DQS Certified HIPAA Experts for Privacy Security (DCHEPS)

After the completion of the course candidate can take the Exam. Minimum passing percentage is 70%. There will be 100 questions, comprising of subjective, objective, true/false, fill in the blanks and multiple choice questions. Only successful candidate will be eligible to receive HIPAA Certification for DQS Certified HIPAA Experts for Privacy Security (DCHEPS).

Duration for the Exam will of ONE Hour. After successful completion of the Exam, you will receive the Certificate in Soft Copy and you can print that certificate.

In case you did not complete the Exam successfully, you can take a retake for the Exam for a fee.


Total Course Duration: 24 hours Number of Total Slides: 700 slides

Total Chapters: 24

Cost of online training and certification test: $750 ($999 with the manual)

Certification Test Only: $120 per attempt


Course for DQS Certified HIPAA Experts for Privacy Security (DCHEPS) has been divided into following chapters:

Chapter 1 – HIPAA Basics

  • Overview of HIPAA Laws
  • Know about HIPAA Administrative Simplification Title
  • Know about Non-compliance and different civil and criminal penalties
  • Learn about key organizations associated with administering HIPAA Administrative Simplification provisions
  • Definitions and Terms of HIPAA

Chapter 2 – Overview of Transactions and Code Sets

  • Overview of HIPAA standard transactions
  • Overview of Code Sets
  • Why need HIPAA Standards and Code Sets

Chapter 3 – ANSI X12 and NCPDP transactions

  • Know about ANSI ASC X12 and NCPDP transactions
  • Learn how to examine  ANSI ASC X12 and NCPDP transactions

Chapter 4 – Learn about Code Sets and National Identifiers

  • Learn about approved HIPAA transaction code sets
  • Learn about adopted national identifiers that can be used with HIPAA covered transactions to identify entities or individuals

Chapter 5 – HIPAA and Health Data security and privacy requirements

  • Learn about HIPAA and health information and its exchange
  • HIPAA Privacy Rule and steps for compliance
  • HIPAA Security Rule and steps for compliance
  • What is compliance framework

Chapter 6 – HIPAA Privacy Rule

  • Learn about basic needs, key words, and understand the concepts of privacy

Chapter 7 – HIPAA Privacy Policy – organizational and personal relationships, rights and obligations

  • Know Organizational HIPAA Responsibilities
  • Interpretation of individual privacy rights

Chapter 8 – Privacy Rule – Notice of Privacy Practices

  • Know about HIPAA Privacy notices and authorization
  • Know about drafting documented and electronic notices of Privacy Practices
  • Understand how to properly use of the authorization

Chapter 9 – HIPAA Privacy Policy – How to use and disclosures Protected Health Information (PHI)

  • Overview of the laws about the usage and disclosure of PHI
  • Understand the disclosure rules about treatment, payment and health care activities
  • Understand the rules of disclosure of information for public purposes

Chapter 10 – Privacy Policy – Safety

  • Know about necessary requirements for compliance with HIPAA Privacy Rules
  • Know about requirements for safety and practices to comply with appropriate privacy safeguards

Chapter 11 – HIPAA Security Rule

  • Overview of Scope of HIPAA Security Rule
  • Know about threats and attacks that can make a Health Care Enterprises vulnerable
  • Know about key security terms, concepts and categories
  • Know about administrative safety implementation
  • Know about physical safety implementation
  • Know about technical safety implementation
  • Learn about organizational requirements for HIPAA Security
  • Learn about Policies, procedures, standards and documentation standards

Chapter 12 – HIPAA Security Rule – Threats and Options

  • Learn how to identify technical and  electronic threats and risks related to Health care
  • Learn about the safety rules
  • Learn about Safety technology
  • Learn about Electronic security options
  • Learn how to use these to comply with Safety Rule and Privacy Rule requirements provisions

Chapter 13 – Advanced Administrative Safety

  • Learn about need for standards and security awareness and training.
  • Learn about the need for Security Incident Procedures standard
  • Learn about Contingency planning.
  • Learn about Evaluation Standard
  • Learn about Business Associate contracts and other documented arrangements standard.

 Chapter 14 – Overview Physical Security

  • Learn about Physical Safety assessment based on the HIPAA Privacy Rule

Chapter 15 – Advanced Physical Safety

  • Learn about Physical Safety
  • Learn about access control for facilities and operations
  • Learn about Nodes use and security standards
  • Learn about Policies, Procedures, Best Practices to ensure appropriate physical security measures to be implemented

Chapter 16 – Physical Safety – Management of Data and Media

  • Learn about Device and Media control

Chapter 17 – Security Technical Safety

  • Learn about Security rules and Technical security
  • Learn about Access Control Standards
  • Learn how to check Audit Control Standard
  • Learn about Integrity Standards
  • Learn about key elements of the Individual or Entity Authentication Standard
  • Learn how to evaluate Transmission Security Standards

Chapter 18 – Security Advanced Technical Safety

  • Learn about  Transmission Security Standard
  • Learn about Transmission Control Protocol / Internet Protocol (TCP / IP) protocol architecture and its components
  • Learn about Firewalls and their role in information protection
  • Learn about Virtual Private Network (VPN)
  • Learn about Wireless Security requirements
  • Learn about different types of Encryptions used  by health care organizations
  • Learn about Windows 7/XP’s Security features

Chapter 19- Digital Signature and Certificates

  • Learn about Electronic Signature requirements
  • Learn about Digital Signature
  • Learn about Digital certificate
  • Public Key Infrastructure (PKI) and their role in Digital Signatures

Chapter 20 – Security Policy and other Standards

  • Learn how to identify threats and vulnerabilities
  • How these threats and vulnerabilities impact risk management strategies
  • Learn how to develop appropriate security policies
  • Overview of  other standards like ISO 27002 and ISO 27001 standards
  • Learn about factors that affect the development of an enterprise security policy
  • Learn about security policy artefacts that address such areas as acceptable use policies

Chapter 21 – Overview of the American Recovery and Reinvestment Act

  • Overview of American Recovery and Reinvestment Act (ARRA), Title XIII, Subpart D (HITECH)
  • Know about new requirements for Business Associates
  • Know about breach notification requirements
  • Know about new Privacy and Security Requirements
  • Know about Increased Enforcement and Penalties
  • Know about Federal Reporting Requirements
  • Know about Resource Requirements for Federal Reporting
  • Best Practices for Compliance

Chapter 22 – Red Flag Rules and Healthcare
Red Flag Rules Overview

  • Overview of Red Flag
  • Associated Definitions
  • Overview of State Identity Theft Protection Laws and the ARRA breach Notification Requirements
  • Requirements for Identity Theft Protection Program
  • Implementation Best Practices

Chapter 23 – HIPAA Best Practices

  • Risk Assessment and Risk Management Planning
  • Disaster Recovery Planning
  • Conduct of Audit
  • Protected Health Information (PHI) Usage, Transactions and Security
  • Development of Process, Policies, Procedures and associated Templates
  • Practical Training