KENTUCKY REGIONAL EXTENSION CENTER

Security Risk Analysis

Security Risk Analysis

A Security Risk Analysis is an accurate and thorough analysis of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic patient health information (ePHI). The HIPAA Security Rule requires all covered entities to conduct a Security Risk Analysis and states the Risk Analysis should be an ongoing process. Once you have completed the Risk Analysis, you must take any additional “reasonable and appropriate” steps to reduce identified risks to reasonable and appropriate levels. (45 CFR 164.308(a)(1)(ii)).

HIPAA Security Rule

The HIPAA Security Rule establishes national standards to protect individuals’ health information that is created, received, used, or maintained in electronic form by a covered entity (also known as ePHI). The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information.
The Security Rule is located at 45 CFR Part 160 and Subparts A and C of Part 164.

Contact the Kentucky REC today for more information on how we can help with your security risk analysis.

Covered Entity

A covered entity is one of the following:

A Health Care ProviderA Health PlanA Health Care Clearinghouse
This includes providers such as:

  • Doctors
  • Clinics
  • Psychologists
  • Dentists
  • Chiropractors
  • Nursing Homes
  • Pharmacies
...but only if they transmit any information in an electronic form in connection with a transaction for which HHS has adopted a standard.
This includes:

  • Health insurance companies
  • HMOs
  • Company health plans
  • Government programs that pay for health care, such as Medicare, Medicaid, and the military and veterans’ health care programs

This includes entities that process nonstandard health information they receive from another entity into a standard (i.e., standard electronic format or data content), or vice versa.

Covered Entity Guidance Tool

Protecting patients’ ePHI is as important as protecting their paper PHI. An SRA helps to identify vulnerabilities and threats surrounding your EHR and other IT systems containing and transmitting ePHI. Once identified, you will need to mitigate the vulnerabilities to reasonable level.

Please note all providers who are covered entities under HIPAA are required to perform a Security Risk Analysis.

Use the following tool to help determine if you are a Covered Entity

Why Do I Need an SRA?

EHR Incentive Program SRA Guidance

Quality Payment Programs/MIPS Guidance

KENTUCKY REC HIPAA NEWS

HHS SCAM ALERT: INDIVIDUAL POSING AS OCR INVESTIGATOR

HHS Scam Alert: Individual Posing as OCR Investigator It has come to OCR’s attention that an individual posing as an OCR Investigator has contacted HIPAA covered entities in an attempt to obtain protected health information (PHI). The individual identifies themselves...

MEDICARE TELEHEALTH COVERAGE DURING THE COVID-19 NATIONAL EMERGENCY

Under the 1135 waiver authority and Coronavirus Preparedness and Response Supplemental Appropriations Act, CMS has expanded access to Medicare telehealth services for beneficiaries. This response is in an effort to ensure that all beneficiaries, particularly those at...

COVID-19 AND THE HIPAA PRIVACY RULE

COVID-19 and The HIPAA Privacy Rule: Bulletins from HHS In light of the COVID-19 national emergency, the Health and Human Services (HHS) Office for Civil Rights (OCR) has released information specific to the HIPAA Privacy Rule. The Kentucky REC wants to make sure you...