Skip to content
Volunteers for Community Impact Logo Volunteers for Community Impact Logo Volunteers for Community Impact Logo
  • HOME
  • ABOUT
    • Join VCI!
    • Newsletter
  • PROGRAMS
    • Foster Grandparent Program
      • Foster Grandparent Program Volunteer Form
    • OTTER Program
    • Senior Companion Program
  • Support VCI
  • CONTACT
Loading...
  • CYBER-SENIORS

    Bridging the generation gap through technology

    VOLUNTEER
    DONATE NOW
10Why Cybercriminals Want PHIScott2021-08-05T14:23:04-04:00

HIPAA Video Contents

  1. What is HIPAA?
  2. The History of HIPAA
  3. Who is required to comply with HIPAA laws?
  4. Important HIPAA Terminology
  5. What is a Covered Entity?
  6. What is Protected Health Information (PHI)?
  7. Privacy and Security Rules
  8. What are Patients’ Rights with PHI?
  9. HIPAA Breaches, Violations, and Penalties
  10. Why Cybercriminals Want PHI
  11. HIPAA & Social Media, Mobile Devices, Email and Faxes
  12. How to be Proactive to be HIPAA Compliant
  13. HIPAA Foundation Conclusion

10. Why Cybercriminals Want PHI

The value of personal data to a cybercriminal is much higher than the credit card or bank account number.

Copyright 2016 -  Volunteers for Community Impact | ALL RIGHTS RESERVED | DESIGNED BY SCOTT CHAUVEAUX
FacebookBlueskyInstagramYouTube
Page load link
Go to Top