HIPAA Privacy and Security Certification Training

To establish standards and requirements for the maintenance and transmission of health-care information, the Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Department of Health and Human Services (http://www.hhs.gov/ocr/hipaa/). The basic goal of HIPAA is to protect the security and confidentiality of electronic patient health information and cut the cost of print-based record transactions. The HIPAA legislation helps every organization that accesses, stores, maintains, or transmits patient-identifiable information and requires meeting specified deadlines by law.

A four-day comprehensive classroom and online web-based training program focuses on better understanding the implication of HIPAA legislation and identifying the critical compliance requirements for businesses/clients. It helps you better understand HIPAA’s Administrative Simplification Act as well as how to create a framework for initiating and working towards a blueprint for Privacy and HIPAA Security compliance and regular audit to avoid violation of regulations

Revised HIPAA regulations, affected by the Health Information Technology for Economic and Clinical Health (HITECH) Act, a part of the American Recovery and Reinvestment Act (ARRA) of 2009, and Omnibus rule published in 2013, are always included in our training. To meet the HIPAA audit checklist requirements, issues by the Department of Health and Human Services (DHHS), Office of e-Health Standards and Services, our instructors (HIPAA consultants) are very helpful. To better understand the relevance of HIPAA to information systems’ infrastructure and initiatives towards HIPAA Security & Privacy compliance, our training provides complete guidelines.

This training will prepare you for HIPAA Certification of Certified HIPAA Privacy Security Expert (CHPSE), Certified HIPAA Security Expert (CHSE), Certified HIPAA Privacy Expert (CHPE), and Certified HIPAA Privacy Associate (CHPA).

Register Now for the Instructor-led Classroom Training: $2799

Register Now for Live Instructor-led Webcast Training: $3299

HIPAA Training for Security, Privacy, and Transaction: Learning Objectives

Our training provides advanced competency in designing, implementing, and administering comprehensive privacy and security protection programs for all types of healthcare organizations. The training helps you:

  • To understand, What HIPAA stands for? How it affects your organization? and What significant changes can be in policies, procedures & processes within an organization in handling patient records due to HIPAA?.
  • To understand the impact of changes in HIPAA rules due to ARRA 2009 HITECH Act and Omnibus rule published in 2013.
  • Understand the federal program for meaningful use and incentives for adopting electronic health records.
  • Understand the current and potential uses of social media, mobile technologies, and big data in health care with the privacy and security risks and challenges.
  • To understand the basic reasons behind HIPAA, specifically: to provide continuity/portability of health benefits to individuals during jobs; to combat fraud/abuse in health insurance and healthcare delivery; to reduce administrative costs in health care; to provide uniform standards for electronic healthcare transactions; and, to ensure security and privacy of patient’s health information.
  • To develop an in-depth understanding of HIPAA Security, Privacy, and Transaction rule.
  • To understand, Who are Business Associates? and What will necessary steps they have to take up ensure HITECH HIPAA compliance?
  • To examine, how implementing HIPAA will affect the way healthcare entities organize their staff to achieve and monitor compliance with patient privacy/confidentiality needs
    To understand the new Enforcement rule.
  • Within every security, the category reviews specific requirements and implementation features.
  • To understand planning and preparation for HIPAA compliance step vise, i.e.: step one, awareness; step two, assessment; and step three, action focused on gaps identified.
  • To understand all required and addressable HIPAA Security Implementation specifications.
  • To review core elements of a security policy document for a healthcare entity.
  • To review specific requirements and implementation features within each security category.
  • For business continuity and disaster recovery, identify core elements of a compliance plan that every healthcare entity is required to develop.
  • Analyze international security standards, NIST, ISO’s 27002, and the BS 7799.
  • Crosswalk between NIST, SOX, ISO, and HIPAA requirements

Course Outline for HIPAA Compliance

HIPAA Compliance Training – Day 1

HIPAA Fundamentals

  1. HIPAA Basics: An overview of the Health Insurance Portability and Accountability Act of 1996 (all provisions)
  2. HIPAA’s Administrative Simplification Title: Review of the provisions of the Administrative Simplification Title. This includes transaction and code set standards (administrative transactions), national identifiers, privacy requirements, and security requirements.
  3. HIPAA Penalties: Review of the HIPAA enforcement rule including informal and formal remedies, requirements of covered entities, the role of business associates as agents, and enforcement bodies.
  4. HIPAA-Related Organizations: Discussion of entities/organizations specifically designated as standard maintenance organizations and statutorily defined advisory bodies.
  5. HIPAA Terminology and Definitions Covered Entity: Review of definitions included in the
    Administrative Simplification Title-related rules (list not inclusive).
  1. Covered Entity
  2. Health Plan
  3. Clearing House
  4. Health Care Provider
  5. Business Associates
  6. Trading Partner Agreement
  7. Workforce
  8. Organized Health Care Arrangement

HIPAA Transactions, Code Sets, and Identifiers

  1. Transactions
  2. Impacted Health Care Transactions
  3. Target Entities
  4. Scope
  5. Penalties
  6. ASCA

ANSI ASC X12 Standard

  1. Transaction Type 270
  2. Transaction Type 271
  3. Transaction Type 276
  4. Transaction Type 277
  5. Transaction Type 278 Request and Response
  6. Transaction Type 820
  7. Transaction Type 834
  8. Transaction Type 835
  9. Transaction Type 837 – Professional
  10. Transaction Type 837 – Institute
  11. Transaction Type 837 – Dental

HIPAA Code Sets

  1. ICD-9-CM Volumes 1 and 2
  2. CPT-4
  3. CDT
  4. ICD-9-CM Volume 3
  5. NDC
  6. HCPC

HIPAA National Health Care Identifiers

  1. Provider Identifier
  2. Employer Identifier
  3. Health Plan Identifier
  4. Individual Identifier

HIPAA Compliance Training – Day 2 Privacy

HIPAA Privacy Rule Part 1

  1. Introduction: Overview of the HIPAA Privacy Rule
    1. Who is Impacted (e.g., the definition of covered entities, business associates)?
    2. Scope (Activities covered by the rule)
    3. Exceptions (Specifically included or referenced exceptions that allow the use and disclosure of patient/health plan member protected health information (PHI))
    4. Timeline (Effective date of the rule, timelines related to certain requirements identified in the privacy rule such as accounting of disclosures, document retention requirements, etc.)
  2. Key Definitions: Review of key definitions associated with the privacy rule and how they apply to rule application and compliance.
    1. IIHI
    2. PHI
    3. Deidentified Information
    4. Use
    5. Disclosure
    6. Treatment
    7. Payment
    8. Health Care Operations
  3. Notice Requirement: Review of the requirements to draft and make available a notice of privacy practices, the content of the such notice, revision requirements, and availability requirements.
    1. Core Elements
    2. Changes to a Notice
    3. First Interaction
  4. Authorization versus Consent Requirement: Review the legal definitions of consent and authorization and what they would be used for. Review of the legal requirements related to obtaining authorization, the form of such authorization, and content requirements.
    1. Definition of “consent”
    2. Definition of “authorization”
    3. Legal differences between “consent” and “authorization”
    4. Core Data Elements and Required Statements
    5. Defective Authorizations
    6. Revocations
  5. Key Parties Impacted: A discussion of all entities or individuals directly or indirectly impacted by the rule and why.
  6. Minimum Necessary: Discussion of the definition of the minimum necessary and when it applies to the use and disclosure of PHI (internally and externally)
  7. Oral and Other Non-electronic Communications: A discussion of what constitutes PHI pursuant to the rule and the related requirements to protect non-electronic PHI, including oral PHI.
  8. Health-Related Communications, Fund Raising, and Marketing: Review of the requirements related to the use of PHI for communications other than treatment, payment, and health care operations. Also, a review of the strict requirements relating to the use of PHI for marketing and fundraising.
  9. Research: A review of the requirements related to the use of PHI for research including what processes must be followed prior to allowing the use of PHI in research without the patient/health plan member’s authorization.

HIPAA Privacy Rule Part 2

  1. Policy & Training Requirements: A review of the implied and explicit requirements to develop, implement and maintain privacy policies and procedures and the requirement to provide initial and ongoing staff training.
  2. Preemption Requirements: A review of state law preemption. This includes a discussion regarding when state law may preempt the rule without specific authorization from the US Department of Health and Human Services (HHS) and when authorization is required prior to state law preemption of HIPAA.
  3. State Privacy Laws: A general review of state privacy laws that preempt HIPAA (categorized as specially protected health information) with specific reference to select California state laws.
  4. Federal Privacy Law – 42 CFR Pt. 2: A discussion of the most stringent requirements found in 42 CFR Pt. 2 relating to alcohol and chemical dependency
  5. Statutory/Rule Conflict Resolution: Discussion of how to respond when federal and/or state law conflicts.
  6. Case Law: A review of general case law that has impacted the application of HIPAA, state privacy laws, and impacts legal risks.

HIPAA Compliance Training – Day 3 Security

HIPAA Security Rule Part 1

  1. General:
  2. Threats: General review of threats (real and perceived) prompting Congress to include security requirements in the HIPAA Administrative Simplification Title.
  3. Definition and Terminology: Review of general definitions of security and specifically how those definitions apply to the rule and what data must be protected by the implementation of appropriate security measures.
    1. Security
    2. Security Services
    3. Security Mechanisms
    1. General (continued):
    2. Security Rules: Detailed review of the security rule, components of the security rule, and specific requirements (including a reference back to security requirements referenced in the HIPAA Privacy Rule).
    1. Categories of Safeguards
    2. Implementation Specifications
    3. Approach and Philosophy
    4. Security Principles
    1. Administrative Safeguards
    2. Physical Safeguards
    3. Technical Safeguards
    4. Organizational Requirements
    5. Policies and Procedures, and Documentation Standards
    6. Administrative Safeguards: Definition of “administrative safeguards” as they relate to security and the rule. A review of required administrative safeguards and their application within a covered entity and business associate.
    7. Administrative Safeguards
    8. Security Management Process
    9. Assigned Security Responsibility
    10. Workforce Security
    11. Information Access Management
    12. Security Awareness and Training
    13. Security Incident Procedures
    14. Contingency Plan
    15. Evaluation
    16. Business Associate Contracts Standard
    1. Physical Safeguards: Definition of “physical safeguards” as they relate to security and the rule. A review of required physical safeguards and their application within a covered entity and business associate.
    2. Requirements
    3. Facility Access Controls
    4. Workstation Use
    5. Workstation Security
    6. Device and Media Controls
    7. Physical Safeguards Review

HIPAA Security Rule Part 1

  1. Technical Safeguards (general): Definition of “technical safeguards” as they relate to security and the rule. A review of required technical safeguards and their application within a covered entity and business associate.
  2. Requirements
  3. Access Control
  4. Audit Controls
  5. Integrity
  6. Person or Entity Authentication
  7. Security Compliance process: Risk Analysis, Vulnerability Assessment, Remediation, Contingency Planning, Audit & Evaluation
  8. Transmission Security
  9. Technical Safeguards (technical details): A review of required technical safeguards including a more technical review of required or addressable safeguards, implementation, and ongoing maintenance.
  10. TCP/IP Network Infrastructure
  11. Firewall Systems
  12. Virtual Private Networks (VPNs)
  13. Wireless Transmission Security
  14. Encryption
  15. Overview of Windows XP and Vista Security

HIPAA Compliance Training – Day 4 Security, Enforcement Rule & ARRA 2009

HIPAA Security Rule Part 2

  1. Digital Signatures & Certificates: A review of the use of higher forms of individual or entity authentication that is quickly becoming a requirement legally and to reduce legal risk.
  2. Requirements
  3. Digital Signatures
  4. Digital Certificates
  5. Public Key Infrastructure (PKI)
  6. Solution Alternatives
  7. Identity theft prevention and HIPAA
  8. Security Policy: A review of the requirements to document security program practices and processes in policy and related workforce training requirements. Also a review of required policy maintenance and retention.
  9. Risks, Risk Management, and Policy Development/Implementation
  10. General Security Standards Impact on Policy Development
  11. Policy Training Requirements
  12. Security Policy Considerations

Enforcement Rule

  1. Overview: An overview of the rule and rule requirements including entities and individuals the rule applies to
  2. Definitions: A review of rule definitions including (not inclusive) what represents a violation, compliance, definition of agent, resolution processes, and HHS enforcement powers.
  3. Informal resolution process: A discussion of what an informal resolution is and what it entails. Also, a review of the rule’s emphasis on informal resolution and language allowing such resolution at any phase of a violation investigation, penalty assessment, and appeal.
  4. Formal resolution process (i.e., penalties, administrative hearings, appeal process, etc.): A discussion of what would likely trigger a formal resolution process, HHS requirements and authority to investigate, rights and responsibilities of covered entities and resulting actions if civil penalties are levied and paid by the covered entity.
  5. Compliance audits A discussion of the authority to conduct compliance audits, current audit activity, and prospective audit activity.

Identity Theft Protection Laws
A general review of existing identity theft protection laws and breach notification requirements. Includes a specific discussion of California identity theft and medical identity theft protection laws.

American Recovery and Reinvestment Act of 2009 (ARRA), Title XIII

A general overview of Title XIII health information technology (HIT) incentives and requirements provisions. This discussion will focus on an overview of the role of privacy and security in HIT investment provisions and standards development.

American Recovery and Reinvestment Act of 2009 (ARRA), Title XIII, Subtitle D HITECH

  1. Privacy Provision Overview: Overview of the privacy provisions included ARRA and the relationship to the HIPAA Administrative Simplification Title provisions.

American Recovery and Reinvestment Act of 2009 (ARRA), Title XIII, Subtitle D HITECH

  1. Business Associates – New Requirements: A discussion of business associates’ new requirement to statutorily adhere to the provisions of the HIPAA Administrative Simplification Title Privacy and Security Rules. The discussion includes a review of the timeline for compliance and the implications for business associates.
  2. National Identity Theft Protection Provisions: A discussion of the requirements of the new identity theft protection provisions, what is considered a breach or inappropriate disclosure, breach notification requirements, and entities/individuals covered. The discussion also includes new reporting requirements by entity/individual, HHS, and the Federal Trade Commission (FTC).
  3. Marketing Prohibitions and Restrictions: An overview of the enhanced restrictions related to the use and disclosure of PHI where the entity or individual is paid for such use and disclosure and stricter prohibitions against using PHI for marketing purposes.
  4. Enforcement Provisions: A discussion of the new enforcement provisions, entities/individuals covered, and how such enforcement relates to the HIPAA Enforcement Rule and current compliance audits. The discussion also includes a discussion of changes in penalties and the addition of a newly defined criminal act (formerly a civil violation).
  5. Reporting Requirements: A discussion of new requirements for the reporting of breaches to HHS and/or the FTC and annual reports relating to compliance, rule violations, breaches, etc. to Congress and the public.

Red Flag Rules
With identity theft and other problems on the increase, the additional efforts needed to be made to combat this new avenue of fraud against health care. With so much information available and in the hands of many people delivering care, processing payment, and handling the operational and regulatory uses of this information, it was inevitable that healthcare would become a target for exploitation. Changes to the law have helped, and this chapter covers the following topics to better protect your information resources:

  1. Red Flag Rule Overview
  2. Definition of “red flags” and how to spot them
  3. State Identity Theft Protection Laws & ARRA Breach Notification Requirements
  4. Identity Theft Protection Program Requirements
  5. Implementation Tips

HIPAA Solutions – Parts 1 & 2
One of the cornerstones of a successful HIPAA security program is the performance of risk analysis and the creation of a risk management program. These two chapters will walk you through a program of risk analysis and show you how to perform one that focuses on the specific areas that HIPAA requires. You will learn techniques to set a severity scale that is specific to your organization; evaluate and compare risk elements against it; identify and quantify your assets; clarify threats and vulnerabilities that can compromise those assets; develop a strategy to protect against those threats that are both operationally effective and economically efficient. When you complete this section, you will be ready to help get your organization compliant now and keep it that way into the future.

Meaningful Use
Meaningful Use is one of the hottest current topics in Healthcare. In stages, the Meaningful Use program lays out a series of accomplishments and metrics that over time lead to achieving the objective of securely automating healthcare institutions and providers. In addition to having a program of steps over the years of 2011-2016, the US Government has outlined a financial incentive program to further encourage participation and compliance, and reduce the impact of this pervasive change. This module covers:

  1. ARRA & Meaningful Use Rule Overview
  2. Meaningful Use Requirements – Stage 1 & 2
  3. Privacy & Security Related Measures
  4. Meeting Core Requirement 15 (HIPAA Compliance)
  5. Vendor Requirements
  6. How to Prepare

Omnibus Rule of January 2013

  1. Background
  2. Breach Notification Rule
  3. New Limits on Uses and Disclosures of PHI
  4. Business Associates
  5. Increased Patient Rights
  6. Notice of Privacy Practices
  7. Increased Enforcement

Upon completion, the attendee will know what is required, how it will be measured, and how to achieve and measure it.

HIPAA Compliance Training – Day 5 (part of onsite training/customized HIPAA training only)

Call for details on content for this day.

HIPAA Compliance Training
Our HIPAA Compliance Training course will help key compliance team members to be compliant with HIPAA job role based training requirement.
4.6 based on 767 reviews
$2700
New

HIPAA Training for Security, Privacy, and Transaction: Pricing

Register Now for the Instructor-led Classroom Training: $2799

Register Now for Live Instructor-led Webcast Training: $3299

The cost includes Training Kit:

  • HIPAA Compliance Training Manual (worth $450)
  • HIPAA Security Policy Templates (sent by e-mail) (worth $495)

HIPAA Certification Test:

The above training prepares you for:

  • Certified HIPAA Privacy Security Expert (CHPSE)
  • Certified HIPAA Security Expert (CHSE)
  • Certified HIPAA Privacy Expert (CHPE)
  • Certified HIPAA Privacy Associate (CHPA)

Continuing Education Requirements After Getting Certified:

All certified professionals are required to take Cyber Security Awareness For Employees within 1 month of getting certified. You can take this training before or after getting certified. If you are a cybersecurity professional, you can request an exception (provide the reason why you should not take the training and provide your cybersecurity certification credentials) to take this training but you will have to complete the test. 

Course Name: CyberSecurity Awareness For Employees

Description: OCR is focusing on cybersecurity awareness for the covered entities and business associates after the FBI issued a warning for the healthcare industry. This training is a continuing education course needed for all HIPAA certifications (CHPSE, CHPE, and CHSE) professionals to maintain their credentials. This is a non-technical course and anyone can take it. There are no prerequisites for it.

Students learn how hackers use social engineering tools like spoofing, Deceptive Phishing, W2 Phishing, Search Engine Phishing, Pharming, Spear Phishing, Whaling / CEO Fraud, Vishing, SMiSHing, Dropbox Phishing, Google Docs Phishing, Image Phishing, Piggybacking, Dumpster diving, Eavesdropping and many more on company employees. With different types of Malware like Computer viruses, Worms, Trojan horses, Ransomware, Spyware, Adware, Scareware, Keylogger, etc., you want to be aware of threats around you. The overall goal is to protect you from financial losses, identity theft, and damage to your reputation caused due to breaches of security by criminals.

Cost: Included with the HIPAA training cost. You need to buy a Certified Cybersecurity Awareness Professional (CCAP) certification exam if needed.

Visit Here for CyberSecurity Awareness For Employees Course Outline

Once a year all students will have to go through one hour of update course (normal cost $99) which will include relevant regulation changes and other OCR/HHS activities on compliance and enforcement.

To maintain your HIPAA certification, you will continue taking updated courses when they are released. You will receive a new certificate when your certificate will expire if you have taken all required updated courses. You will NOT be required to take any test if you have taken the updated courses regularly.

Certificate for Continuing Education Credits:

Students can buy a CE credits certificate for this course at the time of registration. You will receive 32 CE credits for this course through the Approved Provider of California Board of Registered Nursing after completing the course.

To View Training Schedule:

Click Here for HIPAA Training Schedule

Register Now for ILT Comprehensive HIPAA Privacy and Security Training

Our mission is to provide the highest quality service to achieve your educational goals.

For more information, please contact us at Bob@supremusgroup.com or call (515) 865-4591 FREE