Health Insurance Portability and Accountability

Let’s have a look at some of the branches of the HIPAA Security Regulations: the HIPAA Audit Rule, HIPAA Security Rule, and the HIPAA Privacy Rule.

HIPAA Security Rule

The HIPAA Security Rule is another branch of the HIPAA regulations, and it implements national standards to safeguard the electronic health information for patients, especially if it is recorded, created, and used by an entity covered under the act. The rule consists a set of administrative, physical and technical security protocols that keep the health information private and secure.

The Security Rule was added to the HIPAA Security Regulations in 1998, and it underwent several changes and updates since then. In January 2013, the Security Rule was modified to add the Omnibus HIPAA Final Rule.

HIPAA Privacy Rule

Lastly, the HIPAA Privacy Rule is similar to the Security Rule, and it was first proposed and added to the security regulations in 1999. This rule introduces national standards to safeguard the medical records and personal health information that is used for health plans, healthcare providers, and other covered entities that conduct electronic healthcare transactions.

  • $8,000

    Signup for your Assessment using one of the two provided options.

    CC Payments:
    You are able to pay through your company credit card for the full amount of the assessment and expedite the delivery of your assessment results.

    Payment Invoicing:
    You are invoiced as a split cost 50/50 where the first 50% is due upon signup of self assessment and the final 50% is due upon delivery of the results.

  • HIPAA Assessment

The Assessment Process

Schedule Assessment

An introductory kickoff call will cover the onboarding and action steps needed to schedule your assessment and introduce your consulting team.

Conduct Assessment

Conduct your security assessment detailing the current operational workflows associated to the outlined requirement statements. Your cyber security consultant will guide you through the requirement statements and apply them to your operational workflows.

We Analyze The Results

An expert cyber security consultant analyzes the results and may follow up for clarification while identifying compliance gaps between current operations and defined security requirements.

Get a Corrective Action Plan

A cyber security consultant delivers a corrective action plan with reporting metrics and detailed actions that can be taken to bring your security program into alignment with defined requirements.

Select Your Payment Method

Still Have Questions – Schedule a Call