Compliance and Safety

HIPAA Training Powerpoint » HIPAA Training Powerpoint
Related Training DVDs
by Envision Inc
by Coastal Training / DuPont
by Coastal Training / DuPont
by Coastal Training / DuPont
by Coastal Training / DuPont
HIPAA training

HIPAA Training DVD Preview

You need to install or upgrade Flash Player to view this content, install or upgrade by clicking here.
HIPAA Safety Training Video
HIPAA Training Powerpoint Created by: Florida Department of Health 

Topics Covered:

  • Definition of HIPAA
  • HIPAA Policies and Procedures
  • Exemptions to the Rule
  • Protected Health Information (PHI)
  • Examples of PHI
  • Practical Application of HIPAA
  • Patient Complaint Procedure
  • When Someone Accidentally Violates HIPAA
  • When Someone Intentionally Violates HIPAA
Date Created: 2004 Number of Slides: 50 Osha Regulation: n/a Created by: Florida Department of Health
HIPAA Safety Training Video

Privacy & Security: The New HIPAA Rule Training DVD

  • Training DVD
  • Bonus Resource CD
HIPAA Safety Training Video

Other HIPAA Training Presentations

Date Created: 2003 Number of Slides: 36 Osha Regulation: n/a Created by: Winston-Salem Police Department
Date Created: 2004 Number of Slides: 38 Osha Regulation: n/a Created by: Oxford University Press
Date Created: 2012 Number of Slides: 53 Osha Regulation: n/a Created by: Southwest Baptist University

HIPAA for the Army PPT

from Kenner Army Health Clinic was provided to inform individuals of the Health Insurance Portability and Accountability Act applicable for the US Army. The US Army follows rules on release of soldier’s protected health information to their superior or commander. Upon following the HIPAA, a military exception is possible. Protected Health Information may be disclosed to a Soldier’s Commander to guarantee the success or proper execution of the military mission. This presentation will discuss the capability or fitness of an army to perform any given task provided the HIPAA.

HIPAA Exceptions PPT

Oklahoma State Firefighters Association has provided to inform of the Exceptions to the Privacy Rule on slides #5 to #15. Although the HIPAA must be observed at all times, there are also scenarios wherein PHI can and should be given out. However, strict rules may apply to maintain the discretion of such exceptions. Scenarios are provided to examine understanding of the policies incorporated with HIPAA and PHI.

HIPAA Timeline PPT

on HIPAA Timeline is provided by the University of Pennsylvania on slides #88 to #90. This timeline provides information in the progress of the HIPAA from the time it was signed into a law until privacy regulations are made, implemented and observed by Covered Entities. A covered entity can be one of the following: a Health Care Provider, a Health Plan or a Health Care Clearinghouse. Other topics included are: Privacy, Security and Confidentiality, Users of Health Information, Biometrics, HIPAA, Concerns in Loss of Privacy, Research under HIPAA.

HIPAA Protected Health Information PPT

is provided by the El Paso Community College to provide information on HIPAA and Protected Health Information (PHI). PHI is given importance to maintain the privacy of an individual by means of protecting his information. This policy is also applied on disclosing health conditions and medical history. Other topics included are: PHI Definition, PHI Identifiers, Rules for Use and Disclosure of PHI, Authorization Guidelines, Notice of Privacy Practices, Faxing Guidelines, The Joint Commission Standards, Patient Privacy Rights.

HIPAA: In Technology Age PPT

TriCare Management Activity provided on the State of Privacy in the Technology Age. This illustrates measures to protect information, guarantee privacy of information, and face challenges in time of technology evolution. Used as an example is the Military Health System. A study of advantages and disadvantages are provided for privacy protection during an emerging technology. Topics included are: Military Health System Environment, Challenges with Current Technology, Safeguards to Protect Privacy, and Data Breaches.