My business is considered a HIPAA covered entity. How many policies will it take for us to become compliant with the HIPAA security rule?
Beaver: It’s hard to say, since this depends on your risk assessment. Again, you must do risk assessment first to figure out where your weaknesses are and then write your policies accordingly. For HIPAA, you’ll likely have one or more email policies in addition to various other policies related to access controls, backups, passwords, etc.
Related Questions
- Under the HIPAA Privacy Rule, may a covered entity contract with a business associate to create a limited data set the same way it can use a business associate to create de-identified data?
- What are a covered entitys obligations under the HIPAA Privacy Rule with respect to PHI held by a business associate during the contract transition period?
- As an employee of the JHM covered entity, how does the HIPAA Privacy Rule affect my research?