• Home
  • Blog
  • Contact
HIPAA ComplianceHIPAA Compliance
HIPAA ComplianceHIPAA Compliance
  • Home
  • Blog
  • Contact

Contingency Plan: Applications and Data Criticality Analysis-What to Do and How to Do It

April 9, 2009 HIPAA Law No Comments

In our series on the HIPAA Administrative Simplification Security Rule, this is the fifth implementation specification for the Administrative Safeguard Standard (Contingency Plan). This implementation specification is addressable.  Remember, addressable does not mean “optional.” Rather, an addressable implementation specification means that a covered entity must use reasonable and appropriate measures to meet the standard. As HIPAA.com has noted in earlier postings, with enactment of the American Recovery and Reinvestment Act of 2009 (ARRA) on February 17, 2009, business associates also will be required to comply with the Security Rule standards, effective February 17, 2010.

What to Do

Assess the relative criticality of specific applications and data in support of other contingency plan components.

How to Do It

A covered entity will assign priorities to its contingency plan decisions and actions. These priorities initially will be outputs of the risk analysis, and thereafter reviewed as part of periodic reassessment of threats and vulnerabilities.  Priorities will be a function of the following:

» What are the most important steps in safeguarding the covered entity’s electronic systems and electronic protected health information.
» Where are the covered entity’s most vulnerable points with regard to electronic systems and electronic protected health information.
» What are the covered entity’s biggest threats to electronic systems and electronic protected health information.
» What are steps and in priority order for the covered entity to achieve recovery of electronic systems, electronic protected health information, and business operations in the event of a contingency.

The Security Official in the covered entity should establish criteria for assessing the relative importance of vulnerabilities and threats as part of the risk analysis, and should prioritize steps in data backup, disaster recovery, and emergency mode operation plans for recovery of operations and safeguarding the covered entity’s electronic systems and electronic protected health information.

Remember, the Security Rule covers safeguarding of electronic systems and electronic protected health information.  As a result, loss of electricity is critical to the covered entity’s applications and data and should have high priority in the covered entity’s risk analysis outcomes and in its recovery plans.

Tags: 20092010addressableAdministrative Safeguard StandardAmerican Recovery and Reinvestment Act of 2009applications and data criticality analysisARRAbusiness associatebusiness operationscontingency plancovered entitydata backup plandisaster recovery planelectricityelectronic protected health informationelectronic systemsemergency mode operation planFebruary 17HIPAA Administrative Simplificationimplementation specificationreasonable and appropriateRisk AnalysisSecurity OfficialSecurity Rulethreats and vulnerabilities
No Comments
Share
0

You also might be interested in

HITECH Act Breached Individuals Skyrocket in Latest OCR Web Site Posting

Nov 4, 2011

Under the Health Information Technology for Economic and Clinical Health[...]

Red Flags Rules Compliance Countdown: Today

May 1, 2009

The Federal Trade Commission’s (FTC’s) red flags rules for financial[...]

Accountability Key Privacy/Security Principle of Meaningful Use 2011 Objectives

Jul 6, 2009

On December 15, 2008, the Office of the National Coordinator[...]

Leave a Reply Cancel Reply

Categories

  • 5010
  • American Recovery and Reinvestment Act
  • Enforcement
  • GINA
  • Health Care Reform
  • Health IT and HITECH
  • HIPAA Law
  • Identifiers
  • Meaningful Use
  • Privacy
  • Red Flags Rules
  • Security
  • Transactions & Code Sets
  • Uncategorized

Recent Posts

  • Contracting with Vendors that are NOT HIPAA Business Associates: Best Practices
  • HIPAA Breach: Who You Gonna Call?
  • Can I Be Sued for a HIPAA Violation?
  • Business Associate Agreements – a First Look at Indemnification
  • Gmail, Google Apps for Business HIPAA Business Associate Agreements

Archives

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
HIPAA- Health Insurance Portability Accountability Act

© 2023 · hipaa.com

Prev Next