HIPAA and PCI Compliance

Risk management, required by the HIPAA Security Rule, includes the implementation of security measures to reduce risk to reasonable and appropriate levels to, among other things, ensure the confidentiality, availability and integrity of ePHI and protect against any reasonably anticipated threats, hazards, or disclosures of ePHI not permitted or required under HIPAA.

After a Risk Analysis the next step in the risk management process is to develop and implement a Risk Management Plan. The purpose of a Risk Management Plan is to provide structure for the evaluation, prioritization, and implementation of risk-reducing measures and controls.

Risk prioritization and mitigation decisions will be determined by answering which controls and measures should be implemented and the priority in which they should be addressed based upon their “risk score.” The implementation components of the plan include:

  • Risk score (threat and vulnerability combinations) assigned to a particular issue being addressed;
  • Recommendation(s) of measures and controls selected to reduce the risk of an issue;
  • Ongoing evaluation and monitoring of the risk mitigation measures.

Risk analysis and risk management are not one-time activities. Risk analysis and risk management are dynamic processes that must be periodically reviewed and updated in response to changes in the environment. The risk analysis will identify new risks or update existing risk levels resulting from environmental or operational changes. The output of the updated risk analysis will be an input to the risk management process to reduce newly identified or updated risk levels to reasonable and appropriate levels.

If you CREATE, MAINTAIN, TRANSMIT OR RECEIVE confidential information in ANY electronic format, you are required to have a Security Risk Analysis.

“There are two kinds of companies today, those that have experienced a security breach and those that don’t know it yet.”

IT’S MANDATORY!

HIPAA §164.308 Administrative safeguards. 

(a) A covered entity must, in accordance with §164.306:

(1) (i) Standard: Security management process. Implement policies and procedures to prevent, detect, contain, and correct security violations.

(ii) Implementation specifications:

(A) Risk analysis (Required)

Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity.

Considering an IT solution for your business?