Syllabus
- When do we typically disclose PHI?
- Methods of authenticating recipients of PHI
- Situations where inappropriate disclosure of PHI may occur
- Errors that create accidental disclosures
- Techniques used by malicious actors to elicit disclosures
- A 3-step checklist for avoiding inappropriate disclosures of PHI