{"id":2023,"date":"2015-04-10T09:51:38","date_gmt":"2015-04-10T13:51:38","guid":{"rendered":"http:\/\/162.144.41.148\/~msinc\/__production\/website\/?p=2023"},"modified":"2015-07-27T10:27:33","modified_gmt":"2015-07-27T14:27:33","slug":"security-risk-assessments-what-you-need-to-know","status":"publish","type":"post","link":"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/","title":{"rendered":"Security Risk Assessments &#8211; What you need to know."},"content":{"rendered":"<p><strong>IF YOU ARE A MEDICAL PRACTICE, WE STRONGLY URGE YOU TO READ THE ENTIRE THREAD AS IT WILL HELP PROTECT THE PRACTICE.<\/strong><\/p>\n<p>Earlier this year, the Medical Association of Georgia (MAG) released an alert on their website and email campaign urging practices to confirm they are meeting all of the \u2018meaningful use\u2019 requirements in full. The Centers for Medicare and Medicaid Services (CMS) plans to conduct 38,000 retroactive and pre-payment audits in 2015, and it is stressing that it will recoup the incentives from practices that did not meet the requirements in full.<\/p>\n<p>CMS auditors have reportedly stated that \u201c\u2026being found deficient on any one measure will cause a provider to be out of compliance. In this case, CMS will recoup the provider\u2019s entire stimulus for the reporting period in question.\u201d CMS has up to six years to conduct an audit for a given year.<\/p>\n<p>Bill Steuer with GSG Compliance, LLC says, \u201cMany practices attesting for Meaningful Use, will satisfy each of the requirements for that particular stage, except to actually complete the required Security Risk Assessment.\u00a0 What they do not understand is that if they get audited, CMS can and will take back 100% of the stimulus funds they received for not fully completing the attestation requirements.&#8221;<\/p>\n<p>He states, &#8220;additionally, practices who do <strong>not<\/strong> attest for Meaningful Use, have the misconception that they do not have to complete a Security Risk Assessment. The reality is that the HIPAA Security Rule was enacted in 2003, well before the Meaningful Use program, and it requires practices mitigate their security risks by periodically performing a Security Risk Assessment.<\/p>\n<p>Medicus Solutions specializes in healthcare informatics and we are here to help. We have started to see these audits in practices which we support. <strong><span style=\"text-decoration: underline;\">Completing the security risk assessment is the responsibility of the practice due to the areas which is involves<\/span><\/strong><span style=\"text-decoration: underline;\">. <\/span>We strongly urge each and every practice to review all of their documentation and specifically your security risk assessments. You should have a completed security risk assessment for each year \/ reporting period and it must be updated with risks and risk remediation plans.<\/p>\n<p>We have received a number of requests from clients over the past couple months for Medicus to complete the practice\u2019s security risk assessment. A security risk assessment is compiled of at least three (3) areas which include administrative safeguards, technical safeguards, and physical safeguards. Completing a risk assessment requires a time investment and Medicus is here to help its clients with the technical portion of the risk assessments included in our support. Practices will need to complete the administrative and physical safeguard sections.<\/p>\n<p>The Office of the National Coordinator for Health Information Technology (ONC) has worked with the Health and Human Services (HHS) Office for Civil Rights (OCR) and the Health and Human Services (HHS) Office of the General Counsel (OGC) to develop a tool to help practices complete a security risk assessment.<\/p>\n<p>We have provided access to the tool the ONC has released on our website for your convenience. This includes paper-based versions of the tool, iPad version of the tool, a desktop computer version of the tool, and the user\u2019s guide for the tool. There are a total of 156 questions. Resources are included with each question to help you:<\/p>\n<ul>\n<ul>\n<li>Understand the context of the question<\/li>\n<li>Consider the potential impacts to your PHI if the requirement is not met<\/li>\n<li>See the actual safeguard language of the HIPAA Security Rule<\/li>\n<\/ul>\n<\/ul>\n<p><span style=\"text-decoration: underline;\"><strong>Paper Based Version of the Tool<\/strong><\/span><\/p>\n<p><a href=\"http:\/\/162.241.140.166\/~msinc\/marketing\/newsletter\/SRA%20Tool\/20140312_sratool_content_-_administrative_volume_v1.docx\">Download Administrative Safeguards [DOCX &#8211; 269 KB]<\/a><\/p>\n<p><a href=\"http:\/\/162.241.140.166\/~msinc\/marketing\/newsletter\/SRA%20Tool\/20140320_sratool_content_-_technical_volume_v1.docx\">Download Technical Safeguards [DOCX &#8211; 240 KB]<\/a><\/p>\n<p><a href=\"http:\/\/162.241.140.166\/~msinc\/marketing\/newsletter\/SRA%20Tool\/20140318_sratool_content_-_physical_volume_v1.docx\">Download Physical Safeguards [DOCX &#8211; 225 KB]<\/a><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Computer \/ Desktop Version of the Tool<\/strong><\/span><\/p>\n<p><a href=\"http:\/\/162.241.140.166\/~msinc\/marketing\/newsletter\/SRA%20Tool\/SRATool_desktop_v1.3.exe\">Download SRA Tool Here \u2013 Computer Version (EXE \u2013 66 MB)<\/a><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>IPad Version of the Tool<\/strong><\/span><\/p>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/app\/hhs-sra-tool\/id820478630?ls=1&amp;mt=8\">Download SRA Tool Here \u2013 IPad Version<\/a><\/p>\n<p><span style=\"text-decoration: underline;\"><strong>SRA Tool Users Guide<\/strong><\/span><\/p>\n<p><a href=\"http:\/\/162.241.140.166\/~msinc\/marketing\/newsletter\/SRA%20Tool\/risk_assessment_user_guide_final_3_26_2014.pdf\">Download SRA Tool Users Guide Here<\/a><\/p>\n<p>For updates, below is the link to HealthIT.gov site:<br \/>\n<a href=\"http:\/\/www.healthit.gov\/providers-professionals\/security-risk-assessment-tool\">http:\/\/www.healthit.gov\/providers-professionals\/security-risk-assessment-tool<\/a><\/p>\n<p>MAG Alert:<br \/>\n<a href=\"http:\/\/www.magnetmail.net\/actions\/email_web_version.cfm?recipient_id=311080039&amp;message_id=8374842&amp;user_id=MedGeorgia&amp;group_id=58524&amp;jobid=24761024\">http:\/\/www.magnetmail.net\/actions\/email_web_version.cfm?recipient_id=311080039&amp;message_id=8374842&amp;user_id=MedGeorgia&amp;group_id=58524&amp;jobid=24761024<\/a><\/p>\n<h2>Disclaimer<\/h2>\n<p><em>The Security Risk Assessment Tool at HealthIT.gov is provided for informational purposes only. Use of this tool is neither required by nor guarantees compliance with federal, state or local laws. Please note that the information presented may not be applicable or appropriate for all health care providers and organizations. The Security Risk Assessment Tool is not intended to be an exhaustive or definitive source on safeguarding health information from privacy and security risks. For more information about the HIPAA Privacy and Security Rules, please visit the\u00a0<a href=\"http:\/\/www.hhs.gov\/ocr\/privacy\/index.html\">HHS Office for Civil Rights Health Information Privacy website<\/a>.<\/em><\/p>\n<p><em>NOTE: The NIST Standards provided in this tool are for informational purposes only as they may reflect current best practices in information technology and are not required for compliance with the HIPAA Security Rule\u2019s requirements for risk assessment and risk management. This tool is not intended to serve as legal advice or as recommendations based on a provider or professional\u2019s specific circumstances. We encourage providers, and professionals to seek expert advice when evaluating the use of this tool.<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IF YOU ARE A MEDICAL PRACTICE, WE STRONGLY URGE YOU TO READ THE ENTIRE THREAD AS IT WILL HELP PROTECT THE PRACTICE. Earlier this year, the Medical Association of Georgia (MAG) released an alert on their website and email campaign urging practices to confirm they are meeting all of the \u2018meaningful use\u2019 requirements in full. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2024,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,9],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Risk Assessments - What you need to know. - Medicus Solutions, LLC<\/title>\n<meta name=\"description\" content=\"healthcare security risk assessment tool - Medicus Solutions\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Risk Assessments - What you need to know. - Medicus Solutions, LLC\" \/>\n<meta property=\"og:description\" content=\"healthcare security risk assessment tool - Medicus Solutions\" \/>\n<meta property=\"og:url\" content=\"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Medicus Solutions, LLC\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-10T13:51:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-27T14:27:33+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/SRA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"338\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/\",\"url\":\"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/\",\"name\":\"Security Risk Assessments - What you need to know. - Medicus Solutions, LLC\",\"isPartOf\":{\"@id\":\"http:\/\/162.241.140.166\/~msinc\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/SRA.jpg\",\"datePublished\":\"2015-04-10T13:51:38+00:00\",\"dateModified\":\"2015-07-27T14:27:33+00:00\",\"author\":{\"@id\":\"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/76e02a7fc25b736a8729c86c604b4bd3\"},\"description\":\"healthcare security risk assessment tool - Medicus Solutions\",\"breadcrumb\":{\"@id\":\"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/#primaryimage\",\"url\":\"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/SRA.jpg\",\"contentUrl\":\"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/SRA.jpg\",\"width\":573,\"height\":338,\"caption\":\"healthcare security risk assessment tool - Medicus Solutions\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/162.241.140.166\/~msinc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Risk Assessments &#8211; What you need to know.\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/#website\",\"url\":\"http:\/\/162.241.140.166\/~msinc\/\",\"name\":\"Medicus Solutions, LLC\",\"description\":\"Atlanta Healthcare Computer Support - MSP\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/162.241.140.166\/~msinc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/76e02a7fc25b736a8729c86c604b4bd3\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/1.gravatar.com\/avatar\/17879ad9491896f9af1138fccf0947de?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/1.gravatar.com\/avatar\/17879ad9491896f9af1138fccf0947de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"http:\/\/162.241.140.166\/~msinc\/author\/admin-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Risk Assessments - What you need to know. - Medicus Solutions, LLC","description":"healthcare security risk assessment tool - Medicus Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Security Risk Assessments - What you need to know. - Medicus Solutions, LLC","og_description":"healthcare security risk assessment tool - Medicus Solutions","og_url":"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/","og_site_name":"Medicus Solutions, LLC","article_published_time":"2015-04-10T13:51:38+00:00","article_modified_time":"2015-07-27T14:27:33+00:00","og_image":[{"width":573,"height":338,"url":"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/SRA.jpg","type":"image\/jpeg"}],"author":"admin","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/","url":"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/","name":"Security Risk Assessments - What you need to know. - Medicus Solutions, LLC","isPartOf":{"@id":"http:\/\/162.241.140.166\/~msinc\/#website"},"primaryImageOfPage":{"@id":"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/#primaryimage"},"image":{"@id":"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/SRA.jpg","datePublished":"2015-04-10T13:51:38+00:00","dateModified":"2015-07-27T14:27:33+00:00","author":{"@id":"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/76e02a7fc25b736a8729c86c604b4bd3"},"description":"healthcare security risk assessment tool - Medicus Solutions","breadcrumb":{"@id":"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/#primaryimage","url":"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/SRA.jpg","contentUrl":"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/SRA.jpg","width":573,"height":338,"caption":"healthcare security risk assessment tool - Medicus Solutions"},{"@type":"BreadcrumbList","@id":"http:\/\/162.241.140.166\/~msinc\/newsletter\/security-risk-assessments-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/162.241.140.166\/~msinc\/"},{"@type":"ListItem","position":2,"name":"Security Risk Assessments &#8211; What you need to know."}]},{"@type":"WebSite","@id":"http:\/\/162.241.140.166\/~msinc\/#website","url":"http:\/\/162.241.140.166\/~msinc\/","name":"Medicus Solutions, LLC","description":"Atlanta Healthcare Computer Support - MSP","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/162.241.140.166\/~msinc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/76e02a7fc25b736a8729c86c604b4bd3","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/image\/","url":"http:\/\/1.gravatar.com\/avatar\/17879ad9491896f9af1138fccf0947de?s=96&d=mm&r=g","contentUrl":"http:\/\/1.gravatar.com\/avatar\/17879ad9491896f9af1138fccf0947de?s=96&d=mm&r=g","caption":"admin"},"url":"http:\/\/162.241.140.166\/~msinc\/author\/admin-2\/"}]}},"_links":{"self":[{"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/posts\/2023"}],"collection":[{"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/comments?post=2023"}],"version-history":[{"count":5,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/posts\/2023\/revisions"}],"predecessor-version":[{"id":2145,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/posts\/2023\/revisions\/2145"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/media\/2024"}],"wp:attachment":[{"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/media?parent=2023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/categories?post=2023"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/tags?post=2023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}