Cy9

HIPAA Assessment

Safeguard patient information and ensure compliance with a thorough HIPAA assessment.

HIPAA compliance is a fundamental aspect of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), a federal law mainly focused on protecting sensitive patient health information from being disclosed without the patient’s consent or knowledge. The law provides baseline privacy and security standards for the medical information of US citizens.

 

The standard is applicable to covered entities and their business associates like health care clearinghouses, employer sponsored health plans, health insurers, and medical service providers that engage in certain transactions that involve digital transmission of patient health information (PHI)

HIPAA Regulation divided into Security Rule, Privacy Rule, Transactions and Code Sets (TCS) Rule, Unique Identifiers Rule, Breach Notification Rule, Omnibus Final Rule. HIPAA Security Rule requires implementation of 1) Administrative, 2) Physical, and 3) Technical safeguards.In Addition, it imposes other organizational requirements and a need to document processes analogous to the HIPAA Privacy Rule.

Office of Civil Rights (OCR), explains the failure to provide a “specific risk analysis methodology” is due to Covered Entities and Business Associates being of different sizes, capabilities and complexity. As per OCR, the key objectives of a HIPAA risk assessment are :

  • Identify the PHI that your organization creates, receives, stores and transmits including PHI shared with consultants, vendors and Business Associates.
  • Identify the human, natural and environmental threats to the integrity of PHI human threats including those which are both intentional and unintentional.
  • Assess what measures are in place to protect against threats to the integrity of PHI, and the likelihood of a “reasonably anticipated” breach occurring.
  • Determine the potential impact of a PHI breach and assign each potential occurrence a risk level based on the average of the assigned likelihood and impact levels.
  • Document the findings and implement measures, procedures and policies where necessary to tick the boxes on the HIPAA compliance checklist and ensure HIPAA compliance.
  • HIPAA risk assessment, the rationale for the measures, procedures and policies subsequently implemented, and all policy documents must be kept for a minimum of six years.

What We offer

Business Understanding

Evaluating business process and environment to understand the in-scope elements

HIPAA Scope Finalization

Finalize the scope elements and prepare the requirement documentation

HIPAA Readiness Assessment

Evaluating business process and environment to understand the in-scope elements

HIPAA Risk Assessment

Evaluating business process and environment to understand the in-scope elements

HIPAA Data Flow Assessment

Evaluating business process and environment to understand the in-scope elements

HIPAA Documentation Support

Evaluating business process and environment to understand the in-scope elements

HIPAA Remediation Support

Evaluating business process and environment to understand the in-scope elements

HIPAA Awareness Training

Evaluating business process and environment to understand the in-scope elements

Data and Asset Classification

Identify critical vulnerabilities in your system with a robust testing approach

HIPAA Evidence Review

Evaluating business process and environment to understand the in-scope elements

Final Assessment and Attestation

Evaluating business process and environment to understand the in-scope elements

Continuous Compliance Support

Evaluating business process and environment to understand the in-scope elements

Scroll to Top