Tel: (515) 865-4591
 
 
 

HIPAA Certification Training Official Guide: CHPSE, CHSE, CHPE

HIPAA Security Policy Template

This is the most comprehensive HIPAA training manual for different HIPAA Certifications on Privacy and Security rule or self study HIPAA training. This HIPAA book focuses on the Administrative Simplification portion of HIPAA and the Transactions, Privacy, and Security Rules defined within it. This guide contains explanations of the final Security Rule’s standards and implementation specifications in the areas of Administrative, Physical, and Technical Safeguards. Assessment tools, methodologies, and sample security policies that can be utilized to bring a covered entity into compliance are all included in the text. In addition, major networking protocols and technologies are discussed and evaluated in regard to their relevance to information security.

This manual is very helpful in understanding the HIPAA laws, its penalties, how to start compliance etc. This HIPAA guide is invaluable for members of HIPAA compliance teams, HIPAA Privacy Officers, HIPAA Security Officers,  project managers, network administrators, consultants, and anyone else involved in HIPAA compliance efforts of organization.

ISBN: 978-1-62274-053-6
Number of Pages: 712 pages spiral bound.

Table of Content of HIPAA Manual

Introduction

  • Topic A: About the manual
  • Topic B: Setting student expectations
  • Topic C: Classroom setup
  • Topic D: Support

Chapter 1: HIPAA Basics

  • Topic A: HIPAA introduction
  • Topic B: Administrative Simplification
  • Topic C: HIPAA penalties
  • Topic D: HIPAA-related organizations
  • Topic E: HIPAA terminology
  • Unit summary: HIPAA basics

Chapter 2: Transactions & Code Sets Overview

  • Topic A: Transactions
  • Unit summary: Transactions & code sets overview

Chapter 3: Transactions – ANSI X12 and NCPDP Transaction Types

  • Topic A: ANSI ASC X12 standards
  • Unit summary: Transactions – ANSI X12 and NCPDP transaction types

Chapter 4: Code Sets & National Identifiers

  • Topic A: Code sets
  • Topic B: National health care identifiers
  • Unit summary: Code sets & national identifiers

Chapter 5: HIPAA and e-Health – Security and Privacy Requirements

  • Topic A: HIPAA, EHRs, and e-health
  • Topic B: Planning for privacy compliance
  • Topic C: Planning for security compliance
  • Topic D: Scenario: Possible framework for compliance
  • Unit summary: HIPAA and e-Health – Security and privacy requirements

Chapter 6: HIPAA Privacy Rule

  • Topic A: Introduction to the Privacy Rule
  • Unit summary: HIPAA Privacy Rule

Chapter 7: Privacy Rule – Organizational and Individual Relationships, Rights, And Responsibilities

  • Topic A: Organizational requirements and relationships
  • Topic B: Individual privacy rights
  • Unit summary: Privacy Rule – Organizational and individual relationships, rights, and responsibilities

Chapter 8: Privacy Rule – Notice of Privacy Practices

  • Topic A: Notice of Privacy Practices and Authorizations
  • Unit summary: Privacy Rule – Notice of Privacy Practices

Chapter 9: Privacy Rule – Uses and Disclosures of PHI

  • Topic A: Uses and disclosures: General
  • Topic B: Uses and disclosures: treatment, payment, and health care operations
  • Topic C: Uses and disclosures: Public purposes
  • Unit summary: Privacy Rule – Uses and disclosures of PHI

Chapter 10: Privacy Rule – Safeguards

  • Topic A: Safeguards
  • Unit summary: Privacy Rule – Safeguards

Chapter 11: HIPAA Security Rule - Overview

  • Topic A: Scope of the HIPAA Security Rule
  • Topic B: Threats to business information
  • Topic C: Security terminology and categories
  • Topic D: Administrative safeguards
  • Topic E: Physical safeguards
  • Topic F: Technical safeguards
  • Topic G: Organizational requirements
  • Topic H: Policies and procedures, and documentation standards
  • Unit summary: HIPAA Security Rule - Overview

Chapter 12: HIPAA Security Rule – Threats and Technology Options

  • Topic A: Security threats
  • Topic B: Security technology options
  • Unit summary: HIPAA Security Rule – Threats and technology options

Chapter 13: Advanced Administrative Safeguards

  • Topic A: Security awareness and training
  • Topic B: Security incident procedures
  • Topic C: Contingency plans
  • Topic D: Evaluation
  • Topic E: Business Associate Contracts and other arrangements
  • Unit summary: Advanced administrative safeguards

Chapter 14: Physical safeguards Overview

  • Topic A: Privacy Rule physical safeguards
  • Unit summary: Physical safeguards overview

Chapter 15: Advanced Physical Safeguards

  • Topic A: Requirements
  • Topic B: Facility access controls
  • Topic C: Workstation use and security
  • Topic D: Specific steps – Physical security implementation
  • Unit summary: Advanced physical safeguards

Chapter 16: Physical Safeguards – Device and Media Management

  • Topic A: Device and Media Controls
  • Unit summary: Physical safeguards – Device and Media Management

Chapter 17: General Technical Safeguards

  • Topic A: Requirements
  • Topic B: Access Control
  • Topic C: Audit Controls
  • Topic D: Integrity
  • Topic E: Person or Entity Authentication
  • Unit summary: General technical safeguards

Chapter 18: Advanced Technical Safeguards

  • Topic A: Transmission Security
  • Topic B: TCP/IP network infrastructure
  • Topic C: Firewall systems
  • Topic D: Virtual Private Networks (VPNs)
  • Topic E: Wireless transmission security
  • Topic F: Encryption
  • Topic G: Kerberos authentication
  • Topic H: Case study example: Windows security
  • Unit summary: Advanced technical safeguards

Chapter 19: Digital Signatures and Certificates

  • Topic A: Requirements
  • Topic B: Digital signatures
  • Topic C: Digital certificates
  • Topic D: Public Key Infrastructure (PKI)
  • Unit summary: Digital signatures and certificates

Chapter 20: Security Policy

  • Topic A: Threats, risk management, and policy
  • Topic B: The ISO/IEC-27002 security standards
  • Topic C: Security policy considerations
  • Topic D: Sample security policy documents
  • Unit summary: Security policy

Chapter 21: HITECH Act and Red Flag Rule

  • Topic A: HITECH Act
  • Topic B: Red Flags Rule

Chapter 22: Omnibus Rule

  • Topic A: The Omnibus Rule

Chapter 23: EHRs and Meaningful Use

  • Topic A: Moving Towards Electronic Health Records
  • Topic B: Meaningful Use

Chapter 24: HIPAA Compliance and Enforcement

  • Topic A: HIPAA Compliance Enforcement
  • Topic B: HIPAA Compliance Audits

Chapter 25: Social Media, Mobile Technology, and Big Data

  • Topic A: The Digital Universe
  • Topic B: Privacy and Security in the Digital Universe

Appendix: HIPAA Security Rule

  • Topic A: HIPAA Security Rule Standards

Appendix: HIPAA Privacy Rule

  • Topic A: HIPAA Privacy Rule standards

Job Role/Unit Matrix

  • Topic A: Job role matrix

Course Summary

  • Topic A: Course summary
  • Topic B: Continued learning after class

Glossary

Index

 

Price: $450

buy-now (Opens in New Window)

 
HIPAA Certification Flyer

HIPAA Compliance Template Suites

HIPAA Training Comparison