Shopping cart Shopping Cart
Your shopping cart is empty

Class Catalog

Inservice
Select a class below for a detailed description, curriculum and accreditation information

Single Classes

Class Author

Diane Evans

Diane Evans is Publisher of MyHIPAAGuide.com, a news and information service that helps HIPAA-covered organizations understand their responsibilities. 

Read Diane Evans's Full Bio...

Class Accreditation

Provider approved by the California Department of Public Health, Nurse Aide Certification (NAC) #: 7046. This document must be retained by the certified nurse assistant for a period of four years after the course completion. Provider approved by the Florida Board of Nursing-Certified Nursing Assistants, CE Broker Provider #: 50-13256.

Social Media Rules for Nurse Aides - Online Inservice

Contact Hours: 1
Cost: $10.00

You must be signed in to purchase classes.
Users Sign In Here
Social Media Rules for Nurse Aides - Online Inservice

Even if your employer is following patient privacy rules, staff can create big problems by irresponsibly taking photos of patients, and worse yet, sharing them on social media. In some cases, complaints related to images of wounds and procedures photographed on personal phones and then shared.

Education can prevent violations of patient rights, create a culture of vigilance within an organization, save healthcare providers the cost of fines and settlements (often in 7 figures), and prevent the loss of your certification and employment.

Objectives

Upon successful completion of this course, the participant will be able to:

  1. Define Protected Health Information (PHI).
  2. Identify the kind of daily carelessness that threatens PHI.
  3. State the role of staff in protecting PHI.
  4. Recognize obvious risks that should be reported to appropriate supervisors.
  5. List 3 personal responsibilities that contribute to a culture of vigilance in protecting PHI.

Curriculum

Chapter 1: Privacy & Security Regulations and Internet Challenges

Chapter 2: Big Enemies in Carelessness & Neglect

Chapter 3: Put Safeguards in Place

Chapter 4: Protecting Patient Information

Chapter 5: Conclusion

Chapter 6: Sources