Protect electronic health information created or maintained by the certified EHR technology (CEHRT) through the implementation of appropriate technical capabilities.
Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1), including the encryption/security of data stored in CEHRT in accordance with requirements under 45 CFR 164.312(a)(2)(iv) and 45 DFR 164.306(d)(3), and implement security updates as necessary and correct identified security deficiencies as part of the provider's risk management process for eligible professional's.
- Eligible professional must attest YES to conducting or reviewing a security risk analysis and implementing security updates as needed to meet this measure.
There are no exclusions for this measure.
For additional information from the CMS regarding Core 9: Protect Electronic Health Information click here.