Course Outline for HIPAA Security Online Training with Instructor for level 2

Our HIPAA Security Online Training with Instructor will help Security compliance team members to understand the HIPAA Security law requirement and guides you on how to makeHIPAA Security Online Training your organization HIPAA compliant. Our HIPAA Security Online Training includes changes to the HIPAA regulations due to the Health Information Technology for Economic and Clinical Health (HITECH) Act, which is part of the American Recovery and Reinvestment Act of 2009 (ARRA). Our HIPAA Instructors are HIPAA consultants who help organizations meet the HIPAA audit checklist requirements issued by the DHHS. Learn from the Instructor what your next steps are to meet these newly issued audit requirements by dept. of Health and Human Services (DHHS) Office of e-Health Standards and Services.

HIPAA Security Online Training – Day 1 HIPAA Security Rule

HIPAA Security Rule Part 1                                      

  • General:
  • Threats:  General review of threats (real and perceived) prompting Congress to include security requirements in the HIPAA Administrative Simplification Title.
  • Definition and Terminology:  Review of general definitions of security and specifically how those definitions apply to the rule and what data must be protected by the implementation of appropriate security measures.
    • Security
    • Security Services
    • Security Mechanisms
  • Security Rules:  Detailed review of the security rule, components of the security rule, and specific requirements (including a reference back to security requirements referenced in the HIPAA Privacy Rule).
    • Categories of Safeguards
    • Implementation Specifications
    • Approach and Philosophy
    • Security Principles
  • Administrative Safeguards
  • Physical Safeguards
  • Technical Safeguards
  • Organizational Requirements
  • Policies and Procedures, and Documentation Standards
  • Administrative Safeguards:  Definition of “administrative safeguards” as they relate to security and the rule.  A review of required administrative safeguards and their application within a covered entity and business associate.
  • Administrative Safeguards
  • Security Management Process
  • Assigned Security Responsibility
  • Workforce Security
  • Information Access Management
  • Security Awareness and Training
  • Security Incident Procedures
  • Contingency Plan
  • Evaluation
  • Business Associate Contracts Standard
  • Physical Safeguards:  Definition of “physical safeguards” as they relate to security and the rule.  A review of required physical safeguards and their application within a covered entity and business associate.
  • Requirements
  • Facility Access Controls
  • Workstation Use
  • Workstation Security
  • Device and Media Controls
  • Physical Safeguards Review

HIPAA Security Rule Part 1

  • Technical Safeguards (general):  Definition of “technical safeguards” as they relate to security and the rule.  A review of required technical safeguards and their application within a covered entity and business associate.
  • Requirements
  • Access Control
  • Audit Controls
  • Integrity
  • Person or Entity Authentication
  • Security Compliance process: Risk Analysis, Vulnerability Assessment, Remediation, Contingency Planning, Audit & Evaluation
  • Transmission Security
  • Technical Safeguards (technical details):  A review of required technical safeguards including a more technical review of required or addressable safeguards, implementation, and ongoing maintenance.
  • TCP/IP Network Infrastructure
  • Firewall Systems
  • Virtual Private Networks (VPNs)
  • Wireless Transmission Security
  • Encryption
  • Overview of Windows XP and Vista Security

HIPAA Security Online Training – Day 2 Security, Enforcement Rule & ARRA 2009

HIPAA Security Rule Part 2                                        

  • Digital Signatures & Certificates:  A review of the use of higher forms of individual or entity authentication that is quickly becoming a requirement legally and to reduce legal risk.
  • Requirements
  • Digital Signatures
  • Digital Certificates
  • Public Key Infrastructure (PKI)
  • Solution Alternatives
  • Identity theft prevention and HIPAA
  • Security Policy:  A review of the requirements to document security program practices and processes in policy and related workforce training requirements.  Also a review of required policy maintenance and retention.
  • Risks, Risk Management and Policy Development/Implementation
  • General Security Standards Impact on Policy Development
  • Policy Training Requirements
  • Security Policy Considerations

Enforcement Rule                                                     

  • Overview:  An overview of the rule and rule requirements including entities and individuals the rule applies to.
  • Definitions:  A review of rule definitions including (not inclusive) what represents a violation, compliance, definition of agent, resolution processes, and HHS enforcement powers.
  • Informal resolution process:  A discussion of what an informal resolution is and what it entails.  Also, a review of the rule’s emphasis on informal resolution and language allowing such resolution at any phase of a violation investigation, penalty assessment, and appeal.
  • Formal resolution process (i.e., penalties, administrative hearings, appeal process, etc.):  A discussion of what would likely trigger a formal resolution process, HHS requirements and authority to investigate, rights and responsibilities of covered entities and resulting actions if civil penalties are levied and paid by the covered entity.
  • Compliance audits: A discussion of the authority to conduct compliance audits, current audit activity, and prospective audit activity.

Identity Theft Protection Laws                               
A general review of existing identity theft protection laws and breach notification requirements.  Includes a specific discussion of California identity theft and medical identity theft protection laws.

American Recovery and Reinvestment Act of 2009 (ARRA), Title XIII                                          
A general overview of Title XIII health information technology (HIT) incentives and requirements provisions.  This discussion will focus on an overview of the role of privacy and security in HIT investment provisions and standards development.

American Recovery and Reinvestment Act of 2009 (ARRA), Title XIII, Subtitle D – HITECH                                 

  • Privacy Provision Overview: Overview of the privacy provisions included ARRA and the relationship to the HIPAA Administrative Simplification Title provisions.

American Recovery and Reinvestment Act of 2009 (ARRA), Title XIII, Subtitle D – HITECH

  • Business Associates – New Requirements: A discussion of business associates’ new requirement to statutorily adhere to the provisions of the HIPAA Administrative Simplification Title Privacy and Security Rules.  The discussion includes a review of the timeline for compliance and the implications for business associates.
  • National Identity Theft Protection Provisions:      A discussion of the requirements of the new identity theft protection provisions, what is considered a breach or inappropriate disclosure, breach notification requirements, and entities/individuals covered.  The discussion also includes new reporting requirements by entity/individual, HHS, and the Federal Trade Commission (FTC).
  • Marketing Prohibitions and Restrictions:  An overview of the enhanced restrictions related to the use and disclosure of PHI where the entity or individual is paid for such use and disclosure and stricter prohibitions against using PHI for marketing purposes.
  • Enforcement Provisions:  A discussion of the new enforcement provisions, entities/individuals covered, and how such enforcement relates to the HIPAA Enforcement Rule and current compliance audits.  The discussion also includes a discussion of changes in penalties and the addition of a newly defined criminal act (formerly a civil violation).
  • Reporting Requirements: A discussion of new requirements for the reporting of breaches to HHS and/or the FTC and annual reports relating to compliance, rule violations, breaches, etc. to Congress and the public.

HIPAA Training Schedule

If you need additional information for this HIPAA Security Online Training or conduct onsite HIPAA Security Training for your employees, contact us at Bob@training-hipaa.net or call (515) 865-4591.