Digital Confidentiality According to Professional Ethics and HIPAA: A Heart-Centered Approach Level II

Course Materials

An Exercise Whose Point is Unclear
1. Clients, Professionals, & Behavior in Security
Secure Behaviors
2. Legally and Ethically Secure by the Numbers: The "Before" Part
Decision Psychology in Security and Privacy
How To Comply With the HIPAA Security Rule: A Step-by-Step Guide
Step 1. Security Risk Analysis
Step 1 (cont.) Security Risk Analysis: The Process
Step 2. Risk Management Planning
Step 3. Policies and Procedures Manual
3. Legally and Ethically Secure by the Numbers: The After Part
Breach Notification
Risk Analysis Parties!
Rescuing (or Sacrificing) Your Lost or Stolen Mobile
Security Incidents
Safe Harbor from the HIPAA Breach Notification Rule
How Encryption Makes Safe Harbor: or “Why Encrypting Before is Great For After”
4. Electronic Records, and “the Cloud”
Data Backups: Your Best Friend For “After”
Electronic Health Records
“The Cloud”
The Cloud and Availability & Integrity
Disclosure of Electronic Record-Keeping
Passwords vs. Passphrases, and Password Management Programs
The Cloud, Mobiles, and Breach Assessment
Protecting Your Cloud Services
Cloud Services and the HIPAA Business Associate Rule
Special Aside: Business Associates and Financial Institutions
Epilogue

Almost There…

At the moment, you don’t have access to this page. You might need to log in to your account. Or if you are logged in, you may need to purchase the course in order to access this page.

You are not logged in

Go Log In→

v2.1.09-beta

Scheduled Maintenance

We will be temporarily taking the website offline at 10:00 PM Pacific (1:00 AM Eastern) tonight, July 6, in order to make some improvements. We plan to be back online by midnight Pacific (3:00 AM Eastern). We apologize for any inconvenience this may cause. Dismiss