ID Experts offers breach notification checklist
ID Experts has developed a free toolkit and checklist that can help healthcare organizations prepare for and respond to an Office for Civil Rights (OCR) data breach investigation.
The HIPAA/HITECH Act Privacy, Security and Data Breach Notification Rules compliance tool is geared for healthcare compliance, privacy and information security officers. It provides 12 steps for assessing privacy risks and mitigating data breach risks, to both prepare organizations for an OCR investigation and to reduce the risks of penalties and fines, according to ID Experts, a data breach services company based in Portland, Ore.
According to the company, preparing for an OCR breach investigation includes preventive measures:
1. Assign privacy and security responsibilities before trouble hits: Ensure accountability for patient privacy with a specifically designated privacy official in your organization.
2. Conduct an annual risk analysis: Carry out an annual risk analysis intended to identify privacy/security risks and vulnerabilities.
3. Address security vulnerabilities: Implement security measures to reduce risks and vulnerabilities identified in the most recent risk assessment.
The HIPAA/HITECH Act Privacy, Security and Data Breach Notification Rules compliance tool is geared for healthcare compliance, privacy and information security officers. It provides 12 steps for assessing privacy risks and mitigating data breach risks, to both prepare organizations for an OCR investigation and to reduce the risks of penalties and fines, according to ID Experts, a data breach services company based in Portland, Ore.
According to the company, preparing for an OCR breach investigation includes preventive measures:
1. Assign privacy and security responsibilities before trouble hits: Ensure accountability for patient privacy with a specifically designated privacy official in your organization.
2. Conduct an annual risk analysis: Carry out an annual risk analysis intended to identify privacy/security risks and vulnerabilities.
3. Address security vulnerabilities: Implement security measures to reduce risks and vulnerabilities identified in the most recent risk assessment.