Lexology April 5, 2024
McGuireWoods LLP

Applicable Provider Types: All

Is Your Entity in Compliance?

The Health Insurance Portability and Accountability Act of 1996, as modified by the Health Information Technology for Economic and Clinical Health Act of 2009 (HIPAA) requires covered entities and their business associates to implement policies and procedures to prevent, detect, contain and correct security violations. Under the HIPAA Security Rule, entities must “periodically” perform a security risk assessment, which can be adapted to the size and sophistication of the entity. While the general approach is to perform one annually, some organizations may do so bi-annually and others every three years.

An organization undertaking a risk assessment must thoroughly assess the potential risks and vulnerabilities to the confidentiality, integrity and availability of...

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: Cybersecurity, Govt Agencies, Health IT, Healthcare System, HIPAA, Privacy / Security, Provider, Technology
Biden Administration Finalizes Rule To Support Reproductive Health Care Privacy
FTC Continues Healthcare Action
MGMA seeks clarity on breach notification burden in wake of Change cyberattack
The Balance Between Digital Transformation and Regulatory Compliance for Patient Security
Nuanced Privacy Laws Means Healthcare Organizations Should Prioritize Protecting Personal Information

Share This Article