What is a HIPAA Security Risk Analysis?

Facebook
Twitter
LinkedIn

A security risk analysis is a vital part of the risk management process. According to the HIPAA Security Rule, all HIPAA-covered organizations must conduct them. This analysis helps your organization prevent, detect, contain, and correct security violations.

However, the rule itself is rather broad:

RISK ANALYSIS (Required). Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the [organization]. – Section 164.308(a)(1)(ii)(A)

Because the rule is broad, there is a lot of room for misunderstanding. Let’s address some common misconceptions about risk analyses.

Small practices do not have to do a risk analysis.

False. Small practices have needed to follow this rule since 2006. Small practices must do an initial analysis and continually monitor security at their organization. If you are a small practice and haven’t conducted a risk analysis by this point, this should be your top priority.

I only need to conduct a risk analysis once.

Not true. HIPAA does not specify how often you should conduct an analysis. This depends on your organization’s circumstances. Some do them every year, while others wait two or three years. However, the Office of National Coordinator recommends once a year or as needed. For example, conduct risk analyses after your organization goes through a big change, as changes can introduce new vulnerabilities.

There is only one way to conduct an analysis.

There are many ways you can approach it. Health and Human Services Office for Civil Rights provides guidance on meeting the risk analysis requirement. The NIST Publication 800-30 is another useful guide.

My practice meets the requirement by installing a certified EHR/EMR.

This is a common mistake! You need to take all electronic protected health information into account, not just what’s in your electronic health record (EHR) or electronic medical record (EMR). EHR/EMR vendors are only responsible for the security of their own systems. They can’t help with security risks elsewhere.

The goal of risk analysis is to detect threats and vulnerabilities at your organization. Once you’ve completed it, you must put policies and procedures in place to improve security.

To learn how the HIPAAtrek platform can help you cultivate a culture of security, request a demo or contact us at support@hipaatrek.com.

Read more: My EMR/EHR Makes Me HIPAA Compliant, Right?

Being Prepared For Investigations

Are you prepared for a potential investigation?

Don’t wait until the Office of Civil Rights (OCR) comes knocking. Use this checklist to prepare now for potential investigations and find the confidence that comes from knowing you can prove compliance.

Request A HIPAAtrek Demo

HIPAAtrek User
Compliance is complicated. Your compliance software doesn’t have to be. Schedule your demo today!

You Might Also Like

Double Extortion: What It Is, and How You Can Prevent It

If organizations refuse to pay their ransom, attackers are threatening to release the data publicly. This will of course include sensitive information and PHI. Before Double Extortion, we assumed that hackers could not actually access our data and were only with-holding it from victims to disrupt the ability to continue their work. Now we know they can extract this information and publish it online, breaching our patient’s security.

Read More »

Cybersecurity During COVID-19

Watch out for COVID-19 cyber scams Sarah Badahman, CHPSE, Founder/CEO, HIPAAtrek Bethany Baty, Digital Marketing Director, HIPAAtrek Margaret Scavotto, JD, CHC, President, MPA The Department

Read More »