Course Content
Introduction To HIPPA
This module introduces you to HIPAA and explains why it was created. You'll learn key terms that will be used throughout the course, such as PHI, Covered Entities, and Business Associates. All of these are foundational to understanding your role in compliance.
0/2
The Privacy Rule
Here, you'll explore the HIPAA Privacy Rule and how it governs the use and sharing of patient information. You’ll understand what rights patients have over their health data and what situations allow or require disclosure.
0/3
The Security Rule
This module focuses on protecting electronic protected health information (ePHI). You'll learn how to secure data using administrative, physical, and technical safeguards — and how to assess and reduce risks in your workplace.
0/2
Breaches and Enforcement
In this section, you'll learn what counts as a HIPAA breach, how and when to report it, and what legal consequences can follow. Real-world examples will help you recognize and prevent violations before they happen.
0/3
Workplace Compliance
The final module brings everything together. You’ll get practical tips for maintaining HIPAA compliance in daily operations — from patient check-ins to emails and documentation.
0/4
HIPAA Essentials: Safeguarding Patient Privacy in Healthcare

Technology makes communication easier — and more dangerous. Even the best intentions can lead to HIPAA violations if you’re not careful.

Safe Use of Tech:

  • Never text PHI through unencrypted apps

  • Use secure, HIPAA-compliant platforms for telehealth

  • Avoid accessing patient records from personal devices unless secure

  • Don’t email PHI unless it’s encrypted and verified

Common Mistake:
Emailing a spreadsheet with PHI to the wrong recipient — even internally — is a violation.