ComplianceOnline, Online Event
2013-01-28
Why Should You Attend: The Security Standards for the Protection of Electronic Protected Health Information (ePHI), commonly known as the HIPAA Security Rule, establishes national standards for securing patient data that is stored or transferred electronically. But Securing information can give many professionals anxiety and sleepless nights, when attempting to identify the numerous ways breaches can occur. The Security Management Process of the Security Rule indicates risk analysis is a necessary tool in reaching substantial compliance with many standards and implementation specifications.
Attend this webinar which will help you analyze and understand two very specific HIPAA-security compliance assessments, you will be able to develop organizational compliance plans that address both privacy and security within your organization, specifically addressing your ability to secure patient information within your company, in both physical and electronic forums.
When assessing the risks and vulnerabilities associated with PHI and ePHI, there are three key questions health care organizations should ask, before performing a risk analysis. - Can you identify the sources of PHI and ePHI within your organization, including all PHI that you create, receive, maintain or transmit?
- What are the external sources of PHI/ePHI?
- What are the human, natural, and environmental threats to information systems that contain PHI and ePHI?
This webinar will not only address answering the above referenced questions, but moreover, this discussion will allow you to put these questions/answers in perspective to address your internal and external security needs and devise the most comprehensive plan for your organization’s demands. Areas Covered in the Webinar: This discussion will provide valuable insight and application to a practical and systematic process to initiate and evaluate your organization’s security practices. Within the hour, we will define how to apply a specific methodology, during a risk assessment and to establish a comprehensive analysis: - System Characterization;
- Threat Identification;
- Vulnerability Identification;
- Control Analysis;
- Likelihood Determination;
- Impact Analysis;
- Risk Determination
- Control Recommendations; and
- Results Documentation.
Understanding these categories will help you look at the depth of your criticalities and define each vulnerability in terms that will afford your company with an action plan to cure the problem and put in place procedures to lessen and/or alleviate the risk.
|
|