Digital Confidentiality According to Professional Ethics and HIPAA: A Heart-Centered Approach Level II

Course Materials

An Exercise Whose Point is Unclear
1. Clients, Professionals, & Behavior in Security
Secure Behaviors
2. Legally and Ethically Secure by the Numbers: The "Before" Part
Decision Psychology in Security and Privacy
How To Comply With the HIPAA Security Rule: A Step-by-Step Guide
Step 1. Security Risk Analysis
Step 1 (cont.) Security Risk Analysis: The Process
Step 2. Risk Management Planning
Step 3. Policies and Procedures Manual
3. Legally and Ethically Secure by the Numbers: The After Part
Breach Notification
Risk Analysis Parties!
Rescuing (or Sacrificing) Your Lost or Stolen Mobile
Security Incidents
Safe Harbor from the HIPAA Breach Notification Rule
How Encryption Makes Safe Harbor: or “Why Encrypting Before is Great For After”
4. Electronic Records, and “the Cloud”
Data Backups: Your Best Friend For “After”
Electronic Health Records
“The Cloud”
The Cloud and Availability & Integrity
Disclosure of Electronic Record-Keeping
Passwords vs. Passphrases, and Password Management Programs
The Cloud, Mobiles, and Breach Assessment
Protecting Your Cloud Services
Cloud Services and the HIPAA Business Associate Rule
Special Aside: Business Associates and Financial Institutions
Epilogue

Bibliography

Below are the works that are cited in this course. If you are looking for resources to assist you in using the information you learned in this course, we suggest you click here for the Resources page.

Course References

v1.25.06

Scheduled Maintenance

We will be temporarily taking the website offline at 10:00 PM Pacific (1:00 AM Eastern) tonight, July 6, in order to make some improvements. We plan to be back online by midnight Pacific (3:00 AM Eastern). We apologize for any inconvenience this may cause. Dismiss