HIPAA Professional Education Voiceover

Profile photo for Kristen Sherrill
Not Yet Rated
0:00
Elearning
1
0

Description

A voiceover that I was hired to do by a business looking for HIPAA training for their employees.

Vocal Characteristics

Language

English

Voice Age

Young Adult (18-35)

Accents

North American (General)

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
in this section will be covering hip and Hip a high tech specifically. What is HipAA and Hip a high tech? How does it affect you? Hip a high tech ruling as it relates to T. C. N. And what happens if you're not compliant? HIPPA is a set of federal regulations mandating the way patient health information is to be treated by health care professionals. HipAA high tech is a set of guidelines that focuses on E. P. H. I. Stored on a digital medium such as computers, external hard drives and online or cloud storage coders and auditors for T. C. N. Need to adhere to both. But hip a high tech is far more detailed in how E. P. H. I. Is to be handled. HIPPA. High tech mandates the proper handling of E. P. H. I. On your systems whether at an office or at home. It explains where you can and cannot story ph I and dictates how you must dispose of your hard drives once you stop coding or when you wish to get new hardware, it influences the steps you need to take in order to code for the coding network and requires limiting access and exposure of E. P. H. I. To unauthorized persons and safeguarding it from hackers and viruses. When E P. H. I must be shared only the bare minimum of what is needed to identify. The patient must be used such as initials or a record number. Ph I must be sent over a secure encrypted and traceable connection, share file a bridge, secure email et cetera, proper disclaimers must be used for any communication holding ph I. The confidentiality disclaimer at the bottom of the signature is a must to protect these kinds of email disclosures. If you need a copy of that confidentiality disclaimer please reach out to your project manager or support at coding network dot com and we'll be happy to provide that to you. Hard drives that contain any ph I even for a short while must be encrypted under a S. To 56 protocol. We're gonna discuss that more in the whole disk encryption section when you stop using a computer for coding the hard drives that once held ph I need to either be fully formatted with the old partition deleted, magnetically dig caused or physically destroyed. You can't just delete the data to be compliant. There are a number of organizations that will giggles or destroy the hard drive and provide you with a certificate that says that this was destroyed in the proper fashion. You will need to keep that for your records in case you're ever audited by the government. Do not bring any device containing E. P. H. I to repair or service centre unless it is hip a compliant and they will sign A. B. A. With you or T. C. N. You can take it to a repair shop if your computer never leaves your site and you see everything they are doing but under no circumstances can you take it to best buy or circuit city or something like that and just say hey my computer's broken I'm gonna leave it with you. Can you fix it? Um They have to sign a. B. A. With either you or T. C. N. Um And if they won't then you have to go somewhere else. The easiest way that we found to find computer repair is to do a google search for hipaa compliant computer repair near me. Um If it's an issue that we at TC and I. T. Cannot help you with if you suspect your computer is infected with a virus or malware, do not clean or wipe the system and restore it, notify T. C. N. I. T. So we can determine if there is a potential for a data breach and document it all. E. P. H. I must be removed from your computer. We'll cover that in greater detail later on. T. C. N. Will be providing virtual desktops to certain contractors as necessary. And we will be updating the compliance plan for your review and signature. Both T. C. N. And the federal government have the right to audit your system for compliance T. C. N. Due to your contract and the government due to the act itself we do quarterly audits. So once every three months you'll receive an email um saying that it's time for your quarterly audit. This is why we do that. You can and should be audited for every device whether it's a pc a tablet or laptop, whatever it is that you use or access e. PH ion. If TC an audit, you and you are found to be non compliant, your status can be marked as inactive until you become compliant. While inactive. You cannot work on or access any T. C. N. Client projects or data. If the government on it's you and you are found to be non compliant, you can be fined and the client who's ph I was compromised will likely litigate against T. C. N. As well as yourself. You are a contractor and are not protected from being individually named in a lawsuit.