The Critical Difference: HIPAA Security Compliance Assessment v. HIPAA Security Risk Analysis
Event Information
Compliance assessment? Security Evaluation? Risk Assessment? Risk Analysis? Compliance Analysis? Just what does the HIPAA Security Final Rule and/or The HITECH Act and/or Meaningful Use Final Rule require? Numerous experts have advisedthat the best way to get started with your compliance program is to take stock of where you are today. Unfortunately, the advice includes many terms used interchangeably, such as: Compliance Assessment, Security Evaluation, Risk Assessment, Risk Analysis and Compliance Analysis. This webinar ends the confusion, identifies the types of evaluations required by the HIPAA Security Final Rule (and Meaningful Use Stage I and Stage 2 Requirements) and explains the differences.
---
Learning Objectives:
- Explain the difference between these two Security Rule Evaluation requirements
- Identify proven approaches to completing these evaluations
- Discuss step-by-step instructions for compliance assessments and risk analysis
Start Date: 08/19/2015
Event Type: AEHIS LIVE Webinar , Archived
Session Speaker(s):
Bob Chaput, CISSP, HCISPP, CRISC, CIPP/US, CEO, Clearwater Compliance LLC
Please login or become a member to view register