SlideShare a Scribd company logo
HIPAA Security Assessment ToolKit™
         Introduction and Overview


Bob Chaput
615-656-4299 or 800-704-3394
bob.chaput@HIPAASecurityAssessment.com
HITECH Security Advisors, LLC
                                         1
Disclaimers
1. We are not attorneys! Consult with your own legal
   counsel or advisors.
2. Information about and around HIPAA and HITECH
   continues to evolve.
3. HIPAA and HITECH rules and regulations are subject to
   lots of different interpretations.
4. Every effort has been made to insure that the
   information presented is correct, but we can cannot offer
   such assurances.
5. You should not rely on this information for legal
   purposes, but simply use it as a tool to raise your
   awareness.
Why You Should Care!
  1. “Ensuring adequate privacy and security
     protections for personal health information” is a key
     part of Meaningful Use
  2. HITECH Act has raised the ante for HIPAA Security
     compliance significantly
  3. Compliance is the smart thing to do for your
     business and the right thing to do for your patients
     or your customers’ patients
  4. It’s the law!


                                                             3
Meaningful Use Stage 1 Policy Goals
  It’s about health outcomes improvement
      in the US…
  1. Improving quality, safety, efficiency, and reducing
     health disparities.
  2. Engaging patients and families in their healthcare
  3. Improving care coordination
  4. Improving population and public health
  5. Ensuring adequate privacy and security
     protections for personal health information

                                                           4
The HITECH Act – Major Changes
 From a Privacy and Security perspective, here are five absolute
 “game changers” under HITECH:

    1) Mandatory audits (Subtitle D, Part 1, Section 13411)
    2) HHS non-compliance fines return to HHS’ coffers and
       within a few years (by law) individuals will participate
       in sharing the proceeds
    3) State AGs can now bring civil actions on behalf of their
       citizens
    4) Business Associates are now statutorily obligated
    5) Data Breach Notification requirements


                                                                   5
Meet the HHS Data Breach ‘Wall of Shame’

   http://www.hhs.gov/ocr/privacy/hi
     paa/administrative/breachnotific
     ationrule/postedbreaches.html




                                           6
HIPAA Security-HITECH Compliance Roadmap
                             HIPAA
                                                    HIPAA
                           Remediation            Security is
                              Plan                  NOT a
 Focus of HSA ToolKit™       (HRP)                 “techie”
                                                    project
             Preliminary     HIPAA
             Remediation    Security
                 Plan       Strategy
  HIPAA                                    HIPAA          HIPAA
                (PRP)        (HSS)
 Security                                Compliance      Security
Assessment                                 Manual       Evaluation
  (HSA)                      HIPAA         (HCM)          (HSE)
               HIPAA        Security
                Risk        Training
              Analysis       (HST)
               (HRA)                           … A journey,
                                                  not a
                             HIPAA
                            Security           destination !
                            Policies
                             (HSP)


                                                                 7
Purpose of the HSA ToolKit™
 1. Jump Start Your HIPAA Security
    Compliance Program
 2. Establish A Progress / Benchmark
    Monitor
 3. Quickly Identify “Low Hanging”
    Remediation Items
 4. Develop a Solid Foundation for
    HIPAA Risk Analysis
 5. Build Deep Understanding At The
    Onset
 6. Get out in front of Meaningful Use
    requirements on ePHI security
                                         8
Contents of the HSA ToolKit™
 1. HIPAA Security Assessment ToolKit™ Contents
     document
 2. How to Use the HIPAA Security Assessment ToolKit™
 3. Comprehensive HIPAA Security Assessment (HSA)
     Excel Tool™, including Instructions, Glossary of
     Terms, included with HSA Excel Tool, Policies
     Checklist, Resources & References
 4. HIPAA Security – HITECH Compliance Roadmap™
 5. Preliminary Remediation Plan Candidate Items template
 6. Data Mountain HIPAA-HITECH Security Rule FAQ
 7. Iron Mountain HIPAA Primer – What You Should Know
     About the New Regulations
 8. 2009 CMS' HIPAA Compliance Review Analysis And
     Summary of Results
 9. Office of Civil Rights (OCR) HIPAA Security Standards:
     Guidance on Risk Analysis
 10. Centers for Medicare & Medicaid Services (CMS)
     Security Standards: Implementation for the Small
     Provider
 11. Complete copy of HIPAA Security Final Rule (45 CFR
     Parts 160, 162, and 164)

                                                             9
Heart of the HSA ToolKit™
Features and Benefits
of the HSA ToolKit™
   HSA ToolKit™ Features                HSA ToolKit™ Benefits
                            •   Low Risk
                            •   Easily derived immediate remediation steps
 Low Price and High Value   •   Fast Track to HIPAA Security Rule Compliance
                            •   Comprehensive tool and resources
                            •   Low Impact on Client Staff and Operations
 Short Duration             •   Fast, Immediate Results
                            •   Proven Quality
                            •   Developed by Senior, Experienced Professionals
 Development Team           •   Health Care Expertise
                            •   HIPAA – HITECH Focused
                            •   Comprehensive, Complete Data Gathering
                            •   Based on Proven Best Practices
 Sound Methodology          •   High-Quality, Credible Outcomes
                            •   Process View, No-Fault Appraisal
                            •   Baseline for Compliance Program

                                                                                 11
Contact
             Bob Chaput

   www.HIPAASecurityAssessment.com

bob.chaput@HIPAASecurityAssessment.com


Connect: www.linkedin.com/in/bobchaput

    Follow me: Twitter.com/bobchaput

      HITECH Security Advisors, LLC

                                         12

More Related Content

PPSX
Mbm Hipaa Hitech Ss Compliance Risk Assessment
PPTX
HIPAA Compliance: Simple Steps to the Healthcare Cloud
PPTX
MindLeaf - HIPAA privacy and cybersecurity insurance
PDF
Cyberinsurance 111006
PPTX
Assessing Your Hosting Environment for HIPAA Compliance
PDF
HIPAA: security risk analysis
PPTX
Firehost Webinar: Hipaa Compliance 101 Part 1
DOCX
Hipaa random audit
Mbm Hipaa Hitech Ss Compliance Risk Assessment
HIPAA Compliance: Simple Steps to the Healthcare Cloud
MindLeaf - HIPAA privacy and cybersecurity insurance
Cyberinsurance 111006
Assessing Your Hosting Environment for HIPAA Compliance
HIPAA: security risk analysis
Firehost Webinar: Hipaa Compliance 101 Part 1
Hipaa random audit

What's hot (19)

PPTX
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
DOCX
Common Security Framework Summary
PDF
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
PDF
2010 New Guidelines Hipaa Checklist V1
PDF
Hortonworks help customers building a HIPAA compliant Data Lake
PDF
Hitrust csf-assurance-program-requirements-v1 3-final
PDF
Ecfirstbiz
PDF
HIPAA Solutions on Cloud Foundry
PPT
Iadmdhipmkt1.0
PDF
5 Documents to Prepare for a HIPAA Audit
PPTX
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
PDF
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
PDF
HIPAA Security & Privacy Official
DOCX
HIPAA | HIPAA Training
PPT
FRSecure Sales Deck
PDF
What Every Physician Needs to Know About Cloud Storage
DOCX
HIPAA | HIPAA Training
PPT
Compliance & hipaa regulations
PDF
HealthCare Compliance - HIPAA & HITRUST
The Intersection of OCR Enforcement and Health Care Data Privacy & Security
Common Security Framework Summary
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
2010 New Guidelines Hipaa Checklist V1
Hortonworks help customers building a HIPAA compliant Data Lake
Hitrust csf-assurance-program-requirements-v1 3-final
Ecfirstbiz
HIPAA Solutions on Cloud Foundry
Iadmdhipmkt1.0
5 Documents to Prepare for a HIPAA Audit
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
HIPAA Security & Privacy Official
HIPAA | HIPAA Training
FRSecure Sales Deck
What Every Physician Needs to Know About Cloud Storage
HIPAA | HIPAA Training
Compliance & hipaa regulations
HealthCare Compliance - HIPAA & HITRUST
Ad

Similar to HIPAA Security Assesment Toolkit (20)

PDF
HIPAA Compliance for Developers
PDF
Simple Steps to HIPAA Compliance
PDF
Redspin Webinar - Prepare for a HIPAA Security Risk Analysis
DOCX
Final Project Presentation requirementSelect your final project .docx
PDF
HIPAA HITECH Express Security Privacy Webinar
DOCX
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
PPTX
PSOW 2016 - HIPAA Compliance for EMS Community
PDF
The HIPAA Audit: What to Expect and How to Prepare Your Practice
PDF
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
PDF
Explain the security implications of HIPPA requirements for hospital.pdf
PPTX
Understanding HIPAA
PDF
An Overview of HIPAA Laws and Regulations.pdf
PPTX
Comp8 unit6a lecture_slides
PDF
HIPAA 101- What all Doctors NEED to know
PPTX
The Ultimate Guide to HIPAA Training Course Online Everything You Need to Kno...
PDF
A brief introduction to hipaa compliance
PDF
How to Ensure HIPPA Compliance
PDF
The Ultimate Guide to HIPAA Compliance - Strategies and Security Risk Assessm...
PDF
HIPAA and Beyond - How to Effectively Safeguard Electronic Protected Health I...
PDF
Hipaa compliance for small healthcare providers
HIPAA Compliance for Developers
Simple Steps to HIPAA Compliance
Redspin Webinar - Prepare for a HIPAA Security Risk Analysis
Final Project Presentation requirementSelect your final project .docx
HIPAA HITECH Express Security Privacy Webinar
Barbara Silva is the CIO for Peachtree Community Hospital in Atlanta.docx
PSOW 2016 - HIPAA Compliance for EMS Community
The HIPAA Audit: What to Expect and How to Prepare Your Practice
Redspin & Phyllis and Associates Webinar- HIPAA,HITECH,Meaninful Use,IT Security
Explain the security implications of HIPPA requirements for hospital.pdf
Understanding HIPAA
An Overview of HIPAA Laws and Regulations.pdf
Comp8 unit6a lecture_slides
HIPAA 101- What all Doctors NEED to know
The Ultimate Guide to HIPAA Training Course Online Everything You Need to Kno...
A brief introduction to hipaa compliance
How to Ensure HIPPA Compliance
The Ultimate Guide to HIPAA Compliance - Strategies and Security Risk Assessm...
HIPAA and Beyond - How to Effectively Safeguard Electronic Protected Health I...
Hipaa compliance for small healthcare providers
Ad

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Getting Started with Data Integration: FME Form 101
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Machine Learning_overview_presentation.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
A Presentation on Artificial Intelligence
PDF
Mushroom cultivation and it's methods.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Building Integrated photovoltaic BIPV_UPV.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
SOPHOS-XG Firewall Administrator PPT.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
cloud_computing_Infrastucture_as_cloud_p
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Getting Started with Data Integration: FME Form 101
MIND Revenue Release Quarter 2 2025 Press Release
Machine Learning_overview_presentation.pptx
A comparative study of natural language inference in Swahili using monolingua...
A Presentation on Artificial Intelligence
Mushroom cultivation and it's methods.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...

HIPAA Security Assesment Toolkit

  • 1. HIPAA Security Assessment ToolKit™ Introduction and Overview Bob Chaput 615-656-4299 or 800-704-3394 bob.chaput@HIPAASecurityAssessment.com HITECH Security Advisors, LLC 1
  • 2. Disclaimers 1. We are not attorneys! Consult with your own legal counsel or advisors. 2. Information about and around HIPAA and HITECH continues to evolve. 3. HIPAA and HITECH rules and regulations are subject to lots of different interpretations. 4. Every effort has been made to insure that the information presented is correct, but we can cannot offer such assurances. 5. You should not rely on this information for legal purposes, but simply use it as a tool to raise your awareness.
  • 3. Why You Should Care! 1. “Ensuring adequate privacy and security protections for personal health information” is a key part of Meaningful Use 2. HITECH Act has raised the ante for HIPAA Security compliance significantly 3. Compliance is the smart thing to do for your business and the right thing to do for your patients or your customers’ patients 4. It’s the law! 3
  • 4. Meaningful Use Stage 1 Policy Goals It’s about health outcomes improvement in the US… 1. Improving quality, safety, efficiency, and reducing health disparities. 2. Engaging patients and families in their healthcare 3. Improving care coordination 4. Improving population and public health 5. Ensuring adequate privacy and security protections for personal health information 4
  • 5. The HITECH Act – Major Changes From a Privacy and Security perspective, here are five absolute “game changers” under HITECH: 1) Mandatory audits (Subtitle D, Part 1, Section 13411) 2) HHS non-compliance fines return to HHS’ coffers and within a few years (by law) individuals will participate in sharing the proceeds 3) State AGs can now bring civil actions on behalf of their citizens 4) Business Associates are now statutorily obligated 5) Data Breach Notification requirements 5
  • 6. Meet the HHS Data Breach ‘Wall of Shame’ http://www.hhs.gov/ocr/privacy/hi paa/administrative/breachnotific ationrule/postedbreaches.html 6
  • 7. HIPAA Security-HITECH Compliance Roadmap HIPAA HIPAA Remediation Security is Plan NOT a Focus of HSA ToolKit™ (HRP) “techie” project Preliminary HIPAA Remediation Security Plan Strategy HIPAA HIPAA HIPAA (PRP) (HSS) Security Compliance Security Assessment Manual Evaluation (HSA) HIPAA (HCM) (HSE) HIPAA Security Risk Training Analysis (HST) (HRA) … A journey, not a HIPAA Security destination ! Policies (HSP) 7
  • 8. Purpose of the HSA ToolKit™ 1. Jump Start Your HIPAA Security Compliance Program 2. Establish A Progress / Benchmark Monitor 3. Quickly Identify “Low Hanging” Remediation Items 4. Develop a Solid Foundation for HIPAA Risk Analysis 5. Build Deep Understanding At The Onset 6. Get out in front of Meaningful Use requirements on ePHI security 8
  • 9. Contents of the HSA ToolKit™ 1. HIPAA Security Assessment ToolKit™ Contents document 2. How to Use the HIPAA Security Assessment ToolKit™ 3. Comprehensive HIPAA Security Assessment (HSA) Excel Tool™, including Instructions, Glossary of Terms, included with HSA Excel Tool, Policies Checklist, Resources & References 4. HIPAA Security – HITECH Compliance Roadmap™ 5. Preliminary Remediation Plan Candidate Items template 6. Data Mountain HIPAA-HITECH Security Rule FAQ 7. Iron Mountain HIPAA Primer – What You Should Know About the New Regulations 8. 2009 CMS' HIPAA Compliance Review Analysis And Summary of Results 9. Office of Civil Rights (OCR) HIPAA Security Standards: Guidance on Risk Analysis 10. Centers for Medicare & Medicaid Services (CMS) Security Standards: Implementation for the Small Provider 11. Complete copy of HIPAA Security Final Rule (45 CFR Parts 160, 162, and 164) 9
  • 10. Heart of the HSA ToolKit™
  • 11. Features and Benefits of the HSA ToolKit™ HSA ToolKit™ Features HSA ToolKit™ Benefits • Low Risk • Easily derived immediate remediation steps Low Price and High Value • Fast Track to HIPAA Security Rule Compliance • Comprehensive tool and resources • Low Impact on Client Staff and Operations Short Duration • Fast, Immediate Results • Proven Quality • Developed by Senior, Experienced Professionals Development Team • Health Care Expertise • HIPAA – HITECH Focused • Comprehensive, Complete Data Gathering • Based on Proven Best Practices Sound Methodology • High-Quality, Credible Outcomes • Process View, No-Fault Appraisal • Baseline for Compliance Program 11
  • 12. Contact Bob Chaput www.HIPAASecurityAssessment.com bob.chaput@HIPAASecurityAssessment.com Connect: www.linkedin.com/in/bobchaput Follow me: Twitter.com/bobchaput HITECH Security Advisors, LLC 12