Filter Keyword to...

Category: Managers

Results Per Page :
Today, federal regulations make compliance programs for plans administering Medicare Parts C and D plans mandatory. To assist covered entities, this course provides the basics of an effective compliance...
[READ MORE]
Today, federal regulations make compliance programs for plans administering Medicare Parts C and D plans mandatory. To assist covered entities, this course provides the basics of an effective compliance program with references to available guidances and tools.
Today, federal regulations make compliance programs for plans administering Medicare Parts C and D plans mandatory. To assist covered entities, this course provides the basics of an effective compliance program with references to available guidances and tools.
[READ LESS]
Produced by: HCCS - Retail Only
This course provides a basic overview of the three key laws the government relies upon in the fight against fraud, waste and abuse in healthcare - The False Claims Act, the Anti-Kickback Statute and the Stark...
[READ MORE]
This course provides a basic overview of the three key laws the government relies upon in the fight against fraud, waste and abuse in healthcare - The False Claims Act, the Anti-Kickback Statute and the Stark Law. It also briefly discusses the Healthcare Fraud Statute.
This course provides a basic overview of the three key laws the government relies upon in the fight against fraud, waste and abuse in healthcare - The False Claims Act, the Anti-Kickback Statute and the Stark Law. It also briefly discusses the Healthcare Fraud Statute.
[READ LESS]
Produced by: HCCS - Retail Only
Healthcare fraud is a serious national problem that increases the cost of doing business and results in higher costs and reduced benefits for beneficiaries. A recent report noted that Medicare Advantage (MA)...
[READ MORE]
Healthcare fraud is a serious national problem that increases the cost of doing business and results in higher costs and reduced benefits for beneficiaries. A recent report noted that Medicare Advantage (MA) plans cost taxpayers a whopping $150 billion per year. Equipping staff with basic knowledge of what constitutes fraudulent activity and how to appropriately report it goes a long way in reducing health plan liability.
Healthcare fraud is a serious national problem that increases the cost of doing business and results in higher costs and reduced benefits for beneficiaries. A recent report noted that Medicare Advantage (MA) plans cost taxpayers a whopping $150 billion per year. Equipping staff with basic knowledge of what constitutes fraudulent activity and how to appropriately report it goes a long way in reducing health plan liability.
[READ LESS]
Produced by: HCCS - Retail Only
This course will increase your HIPAA awareness by helping you understand your duty to follow your organizations policies and procedures in regard to the protection of health information; define protected...
[READ MORE]
This course will increase your HIPAA awareness by helping you understand your duty to follow your organizations policies and procedures in regard to the protection of health information; define protected health information; ways to protect a patient not included in the facility director, describe the meaning of minimum necessary and for reporting privacy violations.
This course will increase your HIPAA awareness by helping you understand your duty to follow your organizations policies and procedures in regard to the protection of health information; define protected health information; ways to protect a patient not included in the facility director, describe the meaning of minimum necessary and for reporting privacy violations.
[READ LESS]
Produced by: HCCS - Retail Only
The Privacy Rule provides for certain requirements used in the protection of patient information. In this course, you will review some of those requirements as well as be able to define covered entity,...
[READ MORE]
The Privacy Rule provides for certain requirements used in the protection of patient information. In this course, you will review some of those requirements as well as be able to define covered entity, define mitigation, define workforce, describe the term minimum necessary requirement and name physical safeguards.
The Privacy Rule provides for certain requirements used in the protection of patient information. In this course, you will review some of those requirements as well as be able to define covered entity, define mitigation, define workforce, describe the term minimum necessary requirement and name physical safeguards.
[READ LESS]
Produced by: HCCS - Retail Only
Protecting individuals' health information is a primary goal of the HIPAA Law. This course will help you describe what information is considered Protected Health Information; understand when an authorization...
[READ MORE]
Protecting individuals' health information is a primary goal of the HIPAA Law. This course will help you describe what information is considered Protected Health Information; understand when an authorization is required to use or disclose PHI; de-identify PHI; define the term marketing as it is used in the Privacy Rule; and list information that is and is not allowed on a sign-in sheet.
Protecting individuals' health information is a primary goal of the HIPAA Law. This course will help you describe what information is considered Protected Health Information; understand when an authorization is required to use or disclose PHI; de-identify PHI; define the term marketing as it is used in the Privacy Rule; and list information that is and is not allowed on a sign-in sheet.
[READ LESS]
Produced by: HCCS - Retail Only
HIPAA provides for certain patient rights. This course will help you to identify the following rights: to receive a Notice of Privacy Practices; to review and request protected health information (PHI); to...
[READ MORE]
HIPAA provides for certain patient rights. This course will help you to identify the following rights: to receive a Notice of Privacy Practices; to review and request protected health information (PHI); to request an accounting of PHI disclosures; to request an amendment of PHI; to request a restriction of PHI and to request confidential communications.
HIPAA provides for certain patient rights. This course will help you to identify the following rights: to receive a Notice of Privacy Practices; to review and request protected health information (PHI); to request an accounting of PHI disclosures; to request an amendment of PHI; to request a restriction of PHI and to request confidential communications.
[READ LESS]
Produced by: HCCS - Retail Only
Business Associates play a key role in many aspects of healthcare and have important responsibilities under HIPAA. This course will help you: define the term Business Associate; list types of Business...
[READ MORE]
Business Associates play a key role in many aspects of healthcare and have important responsibilities under HIPAA. This course will help you: define the term Business Associate; list types of Business Associates; describe the HIPAA requirement for which a Business Associate is accountable; Identify language that should be included in a Business Associate Agreement; list steps a covered entity may take if a Business Associate is in violation of its contract.
Business Associates play a key role in many aspects of healthcare and have important responsibilities under HIPAA. This course will help you: define the term Business Associate; list types of Business Associates; describe the HIPAA requirement for which a Business Associate is accountable; Identify language that should be included in a Business Associate Agreement; list steps a covered entity may take if a Business Associate is in violation of its contract.
[READ LESS]
Produced by: HCCS - Retail Only
There are specific requirements for Law Enforcement Uses and Disclosures of Protected Health Information (PHI). This course will help you: provide an example of where protected health information (PHI) may...
[READ MORE]
There are specific requirements for Law Enforcement Uses and Disclosures of Protected Health Information (PHI). This course will help you: provide an example of where protected health information (PHI) may be used or disclosed; explain a circumstance in which PHI may be used or disclosed for health or safety; describe and appropriate response to a legal request for patient records.
There are specific requirements for Law Enforcement Uses and Disclosures of Protected Health Information (PHI). This course will help you: provide an example of where protected health information (PHI) may be used or disclosed; explain a circumstance in which PHI may be used or disclosed for health or safety; describe and appropriate response to a legal request for patient records.
[READ LESS]
Produced by: HCCS - Retail Only
The purpose of the Security Rule is to ensure the confidentiality, integrity and availability of all electronic protected health information (ePHI). This course will enable you to describe those purposes;...
[READ MORE]
The purpose of the Security Rule is to ensure the confidentiality, integrity and availability of all electronic protected health information (ePHI). This course will enable you to describe those purposes; define ePHI; provide a reason for the value of healthcare information; and to provide indicators of a phishing attempt.
The purpose of the Security Rule is to ensure the confidentiality, integrity and availability of all electronic protected health information (ePHI). This course will enable you to describe those purposes; define ePHI; provide a reason for the value of healthcare information; and to provide indicators of a phishing attempt.
[READ LESS]
Produced by: HCCS - Retail Only
The Security Rule operationalizes the protections contained in the Privacy Rule through Administrative, Physical and Technical Safeguards. This course will enable you to name examples of safeguards; to avoid...
[READ MORE]
The Security Rule operationalizes the protections contained in the Privacy Rule through Administrative, Physical and Technical Safeguards. This course will enable you to name examples of safeguards; to avoid risks associated with social media; to state elements of a strong password; and to define both encryption and decryption.
The Security Rule operationalizes the protections contained in the Privacy Rule through Administrative, Physical and Technical Safeguards. This course will enable you to name examples of safeguards; to avoid risks associated with social media; to state elements of a strong password; and to define both encryption and decryption.
[READ LESS]
Produced by: HCCS - Retail Only
The improvement of the efficiency and effectiveness of the healthcare system using an electronic exchange of healthcare data is a provision in HIPAA. The Electronic Transactions Rule implemented some of the...
[READ MORE]
The improvement of the efficiency and effectiveness of the healthcare system using an electronic exchange of healthcare data is a provision in HIPAA. The Electronic Transactions Rule implemented some of the HIPAA Administrative Simplification requirements by adopting standards for electronic transactions. This course will help you: explain HIPAA's additional provisions related to electronic transactions ; describe the operating rules required by the Patient Protection and Affordable Care Act (ACA); recognize the current code sets; and describe the unique identifiers that must be used in HIPAA transactions.
The improvement of the efficiency and effectiveness of the healthcare system using an electronic exchange of healthcare data is a provision in HIPAA. The Electronic Transactions Rule implemented some of the HIPAA Administrative Simplification requirements by adopting standards for electronic transactions. This course will help you: explain HIPAA's additional provisions related to electronic transactions ; describe the operating rules required by the Patient Protection and Affordable Care Act (ACA); recognize the current code sets; and describe the unique identifiers that must be used in HIPAA transactions.
[READ LESS]
Produced by: HCCS - Retail Only
As with any law in our nation, there are consequences for failure to comply with the Privacy and Security Rules. This course will enable you to determine an information breach, breach exemptions, the three...
[READ MORE]
As with any law in our nation, there are consequences for failure to comply with the Privacy and Security Rules. This course will enable you to determine an information breach, breach exemptions, the three types of inappropriate disclosures, how to avoid incidental disclosures and describe the consequences of violations.
As with any law in our nation, there are consequences for failure to comply with the Privacy and Security Rules. This course will enable you to determine an information breach, breach exemptions, the three types of inappropriate disclosures, how to avoid incidental disclosures and describe the consequences of violations.
[READ LESS]
Produced by: HCCS - Retail Only
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. Upon completion of this course, learners will be able to describe the primary objective...
[READ MORE]
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. Upon completion of this course, learners will be able to describe the primary objective of the Privacy Rule, list those for whom access, use and disclosure is allowed without an authorization, identify at least three elements of a valid authorization, define minimum necessary and describe the purpose of the Notice of Privacy Practices.
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. Upon completion of this course, learners will be able to describe the primary objective of the Privacy Rule, list those for whom access, use and disclosure is allowed without an authorization, identify at least three elements of a valid authorization, define minimum necessary and describe the purpose of the Notice of Privacy Practices.
[READ LESS]
Produced by: HCCS - Retail Only
A Business Associates's understanding of the rights of individuals with regard to their health information is fundamental to HIPAA compliance. This course discusses the various rights of individuals afforded...
[READ MORE]
A Business Associates's understanding of the rights of individuals with regard to their health information is fundamental to HIPAA compliance. This course discusses the various rights of individuals afforded by HIPAA.
A Business Associates's understanding of the rights of individuals with regard to their health information is fundamental to HIPAA compliance. This course discusses the various rights of individuals afforded by HIPAA.
[READ LESS]
Produced by: HCCS - Retail Only
The depth and scope of information maintained and transmitted by covered entities makes them lucrative targets for cyber criminals. The Security Rule is designed to help thwart such threats. This course...
[READ MORE]
The depth and scope of information maintained and transmitted by covered entities makes them lucrative targets for cyber criminals. The Security Rule is designed to help thwart such threats. This course discusses the core components of the Security Rule.
The depth and scope of information maintained and transmitted by covered entities makes them lucrative targets for cyber criminals. The Security Rule is designed to help thwart such threats. This course discusses the core components of the Security Rule.
[READ LESS]
Produced by: HCCS - Retail Only
While the Privacy Rule requires appropriate safeguards to ensure the confidentiality of PHI, the scope of the Security Rule is narrower. That is, it establishes safeguards for ePHI only. This courses...
[READ MORE]
While the Privacy Rule requires appropriate safeguards to ensure the confidentiality of PHI, the scope of the Security Rule is narrower. That is, it establishes safeguards for ePHI only. This courses discusses the three primary categories of safeguards and how to apply them.
While the Privacy Rule requires appropriate safeguards to ensure the confidentiality of PHI, the scope of the Security Rule is narrower. That is, it establishes safeguards for ePHI only. This courses discusses the three primary categories of safeguards and how to apply them.
[READ LESS]
Produced by: HCCS - Retail Only
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. This course explains the primary objective of the Privacy Rule, discusses access, use and...
[READ MORE]
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. This course explains the primary objective of the Privacy Rule, discusses access, use and disclosure, authorizations, the concept of minimum necessary and the Notice of Privacy Practices.
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. This course explains the primary objective of the Privacy Rule, discusses access, use and disclosure, authorizations, the concept of minimum necessary and the Notice of Privacy Practices.
[READ LESS]
Produced by: HCCS - Retail Only
A health plan's understanding of enrollees' rights with regard to their health information is fundamental to HIPAA compliance. This course discusses the right to individuals to see and obtain their health...
[READ MORE]
A health plan's understanding of enrollees' rights with regard to their health information is fundamental to HIPAA compliance. This course discusses the right to individuals to see and obtain their health information, find and correct errors, track disclosures, restrict access and request confidential communications are also a part of the Privacy Rule.
A health plan's understanding of enrollees' rights with regard to their health information is fundamental to HIPAA compliance. This course discusses the right to individuals to see and obtain their health information, find and correct errors, track disclosures, restrict access and request confidential communications are also a part of the Privacy Rule.
[READ LESS]
Produced by: HCCS - Retail Only
The depth and scope of information maintained and transmitted by covered entities makes them lucrative targets for cyber criminals. The Security Rule is designed to help thwart such threats. This course...
[READ MORE]
The depth and scope of information maintained and transmitted by covered entities makes them lucrative targets for cyber criminals. The Security Rule is designed to help thwart such threats. This course discusses the primary focus of the Security Rule, electronic protected health information (ePHI), its basic requirements and enforcement.
The depth and scope of information maintained and transmitted by covered entities makes them lucrative targets for cyber criminals. The Security Rule is designed to help thwart such threats. This course discusses the primary focus of the Security Rule, electronic protected health information (ePHI), its basic requirements and enforcement.
[READ LESS]
Produced by: HCCS - Retail Only
While the Privacy Rule requires appropriate safeguards to ensure the confidentiality of PHI, the scope of the Security Rule is narrower. That is, it establishes safeguards for ePHI only. This coursed...
[READ MORE]
While the Privacy Rule requires appropriate safeguards to ensure the confidentiality of PHI, the scope of the Security Rule is narrower. That is, it establishes safeguards for ePHI only. This coursed discusses Physical, Administrative and Technical safeguards and the difference between required and adressable safeguards.
While the Privacy Rule requires appropriate safeguards to ensure the confidentiality of PHI, the scope of the Security Rule is narrower. That is, it establishes safeguards for ePHI only. This coursed discusses Physical, Administrative and Technical safeguards and the difference between required and adressable safeguards.
[READ LESS]
Produced by: HCCS - Retail Only
The New York State HIV Confidentiality Law - Article 27-F of the Public Health Law - is to protect the confidentiality of HIV-related information for individuals who receive healthcare services in New York. ...
[READ MORE]
The New York State HIV Confidentiality Law - Article 27-F of the Public Health Law - is to protect the confidentiality of HIV-related information for individuals who receive healthcare services in New York. This couse discusses the prupose and requirements of Article 27-F.
The New York State HIV Confidentiality Law - Article 27-F of the Public Health Law - is to protect the confidentiality of HIV-related information for individuals who receive healthcare services in New York. This couse discusses the prupose and requirements of Article 27-F.
[READ LESS]
Produced by: HCCS - Retail Only
Business Associates are individuals or entities that perform cetain functions on behalf of, or provide services to, the health plan that involve protected health information. This course discusses the...
[READ MORE]
Business Associates are individuals or entities that perform cetain functions on behalf of, or provide services to, the health plan that involve protected health information. This course discusses the definition of business associate, with what HIPAA components they must adhere and requirements for Business Associate Agreements.
Business Associates are individuals or entities that perform cetain functions on behalf of, or provide services to, the health plan that involve protected health information. This course discusses the definition of business associate, with what HIPAA components they must adhere and requirements for Business Associate Agreements.
[READ LESS]
Produced by: HCCS - Retail Only
The Breach Notification Rule applies to HIPAA covered entities, including health plans, This course informs learners of what a breach is, and is not, what types of actions result in a breach as well as...
[READ MORE]
The Breach Notification Rule applies to HIPAA covered entities, including health plans, This course informs learners of what a breach is, and is not, what types of actions result in a breach as well as outlines on a high level the notification requirements in the event of a breach.
The Breach Notification Rule applies to HIPAA covered entities, including health plans, This course informs learners of what a breach is, and is not, what types of actions result in a breach as well as outlines on a high level the notification requirements in the event of a breach.
[READ LESS]
Produced by: HCCS - Retail Only
This course explains the Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy and security rules as applicable and relevant to business associates. It also addresses the HIPAA Omnibus...
[READ MORE]
This course explains the Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy and security rules as applicable and relevant to business associates. It also addresses the HIPAA Omnibus Final Rule published in the Federal Register January 25, 2013 that finalized the Health Information Technology for Economic and Clinical Health (HITECH) Act’s modifications to the HIPAA privacy, security, breach notification and enforcement final rules. Access the final rule at http://tinyurl.com/auulp25.
This course explains the Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy and security rules as applicable and relevant to business associates. It also addresses the HIPAA Omnibus Final Rule published in the Federal Register January 25, 2013 that finalized the Health Information Technology for Economic and Clinical Health (HITECH) Act’s modifications to the HIPAA privacy, security, breach notification and enforcement final rules. Access the final rule at http://tinyurl.com/auulp25.
[READ LESS]
Produced by: HCPro