SlideShare a Scribd company logo
Online course offering
HIPAA
All you need to know about Health Insurance
Portability and Accountability Act
© KloudLearn www.kloudlearn.com
Learning
Objectives
© KloudLearn www.kloudlearn.com 2
Introduction to HIPAA
Purpose of HIPAA
Main components of HIPAA
HIPAA Compliance Requirement
Compliance Checklist
HIPAA Privacy Rule
Entities covered by HIPAA
PHI
What information is protected under HIPAA?
HIPAA Security Rule
Breach Notification
Summary
Introduction to HIPAA
● HIPAA (Health Insurance Portability and
Accountability Act) is United States legislation
that provides data privacy and security provisions for
safeguarding medical information.
● The law has emerged into greater prominence in
recent years with the many health data breaches
caused by cyber attacks and ransomware attacks on
health insurers and providers.
● The federal law was signed by President Bill Clinton
on Aug. 21, 1996. HIPAA overrides state laws
regarding the safety of medical information, unless
the state law is considered more stringent than
HIPAA.
● It is a federal legislation which addresses issues
ranging from health insurance coverage to national
standard identifiers for healthcare providers.
© KloudLearn www.kloudlearn.com 3
Purpose of HIPAA
● HIPAA, also known as Public Law 104-191, has two main purposes:
■ to provide continuous health insurance coverage for workers who lose or change their job and;
■ to ultimately reduce the cost of healthcare by standardizing the electronic transmission of
administrative and financial transactions.
● Other goals include combating abuse, fraud and waste in health insurance and healthcare delivery, and improving
access to long-term care services and health insurance.
© KloudLearn www.kloudlearn.com 4
Main components of HIPAA
HIPAA contains five sections, or titles:
● Title I: HIPAA Health Insurance Reform
Title I protects health insurance coverage for individuals who lose or change jobs. It also prohibits group
health plans from denying coverage to individuals with specific diseases and preexisting conditions and from
setting lifetime coverage limits.
● Title II: HIPAA Administrative Simplification
Title II directs the U.S. Department of Health and Human Services (HHS) to establish national standards for
processing electronic healthcare transactions. It also requires healthcare organizations to implement secure
electronic access to health data and to remain in compliance with privacy regulations set by HHS.
● Title III: HIPAA Tax-Related Health Provisions
Title III includes tax-related provisions and guidelines for medical care.
● Title IV: Application and Enforcement of Group Health Plan Requirements
Title IV further defines health insurance reform, including provisions for individuals with preexisting
conditions and those seeking continued coverage.
● Title V: Revenue Offsets
Title V includes provisions on company-owned life insurance and the treatment of those who lose their U.S.
citizenship for income tax purposes.
© KloudLearn www.kloudlearn.com 5
HIPAA Compliance Requirements
● National Provider Identifier Standard:
Each healthcare entity, including individuals, employers, health plans and healthcare providers, must have a
unique 10-digit National Provider Identifier number, or NPI.
● Transactions and Code Sets Standard:
Healthcare organizations must follow a standardized mechanism for electronic data interchange (EDI) in
order to submit and process insurance claims.
● HIPAA Privacy Rule:
Officially known as the Standards for Privacy of Individually Identifiable Health Information, this rule
establishes national standards to protect patient health information.
● HIPAA Security Rule:
The Security Standards for the Protection of Electronic Protected Health Information (ePHI) sets standards
for patient data security.
● HIPAA Enforcement Rule:
This rule establishes guidelines for investigations into HIPAA compliance violations.
© KloudLearn www.kloudlearn.com 6
Compliance Checklist
© KloudLearn www.kloudlearn.com 7
HIPAA Compliance Checklist
✔ Establish a HIPAA compliance committee
✔ Review HIPAA guidelines
✔ Perform gap analysis to identify areas of concern
✔ Build and execute a plan to address security gaps
✔ Review key vendors’ interactions with PHI
✔ Perform ongoing monitoring and audits
✔ Establish data breach incident response protocols
✔ Perform HIPAA training
✔ Regularly evaluate compliance and review HIPAA updates
✔ Ask subject matter experts for assistance
HIPAA Privacy Rule
● The Standards for Privacy of Individually Identifiable
Health Information, commonly known as the HIPAA
Privacy Rule, establishes the first national standards
in the United States to protect patients' personal or
protected health information (PHI).
● The Privacy Rule also guarantees patients the right
to receive their own PHI, upon request, from
healthcare providers covered by HIPAA.
● The HIPAA Privacy Rule applies to organizations
that are considered HIPAA-covered entities.
© KloudLearn www.kloudlearn.com 8
Entities covered by HIPAA
● A HIPAA-covered entity is any organization or corporation that directly handles PHI or personal health
records. Covered entities are required to comply with HIPAA and HITECH (Health Information Technology
for Economic and Clinical Health) Act mandates for the protection of PHI and PHRs.
● Covered entities fall into three categories:
■ Healthcare provider:
Healthcare providers include doctors, clinics, psychologists, dentists, chiropractors, nursing homes and
pharmacies.
■ Health plan:
Health plans include health insurance companies, health maintenance organizations (HMOs), company
health plans and government healthcare programs, such as Medicare, Medicaid and military healthcare
programs.
■ Healthcare clearinghouse:
Healthcare clearinghouses are entities that process nonstandard health information they receive from
another entity into a standard format or vice versa. Examples include billing services and community
healthcare systems for managing health data.
© KloudLearn www.kloudlearn.com 9
PHI
Protected Health Information (PHI)
● HIPAA protects all patient information whether it is verbal,
written or electronic.
● It includes all individually identifiable health information that
is transmitted or maintained in any form or medium.
● It includes demographic information that ties the identity of
the individual to his or her health record.
● E.g. names, addresses, geographic codes smaller than state,
all dates (except year) elements related to the person,
telephone numbers, fax numbers, license numbers, social
security numbers, etc.
© KloudLearn www.kloudlearn.com 10
What information is protected under HIPAA?
● The HIPAA Privacy Rule protects all individually identifiable health information that is held or transmitted by
a covered entity. This information can be held in any form, including digital, paper or oral.
● PHI includes but is not limited to the following:
■ a patient's name, address, birth date, Social Security number, biometric identifiers or other personally
identifiable information (PII);
■ an individual's past, present or future physical or mental health condition;
■ any care provided to an individual; and
■ information concerning the past, present or future payment for the care provided to the individual that
identifies the patient or information for which there is a reasonable basis to believe could be used to
identify the patient.
● PHI does not include the following:
■ employment records, including information about education, as well as other records subject to or
defined in the Family Educational Rights and Privacy Act (FERPA); and
■ deidentified data, meaning data that does not identify or provide information that could identify an
individual -- there are no restrictions to its use or disclosure.
© KloudLearn www.kloudlearn.com 11
HIPAA Security Rule
● The Security Standards for the Protection of Electronic Protected Health Information, commonly known as
the HIPAA Security Rule, establishes national standards for securing patient data that is stored or transferred
electronically.
● It draws from the National Institute of Standards and Technology's (NIST) Cybersecurity Framework.
● The Objective:
■ Defines general standards and implementation requirements to protect electronic personal health
information (ePHI), which is preserved by covered entity.
■ Provides appropriate controls such as administrative, physical, technical and Policies, procedures and
documentation requirements in order to guarantee the confidentiality, integrity, and availability of ePHI.
© KloudLearn www.kloudlearn.com 12
Breach Notifications
● Definition of “Breach”:
An impermissible acquisition,
access, use or disclosure not
permitted by the HIPAA Privacy
Rule.
● Examples include:
■ Laptop containing PHI is
stolen.
■ Receptionist who is not
authorized to access PHI
looks through patient files in
order to learn of a person’s
treatment.
■ Nurse gives discharge papers
to the wrong individual.
■ Billing statements containing
PHI mailed or faxed to the
wrong individual/entity.
© KloudLearn www.kloudlearn.com 13
● Examples of Privacy Breach
■ Talking in public areas, talking too loudly, talking to the
wrong person.
■ Lost/stolen or improperly disposed of paper, mail,
films, notebooks.
■ Lost/stolen laptops, PDAs, cell phones, media devices
(video and audio recordings).
■ Lost/stolen media like CDs, flash drives, memory
cards.
■ Hacking of unprotected computer systems.
■ Email or faxes sent to the wrong address, wrong
person, or wrong number.
■ User not logging off of computer systems, allowing
others to access their computer or system.
Summary
● HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data
privacy and security provisions for safeguarding medical information.
● HIPAA Health Insurance Reform, HIPAA Administrative Simplification, HIPAA Tax-Related Health Provisions,
Application and Enforcement of Group Health Plan Requirements and Revenue Offsets are the 5 main
components of HIPAA.
● National Provider Identifier Standard, Transactions and Code Sets Standard, HIPAA Privacy Rule, HIPAA
Security Rule and HIPAA Enforcement Rule are the requirements for HIPAA compliance.
● The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA
Privacy Rule, establishes the first national standards in the United States to protect patients' personal or
protected health information (PHI).
● The Security Standards for the Protection of Electronic Protected Health Information, commonly known as
the HIPAA Security Rule, establishes national standards for securing patient data that is stored or transferred
electronically.
● Nurse gives discharge papers to the wrong individual,Billing statements containing PHI mailed or faxed to the
wrong individual/entity etc are examples of breach in HIPAA.
© KloudLearn www.kloudlearn.com 14
Test your knowledge!
Quiz
Quiz
Health Insurance Portability and Accountability Act
Health Insurance Portability and Accuracy Act
Health Insurance Policy and Accuracy Act
None of the above
© KloudLearn www.kloudlearn.com
Which of the following
is the abbreviation of
HIPAA?
16
True
False
© KloudLearn www.kloudlearn.com
State true or false.
HIPAA Health
Insurance Reform
protects health
insurance coverage for
individuals who lose or
change jobs.
17
5
7
10
None of the above
© KloudLearn www.kloudlearn.com
The National Provider
Identifier number must
have a unique ___
digits.
18
Health Plan
Healthcare clearinghouse
Healthcare provider
All of the above
© KloudLearn www.kloudlearn.com
Which of the following
are the entities covered
by HIPAA?
19
Laptop containing PHI is stolen
Receptionist who is not authorized to access PHI
looks through patient files in order to learn of a
person’s treatment
Nurse gives discharge papers to the right individual
Billing statements containing PHI mailed or faxed
to the wrong individual/entity
© KloudLearn www.kloudlearn.com
Which of the following
is not an example of
breach in HIPAA?
20
a patient's name, address, birth date, Social
Security number, biometric identifiers or
other personally identifiable information (PII);
an individual's past, present or future physical
or mental health condition;
any care provided to an individual;
employment records, including information
about education;
© KloudLearn www.kloudlearn.com
Which of the following
information is not
included in PHI?
21
HIPAA Privacy Rule
HIPAA Security Rule
None of the above
© KloudLearn www.kloudlearn.com
The Security Standards
for the Protection of
Electronic Protected
Health Information is
commonly known as
_____.
22
Reviewing HIPAA guidelines
Reviewing HIPAA updates
Addressing security gaps
Personal information of patients
© KloudLearn www.kloudlearn.com
HIPAA Compliance
checklist does not
include?
23
True
False
© KloudLearn www.kloudlearn.com
The federal law of
HIPAA was signed by
President Bill Clinton.
24
Electronically Performed Health Information
Electronic Protected Health Information
Easily Protected Health Information
None Of The Above
© KloudLearn www.kloudlearn.com
ePHI stands for _____.
25
Thank You
© KloudLearn www.kloudlearn.com 26
KloudLearn, Inc. is headquartered in Silicon Valley, California. Our mission is to help
enterprises provide an engaging and impactful learning experience that improves
business performance. We provide the industry’s most modern LMS (Learning
Management System). For more information visit us at www.kloudlearn.com or reach
out to us at info@kloudlearn.com

More Related Content

What's hot

Regulation of biosimilar in India
Regulation of biosimilar in India Regulation of biosimilar in India
Regulation of biosimilar in India
Palesh Rajkondawar
 
Regulatory requirement for approval of Biologics
Regulatory requirement for approval of BiologicsRegulatory requirement for approval of Biologics
Regulatory requirement for approval of Biologics
Arpitha Aarushi
 
Cosmetic Regulations in European Union
Cosmetic Regulations in European UnionCosmetic Regulations in European Union
Cosmetic Regulations in European Union
Niyati Pandya
 
Cosmetic Regulation in EU.pptx
Cosmetic Regulation in EU.pptxCosmetic Regulation in EU.pptx
Cosmetic Regulation in EU.pptx
MohdTanzeem5
 
Presentation: Cleaning Validation
Presentation: Cleaning ValidationPresentation: Cleaning Validation
Presentation: Cleaning Validation
TGA Australia
 
Medical device regulations in india
Medical device regulations in indiaMedical device regulations in india
Medical device regulations in india
Suraj Pamadi
 
General principles of_intellectual_property[1].pptx_2[1]
General principles of_intellectual_property[1].pptx_2[1]General principles of_intellectual_property[1].pptx_2[1]
General principles of_intellectual_property[1].pptx_2[1]
chandu chatla
 
Combinational products & medical devices
Combinational products & medical devicesCombinational products & medical devices
Combinational products & medical devices
SHUBHAMGWAGH
 
Investigational new drug
Investigational new drugInvestigational new drug
Investigational new drug
Santhosh Kalakar dj
 
US - FDA Regulatory Agency Overview.
US - FDA Regulatory Agency Overview.US - FDA Regulatory Agency Overview.
US - FDA Regulatory Agency Overview.
Venugopal N
 
DISSOLUTION
DISSOLUTIONDISSOLUTION
DISSOLUTION
SagarSahu608102
 
NDA- New Drug Application
NDA- New Drug ApplicationNDA- New Drug Application
NDA- New Drug Application
Dr. Jigar Vyas
 
Snda
SndaSnda
Cleaning validation
Cleaning validationCleaning validation
Cleaning validation
Sarath Chandra
 
Fda regulations for pharmaceutical packaging
Fda regulations for pharmaceutical packagingFda regulations for pharmaceutical packaging
Fda regulations for pharmaceutical packaging
Prem Patil
 
Ppt 1 overview of regulatory affairs and diff bodies_august2016_final
Ppt 1 overview of regulatory affairs and diff bodies_august2016_finalPpt 1 overview of regulatory affairs and diff bodies_august2016_final
Ppt 1 overview of regulatory affairs and diff bodies_august2016_final
Rajashri Survase Ojha
 
Phar validatio.general principles of ipr. by jitu
Phar validatio.general principles of ipr. by jituPhar validatio.general principles of ipr. by jitu
Phar validatio.general principles of ipr. by jitu
Jitendra Sonawane
 
Chemical based hazards in pharmaceutical
Chemical based hazards in pharmaceuticalChemical based hazards in pharmaceutical
Chemical based hazards in pharmaceutical
Hari Haran
 

What's hot (20)

Regulation of biosimilar in India
Regulation of biosimilar in India Regulation of biosimilar in India
Regulation of biosimilar in India
 
Regulatory requirement for approval of Biologics
Regulatory requirement for approval of BiologicsRegulatory requirement for approval of Biologics
Regulatory requirement for approval of Biologics
 
Cosmetic Regulations in European Union
Cosmetic Regulations in European UnionCosmetic Regulations in European Union
Cosmetic Regulations in European Union
 
Cosmetic Regulation in EU.pptx
Cosmetic Regulation in EU.pptxCosmetic Regulation in EU.pptx
Cosmetic Regulation in EU.pptx
 
Presentation: Cleaning Validation
Presentation: Cleaning ValidationPresentation: Cleaning Validation
Presentation: Cleaning Validation
 
Medical device regulations in india
Medical device regulations in indiaMedical device regulations in india
Medical device regulations in india
 
General principles of_intellectual_property[1].pptx_2[1]
General principles of_intellectual_property[1].pptx_2[1]General principles of_intellectual_property[1].pptx_2[1]
General principles of_intellectual_property[1].pptx_2[1]
 
Combinational products & medical devices
Combinational products & medical devicesCombinational products & medical devices
Combinational products & medical devices
 
Investigational new drug
Investigational new drugInvestigational new drug
Investigational new drug
 
US - FDA Regulatory Agency Overview.
US - FDA Regulatory Agency Overview.US - FDA Regulatory Agency Overview.
US - FDA Regulatory Agency Overview.
 
DISSOLUTION
DISSOLUTIONDISSOLUTION
DISSOLUTION
 
NDA- New Drug Application
NDA- New Drug ApplicationNDA- New Drug Application
NDA- New Drug Application
 
Snda
SndaSnda
Snda
 
Cleaning validation
Cleaning validationCleaning validation
Cleaning validation
 
Fda regulations for pharmaceutical packaging
Fda regulations for pharmaceutical packagingFda regulations for pharmaceutical packaging
Fda regulations for pharmaceutical packaging
 
Ppt 1 overview of regulatory affairs and diff bodies_august2016_final
Ppt 1 overview of regulatory affairs and diff bodies_august2016_finalPpt 1 overview of regulatory affairs and diff bodies_august2016_final
Ppt 1 overview of regulatory affairs and diff bodies_august2016_final
 
Phar validatio.general principles of ipr. by jitu
Phar validatio.general principles of ipr. by jituPhar validatio.general principles of ipr. by jitu
Phar validatio.general principles of ipr. by jitu
 
Snda
SndaSnda
Snda
 
Chemical based hazards in pharmaceutical
Chemical based hazards in pharmaceuticalChemical based hazards in pharmaceutical
Chemical based hazards in pharmaceutical
 
Anda
AndaAnda
Anda
 

Similar to Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn

Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
jessie66
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
Cynthia Holland
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
amartya2087
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
susmitaghosh93
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
Valency Networks
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to know
Shred-it
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA Compliance
Jim Anfield
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law Test
Sachiko Hurst
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion
Dan Wellisch
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
Jay Hodes
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
Jose Ivan Delgado, Ph.D.
 
Hipaa training new_staff_december 2018 - compatibility mode
Hipaa training new_staff_december 2018  -  compatibility modeHipaa training new_staff_december 2018  -  compatibility mode
Hipaa training new_staff_december 2018 - compatibility mode
robint2125
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingvrgill22
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
hipaacompliance
 
Protecting patient privacy
Protecting patient privacyProtecting patient privacy
Protecting patient privacydlemin919
 
HIPAA Privacy & Security
HIPAA Privacy & SecurityHIPAA Privacy & Security
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process Servers
Lawgical
 
UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance training
scapoccia
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
Cynthia Holland
 

Similar to Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn (20)

Knowing confidentiality
Knowing confidentialityKnowing confidentiality
Knowing confidentiality
 
Annual HIPAA Training
Annual HIPAA TrainingAnnual HIPAA Training
Annual HIPAA Training
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...HIPAA , REGULATORY AFFAIRS , M.PHARM ...
HIPAA , REGULATORY AFFAIRS , M.PHARM ...
 
HIPAA Audit Implementation
HIPAA Audit ImplementationHIPAA Audit Implementation
HIPAA Audit Implementation
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to know
 
The Startup Path to HIPAA Compliance
The Startup Path to HIPAA ComplianceThe Startup Path to HIPAA Compliance
The Startup Path to HIPAA Compliance
 
HIPAA Part I the Law Test
HIPAA Part I  the Law TestHIPAA Part I  the Law Test
HIPAA Part I the Law Test
 
HIPAA Panel Discussion
HIPAA Panel Discussion HIPAA Panel Discussion
HIPAA Panel Discussion
 
HIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of ComplianceHIPAA - Understanding the Basics of Compliance
HIPAA - Understanding the Basics of Compliance
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
Hipaa training new_staff_december 2018 - compatibility mode
Hipaa training new_staff_december 2018  -  compatibility modeHipaa training new_staff_december 2018  -  compatibility mode
Hipaa training new_staff_december 2018 - compatibility mode
 
Week 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy trainingWeek 1 discussion 2 hipaa and privacy training
Week 1 discussion 2 hipaa and privacy training
 
HIPAA for Dummies
HIPAA for DummiesHIPAA for Dummies
HIPAA for Dummies
 
Protecting patient privacy
Protecting patient privacyProtecting patient privacy
Protecting patient privacy
 
HIPAA Privacy & Security
HIPAA Privacy & SecurityHIPAA Privacy & Security
HIPAA Privacy & Security
 
HIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process ServersHIPAA and FDCPA Compliance for Process Servers
HIPAA and FDCPA Compliance for Process Servers
 
UNA HIPAA Training 8-13
UNA HIPAA Training   8-13UNA HIPAA Training   8-13
UNA HIPAA Training 8-13
 
Hippa compliance training
Hippa compliance trainingHippa compliance training
Hippa compliance training
 
2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training2017 HIPAA Clinical Research Training
2017 HIPAA Clinical Research Training
 

More from KloudLearn

Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
KloudLearn
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
KloudLearn
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
KloudLearn
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
KloudLearn
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - Kloudlearn
KloudLearn
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
KloudLearn
 
California Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnCalifornia Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - Kloudlearn
KloudLearn
 
KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform
KloudLearn
 

More from KloudLearn (8)

Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
 
What is Phishing - Kloudlearn
What is Phishing - KloudlearnWhat is Phishing - Kloudlearn
What is Phishing - Kloudlearn
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - Kloudlearn
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
California Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - KloudlearnCalifornia Consumer Privacy Act (CCPA) - Kloudlearn
California Consumer Privacy Act (CCPA) - Kloudlearn
 
KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform KloudLearn LMS | E-learning Platform
KloudLearn LMS | E-learning Platform
 

Recently uploaded

Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
ayushiqss
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 

Recently uploaded (20)

Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Why React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdfWhy React Native as a Strategic Advantage for Startup Innovation.pdf
Why React Native as a Strategic Advantage for Startup Innovation.pdf
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 

Health Insurance Portability and Accountability Act (HIPPA) - Kloudlearn

  • 1. Online course offering HIPAA All you need to know about Health Insurance Portability and Accountability Act © KloudLearn www.kloudlearn.com
  • 2. Learning Objectives © KloudLearn www.kloudlearn.com 2 Introduction to HIPAA Purpose of HIPAA Main components of HIPAA HIPAA Compliance Requirement Compliance Checklist HIPAA Privacy Rule Entities covered by HIPAA PHI What information is protected under HIPAA? HIPAA Security Rule Breach Notification Summary
  • 3. Introduction to HIPAA ● HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security provisions for safeguarding medical information. ● The law has emerged into greater prominence in recent years with the many health data breaches caused by cyber attacks and ransomware attacks on health insurers and providers. ● The federal law was signed by President Bill Clinton on Aug. 21, 1996. HIPAA overrides state laws regarding the safety of medical information, unless the state law is considered more stringent than HIPAA. ● It is a federal legislation which addresses issues ranging from health insurance coverage to national standard identifiers for healthcare providers. © KloudLearn www.kloudlearn.com 3
  • 4. Purpose of HIPAA ● HIPAA, also known as Public Law 104-191, has two main purposes: ■ to provide continuous health insurance coverage for workers who lose or change their job and; ■ to ultimately reduce the cost of healthcare by standardizing the electronic transmission of administrative and financial transactions. ● Other goals include combating abuse, fraud and waste in health insurance and healthcare delivery, and improving access to long-term care services and health insurance. © KloudLearn www.kloudlearn.com 4
  • 5. Main components of HIPAA HIPAA contains five sections, or titles: ● Title I: HIPAA Health Insurance Reform Title I protects health insurance coverage for individuals who lose or change jobs. It also prohibits group health plans from denying coverage to individuals with specific diseases and preexisting conditions and from setting lifetime coverage limits. ● Title II: HIPAA Administrative Simplification Title II directs the U.S. Department of Health and Human Services (HHS) to establish national standards for processing electronic healthcare transactions. It also requires healthcare organizations to implement secure electronic access to health data and to remain in compliance with privacy regulations set by HHS. ● Title III: HIPAA Tax-Related Health Provisions Title III includes tax-related provisions and guidelines for medical care. ● Title IV: Application and Enforcement of Group Health Plan Requirements Title IV further defines health insurance reform, including provisions for individuals with preexisting conditions and those seeking continued coverage. ● Title V: Revenue Offsets Title V includes provisions on company-owned life insurance and the treatment of those who lose their U.S. citizenship for income tax purposes. © KloudLearn www.kloudlearn.com 5
  • 6. HIPAA Compliance Requirements ● National Provider Identifier Standard: Each healthcare entity, including individuals, employers, health plans and healthcare providers, must have a unique 10-digit National Provider Identifier number, or NPI. ● Transactions and Code Sets Standard: Healthcare organizations must follow a standardized mechanism for electronic data interchange (EDI) in order to submit and process insurance claims. ● HIPAA Privacy Rule: Officially known as the Standards for Privacy of Individually Identifiable Health Information, this rule establishes national standards to protect patient health information. ● HIPAA Security Rule: The Security Standards for the Protection of Electronic Protected Health Information (ePHI) sets standards for patient data security. ● HIPAA Enforcement Rule: This rule establishes guidelines for investigations into HIPAA compliance violations. © KloudLearn www.kloudlearn.com 6
  • 7. Compliance Checklist © KloudLearn www.kloudlearn.com 7 HIPAA Compliance Checklist ✔ Establish a HIPAA compliance committee ✔ Review HIPAA guidelines ✔ Perform gap analysis to identify areas of concern ✔ Build and execute a plan to address security gaps ✔ Review key vendors’ interactions with PHI ✔ Perform ongoing monitoring and audits ✔ Establish data breach incident response protocols ✔ Perform HIPAA training ✔ Regularly evaluate compliance and review HIPAA updates ✔ Ask subject matter experts for assistance
  • 8. HIPAA Privacy Rule ● The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes the first national standards in the United States to protect patients' personal or protected health information (PHI). ● The Privacy Rule also guarantees patients the right to receive their own PHI, upon request, from healthcare providers covered by HIPAA. ● The HIPAA Privacy Rule applies to organizations that are considered HIPAA-covered entities. © KloudLearn www.kloudlearn.com 8
  • 9. Entities covered by HIPAA ● A HIPAA-covered entity is any organization or corporation that directly handles PHI or personal health records. Covered entities are required to comply with HIPAA and HITECH (Health Information Technology for Economic and Clinical Health) Act mandates for the protection of PHI and PHRs. ● Covered entities fall into three categories: ■ Healthcare provider: Healthcare providers include doctors, clinics, psychologists, dentists, chiropractors, nursing homes and pharmacies. ■ Health plan: Health plans include health insurance companies, health maintenance organizations (HMOs), company health plans and government healthcare programs, such as Medicare, Medicaid and military healthcare programs. ■ Healthcare clearinghouse: Healthcare clearinghouses are entities that process nonstandard health information they receive from another entity into a standard format or vice versa. Examples include billing services and community healthcare systems for managing health data. © KloudLearn www.kloudlearn.com 9
  • 10. PHI Protected Health Information (PHI) ● HIPAA protects all patient information whether it is verbal, written or electronic. ● It includes all individually identifiable health information that is transmitted or maintained in any form or medium. ● It includes demographic information that ties the identity of the individual to his or her health record. ● E.g. names, addresses, geographic codes smaller than state, all dates (except year) elements related to the person, telephone numbers, fax numbers, license numbers, social security numbers, etc. © KloudLearn www.kloudlearn.com 10
  • 11. What information is protected under HIPAA? ● The HIPAA Privacy Rule protects all individually identifiable health information that is held or transmitted by a covered entity. This information can be held in any form, including digital, paper or oral. ● PHI includes but is not limited to the following: ■ a patient's name, address, birth date, Social Security number, biometric identifiers or other personally identifiable information (PII); ■ an individual's past, present or future physical or mental health condition; ■ any care provided to an individual; and ■ information concerning the past, present or future payment for the care provided to the individual that identifies the patient or information for which there is a reasonable basis to believe could be used to identify the patient. ● PHI does not include the following: ■ employment records, including information about education, as well as other records subject to or defined in the Family Educational Rights and Privacy Act (FERPA); and ■ deidentified data, meaning data that does not identify or provide information that could identify an individual -- there are no restrictions to its use or disclosure. © KloudLearn www.kloudlearn.com 11
  • 12. HIPAA Security Rule ● The Security Standards for the Protection of Electronic Protected Health Information, commonly known as the HIPAA Security Rule, establishes national standards for securing patient data that is stored or transferred electronically. ● It draws from the National Institute of Standards and Technology's (NIST) Cybersecurity Framework. ● The Objective: ■ Defines general standards and implementation requirements to protect electronic personal health information (ePHI), which is preserved by covered entity. ■ Provides appropriate controls such as administrative, physical, technical and Policies, procedures and documentation requirements in order to guarantee the confidentiality, integrity, and availability of ePHI. © KloudLearn www.kloudlearn.com 12
  • 13. Breach Notifications ● Definition of “Breach”: An impermissible acquisition, access, use or disclosure not permitted by the HIPAA Privacy Rule. ● Examples include: ■ Laptop containing PHI is stolen. ■ Receptionist who is not authorized to access PHI looks through patient files in order to learn of a person’s treatment. ■ Nurse gives discharge papers to the wrong individual. ■ Billing statements containing PHI mailed or faxed to the wrong individual/entity. © KloudLearn www.kloudlearn.com 13 ● Examples of Privacy Breach ■ Talking in public areas, talking too loudly, talking to the wrong person. ■ Lost/stolen or improperly disposed of paper, mail, films, notebooks. ■ Lost/stolen laptops, PDAs, cell phones, media devices (video and audio recordings). ■ Lost/stolen media like CDs, flash drives, memory cards. ■ Hacking of unprotected computer systems. ■ Email or faxes sent to the wrong address, wrong person, or wrong number. ■ User not logging off of computer systems, allowing others to access their computer or system.
  • 14. Summary ● HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that provides data privacy and security provisions for safeguarding medical information. ● HIPAA Health Insurance Reform, HIPAA Administrative Simplification, HIPAA Tax-Related Health Provisions, Application and Enforcement of Group Health Plan Requirements and Revenue Offsets are the 5 main components of HIPAA. ● National Provider Identifier Standard, Transactions and Code Sets Standard, HIPAA Privacy Rule, HIPAA Security Rule and HIPAA Enforcement Rule are the requirements for HIPAA compliance. ● The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes the first national standards in the United States to protect patients' personal or protected health information (PHI). ● The Security Standards for the Protection of Electronic Protected Health Information, commonly known as the HIPAA Security Rule, establishes national standards for securing patient data that is stored or transferred electronically. ● Nurse gives discharge papers to the wrong individual,Billing statements containing PHI mailed or faxed to the wrong individual/entity etc are examples of breach in HIPAA. © KloudLearn www.kloudlearn.com 14
  • 16. Health Insurance Portability and Accountability Act Health Insurance Portability and Accuracy Act Health Insurance Policy and Accuracy Act None of the above © KloudLearn www.kloudlearn.com Which of the following is the abbreviation of HIPAA? 16
  • 17. True False © KloudLearn www.kloudlearn.com State true or false. HIPAA Health Insurance Reform protects health insurance coverage for individuals who lose or change jobs. 17
  • 18. 5 7 10 None of the above © KloudLearn www.kloudlearn.com The National Provider Identifier number must have a unique ___ digits. 18
  • 19. Health Plan Healthcare clearinghouse Healthcare provider All of the above © KloudLearn www.kloudlearn.com Which of the following are the entities covered by HIPAA? 19
  • 20. Laptop containing PHI is stolen Receptionist who is not authorized to access PHI looks through patient files in order to learn of a person’s treatment Nurse gives discharge papers to the right individual Billing statements containing PHI mailed or faxed to the wrong individual/entity © KloudLearn www.kloudlearn.com Which of the following is not an example of breach in HIPAA? 20
  • 21. a patient's name, address, birth date, Social Security number, biometric identifiers or other personally identifiable information (PII); an individual's past, present or future physical or mental health condition; any care provided to an individual; employment records, including information about education; © KloudLearn www.kloudlearn.com Which of the following information is not included in PHI? 21
  • 22. HIPAA Privacy Rule HIPAA Security Rule None of the above © KloudLearn www.kloudlearn.com The Security Standards for the Protection of Electronic Protected Health Information is commonly known as _____. 22
  • 23. Reviewing HIPAA guidelines Reviewing HIPAA updates Addressing security gaps Personal information of patients © KloudLearn www.kloudlearn.com HIPAA Compliance checklist does not include? 23
  • 24. True False © KloudLearn www.kloudlearn.com The federal law of HIPAA was signed by President Bill Clinton. 24
  • 25. Electronically Performed Health Information Electronic Protected Health Information Easily Protected Health Information None Of The Above © KloudLearn www.kloudlearn.com ePHI stands for _____. 25
  • 26. Thank You © KloudLearn www.kloudlearn.com 26 KloudLearn, Inc. is headquartered in Silicon Valley, California. Our mission is to help enterprises provide an engaging and impactful learning experience that improves business performance. We provide the industry’s most modern LMS (Learning Management System). For more information visit us at www.kloudlearn.com or reach out to us at info@kloudlearn.com