{"id":8323,"date":"2019-05-29T16:01:27","date_gmt":"2019-05-29T23:01:27","guid":{"rendered":"https:\/\/www.knowledgecity.com\/blog\/?p=8323"},"modified":"2024-04-08T13:56:57","modified_gmt":"2024-04-08T20:56:57","slug":"hipaa-training-and-data-breaches-are-you-protected","status":"publish","type":"post","link":"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/","title":{"rendered":"HIPAA Training and Data Breaches: Are You Protected?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In November 2018,<\/span><a href=\"https:\/\/www.hipaajournal.com\/november-2018-healthcare-data-breach-report\/\"> <span style=\"font-weight: 400;\">3,230,063<\/span><\/a><span style=\"font-weight: 400;\"> health care records were exposed, stolen or disclosed without permission, according to the HIPAA Journal. Despite efforts to protect medical records and make sure employees understand what can and cannot be disclosed, breaches continue to occur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Despite an emphasis on cybersecurity, November 2018 was not only the worst month of the year but the second consecutive month there was an increase in breaches and record exposures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These are alarming statistics. In the first half of 2018, there were fewer exposures<\/span> <span style=\"font-weight: 400;\">in total than in just November alone. Since the Health Insurance Portability and Accountability Act was made into law in 1996, patients were assured this would protect the privacy of their medical records and ensure the confidentiality of their medical information. Even though<\/span><a href=\"https:\/\/www.nethealth.com\/a-history-of-electronic-medical-records-infographic\/\"> <span style=\"font-weight: 400;\">electronic medical records<\/span><\/a><span style=\"font-weight: 400;\"> were being used in the 1970s, it was the common use of computers in the 1990s that made electronic medical records widespread.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once the internet became the way for medical systems and offices to communicate, the possibility of record breaches became a real problem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Everyone has while some people have heard of HIPAA, but most people don\u2019t they may not really understand what it means in detail other than it should protect their records from unauthorized views, keep medical information confidential unless they give permission otherwise, and allow patients to view their own records. From the perspective of an employer,<\/span><a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/hipaa-simplification-201303.pdf\"> <span style=\"font-weight: 400;\">HIPAA<\/span><\/a><span style=\"font-weight: 400;\"> is a complex and constantly changing law requiring ongoing employee training to ensure the number of breaches does not keep increasing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For employers, data breaches are costly and damaging to their reputations.<\/span><a href=\"http:\/\/www.grouponehealthsource.com\/blog\/top-10-most-common-hipaa-violations\"> <span style=\"font-weight: 400;\">HIPAA violations<\/span><\/a><span style=\"font-weight: 400;\"> can be as high as $50,000 per occurrence with a maximum penalty of $1.5 million per violation.<\/span><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/b-8bQBBRyaw?start=24\" width=\"950\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><strong>What Are The Most Common Breaches?<\/strong><\/p>\n<p><strong>1.\u00a0Keeping Unsecured Records<br \/>\n<\/strong><span style=\"font-weight: 400;\">Records containing<\/span><a href=\"https:\/\/searchhealthit.techtarget.com\/definition\/personal-health-information\"> <span style=\"font-weight: 400;\">Protected (or Personal) Health Information (PHI)<\/span><\/a><span style=\"font-weight: 400;\"> should be kept in locked cabinets, or require secure passwords to access digitally.<\/span><\/p>\n<p><strong>2. Encrypted Data<br \/>\n<\/strong><span style=\"font-weight: 400;\">Although not required by HIPAA, encrypting data provides another layer of security so hackers don\u2019t get into the system. Some states have laws requiring encryption of PHI.<\/span><\/p>\n<p><strong>3. Hacking<br \/>\n<\/strong><span style=\"font-weight: 400;\">Keep antivirus software updated, use firewalls and unique passwords, and monitor your systems constantly.<\/span><\/p>\n<p><strong>4. Loss or Theft of Devices<br \/>\n<\/strong><span style=\"font-weight: 400;\">With the advent of portable devices storing data, the possibility for theft or loss becomes a concern. Encrypt the data, use password protection, and store the device in a secure location.<\/span><\/p>\n<p><strong>5. Gossiping\/Sharing PHI<br \/>\n<\/strong><span style=\"font-weight: 400;\">This is strictly off-limits, and breaches will result in fines. Employees should never discuss patients\u2019 medical information to any unauthorized person.<\/span><\/p>\n<p><strong>6. Employee Dishonest<br \/>\n<\/strong><span style=\"font-weight: 400;\">Viewing PHI by unauthorized personnel is a violation of HIPAA standards.<\/span><\/p>\n<p><strong>7. Improper Disposal Of Records<br \/>\n<\/strong><span style=\"font-weight: 400;\">Records need to be shredded, destroyed, or wiped from a hard drive.<\/span><\/p>\n<p><strong>8. Unauthorized Release Of Information<br \/>\n<\/strong><span style=\"font-weight: 400;\">Only family members of dependents or those with a Power of Attorney can have access.<\/span><\/p>\n<p><strong>9. Third-party Disclosures<br \/>\n<\/strong><span style=\"font-weight: 400;\">This is the area where training is needed the most. Who needs to know? Patients, doctors, billing departments, or related services are the usual recipients. It may be difficult to understand if someone should have access and data breaches can result.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the problems with HIPAA compliance training, besides the changing components of the law, is what needs to be included in a training program. There are no specific requirements for training mandated by HIPAA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some<\/span><a href=\"https:\/\/www.hipaajournal.com\/hipaa-training-requirements\/\"> <span style=\"font-weight: 400;\">basic areas<\/span><\/a><span style=\"font-weight: 400;\"> to keep your training effective and you protected:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">What is HIPAA?<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Why is HIPAA important?<\/span><\/li>\n<li><span style=\"font-weight: 400;\">HIPAA Definitions<\/span><\/li>\n<li><a href=\"https:\/\/www.hhs.gov\/hipaa\/for-individuals\/guidance-materials-for-consumers\/index.html\"><span style=\"font-weight: 400;\">Patients\u2019 rights<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.ama-assn.org\/practice-management\/hipaa\/hipaa-breach-notification-rule\"><span style=\"font-weight: 400;\">Breach notifications<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.medprodisposal.com\/what-is-a-baa\"><span style=\"font-weight: 400;\">BAA agreements<\/span><\/a><\/li>\n<li><a href=\"https:\/\/healthitsecurity.com\/news\/a-review-of-common-hipaa-administrative-safeguards\"><span style=\"font-weight: 400;\">Safeguarding ePHI<\/span><\/a><\/li>\n<li><span style=\"font-weight: 400;\">Potential violations<\/span><\/li>\n<li><a href=\"https:\/\/www.tier3md.com\/hipaa-sanction-policy\/\"><span style=\"font-weight: 400;\">Employee sanctions<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">There are many effective online providers of HIPAA compliance training, usually done through a Learning Management System<\/span><a href=\"http:\/\/www.knowledgecity.com\/\"> <span style=\"font-weight: 400;\">(LMS<\/span><\/a><span style=\"font-weight: 400;\">). Effective training should contain interactive activities, real-life scenarios, immediate feedback on choices and why they are right or wrong, and examples of problems the employees will face and how they were are concluded successfully.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A HIPAA <\/span><a href=\"https:\/\/www.knowledgecity.com\/en\/learningLibrary\"><span style=\"font-weight: 400;\">compliance training course<\/span><\/a><span style=\"font-weight: 400;\"> helps inform and educate your employees on the latest regulations to follow.<\/span><\/p>\n<p><strong>Why Choose Online Training For HIPAA?<\/strong><\/p>\n<p><strong>1. Self-Paced<\/strong><br \/>\n<span style=\"font-weight: 400;\">Navigate the course at a pace that fits your learning style.<\/span><\/p>\n<p><strong>2. Convenient<br \/>\n<\/strong><span style=\"font-weight: 400;\">Learn on your schedule-without the inconvenience of time away from the office.\u00a0<\/span><\/p>\n<p><strong>3. Expert-Created Content<br \/>\n<\/strong><span style=\"font-weight: 400;\">Take a deep-drive into a topic with content development by industry leaders.<\/span><\/p>\n<p><strong>4. Cost-Effective<br \/>\n<\/strong><span style=\"font-weight: 400;\">Save when you choose affordably-priced training with no additional travel costs.<\/span><\/p>\n<p><strong>Next Steps<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">HIPAA is a complicated yet necessary law to govern our changing healthcare health care system. Without it, sensitive information could fall into the wrong hands, resulting in fines and a lack of trust from the community. If your HIPAA training is in need of a makeover, don\u2019t hesitate. Do it today.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ready to start your compliance training? The KnowledgeCity <\/span><a href=\"https:\/\/www.knowledgecity.com\/en\/learningLibrary\"><span style=\"font-weight: 400;\">Learning Library<\/span><\/a><span style=\"font-weight: 400;\"> offers more than 14,000 online video courses. Each course features interactive exercises that can be easily customized to include your company\u2019s information. Jump start your program today.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In November 2018, 3,230,063 health care records were exposed, stolen or disclosed without permission, according to the HIPAA Journal. Despite efforts to protect medical records and&#8230;<\/p>\n","protected":false},"author":5,"featured_media":8350,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":""},"categories":[4001,120,126,34],"tags":[39,472,3508,3507],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HIPAA Training and Data Breaches: Are You Protected?<\/title>\n<meta name=\"description\" content=\"Discover how robust HIPAA training can shield your organization from data breaches and strengthen patient data protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HIPAA Training and Data Breaches: Are You Protected?\" \/>\n<meta property=\"og:description\" content=\"Discover how robust HIPAA training can shield your organization from data breaches and strengthen patient data protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/\" \/>\n<meta property=\"og:site_name\" content=\"KnowledgeCity\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnowledgeCity\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-29T23:01:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-08T20:56:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.knowledgecity.com\/blog\/wp-content\/uploads\/2019\/05\/HIPAA-lock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Knowledge_City\" \/>\n<meta name=\"twitter:site\" content=\"@Knowledge_City\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"KnowledgeCity\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.knowledgecity.com\/blog\/#website\",\"url\":\"https:\/\/www.knowledgecity.com\/blog\/\",\"name\":\"KnowledgeCity\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.knowledgecity.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.knowledgecity.com\/blog\/wp-content\/uploads\/2019\/05\/HIPAA-lock.jpg\",\"contentUrl\":\"https:\/\/www.knowledgecity.com\/blog\/wp-content\/uploads\/2019\/05\/HIPAA-lock.jpg\",\"width\":1200,\"height\":600},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/#webpage\",\"url\":\"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/\",\"name\":\"HIPAA Training and Data Breaches: Are You Protected?\",\"isPartOf\":{\"@id\":\"https:\/\/www.knowledgecity.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/#primaryimage\"},\"datePublished\":\"2019-05-29T23:01:27+00:00\",\"dateModified\":\"2024-04-08T20:56:57+00:00\",\"author\":{\"@id\":\"https:\/\/www.knowledgecity.com\/blog\/#\/schema\/person\/b9b8256f9b75ae1e344f74de240a4edd\"},\"description\":\"Discover how robust HIPAA training can shield your organization from data breaches and strengthen patient data protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/\"]}]},{\"@type\":\"BreadcrumbList\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@id\":\"https:\/\/www.knowledgecity.com\",\"name\":\"KnowledgeCity\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@id\":\"https:\/\/www.knowledgecity.com\/blog\/\",\"name\":\"Blog\"}},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"HIPAA Training and Data Breaches: Are You Protected?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.knowledgecity.com\/blog\/#\/schema\/person\/b9b8256f9b75ae1e344f74de240a4edd\",\"name\":\"KnowledgeCity\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.knowledgecity.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.knowledgecity.com\/blog\/wp-content\/uploads\/2023\/06\/user-96x96.png\",\"contentUrl\":\"https:\/\/www.knowledgecity.com\/blog\/wp-content\/uploads\/2023\/06\/user-96x96.png\",\"caption\":\"KnowledgeCity\"},\"sameAs\":[\"http:\/\/knowledgecity.com\"],\"url\":\"https:\/\/www.knowledgecity.com\/blog\/author\/raynie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HIPAA Training and Data Breaches: Are You Protected?","description":"Discover how robust HIPAA training can shield your organization from data breaches and strengthen patient data protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/","og_locale":"en_US","og_type":"article","og_title":"HIPAA Training and Data Breaches: Are You Protected?","og_description":"Discover how robust HIPAA training can shield your organization from data breaches and strengthen patient data protection.","og_url":"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/","og_site_name":"KnowledgeCity","article_publisher":"https:\/\/www.facebook.com\/KnowledgeCity\/","article_published_time":"2019-05-29T23:01:27+00:00","article_modified_time":"2024-04-08T20:56:57+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.knowledgecity.com\/blog\/wp-content\/uploads\/2019\/05\/HIPAA-lock.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@Knowledge_City","twitter_site":"@Knowledge_City","twitter_misc":{"Written by":"KnowledgeCity","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.knowledgecity.com\/blog\/#website","url":"https:\/\/www.knowledgecity.com\/blog\/","name":"KnowledgeCity","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knowledgecity.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.knowledgecity.com\/blog\/wp-content\/uploads\/2019\/05\/HIPAA-lock.jpg","contentUrl":"https:\/\/www.knowledgecity.com\/blog\/wp-content\/uploads\/2019\/05\/HIPAA-lock.jpg","width":1200,"height":600},{"@type":"WebPage","@id":"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/#webpage","url":"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/","name":"HIPAA Training and Data Breaches: Are You Protected?","isPartOf":{"@id":"https:\/\/www.knowledgecity.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/#primaryimage"},"datePublished":"2019-05-29T23:01:27+00:00","dateModified":"2024-04-08T20:56:57+00:00","author":{"@id":"https:\/\/www.knowledgecity.com\/blog\/#\/schema\/person\/b9b8256f9b75ae1e344f74de240a4edd"},"description":"Discover how robust HIPAA training can shield your organization from data breaches and strengthen patient data protection.","breadcrumb":{"@id":"https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knowledgecity.com\/blog\/hipaa-training-and-data-breaches-are-you-protected\/"]}]},{"@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"item":{"@id":"https:\/\/www.knowledgecity.com","name":"KnowledgeCity"}},{"@type":"ListItem","position":2,"item":{"@id":"https:\/\/www.knowledgecity.com\/blog\/","name":"Blog"}},{"@type":"ListItem","position":3,"name":"HIPAA Training and Data Breaches: Are You Protected?"}]},{"@type":"Person","@id":"https:\/\/www.knowledgecity.com\/blog\/#\/schema\/person\/b9b8256f9b75ae1e344f74de240a4edd","name":"KnowledgeCity","image":{"@type":"ImageObject","@id":"https:\/\/www.knowledgecity.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.knowledgecity.com\/blog\/wp-content\/uploads\/2023\/06\/user-96x96.png","contentUrl":"https:\/\/www.knowledgecity.com\/blog\/wp-content\/uploads\/2023\/06\/user-96x96.png","caption":"KnowledgeCity"},"sameAs":["http:\/\/knowledgecity.com"],"url":"https:\/\/www.knowledgecity.com\/blog\/author\/raynie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/posts\/8323"}],"collection":[{"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/comments?post=8323"}],"version-history":[{"count":15,"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/posts\/8323\/revisions"}],"predecessor-version":[{"id":22128,"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/posts\/8323\/revisions\/22128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/media\/8350"}],"wp:attachment":[{"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/media?parent=8323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/categories?post=8323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knowledgecity.com\/blog\/wp-json\/wp\/v2\/tags?post=8323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}