This CEAP Certificate course offers training on basic security and encryption strategies for healthcare environments.Federal regulations specifically exempt encrypted Protected Health Information (PHI) from breach reporting requirements. A lost laptop containing unencrypted PHI is a major breach and a financial and reputational disaster. The same laptop with encrypted data is not a reportable breach. But HIPAA calls for encryption of all ePHI, whether it is stored or transmitted. This session will focus on pragmatic strategies for providers to encrypt PHI.
Upon completion of this continuing medical education activity, participants should be able to:
- Define federal healthcare regulations on encryption
- Demonstrate working knowledge of the difference between data at rest and data in transmission
- Discuss strategies for full-disk encryption
- Enumerate advantages of hardware-based encryption
- Identify scenarios that require Business Associate Agreements with vendors
- Review the advantages of using cloud-based storage
- Describe the advantages of using a patient portal and EHR messaging
- Determine whether encrypted email is appropriate for their needs
- Identify compliant solutions for chat and text