Requires organizations to have security policies in place in accordance with HIPAA standards.​
Ensures that each of an organization’s physical locations are secure utilizing alarm systems, cameras, and keypad locks, for example.​
Requires organizations to create a list of all of the devices that access electronic protected health information (ePHI). The device list should include who uses the device and what protections are in place securing the device.​
Analyzes an organization’s overall security to determine gaps, allowing remediation plans to be created to close gaps.​
Assesses an organization’s privacy policies, ensuring that PHI use and disclosure guidelines are in line with HIPAA standards. ​
Ensures that documentation and procedures are in line with HIPAA breach notification requirements.​
View Answers:
Correct
Incorrect
Login
Accessing this program requires a login. Please enter your credentials below!