Given the stated importance and heavy consequences associated with the risk analysis, you may want to consider working with a HIPAA security expert.
This article is an excerpt from our ebook, Diagnosing HIPAA Security. To download your free copy of the complete ebook, click here.
‘I know HIPAA is required, and I know it’s important, I just don’t know what exactly HIPAA requires me to do.’
Don’t feel bad if this statement sounds all too familiar. Many doctors, nurses, office managers, and healthcare professionals we talk to share the same confusion over HIPAA compliance. Unfortunately, noncompliance with the HIPAA standards puts organizations at greater risk now than ever before.
The HIPAA risk analysis is arguably the most important part of not only Security Rule compliance, but the entire HIPAA standard as well. The purpose of the risk analysis is to help covered entities identify (and document!) potential security risks (i.e. threats and vulnerabilities). Every security effort your organization makes will be determined by your risk analysis, so it’s critical to conduct a thorough and accurate assessment.
See also: What Are Addressable HIPAA Requirements?
While the HHS has no specified method of conducting a risk analysis, there are some generally accepted steps that outline the process.
There are several reasons why every covered entity should take the risk analysis very seriously. First (and most obvious), this process will help you identify your organization’s greatest areas of risk.
Second (not so obvious but equally important), in the event of a data breach or random audit, covered entities that have not conducted a thorough and accurate risk analysis can expect to be hit with severe financial penalties.
The HHS has stated on multiple occasions that they will make examples of healthcare organizations that put PHI at risk. Given the stated importance and heavy consequences associated with the risk analysis, you may want to consider working with a HIPAA security expert.
See also: SecurityMetrics HIPAA Guide
In the risk analysis you identified the threats and vulnerabilities that expose your organization to potential risk. Now it’s time to add in some protection.
See also: You May Not Be Done With HIPAA
Risk management is the second implementation specification of the Security Management Process. The risk management specification requires organizations to implement security controls that ‘reduce risks and vulnerabilities to a reasonable and appropriate level.'
There are many ways to approach risk management, but ultimately the process will consist of three main steps:
The HIPAA Security Rule requires you to ‘periodically’ complete the risk analysis and risk management process, so plan on a formal assessment at least once a year. Remember that as far as the HHS is concerned, if it’s not documented, it never happened. Thorough documentation of these processes will help you accurately evaluate risk, become more efficient in your assessments, and provide protection should the HHS show up on your doorstep for a random audit.