Course Summary:

This comprehensive online program provides an in-depth analysis of the Security Standards for the Protection of Electronic Protected Health Information (ePHI), as established by the Department of Health and Human Services (HHS). Unlike general privacy training, this course focuses on the technical and operational infrastructure required to safeguard digital health data. The curriculum covers the critical intersection of cybersecurity, risk management, and federal compliance to ensure the confidentiality, integrity, and availability of sensitive patient information in a modern digital landscape. Target Professional Disciplines: Physicians, Nurses, Nurse Practitioners, Physician Assistants, Social Workers, Psychologists, Case Managers, Care Coordinators, Crisis Workers, Emergency Department professionals, and community mental-health personnel.

Problem / Gap Statement

Fragmentation across behavioral health, medical, legal, and crisis systems leads to poor treatment continuity, caregiver confusion, ineffective crisis intervention, and negative outcomes for individuals with severe mental illness. Clinicians often lack a unified framework to coordinate care across these interrelated systems.

Evidence of Gap

  • High readmission and crisis-cycle recurrence rates

  • Frequent breakdowns in communication between families and clinical teams

  • Inconsistent application of crisis protocols

  • Provider burnout tied to lack of system clarity

  • Literature showing poor care transitions increase morbidity and caregiver distress

At the end of this course, learners will be able to

  •  Differentiate between the HIPAA Privacy Rule and the Security Rule, specifically identifying the unique technical requirements of ePHI.

  •  Analyze the three pillars of HIPAA safeguards—Administrative, Physical, and Technical—and evaluate how they apply to various healthcare environments.

  •  Conduct a foundational Risk Analysis as required by 45 CFR § 164.308(a)(1) to identify potential vulnerabilities and threats to data security.

  • Implement best practices for access control, including encryption standards, audit controls, and multi-factor authentication (MFA).

  • Formulate an incident response and disaster recovery plan that aligns with federal reporting requirements in the event of a data breach or system failure

  • Apply the "Reasonable and Appropriate" standard to organizational security policies to balance operational efficiency with compliance

Course curriculum

  • 1

    Introduction to HIPAA: PHI

    • Introduction to HIPAA and PHI

  • 2

    Covered Entities

    • HIPAA Section 2: Covered Entities

  • 3

    The Privacy Rule; Disclosure

    • The Privacy Rule; Disclosure

  • 4

    Privacy Rule; Individual Rights and Admin Requirements

    • Privacy Rule; Individual Rights and Admin Requirements

  • 5

    Risk Analysis and the Breach/Notification Rule

    • Risk Analysis and the Breach/Notification Rule

  • 6

    Bonus Material

    • HIPAA Cheat Sheets

Instructional Methods

  • Case-based learning

  • Micro-lessons and short video segments

  • Reflective exercises

  • Post-test and scenario assessments

About the instructor

Senior Consultant

Michael Mackniak, JD

Michael Mackniak is an attorney, innovator and strategist.He specializes in coaching wellness professionals: caregivers, decision-makers and fiduciaries to develop comprehensive formulas in order to obtain the necessary services for their loved ones, friends or clients.Michael provides a team approach to consultation on the most difficult and challenging cases. He holds a law degree from Quinnipiac University, a master’s degree in nonprofit management from Bay Path University, is a National Certified Guardian and a certified brain injury specialist. His programs have received multiple awards and honors including national recognition from Eli Lily’s “Welcome Back Award”, NAMI’s “Hero Award” and the 2015 National College of Probate Judge’s “Isabella Award.”Michael is the nation’s foremost speaker on interrelated human service systems and developing efficient and effective methods for the delivery of needed resources to our most at need populations. He has lectured across the United States demonstrating the effectiveness of proactive planning in avoiding costly and ineffective interventions in all service settings. Commissioners, administrators, directors and clinicians utilize his practical approach to challenging systems issues in a world of decreasing resources and increasing expectations."Saving Melissa: The Seven 7C's for Curing the Mental Health System" offers readers insight and strategies into the process on creating an interrelated service system in their community. The book acts as a guide to all “Helping Professionals” wishing to deliver meaningful programming in the most effective and efficient manner.

Conflict of Interest (COI) Disclosure & Management

  • All faculty have completed COI disclosures

  • No relevant financial relationships with ineligible companies.

  • Content reviewed by independent planner to ensure absence of commercial bias

  • All recommendations are evidence-based or reflect best-practice guidelines.

Learning Assessment & Evaluation Plan

Assessment Tools:

  • Post-test (multiple choice + case questions)

  • Scenario-based application items

  • Reflection exercises (non-graded)

Evaluation Form Will Measure:

  • Achievement of learning objectives

  • Relevance to professional practice

  • Perceived bias or influence

  • Intent to change practice

  • Satisfaction with format and instruction

A passing score of ≥ 80% will be required for CE credit

Standards of Educational Independence:

The Guardian Model activity is fully independent of commercial influence. No industry funding, sponsorship, or promotional relationships exist. All content is evidence-informed and developed solely by qualified experts.

Credit Calculation & Certificate Process

CE credit is calculated using the standard formula:

1 hour of instruction = 1 CE credit

Certificates will include:

  • Learner name

  • Title of activity

  • Date completed

  • Number/type of credits awarded

  • Accreditation statement

  • Provider signature