Filter Keyword to...

Category: Managers

Results Per Page :
Lax security practices and poor security awareness on the part of employees can result in security breaches that have serious consequences for organizations. Hackers will take advantage of any vulnerability,...
[READ MORE]
Lax security practices and poor security awareness on the part of employees can result in security breaches that have serious consequences for organizations. Hackers will take advantage of any vulnerability, and their reach is global. This course focuses on common pitfalls in IT security by end users, highlighting how seemingly harmless actions by employees can give opportunistic hackers access to sensitive organizational data and systems. The course also provides employees with common sense guidelines dealing with areas such as mobile security, online security, password security, and malicious e-mails. Please note that the course content is for informational purposes only and does not constitute legal advice. Nothing in the course materials shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any jurisdiction's laws. Transmission of this information is not intended to create, and receipt does not establish, an attorney-client relationship. Users should not act upon this information without seeking professional counsel licensed in their jurisdiction.
Lax security practices and poor security awareness on the part of employees can result in security breaches that have serious consequences for organizations. Hackers will take advantage of any vulnerability, and their reach is global. This course focuses on common pitfalls in IT security by end users, highlighting how seemingly harmless actions by employees can give opportunistic hackers access to sensitive organizational data and systems. The course also provides employees with common sense guidelines dealing with areas such as mobile security, online security, password security, and malicious e-mails. Please note that the course content is for informational purposes only and does not constitute legal advice. Nothing in the course materials shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any jurisdiction's laws. Transmission of this information is not intended to create, and receipt does not establish, an attorney-client relationship. Users should not act upon this information without seeking professional counsel licensed in their jurisdiction.
[READ LESS]
Produced by: SkillSoft
Everyone wants to make a difference, but competing priorities often prevent them from achieving extraordinary results.
Everyone wants to make a difference, but competing priorities often prevent them from achieving extraordinary results.
[READ LESS]
Produced by: Franklin-Covey
It’s one thing to have a great strategy, but it’s another to execute it. Dr. Stephen R. Covey explains why many teams have trouble executing—and how to close the “execution gap.”
It’s one thing to have a great strategy, but it’s another to execute it. Dr. Stephen R. Covey explains why many teams have trouble executing—and how to close the “execution gap.”
[READ LESS]
Produced by: Franklin-Covey
Dr. Stephen R. Covey shows how to help every team member feel accountable for results—and how to grow team members’ capacities in the process.
Dr. Stephen R. Covey shows how to help every team member feel accountable for results—and how to grow team members’ capacities in the process.
[READ LESS]
Produced by: Franklin-Covey
This CE course provides guidelines that are intended to assist behavioral health and corrections and community corrections administrators in their ability to develop effective transition plans and to drive...
[READ MORE]
This CE course provides guidelines that are intended to assist behavioral health and corrections and community corrections administrators in their ability to develop effective transition plans and to drive cross-system reentry approaches between behavioral health and criminal justice agencies. The guidelines examined in this course can be used as a tool within behavioral health agencies on the state and local levels to ensure that community-based approaches respond to the multidimensional needs of clients who are involved in the criminal justice system and the agencies that supervise them. Article Author: Alex M. Blandford MPH CHES Exam writer: Patricia Hocking-Walker M.S. (Psychology)
This CE course provides guidelines that are intended to assist behavioral health and corrections and community corrections administrators in their ability to develop effective transition plans and to drive cross-system reentry approaches between behavioral health and criminal justice agencies. The guidelines examined in this course can be used as a tool within behavioral health agencies on the state and local levels to ensure that community-based approaches respond to the multidimensional needs of clients who are involved in the criminal justice system and the agencies that supervise them. Article Author: Alex M. Blandford MPH CHES Exam writer: Patricia Hocking-Walker M.S. (Psychology)
[READ LESS]
Produced by: Quantum Units Education
Today, federal regulations make compliance programs for plans administering Medicare Parts C and D plans mandatory. To assist covered entities, this course provides the basics of an effective compliance...
[READ MORE]
Today, federal regulations make compliance programs for plans administering Medicare Parts C and D plans mandatory. To assist covered entities, this course provides the basics of an effective compliance program with references to available guidances and tools.
Today, federal regulations make compliance programs for plans administering Medicare Parts C and D plans mandatory. To assist covered entities, this course provides the basics of an effective compliance program with references to available guidances and tools.
[READ LESS]
Produced by: HCCS - Retail Only
This course provides a basic overview of the three key laws the government relies upon in the fight against fraud, waste and abuse in healthcare - The False Claims Act, the Anti-Kickback Statute and the Stark...
[READ MORE]
This course provides a basic overview of the three key laws the government relies upon in the fight against fraud, waste and abuse in healthcare - The False Claims Act, the Anti-Kickback Statute and the Stark Law. It also briefly discusses the Healthcare Fraud Statute.
This course provides a basic overview of the three key laws the government relies upon in the fight against fraud, waste and abuse in healthcare - The False Claims Act, the Anti-Kickback Statute and the Stark Law. It also briefly discusses the Healthcare Fraud Statute.
[READ LESS]
Produced by: HCCS - Retail Only
Healthcare fraud is a serious national problem that increases the cost of doing business and results in higher costs and reduced benefits for beneficiaries. A recent report noted that Medicare Advantage (MA)...
[READ MORE]
Healthcare fraud is a serious national problem that increases the cost of doing business and results in higher costs and reduced benefits for beneficiaries. A recent report noted that Medicare Advantage (MA) plans cost taxpayers a whopping $150 billion per year. Equipping staff with basic knowledge of what constitutes fraudulent activity and how to appropriately report it goes a long way in reducing health plan liability.
Healthcare fraud is a serious national problem that increases the cost of doing business and results in higher costs and reduced benefits for beneficiaries. A recent report noted that Medicare Advantage (MA) plans cost taxpayers a whopping $150 billion per year. Equipping staff with basic knowledge of what constitutes fraudulent activity and how to appropriately report it goes a long way in reducing health plan liability.
[READ LESS]
Produced by: HCCS - Retail Only
This course will increase your HIPAA awareness by helping you understand your duty to follow your organizations policies and procedures in regard to the protection of health information; define protected...
[READ MORE]
This course will increase your HIPAA awareness by helping you understand your duty to follow your organizations policies and procedures in regard to the protection of health information; define protected health information; ways to protect a patient not included in the facility director, describe the meaning of minimum necessary and for reporting privacy violations.
This course will increase your HIPAA awareness by helping you understand your duty to follow your organizations policies and procedures in regard to the protection of health information; define protected health information; ways to protect a patient not included in the facility director, describe the meaning of minimum necessary and for reporting privacy violations.
[READ LESS]
Produced by: HCCS - Retail Only
The Privacy Rule provides for certain requirements used in the protection of patient information. In this course, you will review some of those requirements as well as be able to define covered entity,...
[READ MORE]
The Privacy Rule provides for certain requirements used in the protection of patient information. In this course, you will review some of those requirements as well as be able to define covered entity, define mitigation, define workforce, describe the term minimum necessary requirement and name physical safeguards.
The Privacy Rule provides for certain requirements used in the protection of patient information. In this course, you will review some of those requirements as well as be able to define covered entity, define mitigation, define workforce, describe the term minimum necessary requirement and name physical safeguards.
[READ LESS]
Produced by: HCCS - Retail Only
Protecting individuals' health information is a primary goal of the HIPAA Law. This course will help you describe what information is considered Protected Health Information; understand when an authorization...
[READ MORE]
Protecting individuals' health information is a primary goal of the HIPAA Law. This course will help you describe what information is considered Protected Health Information; understand when an authorization is required to use or disclose PHI; de-identify PHI; define the term marketing as it is used in the Privacy Rule; and list information that is and is not allowed on a sign-in sheet.
Protecting individuals' health information is a primary goal of the HIPAA Law. This course will help you describe what information is considered Protected Health Information; understand when an authorization is required to use or disclose PHI; de-identify PHI; define the term marketing as it is used in the Privacy Rule; and list information that is and is not allowed on a sign-in sheet.
[READ LESS]
Produced by: HCCS - Retail Only
HIPAA provides for certain patient rights. This course will help you to identify the following rights: to receive a Notice of Privacy Practices; to review and request protected health information (PHI); to...
[READ MORE]
HIPAA provides for certain patient rights. This course will help you to identify the following rights: to receive a Notice of Privacy Practices; to review and request protected health information (PHI); to request an accounting of PHI disclosures; to request an amendment of PHI; to request a restriction of PHI and to request confidential communications.
HIPAA provides for certain patient rights. This course will help you to identify the following rights: to receive a Notice of Privacy Practices; to review and request protected health information (PHI); to request an accounting of PHI disclosures; to request an amendment of PHI; to request a restriction of PHI and to request confidential communications.
[READ LESS]
Produced by: HCCS - Retail Only
Business Associates play a key role in many aspects of healthcare and have important responsibilities under HIPAA. This course will help you: define the term Business Associate; list types of Business...
[READ MORE]
Business Associates play a key role in many aspects of healthcare and have important responsibilities under HIPAA. This course will help you: define the term Business Associate; list types of Business Associates; describe the HIPAA requirement for which a Business Associate is accountable; Identify language that should be included in a Business Associate Agreement; list steps a covered entity may take if a Business Associate is in violation of its contract.
Business Associates play a key role in many aspects of healthcare and have important responsibilities under HIPAA. This course will help you: define the term Business Associate; list types of Business Associates; describe the HIPAA requirement for which a Business Associate is accountable; Identify language that should be included in a Business Associate Agreement; list steps a covered entity may take if a Business Associate is in violation of its contract.
[READ LESS]
Produced by: HCCS - Retail Only
There are specific requirements for Law Enforcement Uses and Disclosures of Protected Health Information (PHI). This course will help you: provide an example of where protected health information (PHI) may...
[READ MORE]
There are specific requirements for Law Enforcement Uses and Disclosures of Protected Health Information (PHI). This course will help you: provide an example of where protected health information (PHI) may be used or disclosed; explain a circumstance in which PHI may be used or disclosed for health or safety; describe and appropriate response to a legal request for patient records.
There are specific requirements for Law Enforcement Uses and Disclosures of Protected Health Information (PHI). This course will help you: provide an example of where protected health information (PHI) may be used or disclosed; explain a circumstance in which PHI may be used or disclosed for health or safety; describe and appropriate response to a legal request for patient records.
[READ LESS]
Produced by: HCCS - Retail Only
The purpose of the Security Rule is to ensure the confidentiality, integrity and availability of all electronic protected health information (ePHI). This course will enable you to describe those purposes;...
[READ MORE]
The purpose of the Security Rule is to ensure the confidentiality, integrity and availability of all electronic protected health information (ePHI). This course will enable you to describe those purposes; define ePHI; provide a reason for the value of healthcare information; and to provide indicators of a phishing attempt.
The purpose of the Security Rule is to ensure the confidentiality, integrity and availability of all electronic protected health information (ePHI). This course will enable you to describe those purposes; define ePHI; provide a reason for the value of healthcare information; and to provide indicators of a phishing attempt.
[READ LESS]
Produced by: HCCS - Retail Only
The Security Rule operationalizes the protections contained in the Privacy Rule through Administrative, Physical and Technical Safeguards. This course will enable you to name examples of safeguards; to avoid...
[READ MORE]
The Security Rule operationalizes the protections contained in the Privacy Rule through Administrative, Physical and Technical Safeguards. This course will enable you to name examples of safeguards; to avoid risks associated with social media; to state elements of a strong password; and to define both encryption and decryption.
The Security Rule operationalizes the protections contained in the Privacy Rule through Administrative, Physical and Technical Safeguards. This course will enable you to name examples of safeguards; to avoid risks associated with social media; to state elements of a strong password; and to define both encryption and decryption.
[READ LESS]
Produced by: HCCS - Retail Only
The content in this course has been moved to HIPAA Compliance 09: Administrative, Physical and Technical Safeguards.
The content in this course has been moved to HIPAA Compliance 09: Administrative, Physical and Technical Safeguards.
[READ LESS]
Produced by: HCCS - Retail Only
The content in this course has been moved to HIPAA Compliance 09: Administrative, Physical and Technical Safeguards.
The content in this course has been moved to HIPAA Compliance 09: Administrative, Physical and Technical Safeguards.
[READ LESS]
Produced by: HCCS - Retail Only
The improvement of the efficiency and effectiveness of the healthcare system using an electronic exchange of healthcare data is a provision in HIPAA. The Electronic Transactions Rule implemented some of the...
[READ MORE]
The improvement of the efficiency and effectiveness of the healthcare system using an electronic exchange of healthcare data is a provision in HIPAA. The Electronic Transactions Rule implemented some of the HIPAA Administrative Simplification requirements by adopting standards for electronic transactions. This course will help you: explain HIPAA's additional provisions related to electronic transactions ; describe the operating rules required by the Patient Protection and Affordable Care Act (ACA); recognize the current code sets; and describe the unique identifiers that must be used in HIPAA transactions.
The improvement of the efficiency and effectiveness of the healthcare system using an electronic exchange of healthcare data is a provision in HIPAA. The Electronic Transactions Rule implemented some of the HIPAA Administrative Simplification requirements by adopting standards for electronic transactions. This course will help you: explain HIPAA's additional provisions related to electronic transactions ; describe the operating rules required by the Patient Protection and Affordable Care Act (ACA); recognize the current code sets; and describe the unique identifiers that must be used in HIPAA transactions.
[READ LESS]
Produced by: HCCS - Retail Only
As with any law in our nation, there are consequences for failure to comply with the Privacy and Security Rules. This course will enable you to determine an information breach, breach exemptions, the three...
[READ MORE]
As with any law in our nation, there are consequences for failure to comply with the Privacy and Security Rules. This course will enable you to determine an information breach, breach exemptions, the three types of inappropriate disclosures, how to avoid incidental disclosures and describe the consequences of violations.
As with any law in our nation, there are consequences for failure to comply with the Privacy and Security Rules. This course will enable you to determine an information breach, breach exemptions, the three types of inappropriate disclosures, how to avoid incidental disclosures and describe the consequences of violations.
[READ LESS]
Produced by: HCCS - Retail Only
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. Upon completion of this course, learners will be able to describe the primary objective...
[READ MORE]
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. Upon completion of this course, learners will be able to describe the primary objective of the Privacy Rule, list those for whom access, use and disclosure is allowed without an authorization, identify at least three elements of a valid authorization, define minimum necessary and describe the purpose of the Notice of Privacy Practices.
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. Upon completion of this course, learners will be able to describe the primary objective of the Privacy Rule, list those for whom access, use and disclosure is allowed without an authorization, identify at least three elements of a valid authorization, define minimum necessary and describe the purpose of the Notice of Privacy Practices.
[READ LESS]
Produced by: HCCS - Retail Only
A Business Associates's understanding of the rights of individuals with regard to their health information is fundamental to HIPAA compliance. This course discusses the various rights of individuals afforded...
[READ MORE]
A Business Associates's understanding of the rights of individuals with regard to their health information is fundamental to HIPAA compliance. This course discusses the various rights of individuals afforded by HIPAA.
A Business Associates's understanding of the rights of individuals with regard to their health information is fundamental to HIPAA compliance. This course discusses the various rights of individuals afforded by HIPAA.
[READ LESS]
Produced by: HCCS - Retail Only
The depth and scope of information maintained and transmitted by covered entities makes them lucrative targets for cyber criminals. The Security Rule is designed to help thwart such threats. This course...
[READ MORE]
The depth and scope of information maintained and transmitted by covered entities makes them lucrative targets for cyber criminals. The Security Rule is designed to help thwart such threats. This course discusses the core components of the Security Rule.
The depth and scope of information maintained and transmitted by covered entities makes them lucrative targets for cyber criminals. The Security Rule is designed to help thwart such threats. This course discusses the core components of the Security Rule.
[READ LESS]
Produced by: HCCS - Retail Only
While the Privacy Rule requires appropriate safeguards to ensure the confidentiality of PHI, the scope of the Security Rule is narrower. That is, it establishes safeguards for ePHI only. This courses...
[READ MORE]
While the Privacy Rule requires appropriate safeguards to ensure the confidentiality of PHI, the scope of the Security Rule is narrower. That is, it establishes safeguards for ePHI only. This courses discusses the three primary categories of safeguards and how to apply them.
While the Privacy Rule requires appropriate safeguards to ensure the confidentiality of PHI, the scope of the Security Rule is narrower. That is, it establishes safeguards for ePHI only. This courses discusses the three primary categories of safeguards and how to apply them.
[READ LESS]
Produced by: HCCS - Retail Only
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. This course explains the primary objective of the Privacy Rule, discusses access, use and...
[READ MORE]
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. This course explains the primary objective of the Privacy Rule, discusses access, use and disclosure, authorizations, the concept of minimum necessary and the Notice of Privacy Practices.
The Privacy Rule is one of two major components of HIPAA with which a basic understanding is essential to compliance. This course explains the primary objective of the Privacy Rule, discusses access, use and disclosure, authorizations, the concept of minimum necessary and the Notice of Privacy Practices.
[READ LESS]
Produced by: HCCS - Retail Only