Risk Management
Meaningful Use Security Risk Assessment Checklist
🔒

Meaningful Use Security Risk Assessment Checklist

1
Identify the scope of the risk assessment project
2
Gather existing Meaningful Use documentation
3
Review the existing infrastructure and determine the electronic Protected Health Information (ePHI) workflow
4
Identify all potential threats and vulnerabilities to the ePHI
5
Determine and document the likelihood of threat occurrence
6
Determine and document the potential impact of threat occurrence
7
Calculate the levels of risk
8
Identify current security measures and evaluate effectiveness
9
Develop an action plan to mitigate risks identified
10
Approval: Risk Mitigation Plan
11
Formulate a contingency plan
12
Train the staff on the new security measures
13
Implement the new security measures and protocols
14
Document all Meaningful Use Security Risk Assessment process steps and actions taken
15
Perform regular monitoring and auditing
16
Prepare a final report outlining the risk assessment process, findings and any remediation actions taken
17
Approval: Final Report
18
Review the assessment process for improvements
19
Schedule the next Meaningful Use Security Risk Assessment