Skip to content
Volunteers for Community Impact Logo Volunteers for Community Impact Logo Volunteers for Community Impact Logo
  • HOME
  • ABOUT
    • Join VCI!
    • Newsletter
  • PROGRAMS
    • Foster Grandparent Program
      • Foster Grandparent Program Volunteer Form
    • OTTER Program
    • Senior Companion Program
  • Support VCI
  • CONTACT
Loading...
  • CYBER-SENIORS

    Bridging the generation gap through technology

    VOLUNTEER
    DONATE NOW
7Privacy and Security RulesScott2021-08-05T14:20:49-04:00

HIPAA Video Contents

  1. What is HIPAA?
  2. The History of HIPAA
  3. Who is required to comply with HIPAA laws?
  4. Important HIPAA Terminology
  5. What is a Covered Entity?
  6. What is Protected Health Information (PHI)?
  7. Privacy and Security Rules
  8. What are Patients’ Rights with PHI?
  9. HIPAA Breaches, Violations, and Penalties
  10. Why Cybercriminals Want PHI
  11. HIPAA & Social Media, Mobile Devices, Email and Faxes
  12. How to be Proactive to be HIPAA Compliant
  13. HIPAA Foundation Conclusion

7. Privacy and Security Rules

The Privacy and Security Rules allows covered health care providers to share PHI electronically for treatment purposes, as long as they apply reasonable safeguards when doing so.

Copyright 2016 -  Volunteers for Community Impact | ALL RIGHTS RESERVED | DESIGNED BY SCOTT CHAUVEAUX
FacebookBlueskyInstagramYouTube
Page load link
Go to Top