How to Conduct a HIPAA Risk Assessment and the Surprising Danger of Not Doing One - Recorded Webinar

01/10/2023 Recorded Webinar
0
Days
0
Hours
0
Minutes
0
Seconds
Past!

Description

HIPAA risk assessments help in identifying and implementing the most effective and appropriate administrative, physical, and technical safeguards to secure electronically protected health information.

A risk analysis is a requirement in federal law. Conducting a risk analysis is the first step in identifying and implementing safeguards that comply with and carry out the standards and implementation specifications of HIPAA. Your healthcare organization should determine the most appropriate way to achieve HIPAA compliance, taking into account the characteristics of the organization and its environment.

Protected health information is subject to HIPAA confidentiality for entities to evaluate risks and vulnerabilities in their environments and to implement reasonable and appropriate security measures to protect against reasonably anticipated threats or hazards to the security or integrity of the information. Risk analysis and assessment is the first step in that process.

Risk analysis requirements under HIPAA require healthcare organizations to implement policies and procedures to prevent, detect, contain, and correct security violations.

Your agency must conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronically protected health information.

In addition to an express requirement to conduct a risk analysis, the HIPAA law indicates risk analysis is a necessary tool for reaching substantial compliance with many other standards and implementation specifications.

The outcome of the risk assessment process is a critical factor in assessing whether an implementation specification or an equivalent measure is reasonable and appropriate.

Elements of a risk analysis include numerous methods of performing risk assessment with no single best practice that guarantees HIPAA compliance. The scope of risk analysis that the HIPAA law encompasses includes the potential risks and vulnerabilities to the confidentiality, availability, and integrity of all confidential information an organization creates, receives, maintains, or transmits.

Healthcare organizations must identify and document reasonably anticipated threats unique to the circumstances of their environment. Organizations must also identify and document vulnerabilities that, if triggered or exploited by a threat, would create a risk of inappropriate access to or disclosure of this protected health information.

Healthcare organizations should assign risk levels for all threat and vulnerability combinations identified during the risk analysis. The level of risk could be determined, for example, by analyzing the values assigned to the likelihood of threat occurrence and the resulting impact of threat occurrence. The risk level determination might be performed by assigning a risk level based on the average of the assigned likelihood and impact levels.

Finalize documentation as a direct input to the risk management process and conduct periodic reviews and updates to the risk assessment, which should be ongoing. A truly integrated risk analysis and management process is performed as new technologies and business operations are planned, reducing the effort required to address risks identified after implementation. Performing the risk analysis and adjusting risk management processes to address risks in a timely manner will allow the covered entity to reduce the associated risks to reasonable and appropriate levels.

In conclusion, risk assessment is the first step in an organization’s HIPAA compliance efforts. It is an ongoing process that should provide the healthcare organization with a detailed understanding of the risks to the confidentiality, integrity, and availability of this protected health information.

Areas Covered

  • Risk assessment under the HIPAA laws
  • Vulnerability, threat, and risk analysis
  • Scope of risk assessment
  • Identifying potential threats and vulnerabilities
  • Assessing security measures in place
  • Determining threat occurrence, likelihood, and impact
  • Finalize documentation of the risk assessment
  • Regular review and updates to risk assessment for new employees, new laws, and new technology
  • The surprising danger of not doing a HIPAA risk assessment
Webinar Details
    Recorded Webinar
Enrollment Options
Speaker:
Mark R. Brengelman
Mark R. Brengelman

Attorney at Law, Frankfort, Kentucky

Mark holds Bachelor’s and Master’s degrees in Philosophy from Emory University and a Juris Doctorate from the University of Kentucky. Retiring as a...

Related Events

Conducting A Charge Audit to Increase Revenue
Recorded Webinar$149.00

Conducting A Charge Audit to Increase Revenue

Areas Covered A major component of successful revenue management is accurate charging for serv..

05/31/2024Enroll/Buy Now
HIPAA & Patient Access of Medical Records – Focus on Compliance Enforcement
Recorded Webinar$149.00

HIPAA & Patient Access of Medical Records – Fo...

The U.S. Department of Health and Human Services, Office for Civil Rights (OCR) continues to make pa..

05/05/2023Enroll/Buy Now
Developing HIPAA Policies and Procedures - Recorded Webinar
Recorded Webinar$99.00

Developing HIPAA Policies and Procedures - Recorde...

For anyone tasked with managing a HIPAA compliance program, it is critical to have the comprehensive..

12/14/2022Enroll/Buy Now

Upcoming Webinars

HIPAA in 2026: What Changed, What’s Coming, and What It Means for Your Organization
Live Webinar$179.00

HIPAA in 2026: What Changed, What’s Coming, and Wh...

Over the last few years, the U.S. Department of Health and Human Services, Office for Civil Rights h..

02/02/2026Enroll/Buy Now
HIPAA Breach Risk Assessment for Ransomware Attacks
Live Webinar$179.00

HIPAA Breach Risk Assessment for Ransomware Attack...

HIPAA Breach Risk Assessments determine whether a Ransomware attack constitutes a HIPAA Breach that ..

02/10/2026Enroll/Buy Now
E&M Coding Guidelines and Documentation Requirements
Live Webinar$179.00

E&M Coding Guidelines and Documentation Requir...

During this presentation we will Review current documentation guidelines for different location that..

02/10/2026Enroll/Buy Now