HIPAA Assessment

Do you know your cybersecurity readiness? Take our 10 minutes assessment to know your compliance readiness.

0 Score! Get Final Report Restart Assessment

  • 0 to 100 : You got lot to do… let’s get to work!
  • 101 to 200 : You are almost there..
  • 201 to 235 : You got this!
Instructions: Use the Compliance Assessment to understand your organization's current compliance status. At the end of the assessment, use the result to best evaluate, delineate the orientation of your Organzation's compliance posture.
Administrative Safeguards
PHYSICAL SAFEGUARDS
TECHNICAL SAFEGUARDS
ORGANIZATION REQUIREMENTS

HIPAA Assessment

Your Score: 0 You got lot to do… let’s get to work!

  • 0 to 100 : You got lot to do… let’s get to work!
  • 101 to 200 : You are almost there..
  • 201 to 235 : You got this!
e-InnoSec is a Professional Services and Consulting organization that brings expertise to the clients to supplement their business needs. We are compliance and cybersecurity professionals serving small, midsize, and startup organizations to simplify compliance, transform cybersecurity, and save costs. To learn more click here.
Try our Cybersecurity Free Courses with Securetain.
Review your assessment questionnaire in the attachment.
# Question/Requirements Rating

Administrative Safeguards

1.1 164.308 (a)(1) - Does your Organization conduct accurate and thorough analysis of potential risks and vulnerabilities for Protected Health Information (PHI)?

0

1.2 164.308 (a)(1) - Has your Organization implemented adequate security measures to reduce risks and vulnerabilities to a reasonable and appropriate level?

0

1.3 164.308 (a)(1) - Do you have appropriate sanctions in place against employees who fail to comply with your security policies and procedures?

0

1.4 Are all records of information system actives reviewed periodically?

0

2 164.308 (a)(2) - Do you have a security professional or team assigned responsible for your policies and procedures?

0

3 164.308 (a)(6) - Do you have a documented process in place that helps identify and mitigate any suspected or known security incidents ?

0

4.1 164.308 (a)(7) - As part of backup plan, have you implemented procedures to create, maintain, retrieve copies of PHI?

0

4.2 164.308 (a)(7) - As part of disaster recovery, do you have a documented and implemented procedure to restore lost data?

0

4.3 164.308 (a)(7) - Do you periodically evaluate the response to environmental and operational changes affecting the security of electronic PHI?

0

5 164.308 (b)(1) - Do you provide satisfactory assurance through written contract or through any other arrangement?

0

6.1 164.308 (a)(3) - Have you implemented procedures to ensure proper authorization and/or supervision of employees who work with electronic PHI?

0

6.2 164.308 (a)(3) - Have you implemented procedures that help determine if access clearance is appropriate for employees working with electronic PHI?

0

6.3 164.308 (a)(3) - Do you have procedures implemented to ensure proper termination of access to PHI when employment ends?

0

7.1 164.308 (a)(4) - Do you have documented policies and procedures for granting access to PHI?

0

7.2 164.308 (a)(4) - Have you documented and implemented polices and procedures for to review and modify a user's right of access?

0

8.1 164.308 (a)(5) - Does your organization issue security updates periodically?

0

8.2 164.308 (a)(5) - Have you implemented procedures for detecting and reporting malicious software?

0

8.3 164.308 (a)(5) - Do you have procedures in place to monitor log-in attempts and reporting discrepancies?

0

8.4 164.308 (a)(5) - Do you have documented procedure for creating, changing and safeguarding passwords?

0

9.1 164.308 (a)(7) - Have you implemented procedures for periodic testing and previsioning of contingency plan?

0

9.2 164.308 (a)(7) - Do you assess the relative criticality of specific applications and data in support of the contingency plan?

0

PHYSICAL SAFEGUARDS

10 164.310 (b) - Do you have policies and procedures to specify the functions to be performed on classes of workstations that access electronic PHI?

0

11 164.310 (c) - Have you implemented physical safeguards for all workstations that access electronic PHI?

0

12.1 164.310 (d)(1) - Do you have policies and procedures that address the final and proper disposal of electronic PHI?

0

12.2 164.310 (d)(1) - Do you have detailed procedures for the proper removal of electronic PHI from electronic media before media are made available for reuse?

0

13.1 164.310 (a)(1) - Do you have established contingency procedures in place that allow facility access in support of restoration of data in an emergency.

0

13.2 164.310 (a)(1) - Do you have policies and procedures to safeguard your facility and equipment?

0

13.3 164.310 (a)(1) - Are your access controls and validation process based on the role the employees function?

0

13.4 164.310 (a)(1) - Do you have policies and procedures to document repairs and modifications to the physical components of the facility?

0

14.1 164.310 (d)(1) - Does you organization maintain records of the movements of hardware and electronic media?

0

14.2 164.310 (d)(1) - Are you able to retrieve an exact copy of electronic PHI before the movement of systems?

0

TECHNICAL SAFEGUARDS

15.1 164.312 (a)(1) - As part of Unique user Identification, does you organization ensure a unique name/ number is assigned for identifying and tracking user identity?

0

15.2 164.312 (a)(1) - Does your organization have detailed procedures for obtaining necessary electronic PHI during an emergency?

0

16 164.312 (b) - As part of audit controls has your organization implemented mechanisms that records and examines the activity in information systems that contain or use electronic PHI?

0

17 164.312 (d) - Do you have procedures in place to verify a person or entity seeking access to electronic PHI is the one claimed?

0

18.1 164.312 (a)(1) - Has your organization implemented electronic procedures that terminates an electronic session after a predetermined period of inactivity?

0

18.2 164.312 (a)(1) - For your encryption and decryption mechanism, have you implemented a mechanism to encrypt and decrypt electronic PHI?

0

19 164.312 (c)(1) - Do you have policies and procedures in place that protect electronic PHI from improper alteration or destruction?

0

20.1 164.312 (e)(1) - Has your organization implemented security measures/internal controls to ensure that electronic PHI is not improperly modified without detection?

0

20.2 164.312 (e)(1) - Has your organization implemented a mechanism to encrypt electronic PHI whenever deemed appropriate?

0

ORGANIZATION REQUIREMENTS

21 164.312 (a)(1) - "Do your Business associate contracts or other agreements include the following?

0

22 164.312 (b)(1) - "Do your Group Health Plans like the Business Associate contracts/agreements?

0

23 164.316 (a) - Does your organization have a Risk management Program developed?

0

24 164.316 (b)(1) - Does your organization have policies and procedures in place for a Information Security Management Program?

0

25 164.316 (b)(2)(i) - Do you have a 6 year retention period?

0

26 164.316 (b)(2)(ii) - Does your organization ensure availability of PHI related policies to those needing them?

0

27 164.316 (b)(2)(iii) - Do you periodically review and update the policies needed in response to changes affecting security?

0

Get your free report!

For security reasons, complete the form below. You will receive your score to the email ID mentioned below.