Online CPR + First Aid Training Videos

  • 4.5/5 Stars
4.5 (109,104 ratings)
Taught by Roy Shaw
Video Playtime: 4 hours and 36 minutes
English and Español English and Español
The History of HIPAA
Begin Free Training

Includes

  • 24/7 on-demand video
  • Access on mobile
  • SCORM Ready! Works with your LMS
  • Follows AHA guidelines
  • 6.0 CME/CE credits
  • Certification card available to purchase for $39.95
  • Weekly refresher video
  • Expiration reminder
  • Student manual

Training 5 or more people?

Unlock your complimentary company dashboard so you can easily track your team's compliance.

ProFirstAid At a Glance

  • Learn about HIPAA and what is required to comply with the rule.
  • Understand what is Protected Health Information (PHI) and how to protect it.
  • Become familiar with potential HIPAA breaches and violations and safeguard yourself from penalties.
  • Or take the HIPAA for Leaders course if you need a more detailed understanding of HIPAA compliance.

In this introductory section of your HIPAA course, you'll learn about all of the course objectives you can expect to achieve by the end, as well as specifics like: what HIPAA is, the history of HIPAA, who is required to comply with HIPAA laws, and important HIPAA terminology that should make your journey through this HIPAA course easier and more enjoyable.

In this section of your HIPAA course, we'll dig deeper into all things related to HIPAA privacy and rights and introduce you to PHI (protected health information). You'll find lessons on what a covered entity is, HIPAA privacy and security rules, an explanation of PHI in greater detail and using some examples of it, and what the patient's rights are concerning protected health information or PHI.

In this section of your HIPAA course, we'll be teaching you about HIPAA data breaches, HIPAA violations, HIPAA penalties, and how all businesses can create a roadmap to becoming more HIPAA compliant. Specific lessons you'll find in this section are: HIPAA Breaches, Violations and Penalties, Why Cyber Criminals want PHI, HIPAA & Social Media, Mobile Devices, Email and Faxes, How to be Proactive to be HIPAA Compliant, and HIPAA Foundation Conclusion.