Audits Breaches and Fines Part 2 - Further progress along the HIPAA brick road

Poyner Spruill LLP
Contact

In last month’s issue of Endnotes, we covered the “why” of HIPAA compliance. Now let’s consider the “how.” How exactly do you review your HIPAA privacy and security compliance program and ensure that all the requisite bases have been covered?

Know Your Obligations

Your first step is to identify all your legal requirements. For privacy and security purposes, these are enumerated in the HIPAA Privacy, Security and Breach Notice Rules. You need to identify each requirement that must result in some “end product.” Depending on the requirement, that could mean a documented policy or procedure, a set of security reminders, training programs, a complaint process, an incident response plan, etc. If you’ve never asked a lawyer to review your program to determine whether each of these end products is addressed, this might be a good time to consider that step.

Please see full publication below for more information.

LOADING PDF: If there are any problems, click here to download the file.

Written by:

Poyner Spruill LLP
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Poyner Spruill LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide