Course Content
Introduction To HIPPA
This module introduces you to HIPAA and explains why it was created. You'll learn key terms that will be used throughout the course, such as PHI, Covered Entities, and Business Associates. All of these are foundational to understanding your role in compliance.
0/2
The Privacy Rule
Here, you'll explore the HIPAA Privacy Rule and how it governs the use and sharing of patient information. You’ll understand what rights patients have over their health data and what situations allow or require disclosure.
0/3
The Security Rule
This module focuses on protecting electronic protected health information (ePHI). You'll learn how to secure data using administrative, physical, and technical safeguards — and how to assess and reduce risks in your workplace.
0/2
Breaches and Enforcement
In this section, you'll learn what counts as a HIPAA breach, how and when to report it, and what legal consequences can follow. Real-world examples will help you recognize and prevent violations before they happen.
0/3
Workplace Compliance
The final module brings everything together. You’ll get practical tips for maintaining HIPAA compliance in daily operations — from patient check-ins to emails and documentation.
0/4
HIPAA Essentials: Safeguarding Patient Privacy in Healthcare

The HIPAA Security Rule sets standards for how to protect electronic PHI (ePHI) — any protected information created, stored, or shared using electronic systems (like EHRs, emails, or cloud services).

It requires that covered entities and business associates use three types of safeguards:


1. Administrative Safeguards

These are policies, procedures, and training that manage the security of ePHI.

Examples:

  • Assigning a HIPAA security officer

  • Conducting annual risk assessments

  • Creating access policies (who can access what)

  • Regular HIPAA training for all staff


2. Physical Safeguards

This refers to the protection of physical spaces and devices where ePHI is stored or accessed.

Examples:

  • Locked doors to file rooms or server rooms

  • Security cameras

  • Restricting access to computers

  • Logging off workstations when unattended

  • Securing laptops and USB drives


3. Technical Safeguards

These protect electronic systems and data through technology.

Examples:

  • Password protection and user authentication

  • Data encryption (especially when sending ePHI)

  • Automatic logoff systems

  • Firewalls and antivirus software


Bottom line: It takes both people and systems to protect ePHI. Even if you’re not in IT, you still play a part — like using strong passwords and logging off when you step away.