Download presentation
Presentation is loading. Please wait.
Published byEmerald Cameron Modified over 9 years ago
1
Utilizing the CMS Security Risk Assessment Tool Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN 678.640.4752
2
Overview Why is the Security Risk Assessment (SRA) needed? Introduction of the CMS/OCR SRA Tool How do you use the Tool? Review of Pros and Cons of Utilizing Tool Q&A
3
Why is the SRA Needed? Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires that covered entities conduct a risk assessment of their healthcare organization Conducting a security risk assessment is a core requirement for providers seeking payment through the Medicare and Medicaid EHR Incentive Program, commonly known as the Meaningful Use Program
4
Why is the SRA Needed? A risk assessment helps your organization ensure it is compliant with HIPAA’s administrative, physical, and technical safeguards A risk assessment also helps reveal areas where your organization’s protected health information (PHI) could be at risk
5
Introduction to Tool Result of a collaborative effort by the HHS Office of the National Coordinator for Health Information Technology (ONC) and Office for Civil Rights (OCR). Designed to help practices conduct and document a risk assessment in a Thorough, organized fashion at their own pace Facilitating assessment of information security risks in your organization under the HIPAA Security Rule. The application, available for downloading at www.HealthIT.gov/security-risk-assessment Also produces a report that can be provided to auditors.
6
Disclaimer The Security Risk Assessment Tool at HealthIT.gov is provided for informational purposes only. Use of this tool is neither required by nor guarantees compliance with federal, state or local laws. Please note that the information presented may not be applicable or appropriate for all health care providers and organizations. The Security Risk Assessment Tool is not intended to be an exhaustive or definitive source on safeguarding health information from privacy and security risks. For more information about the HIPAA Privacy and Security Rules, please visit the HHS Office of Civil Rights the HHS Office for Civil Rights Health Information Privacy website.
7
Introduction to Tool Downloading the SRA Tool (Windows version) To download the SRA Tool, navigate to ONC’s website at: http://www.healthit.gov/securityrisk-assessment
8
Introduction to Tool Next, select the blue button located within the Security Risk Assessment Tool” box.
9
Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing Once you select the button, you will be directed to the Security Risk Assessment Tool page Navigate to the right side of the page to begin downloading the Windows version of the tool
10
Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing While your downloading experience may vary depending upon the internet browser you are using, all browsers should allow you to save the file on your desktop computer or laptop Once prompted, select the arrow symbol next to the “Save” option
11
Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing From the menu options, select “Save As” then select the folder location where you would like to store your application Finally, select the “Save” button Once you have downloaded the application Double-click the icon and select “run” when prompted The SRA Tool will open Introduction to Tool
12
Demonstration – Using the Tool Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing
13
Pros & Cons Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing What the SRA Tool Is: A Security Risk Assessment Tool Use of the Tool can support an organization’s risk assessment process Supports identification of conditions where Electronic Protected Health Information (ePHI) could be disclosed without proper authorization, improperly modified, or made unavailable when needed Responses to the questions in the SRA Tool can be used to help organizations identify areas where security controls designed to protect ePHI may need to be implemented or where existing implementations may need to be improved
14
Pros & Cons Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing What the SRA Tool Is: Single User Downloadable to desktop Recommended for small to medium size offices Easy to use
15
Pros & Cons Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing What the SRA Tool Is Not: A Multi-User Tool - Not a collaborative multi-user tool to be used simultaneously by any users -Single user at any one time with appropriate permissions to install and run the application on the desktop will use the tool to individually capture information -However, multiple users may access the tool on separate occasions.
16
Pros & Cons Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing What the SRA Tool Is Not: A Compliance Tool The SRA Tool does not produce a statement of compliance Use the SRA Tool in coordination with other tools and processes to support HIPAA Security Rule – Risk Analysis compliance and risk management activities Statements of compliance are the responsibility of the covered entity and the HIPAA Security Rule regulatory and enforcement authority Please note that the SRA Tool does not cover additional Security Rule requirements Does not provide mitigation or mitigation plan w/dates, or Policies & Procedures
17
Pros & Cons Upon completion of this webinar, participants will be able to: Realize need for Risk assessment Recognize availability of this resource Demonstrate ability to access, download, start assessment Determine pros and cons of utilizing What the SRA Tool Is Not: A HIPAA Privacy Rule Tool The SRA Tool provides guidance in understanding the requirements of the HIPAA Security Rule – Risk Analysis specifically Does not include provisions for the HIPAA Privacy Rule Downloadable on Windows 8
18
Resources GA-HITEC 877-658-1990 www.ga-hitec.org CMS Incentive Programs www.cms.gov/ehrincentiveprograms www.HealthIT.gov/security-risk-assessment http://www.healthit.gov/providers-professionals/security-risk-assessment GA Medicaid Incentive Program www.dch.georgia.gov/ehr
19
Q & A Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN 678.640.4752
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.