Company | Support | Contact Us
Privacy | Transactions and Code Sets | Security | Identifiers
HIPAA Navigator | HIPAA SLP | Manuals
Approach | Assessment | Implementation | Training | Evaluation | Maintenance
For Providers | For Health Plans | FAQ | Free Downloads
For Providers | For Health Plans | For Attorneys | For Security Professionals
subglobal7 link | subglobal7 link | subglobal7 link | subglobal7 link | subglobal7 link | subglobal7 link | subglobal7 link
subglobal8 link | subglobal8 link | subglobal8 link | subglobal8 link | subglobal8 link | subglobal8 link | subglobal8 link

Assessment Programs

Our assessment programs are structured to give our clients a thorough evaluation of their HIPAA compliance, and to present the results and recommendations in clear, actionable terms. To start with, we determine what kind of entity your organization is with respect to HIPAA regulations, and what activities make it subject to HIPAA. Most of the competitive solutions available do not do this for small and medium sized organizations, the ones that need it the most - instead, they offer solutions which burden these organizations with requirements which don't apply to them. HIPAAssociates offers the following assessment programs to suit client needs:

HIPAA Privacy Assessment

The Privacy Assessment Program includes gap analysis, reasonable safeguards walkthrough, organization assessment (to see if any of the Privacy organizational requirements apply), state law survey, generation of reports, and development of the implementation plan.

Detail

HIPAA Transactions and Code Sets Assessment

The TCS Assessment Program includes gap analysis (including analysis of individual transactions and codes in use), organization assessment (to see if any of the Transactions organizational requirements apply), state law survey, systems analysis, communication with vendors, generation of reports, and development of the implementation plan.

Detail

HIPAA Security Assessment

The Security Assessment Program includes gap analysis, organization assessment (to see if any of the Security organizational requirements apply), state law survey, systems analysis, critical data and systems analysis, risk assessment, communication with vendors, generation of reports, and development of the implementation plan.

Detail

Privacy Policy | Legal Notice | ©2001-2008 HIPAAssociates, Inc.