Welcome to Pedagogy   |   Sign In
Shopping cart Shopping Cart
Your shopping cart is empty

Class Catalog

Class Author
Diane Evans

Diane Evans is Publisher of MyHIPAAGuide.com, a news and information service that helps HIPAA-covered organizations understand their responsibilities. 

Read Diane Evans's Full Bio...
Class Accreditation
Provider approved by the California Department of Public Health, Nurse Aide Certification (NAC) #: 7046. This document must be retained by the certified nurse assistant for a period of four years after the course completion. Provider approved by the Florida Board of Nursing-Certified Nursing Assistants, CE Broker Provider #: 50-13256.
What Others are Saying

Social Media Rules for Nurse Aides - Online Inservice

Contact Hours: 1
Cost: $10.00
You must be signed in to purchase classes.
Users Sign In Here
Social Media Rules for Nurse Aides - Online Inservice

Even if your employer is following patient privacy rules, staff can create big problems by irresponsibly taking photos of patients, and worse yet, sharing them on social media. In some cases, complaints related to images of wounds and procedures photographed on personal phones and then shared.

Education can prevent violations of patient rights, create a culture of vigilance within an organization, save healthcare providers the cost of fines and settlements (often in 7 figures), and prevent the loss of your certification and employment.




Objectives


Upon successful completion of this course, the participant will be able to:

  1. Define Protected Health Information (PHI).
  2. Identify the kind of daily carelessness that threatens PHI.
  3. State the role of staff in protecting PHI.
  4. Recognize obvious risks that should be reported to appropriate supervisors.
  5. List 3 personal responsibilities that contribute to a culture of vigilance in protecting PHI.

Curriculum


Chapter 1: Privacy & Security Regulations and Internet Challenges

Chapter 2: Big Enemies in Carelessness & Neglect

Chapter 3: Put Safeguards in Place

Chapter 4: Protecting Patient Information

Chapter 5: Conclusion

Chapter 6: Sources

Copyright © 2021 Pedagogy, Inc. All Rights Reserved.



Powered by Kentico