Lexology April 5, 2024
McGuireWoods LLP

Applicable Provider Types: All

Is Your Entity in Compliance?

The Health Insurance Portability and Accountability Act of 1996, as modified by the Health Information Technology for Economic and Clinical Health Act of 2009 (HIPAA) requires covered entities and their business associates to implement policies and procedures to prevent, detect, contain and correct security violations. Under the HIPAA Security Rule, entities must “periodically” perform a security risk assessment, which can be adapted to the size and sophistication of the entity. While the general approach is to perform one annually, some organizations may do so bi-annually and others every three years.

An organization undertaking a risk assessment must thoroughly assess the potential risks and vulnerabilities to the confidentiality, integrity and availability of...

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: Cybersecurity, Govt Agencies, Health IT, Healthcare System, HIPAA, Privacy / Security, Provider, Technology
New privacy screen protectors launched to help practices stay HIPAA compliant
Home-Based Care Providers Vulnerable to HIPAA Compliance Issues
HHS tightens HIPAA as healthcare cyberattacks increase
HHS Publishes Notice of Proposed Rulemaking to Amend HIPAA Security Rule Requirements - Comments Due March 7, 2025
HIPAA Compliance: 3 Strategies for Implementing Multilingual Healthcare Delivery

Share This Article