If you are reading this post, it is highly likely that you already know that you are required to do a security risk analysis. You know that HIPAA, Promoting Interoperability Program (PIP) (formerly known as Meaningful Use) and MIPS all require it. You are also...
As a company that handles protected health information (PHI), HIPAA requires you to analyze how you manage risks to your PHI. This is known as a security risk analysis (SRA). The U.S. Department of Health and Human Services says risk analyses are vital to HIPAA...
As a HIPAA compliance professional, it can seem like you’re running from one disaster to the next. You’re so busy putting out “fires” all day that you barely have time to work on your HIPAA compliance program before another ember ignites. It seems you only have time...
Updated May 20, 2019 Sending texts and emails is a part of everyday life. Most organizations use one or both to communicate inside the organization and with clients. But when you handle electronic protected health information (ePHI), texting and emailing may be risky....
A security risk analysis is a vital part of the risk management process. According to the HIPAA Security Rule, all HIPAA-covered organizations must conduct them. This analysis helps your organization prevent, detect, contain, and correct security violations. However,...