Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Meaningfull User Risk Analysis
1. How To Conduct a Meaningful Use
Risk Analysis
Thursday, June 9, 2011 2:30 PM - 3:30 PM CDT
THE CHALLENGE
The deadline for HIPAA Security Rule compliance for Covered Entities (CEs) was April
2005! For Business Associates (BAs), the date was February 2010. Additionally, the
federal government unveiled its criteria for the Meaningful Use of electronic health
records (EHRs) on July 13. The criteria must be met in order for a hospital or eligible
provider (EP) to qualify for EHR incentives under the American Recovery and
Reinvestment Act of 2009 (ARRA). The meaningful use criteria have been established
and include a specific privacy / security requirement to “Protect electronic health
information created or maintained by the certified EHR technology through the
implementation of appropriate technical capabilities.” For both hospitals and EPs, the
certification criteria is to “Conduct or review a security risk analysis and implement
security updates as necessary.”
THE SOLUTION
If you receive, store, process or transmit ePHI, you should attend this webinar on how
to conduct a HIPAA Security Risk Analysis. The concepts of risk, threats,
vulnerabilities, impact, likelihood and many others are explained in this webinar. A
classic categorization of risks into a matrix is explored. This webinar teaches you how
to determine your risks, categorize them as Low, Medium, High or Critical and then
develop a risk remediation action plan.
In this live session, attendees will learn about:
• Risk Analysis essentials
• Specific requirements outlined in HHS/OCR Final Guidance
• A Practical Risk Analysis Methodology
• Step-by-Step Instructions for completing a HIPAA Risk Analysis
• Resources available to help you
Register Today: https://www1.gotomeeting.com/register/171895241