HIPAA Risk Assessment, Security Risk Assessment

Annual HIPAA Deadline Approaching: HIPAA Risk Assessment

135
0

Please support Telehealth.org’s ability to deliver helpful news, opinions, and analyses by turning off your ad blocker.

Each year healthcare professionals must conduct a HIPAA risk assessment to identify risks and vulnerabilities to protect patient/client’s health information. As the 2021 annual security risk assessment deadline approaches, it is important to understand what needs to be done to meet this requirement.

Components Needed for HIPAA Risk Assessment

As discussed below, there are six components that need to be addressed to conduct an accurate and thorough HIPAA risk assessment.

  1. Collecting Data
  2. Identifying and Documenting Potential Threats and Vulnerabilities
  3. Assessing Current Security Measures
  4. Determining the Likelihood of Threat Occurrence
  5. Determining the Potential Impact of Threat Occurrence
  6. Determining the Level of Risk

Each of these HIPAA risk assessment components will be reviewed in more detail below.

1. Collecting Data

The first step to completing a security risk assessment is ensuring that electronically protected health information is adequately protected by identifying where it is created, stored, received, maintained, or transmitted. HIPAA refers to this as “collecting data.”

2. Identifying and Documenting Potential Threats and Vulnerabilities

Once step one is completed, reasonably anticipated threats and vulnerabilities to ePHI must be documented. This includes how vulnerabilities can be potentially exploited by a threat and the risk of improper access or disclosure to ePHI that would occur as a result. HIPAA refers to this as “Identifying and Documenting Potential Threats and Vulnerabilities.”

3. Assessing Current Security Measures

The next step to completing a HIPAA risk assessment is documenting the current security measures you have in place to protect ePHI. Those security measures must meet HIPAA Security Rule requirements and be properly configured and maintained. HIPAA refers to this as “Assessing Current Security Measures.”

4. Determining the Likelihood of Threat Occurrence

Based on the threats you identified in step 2, you must determine the likelihood of potential risks to ePHI. HIPAA refers to this as “Determining the Likelihood of Threat Occurrence.”

5. Determining the Potential Impact of Threat Occurrence

Next, you must determine the impact of a threat if it triggers or exploits a vulnerability. Would the impact be severe, moderate, or low? If malware exploits a vulnerability, would the impact be severe? HIPAA refers to this as “Determining the Potential Impact of Threat Occurrence.”

6. Determining the Level of Risk

Lastly, you must determine the level of risk that identified vulnerabilities to ePHI pose. HIPAA refers to this as “Determining the Level of Risk.” By determining the level of risk vulnerabilities pose, remediation plans can be created accordingly, ensuring that those that pose the most risk will be addressed quickly.

Why Are HIPAA Security Risk Assessments So Important?

Conducting an annual security risk assessment is essential to maintaining PHI’s confidentiality, integrity, and availability. Without annual SRAs, PHI is left vulnerable to potential breaches. When healthcare professionals suffer a breach and fail to comply with the SRA requirement, they are in violation of HIPAA and are often subject to costly fines and corrective actions.

This Article Contributed by Compliancy Group

Need assistance with HIPAA compliance? Compliancy Group can help!

Basic Telehealth Legal & Ethical Rules: HIPAA, Privacy, Working Across State Lines, Malpractice Insurance

Bring your telehealth practice into legal compliance. Get up to date on inter-jurisdictional practice, privacy, HIPAA, referrals, risk management, duty to warn, the duty to report, termination, and much more!

Disclaimer: Telehealth.org offers information as educational material designed to inform you of issues, products, or services potentially of interest. We cannot and do not accept liability for your decisions regarding any information offered. Please conduct your due diligence before taking action. Also, the views and opinions expressed are not intended to malign any organization, company, or individual. Product names, logos, brands, and other trademarks or images are the property of their respective trademark holders. There is no affiliation, sponsorship, or partnership suggested by using these brands unless contained in an ad. We do not and cannot offer legal, ethical, billing technical, medical, or therapeutic advice. Use of this site constitutes your agreement to Telehealth.org Privacy Policy and Terms and Conditions.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x