HIPAA is the federal Health Insurance Portability and Accountability Act of 1996. This Law creates national standards to keep health insurance, protect the confidentiality and security of healthcare information as well as personal health information.
The Goal of the program is to protect confidential information from improve use or disclosure
HIPAA Title I protects health insurance coverage for individuals who lose or change jobs. It also prohibits group health plans from denying coverage to individuals with specific diseases and pre-existing conditions, and from setting lifetime coverage limits.
The HIPAA Privacy Rule regulates the use and disclosure of Protected Health Information (PHI) held by "covered entities" (generally, health care clearinghouses, employer sponsored health plans, health insurers, and medical service providers that engage in certain transactions.)
HIPAA Title II directs the U.S. Department of Health and Human Services to establish national standards for processing electronic healthcare transactions. It also requires healthcare organizations to implement secure electronic access to health data and to remain in compliance with privacy regulations set by HHS.
HIPAA Title III includes tax-related provisions and guidelines for medical care.
HIPAA Title IV further defines health insurance reform, including provisions for individuals with pre-existing conditions and those seeking continued coverage.
HIPAA Title V includes provisions on company-owned life insurance and treatment of those who lose their U.S. citizenship for income tax purposes.
All our consultants are senior professional with tremendous exposure to Information Security and Governance Risk & Compliance. With over a decade of experience in training & consulting, they help bring a lot of practical and industry relevant examples with case studies to the classroom which improves the overall learning experience. Our professional hold industry acclaimed accreditation such as : Phd , M.S , CISSP, CHFI, CISA, CISM, CEH, ISO 27001 LI / LA, CCNP, CWNA , MCSE & ITIL.
infySEC IS Lab is an extreme Online Virtual Remote Lab provided to participants where they can work from any place at any point of time without restriction. ISLab provides login privilege to Certified Ethical Cracker participants where they can work in our Virtual Remote Server and start doing their Labs.
Our ISLab was created in such a concept called “Learn with Fun” where each participant will face gaming-like structured online hacking program called 'Live Hacking Zone' which contains many Levels relevant to the topics covered on the program. Each participant has to cross levels to face CEC exam, Hence CEc will only deliver equipped candidates. Participant have to cross multiple Levels starting with easy to toughest level. Each participant can track other participants activity live which helps each participants to get involved into Live Hacking Zone competition, Prepare to be SHOCKED, ENTERTAINED and EDUCATED all at the same time.
The content of infySEC syllabuses is regularly updated to ensure that it remains relevant and reflects the latest thinking in par with the scenario of current technology . However, as part of the latest review, the documents themselves have been given a fresh design.
Training Period - 2 days (Weekend)
HIPAA Topics:
S.No | TOPICS |
1 |
The Essence of HIPAA |
2 |
HIPAA Terms You Need to Know |
3 |
Patients’ Rights under HIPAA |
4 |
Business Associates |
5 |
HIPAA and Electronic Health Records |
6 |
The HIPAA Officer |
7 |
Purpose of the Privacy Rule |
8 |
HIPAA’s Five Guiding Principles |
9 |
Privacy Rule Compliance Requirements |
10 |
Why HIPAA’s Protections Are Needed |
11 |
HIPAA’s Security Rule |
12 |
Security Rule Compliance |
13 |
How HIPAA Affects You and Your Job |
14 |
Organization Policies and HIPAA |
15 |
Management vs. Employee Responsibilities |
16 |
Digital Media & Social Networking Issue |
17 |
HIPAA Enforcement |
18 |
Required Documentation under HIPAA |
19 |
Penalties for HIPAA Violations |
20 |
How HIPAA Violations are Created |
21 |
Mandatory Breach Response & Notification |
22 |
Managing & Resolving HIPAA Complaints |
23 |
Disclosure Do’s and Don’ts |
24 |
Emergencies and HIPAA |
25 |
HIPAA’s Mitigation Requirement |
26 |
HIPAA Audits and Investigations |
27 |
HIPAA Success Factors |