Let’s face it, security risk analysis protocol and details can be confusing even after learning about it in a seminar or book. That is why we like to end our presentations about security risk analysis with these top 10 myths of security risk analysis. Take a look at some of these myths you thought may have been true.
The Office for Civil Rights (OCR) recently announced its intention to begin its second round of HIPAA audits. Slated to begin in 2016, the initiative will include both on-site and desk audits and will focus on areas of poor compliance found in initial audits. Audits will cover hospitals, healthcare providers, health plans and businesses. This round of compliance audits will include 200-300 limited scope desk audits to create a sample base of covered entities to ensure HIPAA Privacy, Security & Breach Notification Rules compliance.
Last week, the Centers for Medicare & Medicaid Services (CMS) and the Office of the National Coordinator for Health IT (ONC) released final regulations and plans that will affect Keystone IT clients who are attesting for Meaningful Use and the healthcare industry as a whole. CMS published the Meaningful Use 2015-2017 Modifications/Stage 3 Rule, and ONC released the Nationwide Interoperability Roadmap.