HIPAA Security Implementation, Version 1.0

7.8 PRESENTATION

By now, it's reasonable to expect that you've accumulated a lot of documentation. You've got the identification of goals and referential material to look up the legal requirements from the HIPAA Security Rule. Next, you have a site survey of the existing infrastructure and policies that might assist in your HIPAA compliance plan. This would be followed by a detailed financial risk evaluation and, finally, a very thorough document of the possible and favored implementation tasks and technologies.

Don't print all of this material out and turn it in as your justification plan. In most cases, some type of slide show presentation will serve as an effective tool for making your pitch. The following presentation guideline is based upon a good discussion on justifying an IDS infrastructure by Stephen Northcutt [1] . To seek justification for your HIPAA Security Rule compliance plan, the slide show should consist of the following sections:

In many cases, a management board might want a short summarized presentation. In preparation for this eventuality, you should prepare three slides consisting of the Executive Summary/Problem Statement, Cost Summary, and the Schedule from the bigger slide presentation created based upon the guidelines above. Be prepared to identify facts and figures and to answer questions. If necessary, refer to the slides from the larger presentation.

[1] Network Intrusion Detection: Third Edition by Stephen Northcutt and Judy Novak, Chapter 19

Категории