Lexology April 5, 2024
McGuireWoods LLP

Applicable Provider Types: All

Is Your Entity in Compliance?

The Health Insurance Portability and Accountability Act of 1996, as modified by the Health Information Technology for Economic and Clinical Health Act of 2009 (HIPAA) requires covered entities and their business associates to implement policies and procedures to prevent, detect, contain and correct security violations. Under the HIPAA Security Rule, entities must “periodically” perform a security risk assessment, which can be adapted to the size and sophistication of the entity. While the general approach is to perform one annually, some organizations may do so bi-annually and others every three years.

An organization undertaking a risk assessment must thoroughly assess the potential risks and vulnerabilities to the confidentiality, integrity and availability of...

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: Cybersecurity, Govt Agencies, Health IT, Healthcare System, HIPAA, Privacy / Security, Provider, Technology
Boosting HIPAA Compliance in EHR Systems with Privacy-by-Design
OIG: Office for Civil Rights Should Enhance Its HIPAA Audit Program
OCR's HIPAA audit program lacked mettle, OIG says
HIPAA audits not effective at improving cybersecurity: OIG
HIPAA for Non-MDs: An Easy Guide to Compliance Regulations

Share This Article