Skip to the main content.

1 min read

Keep Your Medical Clinic Out Of Hot Water With The HIPAA Police!

HIPAA PoliceConduct a HIPAA Security Risk Analysis and Implement Appropriate Safeguards

For healthcare providers, security breaches involving protected health information (PHI) have become common occurrences. Many of these security breaches involve stolen laptops or other portable electronic devices, including CDs, DVDs, and USB flash drives. According to HIPAA, covered entities must ensure appropriate safeguards are in place to protect ePHI.

In addition, a risk analysis must be conducted to identify and implement the appropriate safeguards. There are 9 essential elements to incorporate into a risk analysis:

  • Scope of the Analysis: Review all ePHI created, received, maintained, or transmitted by your organization.
  • Data Collection: Gather and document the data on ePHI gathered using the methods above.
  • Identify and Document Potential Threats: Identify and document any potential threats and vulnerabilities associated with ePHI.
  • Assess Current Security Measures: Assess and document the current security measures used to protect ePHI.
  • Determine the Likelihood of Threat Occurrence: Consider the likelihood of potential risks to ePHI.
  • Determine the Potential Impact of Threat Occurrence: Consider the impact of potential risks to confidentiality, integrity, and availability of ePHI.
  • Determine the Level of Risk: Analyze the likelihood of threat occurrence and the resulting impact to determine the level of risk.
  • Finalize Documentation: Document the risk analysis from beginning to end.
  • Review and Update the Risk Assessment: Update and document the risk analysis process on a regular basis.

Once you’ve conducted a risk analysis, start implementing appropriate security measures to protect ePHI and mitigate the risk of a security breach. Here’s a few examples of appropriate safeguards:

  • Require two-factor authentication to gain remote access to systems containing ePHI.
  • Enforce session termination on inactive portable or remote devices.
  • Install and update anti-virus software on portable or remote devices.
  • Install firewalls on laptops that store ePHI.
  • Encrypt ePHI stored on laptops and other devices.
  • Password protect all laptops or portable devices containing ePHI.
  • Establish remote access roles specific to business requirements.
  • Implement strong encryption for transmission of ePHI.

To learn more about the elements of a HIPAA security risk analysis, give us a call at {phone} or send us an email at {email}. {company} can help you conduct a thorough risk analysis and implement appropriate safeguards to protect ePHI.

On Time Tech Helps a San Francisco Architecture Firm Hit With Ransomware

On Time Tech Helps a San Francisco Architecture Firm Hit With Ransomware

San Francisco Architecture Firms Calls On Time Tech To Help With Ransomware Issue On Time Tech is happy to offer business IT services and technology...

Read More
Would Your Business Be a Target for Hackers? Let’s Find Out – A Look at a Hacking Attempt from a Hacker’s Point of View!

Would Your Business Be a Target for Hackers? Let’s Find Out – A Look at a Hacking Attempt from a Hacker’s Point of View!

Why would an average, run of the mill computer hacker want to attack your business or website? A hacker would want to wreak havoc on your business or...

Read More
How To Limit What Others See From Your Browsing History

How To Limit What Others See From Your Browsing History

If you’re like most people, you’ve got valid concerns about your personal privacy while browsing the internet. After all, Facebook and other...

Read More