10 Myths about HIPAA’s Required Security Risk Analysis

With revamped HIPAA privacy and security rules now in effect that include higher emphasis on conducting a security risk analysis, the federal HealthIT.gov Web site dispels 10 pieces of misinformation about what the rules really require:

Get access to this article and thousands more...

All Health Data Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to exclusive industry white paper downloads, web seminars, podcasts, e-books, and conference discounts. Qualified members may also choose to receive our free monthly magazine and any of our e-newsletters covering the latest breaking news, opinions from industry leaders, developing trends and specialized topics like EHR's, revenue cycle management, health insurance exchanges, analytics, and more!

Already Registered?

Forgot Password/Need Help?
Comments (1)
This is a great summary of HIPPA's security risk analysis. It is important for each hospital to understand that the analysis needs to be an ongoing process. For example, as more physicians use mobile devices, security guidelines need to be in place. Currently, less than 50% of hospitals have a security strategy for regulation of mobile devices, which could leave these hospitals very vulnerable! Here is some interesting information on the rise of connected devices in healthcare http://www.koolspan.com/blog/next-generation-healthcare/
Posted by Eric K | Tuesday, January 07 2014 at 4:08PM ET
Add Your Comments:
Not Registered?
You must be registered to post a comment. Click here to register.
Already registered? Log in here
Please note you must now log in with your email address and password.


Slide Shows

Already a subscriber? Log in here
Please note you must now log in with your email address and password.