Training and Compliance
Part 2 Heading link
Why must I take this training?
The Health Insurance Portability and Accountability Act (HIPAA) contains regulations that govern privacy, security and electronic transactions standards for Protected Health Information (PHI). These regulations became effective April 14, 2003, and require that all members of the University-covered entity complete job-specific training. OSHA also requires annual training for all employees.
College of Dentistry staff, faculty, and students
Your training program has been customized based on your job classification, and your patient contact status. Since College of Dentistry certification is independent from the Medical Center’s, residents and faculty with Hospital Privileges are required to complete this training in addition to those required by the Medical Center.
How do I access the LMS training program?
Visit the Learning Management System’s comprehensive instruction manual for detailed information.
Step 1: Get your ID and Password.
Q. What is my NetID?
A. Your email before @uic.edu. Example: firstname.lastname@example.org yields a Net ID of jdoe
Q. What is my Password?
A. Your ACCC Common Password used to access UIC Webmail, NESSIE or the hospital network.
Step 2: Access the Learning Mangement System.
Step 3: Click on To Do List from the menu tab at the top-left hand side of the page.
Click on the title of the assigned course(s) to access all of your mandatory courses.
How do I print my transcript?
Keep in mind that for College of Dentistry compliance tracking purposes, it is not necessary that you print any transcripts, as tracking occurs electronically. However, if you need a transcript of your completed courses, you may log into the LMS website, then click “Records/Transcripts”. Instructions are available here.
Need Technical Assistance?
If you are having difficulty accessing/completing this training, please contact the Medical Center LMS Helpdesk by email or call 312-996-8393 (staffed Monday through Friday 8:00 am – 4:30 pm, with 24 hr voicemail).
Protected Health Information (PHI)
Protected Health Information is individually identifiable health information that is created or received by a health care provider, health plan, employer or health care clearinghouse. Such information relates to the past, present or future physical health, mental health or condition of an individual.
Health information that includes any of the following identifiers is considered PHI: name; address (includes street address, city, county, zip code); name of relatives; name of employers; e-mail address; telephone number; fax number; birthdate; finger or voice prints; photographic images; social security number; internet protocol (IP) address; any vehicle or device serial number; health plan beneficiary number; account number; certificate/license number; web url; any other unique identifying number, characteristic or code.
Research Training for Faculty, Staff, Students and Laboratory Volunteers
Registration for Laboratory Volunteers and Visiting Students
All volunteers and students enrolled in programs outside the College of Dentistry must register with the College prior to beginning work in a COD laboratory. To do so, complete the following paperwork and submit it to the Office for Research, room 402D.
- Completed Registration Form. The Office for Research will sign on the second page for “Departmental Approval.”
- Certificate of completion of laboratory safety training. Note that the University requires in-person training for all students and long-term volunteers. Laboratory Safety
- Proof of health insurance coverage for the duration of the volunteer period.
Quick Links Heading link
- UIC College of Dentistry HIPAA Policies
- 1.0 Health Records Release Information
- 1.1 Use and Disclosure of PHI for Identification and Notification
- 1.2 USe and Disclosure of PHI for Research
- 1.3 Confidentiality Agreement and Security Awareness
- 1.4 Notice of Privacy Practices
- 1.5 Minimum Necessary Use and Disclosure of PHI
- 1.6 Requests for Amendments to PHI
- 1.7 HIPAA and Image Collection Policy
- 2.0 Electronic Mail
- 2.1 Telephone Communication of PHI
- 2.2 Fax Transmittal of PHI
- 2.3 Portable Electronic Device Safeguards
- 2.4 Social Media Policy
- 2.5 Destruction of PHI
- 3.0 HIPAA and State Breach Notifications
- 3.1 Red Flags Identity Theft Program
- 3.2 HIPAA Sanctions
- 3.3 Request for Accounting Unauthorized Disclosure of PHI
- 3.4 Reporting Patient Privacy and Security Related Complaints
- 3.5 Confidentiality and Security Violations
- 4.0 Information Systems Prioritization for Business Continuity