Just performing HIPAA-compliant tasks is not enough. Audits and investigations require evidence that compliant tasks have been carried out and completed. The Evidence of Compliance includes log-in files, patch analysis, user & computer information, and other source material to support your compliance activities. and it’s the dirty work our clients look to outsource.
HIPAA Policies & Procedures
The Policy and Procedures are the best practices that our industry experts have formulated to comply with the technical requirements of the HIPAA Security Rule. The policies spell out what your organization will do while the procedures detail how you will do it. In the event of an audit,
HIPAA Management Plan
A Risk Management Plan with tasks required to minimize, avoid, or respond to risks. Beyond gathering information, Network Detective provides a risk scoring matrix that an organization can use to prioritize risks and appropriately allocate money and resources and ensure that issues identified are issues solved.
Network Share Identification Worksheet
The Network Share Identification Worksheet takes the list of network shares gathered by the Data Collector and lets you identify those that store or access ePHI. This is an effective tool in developing data management strategies including secure storage and encryption. To save time the system allows you to enter default settings for all network shares and just change some as needed
HIPAA Risk Profile
A Risk Analysis should be done no less than once a year. However, Network Detective has created an abbreviated version of the Risk Analysis called the HIPAA Risk Profile designed to provide interim reporting in a streamlined and almost completely automated manner.
Evidence of HIPAA Compliance
Just performing HIPAA-compliant tasks is not enough. Audits and investigations require evidence that compliant tasks have been carried out and completed. The proof to proper documentation is accessibility and the detail to satisfy an auditor or investigator included in this report.
HIPAA Site Interview.
The site interview contains questions that cannot be answered by collecting data from the network. Information is gathered about the organization’s Security Officer, and about security of the wireless network.
Backed up Weekly
Data Collaboration Services holds partnerships with trusted names the Cloud & Big Data Industry