Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
10Activity
0 of .
Results for:
No results containing your search query
P. 1
An Introduction to HIPAA

An Introduction to HIPAA

Ratings: (0)|Views: 121|Likes:
Published by Jason Gaya
empower eLearning HIPAA Compliance training is develop to helping organizations meet the Administrative Simplification Act http://www.empowerbpo.com
empower eLearning HIPAA Compliance training is develop to helping organizations meet the Administrative Simplification Act http://www.empowerbpo.com

More info:

Published by: Jason Gaya on Jun 09, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

10/29/2010

pdf

text

original

 
 Author: Jason GayaPage 16/9/2010
emPower e-Learning Solutions
 At emPower e-Learning solutions we make learning a pleasure. To help individuals andorganizations learn in the most efficient and effective way by using the latest e-LearningStrategies and state-of-the-art Media, Internet and Information Technologies.
 About the Company 
emPower e-learning solutions is one of the leading provider of online health compliancecourses in the market. Keeping in mind the needs of the companies to train theiremployees as per prevalent industry standards, emPower provides variety of e-courses,including those mandated by Government and regulatory bodies such as HIPAA, OSHA,Joint Commission and Red Flag rule. The company has its own Learning ManagementSystem which efficiently hosts customized e-learning courses. The real time compliancetracking feature of our LMS, endorses the policy to provide our invaluable customers world class e-learning environment. Our courses are SCORM compliant so that studentsand employees can easily access and run our courses on other Learning ManagementSystem, without any hiccup.emPower’s goal is to provide customized e-learning solutions, so that employees canhone their workplace skills. This creates a safer, better and more productive atmosphereat the facility. As a result the overall productivity increases and propels the company ahead of its competitors
. 
emPower is a leading provider of comprehensive regulatory compliance solutionsthrough Learning management system. Our mission is to provide innovative solutions toenable compliance with applicable laws and regulations and maximize businessperformance. We provide range of courses to manage compliance required by regulatory  bodies such as OSHA, HIPAA, JCAHO, etc. Apart from this empower also offers customdemos and tutorials for your website, business process management and softwareimplementation. As a part of our policy of spreading awareness on various healthcare regulations, we arepresenting below a selection of articles, which will provide you useful information onhow the computer network, social media and communication technology can be madeHIPAA compliant.
Media Contact (
emPower 
)
 
 Jason Gaya
pr@empowerbpo.com
emPower 
12806 Townepark WayLouisville, KY 40243-2311Ph: 812 -332-5590http://www.empowerbpo.com Copyright © 2010.
emPower 
.
emPower 
is a registered trademark. All Rights Reserved.
 
 Author: Jason GayaPage 26/9/2010
INTRODUCTION TO HIPAA .....................................................................................................................3UNDERSTANDING HIPAA .........................................................................................................................5HIPAA- ENFORCING STRICTER REGULATION TO ENSURE GREATER PROTECTION FOR PATIENT HEALTH INFORMATION. ......................................................................................................6HIPAA SECURITY STANDARD: SELECTING THE RIGHT E-MAIL SERVICE. ..........................8HIPAA COMPLIANCE: USING ENCRYPTION FOR SAFE AND SECURE MANAGEMENT OFPATIENT HEALTH INFORMATION. ....................................................................................................10HIPAA SECURITY COMPLIANCE: PROTECTS CONFIDENTIAL PATIENT HEALTHINFORMATION ..........................................................................................................................................11ENHANCING COMPUTER NETWORK SECURITY TO ACHIEVE HIPAA COMPLIANCE .....14HIPAA LAW: ENSURING SECURE TRANSMISSION OF PATIENT HEALTH INFORMATIONTHROUGH FAX .........................................................................................................................................16BALANCING SOCIAL MEDIA WITH HIPAA ......................................................................................18TWITTER - TWEETING THE HIPAA WAY .........................................................................................20HIPAA COMPLIANCE IN FTP HOSTING .............................................................................................22HIPAA COMPLIANCE IN WIRELESS LOCAL AREA NETWORK ................................................23HIPAA COMPLIANCE - SIGNING A BUSINESS CONTRACT WITH VENDOR TO ENSURESAFE DISPOSAL OF MEDICAL RECORDS .........................................................................................25HIPAA COMPLIANCE: ENSURING SAFE DISPOSAL OF PATIENT HEALTH INFORMATIONDOCUMENTS .............................................................................................................................................26HIPAA COMPLIANCE: SELECTING THE RIGHT SOFTWARE ....................................................27TELEMEDICINE: EMPLOYING SECURITY FEATURES TO ACHIEVE HIPAA COMPLIANCE........................................................................................................................................................................29HIPAA 5010- GRADUATING FROM HIPAA 4010 TO PROVIDE BETTER HEALTHINSURANCE SERVICE .............................................................................................................................30HIPAA LAW-SELECTING THE RIGHT USER AUTHENTICATION SYSTEM ............................32
 
 Author: Jason GayaPage 36/9/2010
Introduction to HIPAA 
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and itsregulations was enacted by congress on August 21,1996 to protect the privacy and security of patient’s personal health information. Theregulation obligates healthcare providers toestablish national standards for electronichealthcare transactions and national identifiers forproviders, health plans, and employers. Thepurpose of this security rule is to improve theportability of continuity of health insurance in thegroup and individual markets, combat fraud, waste and abuse in health insurance and healthcare delivery. Privacy and security procedures inthe administrative simplification section designedto streamline the administration of health insurance by recognizing theefficiencies and cost savings technology. Healthcare entity if fails to comply withthese regulations may have to pay million of dollars. Anyone dealing withsensitive data must follow most strict security policy available.
HIPAA consists of:
Healthcare access, portability and renewability 
Preventing health-care fraud and abuse
Tax related health plan provisions
 Application and enforcement of group health planned requirements
Revenue offsets.
 Who is covered by HIPAA?
The Privacy rule applies only to covered entities
.Covered entities include:
Health care clearing houses, public or private entity that facilitates theprocessing of nonstandard, health information data elements into standarddata elements.
Health care providers-a provider of medical or other health services and any other person furnishing healthcare services or supplies.
Health plans-an individual or group plan that provides or pays the cost of medical care, with the exception of liability and worker‘s compensation plans.HIPAA has achieved great success in securing and protecting sensitive healthcareinformation. HIPAA has made considerable contributions resulted into increasein the utilization of electronic medical record systems, to implement secure,

Activity (10)

You've already reviewed this. Edit your review.
1 hundred reads
drRT83 liked this
jaison)) liked this
Matthew Jeandron liked this
prateek liked this
sheila_tamms liked this
srinithegooner liked this
kahuna_ronbo liked this
sri liked this
ssbansod liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->