Building Amazing Organizations
Got Questions?
800‑258‑3837
Back to Course List

HIPAA: Mobile Device Privacy and Security

Preview video
Preview Video
Course Format
Video on Demand  Video On Demand
Product ID
usdhhmdp_vod
Training Time ?
17 to 25 minutes
Language(s)
English
Video Format
High Definition
Required Plugins
None
Number of Lessons
5
Quiz Questions
8
Closed Captioning
Question Feedback
Wrong Answer Remediation
Lesson Bookmarking
Downloadable Resources
Interactive Producer
Mastery Training Content Network
Original Content Producer
U.S. Department of Health and Human Services
Course screen Course screen Course screen
Overview

Protecting patient health information is a major concern for those working in healthcare. It is important to consider the security and privacy of patient data, especially as everything continues to go in a mobile direction. Mobile devices include tablets, smart phones, and laptop computers, and using mobile device introduces new risks for exposing protected health information, PHI. HIPAA was implemented nationally to direct reasonable and appropriate privacy and security safeguards put in place for PHI.

The course discusses identifying mobile security risks within your practice, a lost or stolen mobile device, and public Wi-Fi networks. This course explains some specific strategies for minimizing the risk of unauthorized access to patient information.

Use this course to ensure HIPAA compliance within your organization, protect PHI and gain greater trust from your patients.

Video on Demand   This course is in the Video On Demand format, to read about Video On Demand features click here.

  • Install on any SCORM LMS
  • Full-screen video presentation
  • Print certificate and wallet card
  • You have 60 days to complete the course
Audience

Healthcare employees working for a HIPAA covered entity

Topics
The course presents the following topical areas:
  • Introduction
  • Identifying Mobile Health Security Risks in Your Practice
  • A Lost or Stolen Mobile Health Device
  • Accessing a Public Wi-Fi Network
  • Conclusion

© Mastery Technologies, Inc.