HIPAA Security Implementation, Version 1.0

4.9 RISK MANAGEMENT & ASSESSMENT

Both rules emphasize the use of Risk Assessments in order to Assess and Manage Risk appropriately. Unless one under stands what the organizations critical assets are (people, applications, data, facilities etc.) and what potential threats / risks that these assets are exposed to one will never be able to define appropriate, cost effective controls to protect these assets.

The security rule recognizes that not all organizations have the same issues, technologies etc. hence the concept of 'Reasonable and Appropriate' safeguards / controls was born.

It should also be noted that Risk Assessments are discoverable documents and should be treated as such. The fact that they are discoverable is not an excuse for not performing a Risk Assessment. A CE can be held liable in a case as it 'should have known' or 'should have taken reasonable and prudent steps to discover'

Good Risk Assessment is an excellent means of demonstrating 'Due Care and Due Diligence' by the CE and is also a structured approach to identifying operational issues specific to one's environment and the prioritization of tasks to comply with the act.

Risk Assessment is not something that an organization does just once, it is an on going process that needs to be done on a regular basis to ensure that an organization's controls are kept updated in a cost effective manner.

Some of the reasons that will require the constant updating of controls through Risk Assessment are that technologies change, the organization changes i.e. through mergers, acquisitions and via natural growth, employees come and go, business models and product offerings change to name some.

A Risk Assessment Process or Methodology would follow the steps listed below:

Категории