ClearDATA HIPAA Security Risk Analysis (SRA)
Getting to Meaningful Use, protecting patient data and adhering to HIPPA and other mandates are forefront in the minds of healthcare providers across the country.
The need for security risk assessments (SRAs) has been underscored by recent reports of practices across the country paying large settlements, some as high as six figures, to the U.S. Department of Health and Human Services (HHS) and agreeing to take corrective action to implement policies and procedures to safeguard the protected health information of their patients.
Our security experts can help your organization meet the Stage 1 Meaningful Use Core # 15 requirement to achieve Meaningful Use and qualify for your Incentive dollars.
ClearDATA Security & Compliance Expertise
The ClearDATA team features some of the healthcare industry's leading experts with unrivaled qualifications in HIPAA Privacy and Security Rules and data protection. The company provides specialized consulting services to organizations ranging from single doctor practices to large integrated delivery networks.
We measure the IT-related risks associated with key regulations and standards including:
- Healthcare Insurance Portability and Accountability Act (HIPAA)
- Health Information Technology for Economic and Clinical Health (HITECH) Act
- Payment Card Industry Data Security Standards (PCI DSS)
- Sarbanes Oxley Act (SOX) and SAS 70.
Detailed Description: ClearDATA HIPAA Security Risk Analysis
- Review of security infrastructure and current processes and programs for improvement.
- Assess current HIPAA security compliance operations including a physical site review of all facilities, the safeguards in place, vulnerabilities and specific threats to these safeguards.
- Develop a protected health information (PHI) inventory of both electronic PHI and other forms.
- Evaluate existing security policies and procedures to determine if they are, a) sufficient to be effective, b) currently operational, c) applicable for the organization and, d) represent applicable compliance programs.
- Assessment of the Administrative, Physical and Technical Safeguards per Security Rule.
- Review of physical computing environment.
- Interrogation of security software & protocols.
- Assessment of electronic transmission procedures for PHI.
- Assess vulnerabilities to the confidentiality, integrity and availability of ePHI.
Contact us today to see how we can help you comply with HIPAA and the HITECH Act.