ComplianceGrowth

How to Conduct a HIPAA HITECH Security Risk Assessment

Brian L Tuttle
Recording Webinar Available @All Days
Recorded Webinar
  

Description

Conducting a HIPAA HITECH security risk assessment involves systematically evaluating potential risks and vulnerabilities to protected health information (PHI). The webinar will begin by assembling a multidisciplinary team with IT, security, compliance, and healthcare operations expertise, defining the assessment's scope, and identifying all systems, processes, and personnel interacting with PHI. Next, assess security measures, including physical safeguards, technical controls, and administrative procedures. It also utilizes standardized frameworks and the HIPAA Security Rule to guide the assessment process. Identifying potential threats, such as unauthorized access, data breaches, or system failures, and evaluating each threat's likelihood and potential impact. And develop a comprehensive risk management plan that prioritizes mitigation strategies based on the severity and probability of identified risks. Regularly review and update the risk assessment to adapt to evolving threats and changes in technology organizational processes.

Webinar Highlights:

  • The webinar will discuss whether a HIPAA HITECH Security Risk Assessment is the first thing OCR will ask for in an audit.  
  • Understanding whether the risk assessment is adequate and current and whether it covers the bases necessary for specific organizations.
  • Learning how to write HIPAA HITECH Security Policies based on HIPAA HITECH Risk Assessment findings.
  • The speaker will show how to conduct a proper risk assessment point by point.
  • Understanding how to write proper policies and procedures, which are to be based on the risk assessment findings, and how to word the policies to satisfy OCR or a potential client.

Why Should You Attend:

Attending a HIPAA HITECH security risk assessment is not just about individual compliance but collective security. Ensuring compliance with regulatory requirements set forth by HIPAA and HITECH contributes to a collective effort to safeguard protected health information (PHI). Moreover, involvement in the assessment allows us to comprehensively understand the organization's security posture, including identifying potential vulnerabilities and threats to PHI. This knowledge empowers attendees to proactively implement security measures and mitigate risks, ultimately reducing the likelihood of data breaches and their associated consequences, such as financial penalties and reputational damage. Furthermore, attending the assessment fosters collaboration and communication among stakeholders, facilitating a holistic approach to security that considers technical, operational, and regulatory aspects is not just essential; it's a testament to the power of collaboration, promoting a culture of compliance, accountability, and continuous improvement within your organization.

Who Should Attend:

  • Attorneys
  • IT companies
  • Private Practice
  • Hospitals & Ambulatory
  • Billing Companies
  • Transcriptions Companies
  • Home Health Groups
  • Health Insurance
  • Practice Managers
  • MDs and other medical professionals

Training Options

Error Conference Exists In Wish-list.

Congrats Conference Added In Wish-list.

Recording
 $199  

Digital Download
 $229  

Transcript (PDF)
 $199  

Tokyo

Tokyo is the capital of Japan.



* Or more than 6 attendee call us at +1-830-256-0384 or mail us at cs@compliancegrowth.com

* For Cheque and ACH payment call us at +1-830-256-0384 or mail us at cs@compliancegrowth.com

* Click to download the Order Form