Screen 0
1_C_1 |
Welcome to your HIPAA Training. Please click the forward arrow to begin. |
Screen 1
2_C_2 |
You are receiving this training because you are working at Abbott, located in the US or Puerto Rico. As such, you might be exposed to data that is governed by the Health Insurance Portability and Accountability Act (HIPAA). |
Screen 2
3_C_3 |
Abbott places a high value on protecting data, including Protected Health Information (PHI). We want to ensure you have the knowledge and skills necessary to handle and protect this sensitive information. Throughout this course, we’ll look at HIPAA and best practices for protecting PHI. |
Screen 3
4_C_4 |
Upon completion of this course, you will be able to:
The course will take 30 minutes to complete. |
Screen 4
5_C_5 |
The icons at the top of the screen provide one-click access to key resources:
In addition, you can use the Audio icon to turn the audio on or off and the Exit icon to close the course window. |
Screen 5
6_C_6 |
There are several features to help guide you through the course:
|
Screen 6
7_C_7 |
Knowledge Check Once you have reviewed the content of this course, you will be required to complete a 10-question Knowledge Check. You must score 80 percent to certify completion of this course. |
Screen 7
8_C_8 |
HIPAA is a US regulation and applies to all US patients. It requires Abbott entities that provide healthcare services to protect the privacy and security of PHI and provide individuals with certain rights regarding their health information. HIPAA states that health data: “Can only be used for health-related purposes unless people give permission to share it otherwise.” |
Screen 8
9_C_9 |
PHI is information relating to an individual’s physical or mental health conditions, treatments, and payments that can identify an individual. It is information that, individually or when put together, makes it possible to link a health record to a specific individual. |
Screen 9
10_C_10 |
HIPAA applies to all PHI, regardless of how it’s communicated - whether it’s shared verbally, in writing, or through electronic methods. It is all our jobs to protect this information! |
Screen 10
11_C_11 |
Examples of PHI include anything that would identify a person, such as a person’s name, their SSN, or their passport ID number, plus any of the following:
CLICK LEARN MORE FOR AN EXPANDED LIST OF HIPAA IDENTIFIERS. |
Screen 10
12_C_11 |
Learn More HIPAA Identifiers include:
|
Screen 11
13_C_12 |
Your ability to protect PHI depends on your ability to recognize PHI. CLICK EACH OF THE PANELS TO VIEW EXAMPLES OF DOCUMENTS AND SITUATIONS WHICH MAY CONTAIN PHI. |
Screen 11
14_C_12 |
Written Health Information Any information that relates to an individual’s health care or payment, including the following:
|
Screen 11
15_C_12 |
Electronic Health Information Any information that relates to an individual’s health care or payment, including the following:
|
Screen 11
16_C_12 |
Spoken Health Information Any information that relates to an individual’s health care or payment, including:
Always be mindful of your surroundings when discussing PHI! |
Screen 12
17_C_13 |
Now that you know what PHI is and why it’s important, take a moment to review some different documents and assess whether HIPAA would apply. Simply click on PHI or Not PHI to move the information into its correct folder. |
Screen 12
18_C_13 |
Patient Contact Information. PHI That’s correct! This example contains PHI. Not PHI |
Screen 12
19_C_13 |
A patient ID card. PHI That’s correct! This example contains PHI. Not PHI |
Screen 12
20_C_13 |
An Annual Report. PHI That’s correct! This example does not contain PHI. Not PHI |
Screen 12
21_C_13 |
Notice of privacy practices. PHI That’s correct! This example does not contain PHI. Not PHI |
Screen 12
22_C_13 |
A Product Brochure. PHI That’s correct! This example does not contain PHI. Not PHI |
Screen 12
23_C_13 |
An insurance registration form. PHI That’s correct! This example contains PHI. Not PHI |
Screen 12
24_C_13 |
That’s correct! That’s not correct! Click forward to continue. |
Screen 13
25_C_14 |
All Abbott personnel in the United States (including US territories) who handle PHI must comply with the HIPAA regulations. Keep in mind, it only applies to US patients. Consider some of our products and services that might contain PHI: Freestyle Libre, HeartMate LVAD, our Toxicology testing services, and all the Alinity products, just to name a few. |
Screen 14
26_C_15 |
In addition, anyone who has access to or handles PHI on behalf of Abbott, such as external service providers or vendors, are also required to comply with HIPAA. Covered Entities, Business Associates, and Subcontractor Business Associates are required to have agreements in place which ensure PHI is adequately protected. CLICK EACH OF THE PANELS TO LEARN MORE. |
Screen 14
27_C_15 |
Covered Entities Covered Entities include health plans, health care clearinghouses, and health care providers. Many of Abbott’s US-based customers are Covered Entities. Examples of Covered Entities at Abbott include:
|
Screen 14
28_C_15 |
Business Associates A Business Associate is an individual or entity who creates, receives, maintains, or transmits PHI on behalf of a Covered Entity. A Business Associates’ functions may include, remote monitoring, billing, accounting, legal, or IT services. Examples of Business Associate entities at Abbott include:
Shred-it is also a Business Associate when it removes our printed documents containing PHI. |
Screen 15
29_C_16 |
HIPAA provides specific rights to patients. For example, individuals or their authorized representatives can request:
Let's take a closer look at the rights HIPAA provides. |
Screen 16
30_C_17 |
Patients have the following rights:
|
Screen 17
31_C_18 |
Right to Notice Our Privacy Policy clearly explains what information may be collected; how the information may be used, disclosed, or maintained; and what privacy rights the individual has regarding their information. The Policy applies to our customers, employees, and the general public, and can be accessed any time by visiting Abbott’s public website. |
Screen 18
32_C_19 |
How does this impact our business? While all states are required to follow HIPAA, many have expanded on the regulation, by creating their own medical privacy information protection laws. Thus, producing additional requirements that Abbott and companies across the United States must follow when handling their residents’ health information. |
Screen 19
33_C_20 |
Because Abbott’s operations extend to all 50 states, we must comply with the applicable state laws. CLICK EACH OF THE PANELS TO LEARN HOW INFORMATION PROTECTION AND MEDICAL PRIVACY LAWS VARY BY STATE. |
Screen 19
34_C_20 |
Organizational Policies & Procedures State laws may vary in the organizational policies and procedures required by a company to help ensure the privacy and protection of information. |
Screen 19
35_C_20 |
Privacy & Security Breach Definitions State laws may vary in how a privacy or security breach is defined and what is considered a breach. |
Screen 19
36_C_20 |
Breach Reporting Requirements Breach reporting requirements vary by state, which often include who, what, when, and how a breach must be reported. |
Screen 19
37_C_20 |
PHI Definitions State laws may vary in how Personal Information and/or Health Information is defined and what types of information are included under these definitions. |
Screen 20
38_C_21 |
You receive a document containing an individual’s name, address, e-mail address, device implant date, and implanted device model and serial number. Which of the information is considered PHI? Device implant date. Model and serial number of implanted device. All of the information is PHI. None of the information is PHI. Name, address, and e-mail address. Submit |
Screen 20
39_C_21 |
Try Again That’s not correct! That’s partially correct! That’s correct! Please review your answer choice(s) and click the Try Again button above. An individual’s name, address, e-mail address, device implant date, and the model and serial number of an implanted device are all considered PHI. Click the forward arrow to continue. |
Screen 21
40_C_22 |
What’s your responsibility in protecting PHI? Check all that apply and click the Submit button below. To know and follow our organization’s HIPAA policies for safeguarding PHI. To know what PHI is and report all violations to Global Privacy. None. I don’t ever work with PHI. Submit |
Screen 21
41_C_22 |
Try Again That’s not correct! That’s partially correct! That’s correct! Please review your answer choice(s) and click the Try Again button above. All Abbott personnel have a responsibility to protect PHI. This includes following Abbott policies and practices that are designed to help to safeguard an individual’s personal information. Click the forward arrow to continue. |
Screen 22
42_C_23 |
Most states have created their own medical privacy laws. Does this mean they are exempt from complying with HIPAA? Yes. No. Submit |
Screen 22
43_C_23 |
Try Again That’s not correct! That’s partially correct! That’s correct! Please review your answer choice(s) and click the Try Again button above. HIPAA applies to all states. However, the general standard is that if a state’s law is more protective of individual’s PHI, companies are required to adhere to both HIPAA and the state’s additional requirements. Click the forward arrow to continue. |
Screen 23
44_C_24 |
You have completed the Introduction to HIPAA section of this course. Before you proceed, here are a few key points to remember.
|
Screen 24
45_C_25 |
Regardless of your role, it’s important to understand that we are only able to use PHI for the purposes for which it was collected and allowed to disclose (share) PHI under specific circumstances. |
Screen 25
46_C_26 |
When authorization is required Except when disclosures are made between a covered entity and a business associate (and other HIPAA-defined instances), Abbott must obtain a patient’s authorization before disclosing their PHI. Disclosures requiring authorization may include:
Keep in mind: We need to be sure that the patient authorizes the specific use or disclosure prior to their PHI being used. Contact Global Privacy with any questions around this topic. |
Screen 26
47_C_27 |
Another important part of HIPAA’s use and disclosure requirements is what’s referred to as the “minimum necessary” standard. When we use or disclose PHI, the minimum necessary standard requires that we make a reasonable effort to use, disclose, or request only the minimum amount of PHI necessary to accomplish the intended purpose. |
Screen 27
48_C_28 |
To what extent can you use, access, and disclose PHI? The minimum degree necessary required for payment and healthcare operations. Between 2 different Abbott entities. Generally, if you can access PHI, you can use it. All of the above. Submit |
Screen 27
49_C_28 |
Try Again That’s not correct! That’s partially correct! That’s correct! Please review your answer choice(s) and click the Try Again button above. The minimum necessary standard requires that PHI accessed, used, or disclosed is limited to the minimum amount necessary for the intended purpose, except for treatment. Click the forward arrow to continue. |
Screen 28
50_C_29 |
When you comply with HIPAA, what are you ensuring? Check all that apply and click the Submit button below. Abbott will verify the identity of an authorized recipient before disclosing PHI. Individuals have legal rights regarding who can access their PHI. Abbott has the final say in who can access our patients and customer’s PHI. Submit |
Screen 28
51_C_29 |
Try Again That’s not correct! That’s partially correct! That’s correct! Please review your answer choice(s) and click the Try Again button above. When you comply with HIPAA, you support an individual’s right to determine who can access their PHI and ensure that PHI is only provided to authorized recipients. Click the forward arrow to continue. |
Screen 29
52_C_30 |
You have completed the Using and Disclosing PHI section of this course. Before you proceed, here are a few key points to remember.
|
Screen 30
53_C_31 |
Just as there are rules for how we can use and disclose PHI, there are rules for how to secure (or protect) PHI. |
Screen 31
54_C_32 |
The HIPAA Security Rule defines three categories of safeguards to protect our electronic PHI (“ePHI”). Within these categories HIPAA defines standards and implementation specifications to ensures policies, procedures and controls exist to protect the ePHI. CLICK EACH OF THE PANELS TO LEARN HOW EACH SAFEGUARD APPLIES. |
Screen 31
55_C_32 |
Physical Safeguards Physical safeguards refer to the steps we take to protect unauthorized access to our facilities, equipment, and resources that contain PHI. Some examples include site security, the use of badges, visitor access rules, and restricted access to sensitive areas like server rooms. |
Screen 31
56_C_32 |
Technical Safeguards Technical safeguards include using strong authentication controls (i.e., passwords) and encrypting emails containing ePHI. |
Screen 31
57_C_32 |
Administrative Safeguards Administrative safeguards describe the policies and procedures required to maintain the confidentiality, integrity, and availability of PHI. This training is an example of an administrative safeguard. Other examples are procedures for giving and terminating access to systems containing ePHI, and contingency planning to ensure we can continue business and recover our PHI in an emergency, or after a disaster or other unforeseen event. |
Screen 32
58_C_33 |
Refer to our Privacy and Information Security policies on Abbott World to learn more about the physical, technical, and administrative safeguards at Abbott. |
Screen 33
59_C_34 |
While we recognize the importance of safeguarding PHI from unauthorized sources outside of our organization, it is inside our organization where we have the greatest impact. |
Screen 34
60_C_35 |
You protect our PHI by following our policies and controls and by understanding some of the common ways PHI might be inappropriately used or disclosed. CLICK EACH OF THE PANELS TO LEARN ABOUT THE RISKS ASSOCIATED WITH SPECIFIC ACTIVITIES AND HOW THEY CAN LEAD TO HIPAA PRIVACY VIOLATIONS. |
Screen 34
61_C_35 |
Not logging off your computer You’ve probably noticed a coworker who, at some point, has left their computer unlocked and unattended. Not signing off a computer leaves the computer vulnerable to unauthorized access. Remember to log off or lock your computer before leaving your workstation. Store any hard-copy PHI in a secure desk or file cabinet. |
Screen 34
62_C_35 |
Sending unencrypted emails Sending PHI to an outside party in an unencrypted email may allow hackers to intercept and access, delete, or change the data. For this reason, before you send an email that contains PHI, encrypt the data by typing “[Secure]” (including the square brackets) in the subject line. |
Screen 34
63_C_35 |
Sending a fax to a wrong number Faxing a document containing PHI to a wrong number can send the PHI to an unauthorized recipient. This can potentially result in losing our customers’ trust, damage to Abbott’s reputation. Protect our PHI as if it were your own. |
Screen 34
64_C_35 |
Using unencrypted storage devices Information is at risk of falling into the wrong hands if a storage device is lost. Though convenient, small electronic storage devices, such as USBs, can be readily accessed by individuals with very limited technical know-how. It is important that USB’s and other portable storage devices are encrypted. |
Screen 35
65_C_36 |
Abbott has a legal responsibility to investigate all privacy and security incidents related to PHI and to notify affected individuals as soon as possible. If there is a misuse of PHI, such as disclosing information to an unauthorized individual, sending an unencrypted email with patient data, or improperly disposing of such sensitive information, report the incident as soon as possible. If you have any concerns about a potential violation or questions regarding the reporting process, contact OEC or a member of the Global Privacy team. |
Screen 36
66_C_37 |
As you scan your badge to enter an Abbott facility, a coworker approaches you and asks you to hold the door. Should you let the coworker follow you in? Yes, as long as you’re sure they work at Abbott. Yes, as long as they say they are authorized to work in that area. Yes, as long as they have an employee badge. No, all employees need to scan their badges to enter an Abbott facility. Submit |
Screen 36
67_C_37 |
Try Again That’s not correct! That’s partially correct! That’s correct! Please review your answer choice(s) and click the Try Again button above. Regardless of the individual, or their level of authority, Abbott requires all employees to use their badge when entering an Abbott facility. Click the forward arrow to continue. |
Screen 37
68_C_38 |
You receive a call regarding a privacy concern. What should you do? Try to resolve the situation. Direct the concern to a member of the Global Privacy Team. Determine if it’s a valid concern and then report it to the appropriate department. Nothing. Privacy concerns are a normal part of our business. Submit |
Screen 37
69_C_38 |
Try Again That’s not correct! That’s partially correct! That’s correct! Please review your answer choice(s) and click the Try Again button above. If a privacy concern is received, you should direct the concern to OEC or a member of the Global Privacy team as soon as possible. Click the forward arrow to continue. |
Screen 38
70_C_39 |
Which of the following are examples of a HIPAA incident? Check all that apply and click the Submit button below. Providing a Health Care Provider with patient information for treatment purposes. Sending a fax with PHI to an incorrect fax number. Discussing patient information with a friend at lunch. Sending PHI via encrypted email to an authorized recipient. Submit |
Screen 38
71_C_39 |
Try Again That’s not correct! That’s partially correct! That’s correct! Please review your answer choice(s) and click the Try Again button above. Information may be securely disclosed to Health Care Providers providing treatment and to authorized recipients. It’s not okay to discuss Protected Health Information with an unauthorized recipient. Click the forward arrow to continue. |
Screen 39
72_C_40 |
You have completed the Securing PHI and Incident Reporting section of this course. Before you proceed, here are a few key points to remember.
|
Screen 40
73_C_41 |
If you have questions about how HIPAA impacts your business, your role, or you would like to learn more about best practices, please reference the following list for Privacy contacts specific to your business. For anyone at Abbott with HIPAA or Privacy questions contact Privacy@Abbott.com Additional information can be found on the Global Privacy page. |
Screen 41
74_C_42 |
Course Transcript Click here for a full transcript of the course. |
Screen 42
Activity: Introduction 75_C_43 |
The Knowledge Check consists of 10 questions. You must score 80% or higher to successfully complete this course. When you are ready, click the Knowledge Check button to begin. |
Screen 43 Question 1: Scenario 76_C_44 |
Which of the following are examples of a HIPAA privacy incident? Check all that apply. |
Screen 43 Question 1: Options 77_C_44 |
[1] Providing a Health Care Provider with patient information for treatment purposes. [2] Documenting patient results on the wrong patient record. [3] Discussing patient information with a friend. [4] Sending PHI via encrypted email to an authorized recipient. |
Screen 43 Question 1: Feedback 78_C_44 |
Information may be securely disclosed to Health Care Providers providing treatment and to authorized recipients. It’s not okay to discuss Protected Health Information with an unauthorized recipient. Always verify the recipient of PHI before disclosing any information or patient ID cards. For more information about the correct answer, see Section 2.2, What is Protected Health Information? |
Screen 43 Question 2: Scenario 79_C_44 |
To what extent can you use, access, and disclose PHI? |
Screen 43 Question 2: Options 80_C_44 |
[1] The minimum degree necessary required for payment and healthcare operations. [2] For research and marketing without the necessary approvals. [3] Generally, if you can access PHI, you can use it. [4] All of the above. |
Screen 43 Question 2: Feedback 81_C_44 |
The minimum necessary standard requires that PHI accessed, used, or disclosed is limited to the minimum amount necessary for the intended purpose, except for treatment. For more information about the correct answer, see Section 3.2 Minimum Necessary Standard. |
Screen 43 Question 3: Scenario 82_C_44 |
You receive a document containing an individual’s name, address, and medical history. Which of the information is considered PHI? |
Screen 43 Question 3: Options 83_C_44 |
[1] Individual’s name. [2] Individual’s address. [3] Individual’s medical history. [4] All of the information is PHI. [5] None of the information is PHI. |
Screen 43 Question 3: Feedback 84_C_44 |
An individual’s name, address, and medical history are all considered PHI. For more information about the correct answer, see Section 2.2, What is Protected Health Information? |
Screen 43 Question 4: Scenario 85_C_44 |
You receive a call regarding a privacy concern. What should you do? |
Screen 43 Question 4: Options 86_C_44 |
[1] Try to resolve the situation. [2] Direct the concern to your local Privacy Steward or the Privacy Office. [3] Determine if it’s a valid concern and then report it to the appropriate department. [4] Nothing. Privacy concerns are a normal part of our business. |
Screen 43 Question 4: Feedback 87_C_44 |
If a privacy concern is received, you should direct the concern to your local Privacy Steward or Abbott’s Privacy Office as soon as possible. For more information about the correct answer, see Section 4.3, Reporting Your Concerns. |
Screen 43 Question 5: Scenario 88_C_44 |
What’s your responsibility in protecting PHI? Check all that apply. |
Screen 43 Question 5: Options 89_C_44 |
[1] To know and follow our organization’s HIPAA security and privacy policies for safeguarding PHI. [2] To know what PHI is and report all known or suspected misuse of PHI to the Privacy Office. [3] None. I don’t ever work with PHI. |
Screen 43 Question 5: Feedback 90_C_44 |
All Abbott personnel have a responsibility to protect PHI. Understanding and following Abbott’s HIPAA privacy and security policies help to safeguard an individual’s personal information. For more information about the correct answer, see Section 2.3, Understanding Your Responsibilities. |
Screen 43 Question 6: Scenario 91_C_44 |
When you comply with HIPAA, you support an individual’s right to determine who can access their PHI and ensure that PHI is only provided to authorized recipients. Check all that apply. |
Screen 43 Question 6: Options 92_C_44 |
[1] Abbott will verify the identity of an authorized recipient before disclosing PHI. [2] Individuals have legal rights regarding who can access their PHI. [3] Abbott has the final say in who can access our patients and customer’s PHI. |
Screen 43 Question 6: Feedback 93_C_44 |
When you comply with HIPAA, you support an individual’s right to determine who can access their PHI and ensure that PHI is only provided to authorized recipients. For more information about the correct answer, see Section 2.4, Individuals have Rights. |
Screen 43 Question 7: Scenario 94_C_44 |
Under HIPAA rules, an individual has the right to request which of the following: |
Screen 43 Question 7: Options 95_C_44 |
[1] To request a copy of their health record. [2] To request we make a correction to their health record. [3] To request confidential communications between us and the individual. [4] All of the above. |
Screen 43 Question 7: Feedback 96_C_44 |
An individual has the right to request a copy of their health record, corrections to their health record, and confidential communications between us and the individual. For more information about the correct answer, see Section 2.4, Individuals have Rights. |
Screen 43 Question 8: Scenario 97_C_44 |
You are only responsible for securing electronic forms of PHI. |
Screen 43 Question 8: Options 98_C_44 |
[1] True. Having conversations about PHI is just part of our business and requires no security controls. [2] False. Reasonable safeguards need to be taken to secure all PHI, regardless of form. |
Screen 43 Question 8: Feedback 99_C_44 |
All forms of PHI require that you follow Abbott’s practices for safeguarding PHI. For more information about the correct answer, see Section 4.1, Securing PHI. |
Screen 43 Question 9: Scenario 100_C_44 |
As you scan your badge to enter a restricted area, a coworker approaches you and asks you to hold the door. Should you let them follow you in? |
Screen 43 Question 9: Options 101_C_44 |
[1] Yes, as long as you’re sure she works at Abbott. [2] Yes, as long as she says she’s authorized to work in that area. [3] Yes, as long as she has an employee badge. [4] No, all employees need to scan their badges to enter a restricted area. |
Screen 43 Question 9: Feedback 102_C_44 |
Regardless of the individual, or their level of authority, Abbott requires all employees use their badge when entering a restricted area. For more information about the correct answer, see Section 4.2, Potential Violations & Consequences. |
Screen 43 Question 10: Scenario 103_C_44 |
Most states have created their own medical privacy laws. Does this mean they are exempt from complying with HIPAA? Check all that apply. |
Screen 43 Question 10: Options 104_C_44 |
[1] Yes. HIPAA only applies if a state does not have privacy laws aimed at protecting PHI. [2] No. HIPAA applies to all states, regardless of whether they have medical privacy laws that are separate from HIPAA. |
Screen 43 Question 10: Feedback 105_C_44 |
HIPAA applies to all states. However, the general standard is that if a state’s law is more protective of individual’s PHI, companies are required to adhere to both HIPAA and the state’s additional requirements. For more information about the correct answer, see Section 2.5, State-Specific Privacy Laws. |
Screen 43
106_C_44 |
All questions remain unanswered |
Screen 44
Activity: Overall Feedback 107_C_45 |
No results are available, as you have not completed the Knowledge Check. Congratulations! You have successfully passed the Knowledge Check and completed the course. Please review your results below by clicking on each question. Once you are done, you must click the EXIT [X] icon in the course title bar before closing your browser window or browser tab. Sorry, you did not pass the Knowledge Check. Take a few minutes to review your results below by clicking on each question. When you are done, click the Retake Knowledge Check button. |
108_toc_1 |
Introduction |
109_toc_2 |
Welcome |
110_toc_3 |
Objectives |
111_toc_4 |
Tutorial |
112_toc_5 |
An Introduction to HIPAA |
113_toc_6 |
What is HIPAA? |
114_toc_7 |
What is Protected Health Information? |
115_toc_8 |
Understanding Your Responsibilities |
116_toc_9 |
Individuals Have Rights |
117_toc_10 |
State-Specific Privacy Laws |
118_toc_11 |
Quick Check |
119_toc_12 |
An Introduction to HIPAA: Quick Reference |
120_toc_13 |
Using and Disclosing PHI |
121_toc_14 |
Types of Disclosures |
122_toc_15 |
Minimum Necessary Standard |
123_toc_16 |
Quick Check |
124_toc_17 |
Using and Disclosing PHI: Quick Reference |
125_toc_18 |
Securing PHI & Incident Reporting |
126_toc_19 |
Securing PHI |
127_toc_20 |
Potential Violations & Consequences |
128_toc_21 |
Reporting Your Concerns |
129_toc_22 |
Quick Check |
130_toc_23 |
Securing PHI & Incident Reporting: Quick Reference |
131_toc_24 |
Resources |
132_toc_25 |
Where to get help |
133_toc_26 |
Reference Material |
134_toc_27 |
Knowledge Check |
135_toc_28 |
Introduction |
136_toc_29 |
Knowledge Check |
137_toc_30 |
Question 1 |
138_toc_31 |
Question 2 |
139_toc_32 |
Question 3 |
140_toc_33 |
Question 4 |
141_toc_34 |
Question 5 |
142_toc_35 |
Question 6 |
143_toc_36 |
Question 7 |
144_toc_37 |
Question 8 |
145_toc_38 |
Question 9 |
146_toc_39 |
Question 10 |
147_toc_40 |
Feedback |
148_string_1 |
The Course cannot contact the LMS. Click 'OK' to continue and review the course. Note, Course Certification may not be available. Click 'Cancel' to exit |
149_string_2 |
All questions remain unanswered |
150_string_3 |
Questions |
151_string_4 |
Question |
152_string_5 |
not answered |
153_string_6 |
That's correct! |
154_string_7 |
That's not correct! |
155_string_8 |
Feedback: |
156_string_9 |
HIPAA PRIVACY AND SECURITY TRAINING |
157_string_10 |
Knowledge Check |
158_string_11 |
Submit |
159_string_12 |
Retake Knowledge Check |
160_string_13 |
Course Description: This course provides an overview of the Health Insurance Portability and Accountability Act (or HIPAA). Any organization that uses, discloses, or maintains protected health data (PHI) must comply with the rules of HIPAA. As a company that handles PHI, Abbott needs to comply with HIPAA, and we're relying on you to help us do that. Throughout this course, you’ll learn about HIPAA and best practices for protecting PHI. |
161_string_14 |
Table of Contents |
162_string_15 |
Where to Get Help |
163_string_16 |
Reference Material |
164_string_17 |
Audio |
165_string_18 |
Exit |
166_string_19 |
Close |