The website offers Top 10 Myths of Security Risk Analysis.(5) It discusses things like the fact that all providers who are “covered entities” under HIPAA are required to perform a risk analysis.(5) There is a Tool User Guide, and it is available for Windows and Mac users. There is also a Tutorial video to help providers begin using the tool. Videos on risk analysis and contingency planning are available at the website to provide further context.
HIPAA requires organizations that handle protected health information to frequently review the administrative, physical, and technical safeguards they have in place to protect the security of the information. These risk assessments can expose possible weaknesses in security policies, processes, and systems. Risk assessments also help providers address vulnerabilities, possibly preventing health data breaches or other adverse security events.
Make sure your office is HIPAA compliant!
RELATED | Team EHR: Everything you and your dental team need to know about electronic dental records