SlideShare a Scribd company logo
1 of 2
Download to read offline
HIPAA Privacy & Security Training for
Business Associates
The HIPAA Group, Inc. hereby presents
Nishant Kumar
of
hCentive, Inc.
With this Certificate, in recognition of successful completion of this program
Awarded this date: November 08, 2013
Ten Points of HIPAA Privacy
1. Protect PHI at all times. Never access records of
family, friends, or others unless authorized.
2. Access, use, or provide only the minimum
necessary PHI needed for a task or request.
3. Cover, turn over, or lock up PHI that is not in use.
4. Report accidental disclosures of PHI to your
HIPAA Officer or Supervisor.
5. Don’t discuss PHI or patients outside of work
under any circumstances.
6. In emergencies, put patient care ahead of all else
– even HIPAA.
7. Dispose of PHI according to current Policies and
Procedures. Never dump un-shredded PHI.
8. When discussing PHI around others, lower your
voice or move to a more private area if possible.
9. Protect PHI on computers, cell phones, fax
machines, PDA’s, and other electronic devices.
10. If you have a privacy or security question, ask
your HIPAA Officer or Supervisor.
www.HIPAAstore.com Phone 888-494-6987
® Copyright HIPAA Group, Inc.
Ten Secrets of HIPAA Security
1. Protect ePHI at all times. Never access records of
family, friends, or others unless authorized.
2. Beware of hackers and scammers impersonating
staff. Verify identities before giving access.
3. Use strong pass-phrases and timer-based screen
savers on all computers and workstations.
4. Never leave files and documents containing ePHI
open and unattended if you walk away from them.
5. Always scan for viruses, spyware, and other
threats before installing new data or programs.
6. Use encryption for emailing ePHI or don’t email it.
7. Always file, lock, shred, or properly dispose of
ePHI. Never dispose of “readable” ePHI.
8. Protect ePHI on computers, cell phones, PDA's,
fax machines, portable storage media, etc.
9. Immediately report security violations to your
HIPAA Officer or Supervisor.
10. If you have a privacy or security question, ask
your Supervisor or HIPAA Officer.
www.HIPAAstore.com Phone 888-494-6987
® Copyright HIPAA Group, Inc.
Below are your free HIPAA Awareness Cards!
Print these cards and keep them handy
as a daily reminder to keep PHI safe and secure.
► To print only your Certificate, check your printer settings and print “page 1” only. ◄

More Related Content

What's hot

St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric VanderburgSt. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric VanderburgEric Vanderburg
 
Worlds 1st DIY for Emergency & Wandering Help
Worlds 1st DIY for Emergency & Wandering HelpWorlds 1st DIY for Emergency & Wandering Help
Worlds 1st DIY for Emergency & Wandering HelpNeha Anand
 
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...Eric Vanderburg
 
Untangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security AwarenessUntangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security AwarenessEric Vanderburg
 
Wireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPSWireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPSMd Sohail Ahmad
 
Secure communications reality 2014-05-21
Secure communications reality  2014-05-21Secure communications reality  2014-05-21
Secure communications reality 2014-05-21mobilemark7
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must FollowQuick Heal Technologies Ltd.
 
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Eric Vanderburg
 
The Essential Guide To Online Privacy
The Essential Guide To Online PrivacyThe Essential Guide To Online Privacy
The Essential Guide To Online PrivacyNic Hall
 
Secure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your PoliciesSecure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your PoliciesqliqSoft
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeBrijesh Joshi
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 

What's hot (19)

St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric VanderburgSt. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
St. Mark Lutheran Cyber safety seminar - JurInnov - Eric Vanderburg
 
Worlds 1st DIY for Emergency & Wandering Help
Worlds 1st DIY for Emergency & Wandering HelpWorlds 1st DIY for Emergency & Wandering Help
Worlds 1st DIY for Emergency & Wandering Help
 
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
 
Untangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security AwarenessUntangled Conference - November 8, 2014 - Security Awareness
Untangled Conference - November 8, 2014 - Security Awareness
 
Wireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPSWireless Intrusion Prevention Systems or WIPS
Wireless Intrusion Prevention Systems or WIPS
 
Secure communications reality 2014-05-21
Secure communications reality  2014-05-21Secure communications reality  2014-05-21
Secure communications reality 2014-05-21
 
10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow10 Cyber Safety Tips Every Internet User Must Follow
10 Cyber Safety Tips Every Internet User Must Follow
 
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
How much should you reveal on social media
How much should you reveal on social mediaHow much should you reveal on social media
How much should you reveal on social media
 
Pcs academy october_2020_security
Pcs academy october_2020_securityPcs academy october_2020_security
Pcs academy october_2020_security
 
The Essential Guide To Online Privacy
The Essential Guide To Online PrivacyThe Essential Guide To Online Privacy
The Essential Guide To Online Privacy
 
Secure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your PoliciesSecure Texting Best Practices: Communicate Your Policies
Secure Texting Best Practices: Communicate Your Policies
 
Netiquette
NetiquetteNetiquette
Netiquette
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
Lock computer ppt
Lock computer pptLock computer ppt
Lock computer ppt
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 

Similar to HIPAA Privacy & Security Training

MSH-REB-Privacy-and-Security-Fundamentals-for-Researchers.ppt
MSH-REB-Privacy-and-Security-Fundamentals-for-Researchers.pptMSH-REB-Privacy-and-Security-Fundamentals-for-Researchers.ppt
MSH-REB-Privacy-and-Security-Fundamentals-for-Researchers.pptPedroPiminchumo
 
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!3Lions Publishing, Inc.
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...Endeavor Management
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2jodimw
 
Confidentiality
ConfidentialityConfidentiality
Confidentialityslinkous
 
PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15Priya Harracksingh
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcaresrwindon
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationfalane
 
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.comHcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.comejazmazhar
 
Hipaa education
Hipaa educationHipaa education
Hipaa educationeklundc
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 Jason Karn
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?Lepide USA Inc
 

Similar to HIPAA Privacy & Security Training (20)

16 info securitytoolbox1g (1)
16 info securitytoolbox1g (1)16 info securitytoolbox1g (1)
16 info securitytoolbox1g (1)
 
MSH-REB-Privacy-and-Security-Fundamentals-for-Researchers.ppt
MSH-REB-Privacy-and-Security-Fundamentals-for-Researchers.pptMSH-REB-Privacy-and-Security-Fundamentals-for-Researchers.ppt
MSH-REB-Privacy-and-Security-Fundamentals-for-Researchers.ppt
 
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!20190523 Breach Notification Wizard: Lessons in Knowledge Management!
20190523 Breach Notification Wizard: Lessons in Knowledge Management!
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...The Basics of Protecting PHI - Best Practices When Working with Business Asso...
The Basics of Protecting PHI - Best Practices When Working with Business Asso...
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
 
Hippa powerpoint 92613
Hippa powerpoint 92613Hippa powerpoint 92613
Hippa powerpoint 92613
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15PriyaHarrackisngh_Portfolio_11_15
PriyaHarrackisngh_Portfolio_11_15
 
Confidentiality in Healthcare
Confidentiality in HealthcareConfidentiality in Healthcare
Confidentiality in Healthcare
 
Mha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentationMha 690 week 1 discussion presentation
Mha 690 week 1 discussion presentation
 
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.comHcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
 
Hipaa education
Hipaa educationHipaa education
Hipaa education
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
 
How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?How to avoid being caught out by HIPAA compliance?
How to avoid being caught out by HIPAA compliance?
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 

HIPAA Privacy & Security Training

  • 1. HIPAA Privacy & Security Training for Business Associates The HIPAA Group, Inc. hereby presents Nishant Kumar of hCentive, Inc. With this Certificate, in recognition of successful completion of this program Awarded this date: November 08, 2013
  • 2. Ten Points of HIPAA Privacy 1. Protect PHI at all times. Never access records of family, friends, or others unless authorized. 2. Access, use, or provide only the minimum necessary PHI needed for a task or request. 3. Cover, turn over, or lock up PHI that is not in use. 4. Report accidental disclosures of PHI to your HIPAA Officer or Supervisor. 5. Don’t discuss PHI or patients outside of work under any circumstances. 6. In emergencies, put patient care ahead of all else – even HIPAA. 7. Dispose of PHI according to current Policies and Procedures. Never dump un-shredded PHI. 8. When discussing PHI around others, lower your voice or move to a more private area if possible. 9. Protect PHI on computers, cell phones, fax machines, PDA’s, and other electronic devices. 10. If you have a privacy or security question, ask your HIPAA Officer or Supervisor. www.HIPAAstore.com Phone 888-494-6987 ® Copyright HIPAA Group, Inc. Ten Secrets of HIPAA Security 1. Protect ePHI at all times. Never access records of family, friends, or others unless authorized. 2. Beware of hackers and scammers impersonating staff. Verify identities before giving access. 3. Use strong pass-phrases and timer-based screen savers on all computers and workstations. 4. Never leave files and documents containing ePHI open and unattended if you walk away from them. 5. Always scan for viruses, spyware, and other threats before installing new data or programs. 6. Use encryption for emailing ePHI or don’t email it. 7. Always file, lock, shred, or properly dispose of ePHI. Never dispose of “readable” ePHI. 8. Protect ePHI on computers, cell phones, PDA's, fax machines, portable storage media, etc. 9. Immediately report security violations to your HIPAA Officer or Supervisor. 10. If you have a privacy or security question, ask your Supervisor or HIPAA Officer. www.HIPAAstore.com Phone 888-494-6987 ® Copyright HIPAA Group, Inc. Below are your free HIPAA Awareness Cards! Print these cards and keep them handy as a daily reminder to keep PHI safe and secure. ► To print only your Certificate, check your printer settings and print “page 1” only. ◄