Aron Mesterbasic
The HealthCare Information Security and Privacy Practitioner (HCISPP) is the ideal certification for those with the core knowledge and experience needed to implement, manage or assess the appropriate security and privacy controls of a healthcare organization.
Your course package is designed to provide maximum learning and convenience. This is included in the price of your course:
Your expert instructor will get you ready for the following exam and certification, which are not included in your course package.
You´ll have the perfect starting point for your training with these prerequisites:
Candidates must have a minimum of two years cumulative paid work experience in one or more knowledge areas of the HCISPP Common Body of Knowledge (CBK) that includes security, compliance and privacy. Legal experience may be substituted for compliance and information management experience may be substituted for privacy. Of the two years of experience, one of those years must be in the healthcare industry.
Don't have the necessary experience?
If you don't yet have the necessary experience, you can still take this course but won't achieve the HCISPP certification. Instead, (ISC)² will grant you “Associate of (ISC)²” status after you pass your HCISPP examination.
Using our engaging learning methodology including a variety of tools, we’ll cover the entire curriculum.
Domain 1: Healthcare Industry
1.1 Understand the Healthcare Environment Components
- Types of Organizations in the Healthcare Sector (e.g., providers, pharma, payers)
- Health Insurance (e.g., claims processing, payment models, health exchanges, clearing houses)
- Coding (e.g., Systematized Nomenclature of Medicine Clinical Terms (SNOMED CT),
International Classification of Diseases (ICD) 10)
- Revenue Cycle (i.e., billing, payment, reimbursement)
- Workflow Management
- Regulatory Environment
- Public Health Reporting
- Clinical Research (e.g., processes)
- Healthcare Records Management
1.2 Understand Third-Party Relationships
- Vendors
- Business Partners
- Regulators
- Other Third-Party Relationships
1.3 Understand Foundational Health Data Management Concepts
- Information Flow and Life Cycle in the Healthcare Environments
- Health Data Characterization (e.g., classification, taxonomy, analytics)
- Data Interoperability and Exchange (e.g., Health Level 7 (HL7), International Health Exchange (IHE), Digital
- Imaging and Communications in Medicine (DICOM))
- Legal Medical Records
Domain 2: Information Governance in Healthcare
2.1 Understand Information Governance Frameworks
- Security Governance (e.g., charters, roles, responsibilities)
- Privacy Governance (e.g., charters, roles, responsibilities)
2.2 Identify Information Governance Roles and Responsibilities
2.3 Align Information Security and Privacy Policies, Standards and Procedures
- Policies
- Standards
- Processes and Procedures
2.4 Understand and Comply with Code of Conduct/Ethics in a Healthcare Information Environment
- Organizational Code of Ethics
- (ISC)² Code of Ethics
Domain 3: Information Technologies in Healthcare
3.1 Understand the Impact of Healthcare Information Technologies on Privacy and Security
- Increased Exposure Affecting Confidentiality, Integrity and Availability (e.g., threat landscape)
- Oversight and Regulatory Challenges
- Interoperability
- Information Technologies
3.2 Understand Data Life Cycle Management (e.g., create, store, use, share, archive, destroy)
3.3 Understand Third-Party Connectivity
- Trust Models for Third-Party Interconnections
- Technical Standards (e.g., physical, logical, network connectivity)
- Connection Agreements (e.g., Memorandum of Understanding (MOU), Interconnection Security Agreements (ISAs))
Domain 4: Regulatory and Standards Environment
4.1 Identify Regulatory Requirements
- Legal Issues that Pertain to Information Security and Privacy for Healthcare Organizations
- Data Breach Regulations
- Protected Personal and Health Information (e.g., Personally Identifiable Information (PII), Personal Health Information (PHI))
- Jurisdiction Implications
- Data Subjects
- Research
4.2 Recognize Regulations and Controls of Various Countries
- Treaties
- Laws and Regulations (e.g., European Union (EU) Data Protection Directive, Health Insurance Portability and Accountability Act /Health Information Technology for Economic and Clinical Health (HIPAA/HITECH), General Data Protection Regulation (GDPR), Personal Information Protection and Electronic Documents Act (PIPEDA))
4.3 Understand Compliance Frameworks
- Privacy Frameworks (e.g., Organization for Economic Cooperation and Development (OECD) Privacy principles, Asia-Pacific Economic Cooperation (APEC), Generally Accepted Privacy Principles (GAPP))
- Security Frameworks (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST), Common Criteria (CC))
Domain 5: Privacy and Security in Healthcare
5.1 Understand Security Objectives/Attributes
- Confidentiality
- Integrity
- Availability
5.2 Understand General Security Definitions and Concepts
- Identity and Access Management (IAM)
- Data Encryption
- Training and Awareness
- Logging, Monitoring and Auditing
- Vulnerability Management
- Segregation of Duties
- Least Privilege (Need to Know)
- Business Continuity (BC)
- Disaster Recovery (DR)
- System Backup and Recovery
5.3 Understand General Privacy Definitions and Concepts
- Consent/Choice
- Limited Collection/Legitimate Purpose/Purpose Specification
- Disclosure Limitation/Transfer to Third-Parties/ Trans-border Concerns
- Access Limitation
- Accuracy, Completeness and Quality
- Management, Designation of Privacy Officer, Supervisor Re-authority, Processing Authorization and Accountability
- Training and Awareness
- Transparency and Openness (e.g., notice of privacy practices)
- Proportionality, Use and Disclosure, and Use Limitation
- Access and Individual Participation
- Notice and Purpose Specification
- Events, Incidents and Breaches
5.4 Understand the Relationship Between Privacy and Security
- Dependency
- Integration
5.5 Understand Sensitive Data and Handling
- Sensitivity Mitigation (e.g., de-identification, anonymization)
- Categories of Sensitive Data (e.g., behavioral health)
Domain 6: Risk Management and Risk Assessment
6.1 Understand Enterprise Risk Management
- Information Asset Identification
- Asset Valuation
- Exposure
- Likelihood
- Impact
- Threats
- Vulnerability
- Risk
- Controls
- Residual Risk
- Acceptance
6.2 Understand Information Risk Management Framework (RMF) (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST))
6.3 Understand Risk Management Process
- Definition
- Approach (e.g., qualitative, quantitative)
- Intent
- Life Cycle/Continuous Monitoring
- Tools/Resources/Techniques
- Desired Outcomes
- Role of Internal and External Audit/Assessment
6.4 Identify Control Assessment Procedures Utilizing Organization Risk Frameworks
6.5 Participate in Risk Assessment Consistent with the Role in Organization
- Information Gathering
- Risk Assessment Estimated Timeline
- Gap Analysis
- Mitigating Actions
- Avoidance
- Transfer
- Acceptance
- Communications and Reporting
6.6 Understand Risk Response (e.g., corrective action plan)
6.7 Utilize Controls to Remediate Risk (e.g., preventative, detective, corrective)
- Administrative
- Physical
- Technical
6.8 Participate in Continuous Monitoring
Domain 7: Third-Party Risk Mangament
7.1 Understand the Definition of Third-Parties in Healthcare Context
7.2 Maintain a List of Third-Party Organizations
- Third-Party Role/Relationship with the Organization
- Health Information Use (e.g., processing, storage, transmission)
7.3 Apply Management Standards and Practices for Engaging Third-Parties
- Relationship Management
7.4 Determine When a Third-Party Assessment Is Required
- Organizational Standards
- Triggers of a Third-Party Assessment
7.5 Support Third-Party Assessments and Audits
- Information Asset Protection Controls
- Compliance with Information Asset Protection Controls
- Communication of Results
7.6 Participate in Third-Party Remediation Efforts
- Risk Management Activities
- Risk Treatment Identification
- Corrective Action Plans
- Compliance Activities Documentation
7.7 Respond to Notifications of Security/Privacy Events
- Internal Processes for Incident Response
- Relationship Between Organization and Third-Party Incident Response
- Breach Recognition, Notification and Initial Response
7.8 Respond to Third-Party Requests Regarding Privacy/Security Events
- Organizational Breach Notification Rules
- Organizational Information Dissemination Policies and Standards
- Risk Assessment Activities
- Chain of Custody Principles
7.9 Promote Awareness of Third-Party Requirements
- Information Flow Mapping and Scope
- Data Sensitivity and Classification » Privacy and Security Requirements
- Risks Associated with Third-Parties
The Virtual Classroom is an online room, where you will join your instructor and fellow classmates in real time. Everything happens live and you can interact freely, discuss, ask questions, and watch your instructor present on a whiteboard, discuss the courseware and slides, work with labs, and review.
Yes, you can sit exams from all the major Vendors like Microsoft, Cisco etc from the comfort of your home or office.
With Readynez you do any course form the comfort of your home or office. Readynez provides support and best practices for your at-home classroom and you can enjoy learning with minimal impact on your day-to-day life. Plus you'll save the cost and the environmental burden of travelling.
Well, learning is limitless, when you are motivated, but you need the right path to achieve what you want. Readynez consultants have many years of experience customizing learner paths and we can design one for you too. We are always available with help and guidance, and you can reach us on the chat or write us at info@readynez.com.