Helping to Secure Our Clients' Protected Health Information and Systems
As Meaningful Use and ICD-10 regulatory initiatives provide opportunities to implement and upgrade systems, the opportunity also exists to re-establish privacy and security practices and procedures. Crowe Horwath LLP's five-step process provides a comprehensive analysis of the gaps and remediation/implementation plan to help protect the privacy of patients.
Please review our list of professional services below:
- Executive assessment
- Readiness assessment
- Project management (PMP)
- Vendor selection (RPI and RFP)
- Attestation assistance
- Strategic road map
- Risk assessment
- HIPAA risk/gap analyses and remediation
- Subject-matter expertise (SME)
- Data warehousing
- EMR optimization
- Monitoring and support
Learn more about our services.
Security and Privacy Risk Analysis:
Five Steps to a Practical Approach
||Security Risk Analysis
||Privacy Risk Analysis
||Conduct policy gap analysis.
||Create software application inventory and risk rating.
||Identify participants for privacy survey.
||a) Conduct gap analysis among highest-risk applications.
b) Conduct entity-level controls gap analysis.
|Conduct privacy survey of selected departments.
||Conduct survey-based gap analysis of remaining applications.
||Update policy gap analysis with results of privacy survey.
||Conduct hospital walk-through.