Discussion 1

The following websites include toolkits for completing a risk assessment:
http://www.himss.org/ASP/topics_pstoolkitsDirectory.asp?faid=569&tid=4

https://healthit.ahrq.gov/health-it-tools-and-resources/health-information-security-and-privacy-collaboration-toolkit

Review the risk assessment guides available at these sites and then answer the following question:
Because HIPAA requires that a covered entity appoint a security officer, what is the role of the health professional or informatics specialist in working with the security officer to complete a risk assessment? In your discussion, consider who has access to the information required to complete the assessment and how the information should be collected.

Latest completed orders:

Completed Orders
# Title Academic Level Subject Area # of Pages Paper Urgency