How To Conduct a Meaningful Use Risk Analysis

Need to complete your Meaningful Use Risk Analysis?  Business Associate compliting a HIPAA Security Risk Analysis for the first time? Learn how to do either in our recent webinar…

Download Presentation Materials and View recorded version now…also, link to complete transcript…

  1. Webinar slide materials
  2. Recorded Webinar below (~60 minutes)
  3. Unedited Transcript of “How to Conduct a Meaningful Use – HIPAA Security Risk Analysis”

See our list of upcoming live webinars, or check out our on-demand webinars with resources you may have missed.

Learn about Clearwater’s Proven Approach to HIPAA Security Rule Risk Analysis

Striving to meet requirements for a Risk Analysis to meet the HIPPA Security Final Rule and/or The HITECH Act and/or Meaningful Use Final Rule requirements?

Lots of confusion continues to swirl around the difference between a HIPAA Security Evaluation versus HIPAA Security Risk Analysis. No wonder, the terms are often used interchangeably.

Learn how to conduct a thorough HIPAA Security Risk Analysis…attend our upcoming 5/12 complimentary webinar… register today!

THE CHALLENGE

The deadline for HIPAA Security Rule compliance for Covered Entities (CEs) was April 2005!  For Business Associates (BAs), the date was February 2010. Additionally, the federal government unveiled its criteria for the Meaningful Use of electronic health records (EHRs) on July 13. The criteria must be met in order for a hospital or eligible provider (EP) to qualify for reimbursement of the cost of EHR software under the American Recovery and Reinvestment Act of 2009 (ARRA).  The meaningful use criteria have been established and include a specific privacy / security requirement to “Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities.”  For both hospitals and EPs, the certification criteria is to “Conduct or review a security risk analysis and implement security updates as necessary.”

THE SOLUTION

If you receive, store, process or transmit ePHI, you should attend this webinar on how to conduct a HIPAA Security Risk Analysis.  The concepts of risk, threats, vulnerabilities, impact, likelihood and many others are explained in this webinar.  A classic categorization of risks into a matrix is explored.  This webinar teaches you how to determine your risks, categorize them as Low, Medium, High or Critical and then develop a risk remediation action plan.

THE AGENDA:

In this live session, attendees will learn about:

  • Risk Analysis essentials
  • Specific requirements outlined in HHS/OCR Final Guidance
  • Meaningful Use requirements
  • A Practical Risk Analysis Methodology
  • Step-by-Step Instructions for completing a HIPAA Risk Analysis
  • Resources available to help you

Who Should Attend?
Business leaders and managers with responsibility for Risk Management, Corporate Compliance,  and HIPAA-HITECH Privacy and Security compliance should attend.  C-suite, Chief Compliance Officers, Chief Risk Officers, Chief Privacy Officers, CISOs, CIOs.

Benefit from our expertise; register for a complimentary HIPAA-HITECH compliance webinar today!

Share

No comments yet.

Leave a Reply