HIPAA Compliance Training

Enroll into this course

About this course

In conjunction with Improvement Sciences, EdApp has deployed a readily-available HIPAA (Health Insurance Portability and Accountability Act) training course in our editable content library! If you're looking for a fun and engaging way to learn some of the most important and essential healthcare information, look no further than our HIPAA Compliance Training course. We understand that professionals are becoming increasingly busy which is why we provide the option for professioanls to learn in their own time.


The skills covered in the course provide applicable skills to learners, meaning that they can instantly perform what they have learnt via the course in their job! The HIPAA training content teaches the most paramount skills for clear communication on regulations, enabling access to skills such as best practices in HIPAA compliance scenarios, threats and remedies, and privacy, breach and security rules.

What you'll learn with "HIPAA Compliance Training" course

  • Protected Information
  • Privacy, Breach and Security Rules
  • Threats and Remedies
  • Best Practices
  • HIPAA Compliance Scenarios
  • Knowledge Check
  • Glossary of HIPAA Terms
  • Useful Resources
  • Certificate of Completion

"HIPAA Compliance Training" Content

  • How to use this course

    Lesson Excerpts

    • HIPAA is huge, with hundreds of pages in the regulations. There's really no "one size fits all" - The best HIPAA training is tailored to a role. "What It's About" isn't as important as "How Do I Do It". This course includes the "highlights" as we see them. - We have generalized as much as is reasonable - practical HIPAA training is about a mindset, not about the minutiae of the regulations.

    • Features of this Course

    • The newest feature offers a new level of feedback for the user.

      The newest feature offers a new level of feedback for the user.
  • HIPAA Overview

    Lesson Excerpts

    • So what does HIPAA protect? Any data in a patient's medical record that can be used to personally identify them - in HIPAA terms, protected health information (PHI).

      So what does HIPAA protect? Any data in a patient's medical record that can be used to personally identify them - in HIPAA terms, protected health information (PHI).
    • Who must comply with HIPAA?

    • HIPAA provides...

  • What Information is Protected?

    Lesson Excerpts

    • Which of the following are personal health identifiers?

    • When in doubt, treat every piece of patient data as if it is protected information.

    • Every HIPAA violation is treated the same.

  • The Privacy Rule

    Lesson Excerpts

    • Health Plans An entity, including private insurers and payers; and, national and state government payers (Medicare, Medicaid), that provides or pays for medical care.

      Health Plans An entity, including private insurers and payers; and, national and state government payers (Medicare, Medicaid), that provides or pays for medical care.
    • HIPAA establishes only criminal penalties for unauthorized disclosure of personal health information.

    • The Privacy Rule requires patients to receive plain language notice of:

  • The Security Rule

    Lesson Excerpts

    • Security is not a one-time project

      Security is not a one-time project
    • Risk Analysis to discover potential unauthorized access and disclosure of PHI # Security Analysis to identify security measures that can be reasonably implemented to address risks identified in the risk analysis

    • Administrative Safeguards include:

  • The Breach Rule

    Lesson Excerpts

    • Despite safeguards, a breach may occur.

      Despite safeguards, a breach may occur.
    • Under the Breach Rule, patients may be notified of a breach by:

    • Which of the following is an example of a "Social" breach?

  • Threats and Remedies

    Lesson Excerpts

    • Healthcare information (PHI) is particularly ripe for abuse because it contains so many important personal identifiers (e.g., Social Security Numbers, bank account information).

      Healthcare information (PHI) is particularly ripe for abuse because it contains so many important personal identifiers (e.g., Social Security Numbers, bank account information).
    • With internal threats, we have already let the person inside our perimeter.

      With internal threats, we have already let the person inside our perimeter.
    • Which of the following are true of internal threats?

  • Best Practices

    Lesson Excerpts

    • Be neat - do not let records lay about. Have policies and procedures. Meet frequently, even informally, to discuss privacy and security. Reward people who demonstrate good practices. Build a robust “social firewall” - make your people suspicious of any request for PHI. Control personal smartphone and device use - well, we can hope. Banish gossip - make it the office ethic. Create a collaborative atmosphere, a community of practice, in which all employees are encouraged to participate in building robust security practices.

    • In a small practice, one person can fulfill all of the roles required to implement, maintain, and monitor security safeguards.

    • Path to HIPAA Compliance

  • Scenario #1

    Lesson Excerpts

    • Dakota, a practice administrator, receives an email, Subject: Urgent: Payment Delayed from a consultant the practice uses.

      Dakota, a practice administrator, receives an email, Subject: Urgent: Payment Delayed from a consultant the practice uses.
    • What should Dakota have done?

    • Your office receives an unexpected email from a known consultant with a link to provide practice information, bank account information, and access credentials for the practice management system.

  • Scenario #2

    Lesson Excerpts

    • On a Friday, Alex, the Senior Practice Manager for a large multi-specialty group, stopped for coffee while going home.

      On a Friday, Alex, the Senior Practice Manager for a large multi-specialty group, stopped for coffee while going home.
    • When should the Office of Civil Rights be notified following a breach?

    • Which of the following practices can mitigate against losing unencrypted PHI?

  • HIPAA Knowledge Check

    Lesson Excerpts

    • HIPAA Knowledge Check

  • Certificate of Completion

    Lesson Excerpts

    • Congrats on completing the HIPAA compliance training! You may now access your certificate in the briefcase.

      Congrats on completing the HIPAA compliance training! You may now access your certificate in the briefcase.
  • Glossary of HIPAA Terms

    Lesson Excerpts

    • Go to the Briefcase and download a copy of the Glossary of HIPAA Terms pdf. Modify, edit, and reuse as needed.

      Go to the Briefcase and download a copy of the Glossary of HIPAA Terms pdf. Modify, edit, and reuse as needed.
  • Useful Resources

    Lesson Excerpts

    • Useful Resources

  • References

    Lesson Excerpts

    • References

    • Content for this course was based on...

"HIPAA Compliance Training" Author

Improvement Sciences

Improvement Sciences and their talented and experienced multidisciplinary team create courseware for a number of different disciplines. They work with a lot of subject matter experts to develop best in class courses and have built this course to help in the fight against COVID-19.

Selected Review

"We all know that HIPAA Compliance training is SO important to have an insightful understanding of, however the training we are subject to complete can sometimes be really boring. EdApp has completely changed this with its super engaging and fun (yes, fun) approach to providing high-quality training!"

Users also learned

Other Courses By Improvement Sciences

Explore more

EdApp is easy to use and free for you and your team. No credit card required.

or book a demo with us today!