RA for MU and Continuous Monitoring. IT Security Requirements Under the HITECH Act. Lisa Broome, RPMS ISSO. Agenda. Introduction Threat Identification Vulnerability Identification Control Analysis Risk Mitigation HIPAA Questions?.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
RA for MU and Continuous Monitoring
IT Security Requirements Under the HITECH Act
Lisa Broome, RPMSISSO
Meaningful use criteria and certification
standards are tools to promote health IT
Privacy and security are incorporated to
address risks associated with increasing information
sharing, access and use.
IT security is the foundation to build TRUST in health information technology & electronic information exchange.
HITECH Act Requirements
45 CFR 164.308(a)(1)
Resources and Information
Implemented Across IHS Federal/Tribal/Urban Facilities in August 2009
Focus on HighRisks by Area
Reporting to HHS
Part of the QuarterlyReport to the HHS Secretary
Other vulnerability tests run by OIT/DIS
For Official Use Only
(While it technically needed to meet the standard, facilities will NOT be
required to utilize 2-factor under Stage 1.