Meaningful Use Risk Assessment.

Achieve compliance with the Medicare Promoting Interoperability Program requirements.

extensive security risk analysis & advisory for EHR meaningful use compliance.

GraVoc’s seasoned information security experts can provide extensive Meaningful Use risk assessment and management advisory to help your healthcare organization achieve compliance with the Medicare Promoting Interoperability Program requirements.

Through this security risk analysis, our experienced team will identify vulnerabilities in your certified Electronic Health Record (EHR) technology infrastructure and provide recommendations for an action plan to correct these gaps and maximize protection of your patient health information.

Keep scrolling to learn more about our Meaningful Use risk assessment services!

9

What is EHR Meaningful Use?

9

Meaningful use risk assessment components

9

Meaningful use risk & readiness assessment process

what is EHR meaningful use?

The Centers for Medicare and Medicaid Services (CMS), a federal agency, runs the Medicare Promoting Interoperability Program – previously known as the EHR Incentive Programs – for eligible hospitals and critical access hospitals (CAHs).

The EHR Incentive programs were introduced to encourage eligible healthcare professionals and organizations to implement certified EHR technology. Eventually, these programs were renamed, and the requirements were revamped, to reflect a focus on interoperability and enhancing patient access to health information.

The Medicare Promoting Interoperability Program includes a Security Risk Analysis Measure that requires participating entities to conduct a risk assessment of their certified EHR technology and evaluate the encryption of data to find and close gaps. Entities must then submit a yes/no attestation of completion. They need a ‘yes’ response to show compliance with the measure.

Eligible entities that do not participate in the Program face a downward payment adjustment, which means a drop in Medicare reimbursements.

during your Meaningful Use risk assessment, we review:

Server

HIPAA Privacy Rule

We conduct a review of the standards to protect medical health records, the development and dissemination of the privacy notice, policies for disclosures and implementation of Privacy Rule Administrative requirements.

Breach Notification (HITECH)

We review notification processes for a breach of protected health data, use of encryption and account of PHI disclosures.

Security Rules

  • Administrative safeguards: A review of the EHR controls and existing workflows.
  • Physical safeguards: An assessment of the certified EHR’s environment and level of physical security in place.
  • Technical Safeguards: We evaluate the certified EHR’s technical infrastructure, including access methods, authentication, and authorization to the system. Here, we do a deep dive into your encryption tools and policies, password management, incident detection, user access, and more.

our EHR Meaningful Use security risk & readiness assessment process:

Our certification gap analysis & readiness process for EHR Meaningful Use has three phases:

review phase.

During the discovery phase, we conduct interviews with key personnel, direct observation, and review of documents. This also involves a review of your technology infrastructure, existing devices such as firewalls, and network topology.

analysis phase.

We analyze information gathered during discovery and establish the current state of your certified EHR against requirements for Meaningful Use. This includes a summary of your security controls and policies and the use of electronic information.

remediation & readiness phase.

We provide a detailed report with our findings and recommendations for upgraded protection measures to tackle identified threats or weaknesses in your certified EHR environment. This way, our team helps ready your healthcare organization for compliance with the security requirements for EHR Meaningful Use.

our certifications include:

CCNA Security

Cisco Certified Network Associate Security

CISM

Certified Information Security Manager

CISA

Certified Information Systems Auditor

CRISC

Certified in Risk and Information Systems Control

C|EH

Certified Ethical Hacker

CISSP

Certified Information Systems Security Professional

E|CIH

EC-Council Certified Incident Handler

MCP

Microsoft Certified Professional

let’s talk about Meaningful Use Risk Assessment.


Have a question or want to discuss our Meaningful Use risk assessment services? Contact a GraVoc employee below by filling out the form!