HIPAA Security

Business Associate Agreement

10 Requirements to Include in Your Business Associate Agreement

10 Requirements to Include in Your Business Associate Agreement The HIPAA Privacy, Security, and Breach Notification Rule require Covered Entities and their third-party vendors, referred to by the Department of Health and Human Services as Business Associates (BAs), are required to obtain a signed Business Associate Agreement (BAA) from each vendor, and their subcontractors, to ensure appropriate safeguards are implemented to …

10 Requirements to Include in Your Business Associate Agreement Read More »

Documentation That's What It's All About

Documentation That’s What It’s All About

Documentation That’s What It’s All About Today I am breaking down the Documentation standard, 45 §164.316(b)(1), from the HIPAA Security Management Process into byte-size portions to help you understand how they are significant to your organization. Before I can break down today’s topic, I first should set the document stage. When it comes to auditors, lawyers and the …

Documentation That’s What It’s All About Read More »

HIPAA Security Rule Administrative Safeguards

Breaking Down the HIPAA Administrative Safeguards

HIPAA Security Rule Administrative Safeguards Today I am breaking down the Administrative Safeguards of the HIPAA Security Rule, 45 CFR § 164.308, into byte-size portions to help you understand how they are significant to your organization. The HIPAA Security Rule establishes security standards for protecting all electronic protected health information (ePHI).  The Administrative Safeguards comprise over half of the …

Breaking Down the HIPAA Administrative Safeguards Read More »

HIPAA Security Standards

Breaking Down the HIPAA Security Standards

Breaking Down the HIPAA Security Standards Today I am breaking down the HIPAA Security Rule, 45 CFR § 164.308, into byte-size portions to help you understand how they are significant to your organization. The HIPAA Security Rule establishes security standards for protecting all electronic protected health information (ePHI), 45 CFR Part 160 and Part 164, Subparts A and C. The HIPAA Security …

Breaking Down the HIPAA Security Standards Read More »

HIPAA Security Management Process

HIPAA Security Management Process in 6 Steps

HIPAA Security Management Process in 6 Steps Today I am breaking down the HIPAA Security Management Process, 45 § 164.308(a)(1), into byte-size portions to help you understand how they are significant to your organization. Before I can break down today’s topic, I first should set the stage.  The HIPAA Security Rule, Administrative Safeguards provisions that requires regulated entities to perform a …

HIPAA Security Management Process in 6 Steps Read More »

HIPAA Security Office Requirement

Breaking Down the HIPAA Security Officer Requirement

Breaking Down the HIPAA Security Officer Requirement Today I am breaking down the HIPAA Security Officer requirement, Assigned Security Responsibility 45 § 164.308(a)(2), into byte-size portions to help you understand how they are significant to your organization. Since 2005, the Health Insurance Portability and Accountability Act (HIPAA) Security Rule has required regulated entities to identify who will be operationally responsible for assuring that the …

Breaking Down the HIPAA Security Officer Requirement Read More »

Threats, Vulnerabilities, and Risks

Breaking Down Threats, Vulnerabilities, and Risks

Breaking Down Threats, Vulnerabilities, and Risks Today I am breaking down threats, vulnerabilities, and risks into byte-size portions to help you understand how they are significant to your organization. Before I can break down today’s topic, I first should set the stage.  Setting the Stage for Threats, Vulnerabilities, and Risks The Security Management Process, 45 …

Breaking Down Threats, Vulnerabilities, and Risks Read More »

How To Identify Your HIPAA Risk Analysis Scope

The HIPAA Security Rule adopts national standards for safeguards to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI) that is created, received, maintained, or transmitted by a Covered Entity (CE) or Business Associate (BA). As a CE or BA, you are required to have in place reasonable and appropriate security measures …

How To Identify Your HIPAA Risk Analysis Scope Read More »