How To Conduct a Meaningful Use Risk Analysis

Learn Practical, Actionable Step-by-Step Instructions for completing a Meaningful Use / HIPAA Security Risk Analysis

  1. Webinar slide materials
  2. Recorded Webinar below (~60 minutes)

See our list of upcoming live webinars, or check out our on-demand webinars with resources you may have missed.

Learn about Clearwater’s HIPAA Security Risk Analysis ToolKit™…

THE CHALLENGE

The deadline for HIPAA Security Rule compliance for Covered Entities (CEs) was April 2005!  For Business Associates (BAs), the date was February 2010. Additionally, the federal government unveiled its criteria for the Meaningful Use of electronic health records (EHRs) on July 13. The criteria must be met in order for a hospital or eligible provider (EP) to qualify for reimbursement of the cost of EHR software under the American Recovery and Reinvestment Act of 2009 (ARRA).  The meaningful use criteria have been established and include a specific privacy / security requirement to “Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities.”  For both hospitals and EPs, the certification criteria is to “Conduct or review a security risk analysis and implement security updates as necessary.”

THE SOLUTION

If you receive, store, process or transmit ePHI, you should attend this webinar on how to conduct a HIPAA Security Risk Analysis.  The concepts of risk, threats, vulnerabilities, impact, likelihood and many others are explained in this webinar.  A classic categorization of risks into a matrix is explored.  This webinar teaches you how to determine your risks, categorize them as Low, Medium, High or Critical and then develop a risk remediation action plan.

In this live session, attendees learn about:

  • Risk Analysis essentials
  • Specific requirements outlined in HHS/OCR Final Guidance
  • A Practical Risk Analysis Methodology
  • Step-by-Step Instructions for completing a HIPAA Risk Analysis
  • Resources available to help you

Who Should Attend?
Business leaders and managers with responsibility for Risk Management, Corporate Compliance,  and HIPAA-HITECH Privacy and Security compliance should attend.  C-suite, Chief Compliance Officers, Chief Risk Officers, Chief Privacy Officers, CISOs, CIOs.

Receive the presentation materials.

Attend future Live Web Events.

Share

No comments yet.

Leave a Reply