Core 15: Protect Electronic Health Information

Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities.

In English?
When we were certified as a complete EHR for Meaningful Use Stage 1, we met all requirements for privacy and security.  However, this measure requires action from you to perform a security risk analysis.

Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process.

There are no exclusions.

For additional information from the CMS regarding Protect Electronic Health Information click here.

How to
Use the document below as a guide to complete your risk analysis.  We recommend printing it out, addressing each question with an initial, and keeping it on file for future reference.

Was this article helpful?
1 out of 1 found this helpful
Have more questions? Submit a request


Powered by Zendesk