HIPAA - Security Rule for Business Associates

  • 5 topics | 33m
  • Up to 30 languages
  • Transcripts
This course provides employees of business associates (as defined by HIPAA) with an overview of the security obligations that apply to their organizations with respect to electronically stored and transmitted PHI. It explains the importance of compliance, the different kinds of safeguards that business associates are required to put in place, and the role of individual employees in preventing data breaches. Employees are advised on best practices to reduce risks to e-PHI, including how to achieve better security when e-mailing, browsing the web, or remotely accessing e-PHI. This course was developed with subject matter support provided by the Labor & Employment Law Group of the law firm of Baker, Donelson, Bearman, Caldwell & Berkowitz, PC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with any federal, state, or local laws. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking professional counsel. The information contained herein is provided only as general information that may or may not reflect the most current legal developments. This information is not provided in the course of an attorney-client relationship and is not intended to constitute legal advice or to substitute for obtaining legal advice from an attorney licensed in your state.


  • recognize the goals of HIPAA's Security Rule
  • recognize why it's important to comply with the HIPAA Security Rule
  • recognize examples of the types of safeguards required by the HIPAA Security Rule
  • handle e-PHI appropriately, according to the HIPAA Security Rule
  • identify security practices for e-mail and remote access
  • identify how to safeguard electronic protected health information in accordance with the HIPAA Security Rule


  • The HIPAA Security Rule and e-PHI
  • HIPAA Security Rule Safeguards
  • Basic Security for e-PHI
  • Security Practices for E-mail and Remote Access
  • Knowledge Check: Complying with the Security Rule