The Most Flexible Training — Guaranteed
Award-winning IT and security training personalized to how, when and where you learn best.
Browse our massive catalog of security awareness training tailored to industry, role, language and learning style.
This brief video extrapolates on how many people are authorized to access one person's health records.
This module details best practices for detecting and reporting unauthorized Protected Health Information (PHI) disclosures. Topics include HIPAA’s definition of a breach, breach disclosure requirements (including the concept of “safe harbor”) and recommended breach detection and notification methods.
This module defines criminal justice information (CJI), the protocols required to access and handle CJI and the consequences of noncompliance.