{"id":813,"date":"2016-11-04T07:00:26","date_gmt":"2016-11-04T13:00:26","guid":{"rendered":"https:\/\/dsiohn098w.mpqhf.org\/blog\/?p=813"},"modified":"2017-03-28T10:21:21","modified_gmt":"2017-03-28T16:21:21","slug":"hts-mu-security-risk-assessments-needed-mu-2","status":"publish","type":"post","link":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/","title":{"rendered":"HTS &#8211; MU: Security Risk Assessments Needed for More than MU"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/11\/Security-Risks-Assessments-Needed-for-More-than-MU.png\" alt=\"Security-Risks-Assessments-Needed-for-More-than-MU\" width=\"1200\" height=\"300\" class=\"alignnone size-full wp-image-817\" srcset=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/11\/Security-Risks-Assessments-Needed-for-More-than-MU.png 1200w, https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/11\/Security-Risks-Assessments-Needed-for-More-than-MU-300x75.png 300w, https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/11\/Security-Risks-Assessments-Needed-for-More-than-MU-768x192.png 768w, https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/11\/Security-Risks-Assessments-Needed-for-More-than-MU-1024x256.png 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<h1>Security Risk Assessments Needed for More than MU<\/h1>\n<h5>November 4, 2016<\/h5>\n<h6>Written by Patty Kosednar<\/h6>\n<p>Hey all you meaningful users!\u00a0 As you all know, security risk assessments are a requirement for meeting meaningful use.\u00a0 However, the requirement for them and their importance is greater than just the MU program.\u00a0 Below is information from Susan Clarke, our Health Care Information Security and Privacy Practitioner:<\/p>\n<p>\u201c2016 is the biggest HIPAA enforcement Year for the Office for Civil Rights (OCR), with over $20 Million in settlements and growing.\u00a0 At the <em>Safeguarding Health Information:\u00a0 Building Assurance through HIPAA Security in 2016<\/em> conference held in Washington, D.C. on October 19-20, incomplete or inaccurate risk analysis was discussed as a deficiency by OCR.\u00a0 Covered Entities and Business Associates need to conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information.\u00a0 See 45 C.F.R.164.308(a)(1)(ii)(A).<\/p>\n<p>Organizations frequently underestimate the proliferation of ePHI within their environments.\u00a0 When conducting a risk analysis, an organization must identify all of the ePHI created, maintained, received or transmitted by the organization.<\/p>\n<p>In addition, conducting or reviewing a security risk analysis to meet the standards of HIPAA Security Rule is included in the meaningful use requirements of the Medicare and Medicaid EHR Incentive Programs. Eligible professionals must conduct or review a security risk analysis for each EHR reporting period to ensure the privacy and security of their patients\u2019 protected health information.\u00a0 <a href=\"https:\/\/www.cms.gov\/Regulations-and-Guidance\/Legislation\/EHRIncentivePrograms\/Downloads\/2016_SecurityRiskAnalysis.pdf\" target=\"_blank\">Click here for more information<\/a>.\u201d<\/p>\n<p>Time is running out to have your security risk analysis completed in 2016, please contact HTS for more information on how we can help provide a SRA for your practice, hospital or nursing home.<\/p>\n<p>Visit our website for more information on <a href=\"http:\/\/www.mpqhf.org\/corporate\/health-and-technology-services\/hipaa-privacy-and-security\/\" target=\"_blank\">how we can assist you with your SRA.<\/a><\/p>\n<p>Susan Clarke,\u00a0Health Care Information Security and Privacy Practitioner<\/p>\n<p><a href=\"http:\/\/www.gotohts.org\" target=\"_blank\">www.gotohts.org<\/a><\/p>\n<p>307.248.8179<\/p>\n<p>If you have any questions at all, or run into issues with any of the meaningful use objectives and would like help please use \u00a0the \u201cLeave a Reply\u201d section below, or email Patty Kosednar directly with your questions or comments.<\/p>\n<p><strong>Other Resource Links<\/strong><\/p>\n<p><a href=\"http:\/\/www.mpqhf.org\/corporate\/health-and-technology-services\/meaningful-use\/\" target=\"_blank\">HTS MU Resources<\/a><\/p>\n<p><a href=\"https:\/\/www.cms.gov\/Regulations-and-Guidance\/Legislation\/EHRIncentivePrograms\/2016ProgramRequirements.html\" target=\"_blank\">CMS 2016 MU Requirements<\/a><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><strong>Subscribe to the HTS Meaningful Use Blog<\/strong><br \/>\n<a href=\"http:\/\/eepurl.com\/b-xSTj\" class=\"su-button su-button-style-flat\" style=\"color:#ffffff;background-color:#385173;border-color:#2d415c;border-radius:5px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#ffffff;padding:0px 30px;font-size:22px;line-height:44px;border-color:#74869d;border-radius:5px;text-shadow:0px 0px 0px #f4f4f4\"> Subscribe<\/span><\/a>\n<p>&nbsp;<\/p>\n<hr \/>\n<div id=\"boxzero\">\n<section id=\"boxone\">\n<p id=\"boxparagraph\"><strong>See a list of upcoming webinars<\/strong><\/p>\n<p><a href=\"http:\/\/www.mpqhf.org\/corporate\/health-and-technology-services\/upcoming-webinars\/\"><span class=\"link-spanner\">See a list of upcoming webinars<\/span><\/a><br \/>\n<\/section>\n<section id=\"boxtwo\">\n<p id=\"boxparagraph\"><strong>Check out any webinars you missed<\/strong><\/p>\n<p><a href=\"http:\/\/www.mpqhf.org\/corporate\/health-and-technology-services\/webinar-materials\/\"><span class=\"link-spanner\">Check out any webinars you missed<\/span><\/a><br \/>\n<\/section>\n<aside id=\"boxthree\">\n<p id=\"boxparagraph\"><strong>See our MU resources<\/strong><\/p>\n<p><a href=\"http:\/\/www.mpqhf.org\/corporate\/health-and-technology-services\/meaningful-use\/\"><span class=\"link-spanner\">See our MU resources<\/span><\/a><br \/>\n<\/aside>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security Risk Assessments Needed for More than MU November 4, 2016 Written by Patty Kosednar Hey all you meaningful users!\u00a0 As you all know, security risk assessments are a requirement for meeting meaningful use.\u00a0 However, the requirement for them and their importance is greater than just the MU program.\u00a0 Below is information from Susan Clarke, [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":180,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[136],"tags":[7,6,63,64],"class_list":{"0":"post-813","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-meaningful-use-2016","8":"tag-meaningful-use","9":"tag-mu","10":"tag-security-risk-assessment","11":"tag-sra","12":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HTS - MU: Security Risk Assessments Needed for More than MU - Mountain Pacific Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HTS - MU: Security Risk Assessments Needed for More than MU - Mountain Pacific Blog\" \/>\n<meta property=\"og:description\" content=\"Security Risk Assessments Needed for More than MU November 4, 2016 Written by Patty Kosednar Hey all you meaningful users!\u00a0 As you all know, security risk assessments are a requirement for meeting meaningful use.\u00a0 However, the requirement for them and their importance is greater than just the MU program.\u00a0 Below is information from Susan Clarke, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Mountain Pacific Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-04T13:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-28T16:21:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dale Applegate\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dale Applegate\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/\",\"url\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/\",\"name\":\"HTS - MU: Security Risk Assessments Needed for More than MU - Mountain Pacific Blog\",\"isPartOf\":{\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png\",\"datePublished\":\"2016-11-04T13:00:26+00:00\",\"dateModified\":\"2017-03-28T16:21:21+00:00\",\"author\":{\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/8242c32ae4d347d6d34fedf54fe5b348\"},\"breadcrumb\":{\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/#primaryimage\",\"url\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png\",\"contentUrl\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HTS &#8211; MU: Security Risk Assessments Needed for More than MU\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/#website\",\"url\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/\",\"name\":\"Mountain Pacific Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/8242c32ae4d347d6d34fedf54fe5b348\",\"name\":\"Dale Applegate\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6498a62b7e7415e8adb03ec6eb186bd8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6498a62b7e7415e8adb03ec6eb186bd8?s=96&d=mm&r=g\",\"caption\":\"Dale Applegate\"},\"url\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/author\/dale_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HTS - MU: Security Risk Assessments Needed for More than MU - Mountain Pacific Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/","og_locale":"en_US","og_type":"article","og_title":"HTS - MU: Security Risk Assessments Needed for More than MU - Mountain Pacific Blog","og_description":"Security Risk Assessments Needed for More than MU November 4, 2016 Written by Patty Kosednar Hey all you meaningful users!\u00a0 As you all know, security risk assessments are a requirement for meeting meaningful use.\u00a0 However, the requirement for them and their importance is greater than just the MU program.\u00a0 Below is information from Susan Clarke, [&hellip;]","og_url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/","og_site_name":"Mountain Pacific Blog","article_published_time":"2016-11-04T13:00:26+00:00","article_modified_time":"2017-03-28T16:21:21+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png","type":"image\/png"}],"author":"Dale Applegate","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dale Applegate","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/","url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/","name":"HTS - MU: Security Risk Assessments Needed for More than MU - Mountain Pacific Blog","isPartOf":{"@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/#primaryimage"},"image":{"@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/#primaryimage"},"thumbnailUrl":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png","datePublished":"2016-11-04T13:00:26+00:00","dateModified":"2017-03-28T16:21:21+00:00","author":{"@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/8242c32ae4d347d6d34fedf54fe5b348"},"breadcrumb":{"@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/#primaryimage","url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png","contentUrl":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dsiohn098w.mpqhf.org\/blog\/"},{"@type":"ListItem","position":2,"name":"HTS &#8211; MU: Security Risk Assessments Needed for More than MU"}]},{"@type":"WebSite","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/#website","url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/","name":"Mountain Pacific Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dsiohn098w.mpqhf.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/8242c32ae4d347d6d34fedf54fe5b348","name":"Dale Applegate","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6498a62b7e7415e8adb03ec6eb186bd8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6498a62b7e7415e8adb03ec6eb186bd8?s=96&d=mm&r=g","caption":"Dale Applegate"},"url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/author\/dale_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/posts\/813"}],"collection":[{"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/comments?post=813"}],"version-history":[{"count":0,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/posts\/813\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/media\/180"}],"wp:attachment":[{"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/media?parent=813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/categories?post=813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/tags?post=813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}