Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities.
When we were certified as a complete EHR for Meaningful Use Stage 1, we met all requirements for privacy and security. However, this measure requires action from you to perform a security risk analysis.
Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process.
There are no exclusions.
For additional information from the CMS regarding Protect Electronic Health Information click here.
Use the document below as a guide to complete your risk analysis. We recommend printing it out, addressing each question with an initial, and keeping it on file for future reference.