This is the most comprehensive HIPAA training manual for different HIPAA Certifications on Privacy and Security rule or self-study HIPAA training. This HIPAA book focuses on the Administrative Simplification portion of HIPAA and the Transactions, Privacy, and Security Rules defined within it. This guide contains explanations of the final Security Rule’s standards and implementation specifications in the areas of Administrative, Physical, and Technical Safeguards. Assessment tools, methodologies, and sample security policies that can be utilized to bring a covered entity into compliance are all included in the text. In addition, major networking protocols and technologies are discussed and evaluated in regard to their relevance to information security.

This manual is very helpful in understanding the HIPAA laws, their penalties, how to start compliance, etc. This HIPAA guide is invaluable for members of HIPAA compliance teams, HIPAA Privacy Officers, HIPAA Security Officers, project managers, network administrators, consultants, and anyone else involved in the HIPAA compliance efforts of the organization.

ISBN: 978-1-62274-053-6
Number of Pages: 712 pages spiral bound.
Price: $469

Buy HIPAA Manual  Now

Refund Policy

Table of Content for HIPAA Manual

  1. Topic A: About the manual
  2. Topic B: Setting student expectations
  3. Topic C: Classroom setup
  4. Topic D: Support
Chapter 1: HIPAA Basics
  1. Topic A: HIPAA introduction
  2. Topic B: Administrative Simplification
  3. Topic C: HIPAA penalties
  4. Topic D: HIPAA-related organizations
  5. Topic E: HIPAA terminology
  6. Unit summary: HIPAA basics
Chapter 2: Transactions & Code Sets Overview
  1. Topic A: Transactions
  2. Unit summary: Transactions & code sets overview
Chapter 3: Transactions – ANSI X12 and NCPDP Transaction Types
  1. Topic A: ANSI ASC X12 standards
  2. Unit summary: Transactions – ANSI X12 and NCPDP transaction types
Chapter 4: Code Sets & National Identifiers
  1. Topic A: Code sets
  2. Topic B: National health care identifiers
  3. Unit summary: Code sets & national identifiers
Chapter 5: HIPAA and e-Health – Security and Privacy Requirements
  1. Topic A: HIPAA, EHRs, and e-health
  2. Topic B: Planning for privacy compliance
  3. Topic C: Planning for security compliance
  4. Topic D: Scenario: Possible framework for compliance
  5. Unit summary: HIPAA and e-Health – Security and privacy requirements
Chapter 6: HIPAA Privacy Rule
  1. Topic A: Introduction to the Privacy Rule
  2. Unit summary: HIPAA Privacy Rule
Chapter 7: Privacy Rule – Organizational and Individual Relationships, Rights, And Responsibilities
  1. Topic A: Organizational requirements and relationships
  2. Topic B: Individual privacy rights
  3. Unit summary: Privacy Rule – Organizational and individual relationships, rights, and responsibilities
Chapter 8: Privacy Rule – Notice of Privacy Practices
  1. Topic A: Notice of Privacy Practices and Authorizations
  2. Unit summary: Privacy Rule – Notice of Privacy Practices
Chapter 9: Privacy Rule – Uses and Disclosures of PHI
  1. Topic A: Uses and disclosures: General
  2. Topic B: Uses and disclosures: treatment, payment, and health care operations
  3. Topic C: Uses and disclosures: Public purposes
  4. Unit summary: Privacy Rule – Uses and disclosures of PHI
Chapter 10: Privacy Rule – Safeguards
  1. Topic A: Safeguards
  2. Unit summary: Privacy Rule – Safeguards
Chapter 11: HIPAA Security Rule – Overview
  1. Topic A: Scope of the HIPAA Security Rule
  2. Topic B: Threats to business information
  3. Topic C: Security terminology and categories
  4. Topic D: Administrative safeguards
  5. Topic E: Physical safeguards
  6. Topic F: Technical safeguards
  7. Topic G: Organizational requirements
  8. Topic H: Policies and procedures, and documentation standards
  9. Unit summary: HIPAA Security Rule – Overview
Chapter 12: HIPAA Security Rule – Threats and Technology Options
  1. Topic A: Security threats
  2. Topic B: Security technology options
  3. Unit summary: HIPAA Security Rule – Threats and technology options
Chapter 13: Advanced Administrative Safeguards
  1. Topic A: Security awareness and training
  2. Topic B: Security incident procedures
  3. Topic C: Contingency plans
  4. Topic D: Evaluation
  5. Topic E: Business Associate Contracts and other arrangements
  6. Unit summary: Advanced administrative safeguards
Chapter 14: Physical safeguards Overview
  1. Topic A: Privacy Rule physical safeguards
  2. Unit summary: Physical safeguards overview
Chapter 15: Advanced Physical Safeguards
  1. Topic A: Requirements
  2. Topic B: Facility access controls
  3. Topic C: Workstation use and security
  4. Topic D: Specific steps – Physical security implementation
  5. Unit summary: Advanced physical safeguards
Chapter 16: Physical Safeguards – Device and Media Management
  1. Topic A: Device and Media Controls
  2. Unit summary: Physical safeguards – Device and Media Management
Chapter 17: General Technical Safeguards
  1. Topic A: Requirements
  2. Topic B: Access Control
  3. Topic C: Audit Controls
  4. Topic D: Integrity
  5. Topic E: Person or Entity Authentication
  6. Unit summary: General technical safeguards
Chapter 18: Advanced Technical Safeguards
  1. Topic A: Transmission Security
  2. Topic B: TCP/IP network infrastructure
  3. Topic C: Firewall systems
  4. Topic D: Virtual Private Networks (VPNs)
  5. Topic E: Wireless transmission security
  6. Topic F: Encryption
  7. Topic G: Kerberos authentication
  8. Topic H: Case study example: Windows security
  9. Unit summary: Advanced technical safeguards
Chapter 19: Digital Signatures and Certificates
  1. Topic A: Requirements
  2. Topic B: Digital signatures
  3. Topic C: Digital certificates
  4. Topic D: Public Key Infrastructure (PKI)
  5. Unit summary: Digital signatures and certificates
Chapter 20: Security Policy
  1. Topic A: Threats, risk management, and policy
  2. Topic B: The ISO/IEC-27002 security standards
  3. Topic C: Security policy considerations
  4. Topic D: Sample security policy documents
  5. Unit summary: Security policy
Chapter 21: HITECH Act and Red Flag Rule
  1. Topic A: HITECH Act
  2. Topic B: Red Flags Rule
Chapter 22: Omnibus Rule
  1. Topic A: The Omnibus Rule
Chapter 23: EHRs and Meaningful Use
  1. Topic A: Moving Towards Electronic Health Records
  2. Topic B: Meaningful Use
Chapter 24: HIPAA Compliance and Enforcement
  1. Topic A: HIPAA Compliance Enforcement
  2. Topic B: HIPAA Compliance Audits
Chapter 25: Social Media, Mobile Technology, and Big Data
  1. Topic A: The Digital Universe
  2. Topic B: Privacy and Security in the Digital Universe
Appendix: HIPAA Security Rule
  1. Topic A: HIPAA Security Rule Standards
Appendix: HIPAA Privacy Rule
  1. Topic A: HIPAA Privacy Rule standards
Job Role/Unit Matrix
  1. Topic A: Job role matrix
Course Summary
  1. Topic A: Course summary
  2. Topic B: Continued learning after class