Getting Started with Analyzing Security Risks for HIPAA

Are you ready to engage with a client who requires HIPAA compliance? Nope. But you're getting there.

If you've followed the earlier steps in this pamphlet, your environment is now pretty safe. But you don't have enough paperwork in place to sign a BAA, because you haven't evaluated your risk, documented your risk, and written HIPAA Policies and Procedures. HIPAA's conception of a risk analysis is defined at HIPAA 45 CFR § 164.308(a)(1)(ii).

According to HIPAA, you must

  1. Ensure the confidentiality, integrity, and availability of all electronic protected health information (PHI) that you create, receive, maintain, or transmit.
  2. Protect against any reasonably anticipated threats or hazards to the security or integrity of such information.
  3. Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required.
  4. Ensure your workforce complies. (HIPAA 45 CFR § 164.306; emphases added)

Let me pick out some details in these requirements.

The whole philosophy of this pamphlet is to get your house in order when it's small. Since reasonableness depends on size, complexity, and capabilities, starting early on really helps because your size is small, your complexity is low, and your capabilities are few. As you add capabilities, you can incrementally re-assess your risk and introduce or modify controls. Risk analysis is required periodically, so if you get the right habits in place, you can provide for a smooth expansion of scope as your company grows, becomes more complex, and develops more sophisticated capabilities.

How do you do make these determinations around risk? You figure out what is reasonable in your environment via a risk analysis.

HIPAA defines what you have to do to satisfy the Security Rule via its Implemntation Specifications.

These specifications come in two flavors:

The fact that many specifications are addressable provides a pathway to do the appropriate thing for your business. You may decide or discover that the risk of a laptop disk being stolen is very low. You must describe your risk analysis, and then write appropriate policy and procedure to match your assessment of the risk.

The fact that many specification are addressable also means that as your business changes, you must change your policies and procedures to match. This means that when you make a change, you will have to re-analyze the risk.

TODO: