Advanced HIPAA Compliance for the Dental Professional
NOTE: Our Advanced HIPAA course is pending QM Certification through Quality Matters™. QM™ is globally recognized organization leading quality assurance in online and innovative digital teaching and learning environments.
Overview
This advanced course is designed for dental professionals ready to deepen their expertise in HIPAA compliance and confidently navigate today’s rapidly evolving privacy and security landscape. Through practical guidance, real‑world scenarios, and actionable strategies, you’ll learn how to protect patient information, strengthen your practice’s compliance posture, and reduce risk across digital and clinical workflows.
The curriculum goes beyond the basics, offering a comprehensive exploration of the Privacy Rule, Security Rule, Breach Notification requirements, interoperability expectations, and emerging challenges such as third‑party tracking technologies and AI‑driven tools.
Whether you oversee compliance or play a key role in safeguarding patient data, this course equips you with the knowledge and skills to lead confidently and uphold the highest standards of regulatory excellence.
Upon successfully completing this course, you will be eligible to take the Credentials Exam to earn the designation of Certified Dental Specialist in HIPAA (CDSH® ). Please visit the Maintaining Credentials page for information and requirements for maintaining your credential.
Who should take this course:
This course is designed for dental professionals who want to lead compliance with confidence—whether you’re currently responsible for OSHA oversight or seeking to expand your role. It’s especially valuable for Compliance Coordinators, administrators, managers, consultants, dentists, and anyone committed to advancing their career through recognized compliance expertise.
Outline
Introduction and Welcome
- Instructor introduction
- Course Syllabus
- Grading Rubric
Section 1 History of Privacy and Privacy Laws
- Privacy and Security Rules
- HITECH Act and Omnibus Rule
Section 2 Privacy Rule
- Who must comply
Permitted uses and disclosures of PHI
Administrative requirements
Section 3 Security Rule
- Administrative safeguards
- Physical safeguards
- Technical safeguards
- Risk analysis and breach notification
Final Coursework Assignments