIPAA Security rules and regulations, and as well as how to create a framework for initiating and working towards a blueprint for HIPAA Privacy Compliance.

This training will prepare you for HIPAA Certification of Certified HIPAA Privacy Expert (CHPE) and Certified HIPAA Privacy Associate (CHPA).

Register Now for the Instructor-led Classroom Training: $1599

Register Now for Live Instructor-led Webcast Training: $1899

HIPAA Privacy And Intermediate Security Training
Register for Two-Days Comprehensive HIPAA Privacy And Intermediate Security Training & Certification Of CHPE (Level 1).
4.7 based on 168 reviews
$1500
New

Benefits of our HIPAA Privacy Classroom Training

  • Our HIPAA Instructors have many years of healthcare organization experience, have practical experience in HIPAA compliance, and are Security experts (CISSP or equivalent).
  • Students receive templates and additional reference materials and proper guidance toward the next steps of compliance.
  • Instructor’s support was also provided to the student in the form of additional instructions, via e-mail.
  • To make the first pass at the HIPAA training material, the study material is sent to the student as soon as the class is confirmed.
  • Small class size training allows more focus on a study to a student.
  • To train others in your organization acquired tools like PowerPoint is very helpful.
  • Focused classroom training ensures that the student is truly focused, and does not allow any student at the back desk to handle emails and telephone calls even during breaks and lunch. While trying to learn new material, continual distractions lead to less retention of material by students and frustrations with competing for job requirements.
  • Private group HIPAA training in classrooms staff focuses that students should get learning without the distractions of the workplace.

HIPAA Training for Security, Privacy, and Transaction: Learning Objectives

By this HIPAA training, you will get advanced competency in designing, implementing, and administering comprehensive privacy protection programs in all types of healthcare organizations:

  • Understand what HIPAA means? How it affects your organization? and What significant changes are in policies, procedures, and processes within the organization in the handling of patient records due to HIPAA.
  • Understand the impact of changes in HIPAA rules due to ARRA 2009, HITECH Act, and Omnibus rule published in 2013.
  • Identify the main reasons behind HIPAA, specifically: to provide continuity/portability of health benefits to individuals between jobs; to combat fraud/abuse in health insurance and healthcare delivery; to reduce administrative costs in health care; to provide uniform standards for electronic healthcare transactions; and, to ensure security and privacy of patient’s health information.
  • Develop an in-depth understanding of HIPAA Security, Privacy, and Transaction rule.
  • Examine how implementing HIPAA will affect the way healthcare entities organize their staff to achieve and monitor compliance with patient’s privacy/confidentiality needs.
  • Understand the new Enforcement rule.
  • Understand planning and preparation for HIPAA compliance step vise, i.e.: step one, awareness; step two, assessment; and step three, action focused on gaps identified.
  • Understand, Who are Business Associates? and What necessary steps they have to take up to ensure HITECH HIPAA compliance.

HIPAA Training for Security, Privacy, and Transaction: Target Audience

Following are the Target Audience for this training:

  • Healthcare provider & payer privacy compliance employees
  • Privacy lawyers involved in health care
  • Compliance teams for HIPAA privacy
  • HR staff & manager
  • Privacy Auditors
  • Privacy Consultants
  • Clinical physicians and office managers
  • Head nurse
  • Privacy instructors

Course Outline for HIPAA Privacy and Intermediate Security

HIPAA Privacy Training – Day 1

HIPAA Fundamentals

  1. HIPAA Basics: An overview of the Health Insurance Portability and Accountability Act of 1996 (all provisions)
  2. HIPAA’s Administrative Simplification Title: Review of the provisions of the Administrative Simplification Title. This includes transaction and code set standards (administrative transactions), national identifiers, privacy requirements, and security requirements.
  3. HIPAA Penalties: Review of the HIPAA enforcement rule including informal and formal remedies, requirements of Covered Entities, the role of business Associates as agents and enforcement bodies.
  4. HIPAA-Related Organizations: Discussion of entities/organizations specifically designated as standard maintenance organizations and statutorily defined advisory bodies.
  5. HIPAA Terminology and Definitions Covered Entity: Review of definitions included in the
    Administrative Simplification Title-related rules.
  1. Covered Entity
  2. Health Plan
  3. Clearinghouse
  4. Health Care Provider
  5. Business Associates
  6. Trading Partner Agreement
  7. Workforce
  8. Organized Health Care Arrangement

HIPAA Transactions, Code Sets, and Identifiers

  1. Transactions
  2. Impacted Health Care Transactions
  3. Target Entities
  4. Scope
  5. Penalties
  6. ASCA

ANSI ASC X12 Standard

  1. Transaction Type 270
  2. Transaction Type 271
  3. Transaction Type 276
  4. Transaction Type 277
  5. Transaction Type 278 Request and Response
  6. Transaction Type 820
  7. Transaction Type 834
  8. Transaction Type 835
  9. Transaction Type 837 – Professional
  10. Transaction Type 837 – Institute
  11. Transaction Type 837 – Dental

HIPAA Code Sets

  1. ICD-9-CM Volumes 1 and 2
  2. CPT-4
  3. CDT
  4. ICD-9-CM Volume 3
  5. NDC
  6. HCPC

HIPAA National Health Care Identifiers

  1. Provider Identifier
  2. Employer Identifier
  3. Health Plan Identifier
  4. Individual Identifier

HIPAA Privacy Rule Part 1

  1. Introduction: Overview of the HIPAA Privacy Rule
  1. Who is Impacted (e.g., the definition of Covered Entities, Business Associates)?
  2. Scope (Activities covered by the rule)
  3. Exceptions (Specifically included or referenced exceptions that allow use and disclosure of patient/health plan member protected health information (PHI))
  4. Timeline (Effective date of the rule, timelines related to certain requirements identified in the privacy rule such as accounting of disclosures, document retention requirements, etc.)
  1. Key Definitions: Review of key definitions associated with the Privacy Rule and how they apply to rule application and compliance.
  1. IIHI
  2. PHI
  3. Deidentified Information
  4. Use
  5. Disclosure
  6. Treatment
  7. Payment
  8. Health Care Operations
  1. Notice Requirement: Review of the requirements to draft and make available a notice of privacy practices, the content of such notice, revision requirements, and availability requirements.
  1. Core Elements
  2. Changes to a Notice
  3. First Interaction
  1. Authorization versus Consent Requirement: Review the legal definitions of consent and authorization and what they would be used for. Review of the legal requirements related to obtaining authorization, the form of such authorization, and content requirements.
  1. Definition of “consent”
  2. Definition of “authorization”
  3. Legal differences between “consent” and “authorization”
  4. Core Data Elements and Required Statements
  5. Defective Authorizations
  6. Revocations
  1. Key Parties Impacted: A discussion of all entities or individuals directly or indirectly impacted by the rule and why.
  2. Minimum Necessary: Discussion of the definition of the minimum necessary and when it applies to the use and disclosure of PHI (internally and externally)
  3. Oral and Other Non-electronic Communications: A discussion of what constitutes PHI pursuant to the rule and the related requirements to protect non-electronic PHI, including oral PHI.
  4. Health-Related Communications, Fund Raising, and Marketing: Review of the requirements related to the use of PHI for communications other than treatment, payment, and health care operations. Also, a review of the strict requirements relating to the use of PHI for marketing and fundraising.
  5. Research: A review of the requirements related to the use of PHI for research including what processes must be followed prior to allowing the use of PHI in research without the patient/health plan member’s authorization.

HIPAA Privacy Training – Day 2 Privacy

HIPAA Privacy Rule Part 2

  1. Policy & Training Requirements: A review of the implied and explicit requirements to develop, implement and maintain privacy policies and procedures and the requirement to provide initial and ongoing staff training.
  2. Preemption Requirements: A review of state law preemption. This includes a discussion regarding when state law may preempt the rule without specific authorization from the US Department of Health and Human Services (HHS) and when authorization is required prior to state law preemption of HIPAA.
  3. State Privacy Laws: A general review of state privacy laws that preempt HIPAA (categorized as specially protected health information) with specific reference to select California state laws.
  4. Federal Privacy Law – 42 CFR Pt. 2: A discussion of the more stringent requirements found in 42 CFR Pt. 2 relating to alcohol and chemical dependency
  5. Statutory/Rule Conflict Resolution: Discussion of how to respond when federal and/or state law conflicts.
  6. Case Law: A review of general case law that has impacted the application of HIPAA, state privacy laws, and impacts legal risks.

HIPAA Security Rule Part 1

  1. General:
  2. Threats: General review of threats (real and perceived) prompting Congress to include security requirements in the HIPAA Administrative Simplification Title.
  3. Definition and Terminology: Review of general definitions of security and specifically how those definitions apply to the rule and what data must be protected by the implementation of appropriate security measures.
  1. Security
  2. Security Services
  3. Security Mechanism
  1. Security Rules: Detailed review of the security rule, components of the security rule, and specific requirements (including a reference back to security requirements referenced in the HIPAA Privacy Rule).
  1. Categories of Safeguards
  2. Implementation Specifications
  3. Approach and Philosophy
  4. Security Principles
  1. Administrative Safeguards
  2. Physical Safeguards
  3. Technical Safeguards
  4. Organizational Requirements
  5. Policies and Procedures, and Documentation Standards

Enforcement Rule

  1. Overview: This is normally an overview of the HIPAA rule and its requirements which include individuals and entities subject to it.
  2. Definitions: It comprises of reviews on rule definitions including what is; a violation, to be HIPAA compliant, the definition of an agent, HHS enforcement powers, and resolution processes.

American Recovery and Reinvestment Act of 2009 (ARRA), Title XIII – HITECH
This is the general overview of the required provisions and incentives of Title XIII Health Information Technology (HIT). The overview is meant to cover the role of security and privacy in investment provisions and the development of standards of HIT.

American Recovery and Reinvestment Act of 2009 (ARRA), Title XIII, Subtitle D – HITECH

  1. Privacy Provision Overview: This should be a brief introduction to the privacy provisions which are part of ARRA and their relationship to HIPAA Administrative Simplification Title provisions.

Omnibus Rule of January 2013

  1. Background
  2. Breach Notification Rule
  3. New Limits on Uses and Disclosures of PHI
  4. Business Associates
  5. Increased Patient Rights
  6. Notice of Privacy Practices
  7. Increased Enforcement

HIPAA Training for Security, Privacy, and Transaction: Pricing

Register Now for the Instructor-led Classroom Training: $1599

Register Now for Live Instructor-led Webcast Training: $1899

The cost includes Training Kit:

  • HIPAA Compliance Training Manual (worth $450)

HIPAA Certification Test:

The above training prepares you for HIPAA certification of:

  • Certified HIPAA Privacy Expert (CHPE)
  • Certified HIPAA Privacy Associate (CHPA)

Continuing Education Requirements After Getting Certified:

All certified professionals are required to take Cyber Security Awareness For Employees within 1 month of getting certified. You can take this training before or after getting certified. If you are a cybersecurity professional, you can request an exception (provide the reason why you should not take the training and provide your cybersecurity certification credentials) to take this training but you will have to complete the test. 

Course Name: CyberSecurity Awareness For Employees

Description: OCR is focusing on cybersecurity awareness for the covered entities and business associates after the FBI issued a warning for the healthcare industry. This training is a continuing education course needed for all HIPAA certifications (CHPSE, CHPE, and CHSE) professionals to maintain their credentials. This is a non-technical course and anyone can take it. There are no prerequisites for it.

Students learn how hackers use social engineering tools like spoofing, Deceptive Phishing, W2 Phishing, Search Engine Phishing, Pharming, Spear Phishing, Whaling / CEO Fraud, Vishing, SMiSHing, Dropbox Phishing, Google Docs Phishing, Image Phishing, Piggybacking, Dumpster diving, Eavesdropping and many more on company employees. With different types of Malware like Computer viruses, Worms, Trojan horses, Ransomware, Spyware, Adware, Scareware, Keylogger, etc., you want to be aware of threats around you. The overall goal is to protect you from financial losses, identity theft, and damage to your reputation caused due to breaches of security by criminals.

Cost: Included with the HIPAA training cost. You need to buy a Certified Cybersecurity Awareness Professional (CCAP) certification exam if needed.

Visit Here for CyberSecurity Awareness For Employees Course Outline

Once a year all students will have to go through one hour of an update course (normal cost $99) which will include relevant regulation changes and other OCR/HHS activities on compliance and enforcement.

To maintain your HIPAA certification, you will continue taking updated courses when they are released. You will receive a new certificate when your certificate will expire if you have taken all required updated courses. You will NOT be required to take any test if you have taken the updated courses regularly.

Certificate for Continuing Education Credits:

Students can buy a CE credits certificate for this course at the time of registration. You will receive 16 CE credits for this course through the Approved Provider of California Board of Registered Nursing after completing the course.

To View HIPAA Training Schedule:

Click Here to View the HIPAA Training Schedule for Level 1

(Open in New Window)

For more information, please contact us at: Bob@supremusgroup.com

Refund Policy (Opens in New Window)