Learn The Difference Security Assessment V. Risk Analysis

549 views
508 views

Published on

** More HIPAA Compliance BootCamp™ and complementary HIPAA HITECH webinars dates released for 2014 - 2015 and beyond! View our schedule or find your nearest event at http://www.clearwatercompliance.com **

The HITECH Act is a “game changer” when it comes to HIPAA Security Rule Compliance. Numerous experts have advised that the best way to get started with your compliance program is to take stock of where you are today. Unfortunately, the advice includes many terms used interchangeably to complete a: Compliance assessment! Security Evaluation! Risk Assessment! Risk Analysis! Compliance Analysis! This webinar ends the confusion, identifies the types of evaluations required by the HIPAA Security Final Rule (and Meaningful Use Stage I Requirements) and explains the differences. Complying with the HIPAA Security Final Rule itself and as amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act, which was enacted as part of the American Recovery and Reinvestment Act (ARRA) of 2009 involves many steps and considerations. What’s most important is starting on the right foot.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
549
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Learn The Difference Security Assessment V. Risk Analysis

  1. 1. Learn the Difference: HIPAA Security Assessment vs. Risk Analysis Thursday, January 20, 2011 2:30 PM – 3:30 PM CST Webinar End the Confusion  Get Stared Today! The HITECH Act is a “game changer” when it comes to HIPAA Security Rule Compliance. Numerous experts have advised that the best way to get started with your compliance program is to take stock of where you are today. Unfortunately, the advice includes many terms used interchangeably to complete a: Compliance assessment! Security Evaluation! Risk Assessment! Risk Analysis! Compliance Analysis! This webinar ends the confusion, identifies the types of evaluations required by the HIPAA Security Final Rule (and Meaningful Use Stage I Requirements) and explains the differences. Complying with the HIPAA Security Final Rule itself and as amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act, which was enacted as part of the American Recovery and Reinvestment Act (ARRA) of 2009 involves many steps and considerations. What’s most important is starting on the right foot. No matter where you are in your HIPAA-HITECH compliance journey, you will benefit from learning about: • The requirements of the HIPAA Security Final Rule for evaluations • The difference between a compliance assessment and a risk analysis • The HIPAA Security Final Rule civil and criminal penalties • Practical, actionable steps to complete the evaluations required by law • Available ToolKits to jump-start your evaluation processes and overall compliance program • Becoming HIPAA-HITECH Security Rule compliant is an important and large project for any organization. Agenda: • Two Security Rule Evaluation requirements • The difference between a compliance assessment and a risk analysis • Proven approaches to completing these evaluations • Step-by-Step Instructions for compliance assessments and risk analysis • Tools, templates and forms available to help youRegister Today: https://www1.gotomeeting.com/register/197480760

×