Hipaa Self Assessment
Hipaa Self Assessment
Hipaa Self Assessment
This self assessment is designed to provide covered entities with an idea of how they might fare in a HIPAA audit. It contains
questions to which you will be asked to answer yes, no, uncertain or non-applicable. Questions in this self-assessment a
phrased so that "correct" answers are "yes" or non-applicable. HIPAA has both Privacy rules and Security rules. This selfassessment is also split into those two sets of rules.
There is no "grade" for this self-assessment, nor is there a "poor", "fair", "good" rating scale. There is no prescribed number o
"No" answers that indicate an entity is in trouble. It is important to remember that HIPAA compliance is evaluated using what is
known as "compliance testing". In compliance testing, partial credit is not given for an item. An entity is either in compliance o
in compliance with a particular item. Obviously, some requirements carry more risk or more weight, but the bottom line is that
conditions of a requirement are not met, the auditor will deem the entity not in compliance.
If can answer "Yes" to all 78 questions, you are probably doing a good job of protecting your information and you may well be i
compliance with HIPAA regulations.
On the other hand, if you responded to any questions with a "No" answer, your data security and/or privacy standards are prob
not adequate. The more "No" answers you selected, the more likely it is that you are even further away from compliance with
HIPAA regulations.
The best way to use this tool is to act as if an auditor is asking the questions of you. Auditors always expect evidence that you
completely answering the question. As a result, during a real audit, you will be required to provide evidence to support your
answers. While for your self-assessment, you do not necessarily need to gather the evidence, you should spend some time c
visualizing how the information should be obtained. For example, rather than simply answering yes to a question of whether y
have developed a particular policy, enter the web site where the policy can be found into the comments section.
If a question is asking whether you train employees, think of how you can prove that - for example, by providing completed
quizzes, or signed attendance records. If an auditor can't verify the training took place with objective proof, it didn't happen. Y
don't have to collect all evidence for the self-assessment, but to answer "Yes" to this question, you should be able to explain h
to obtain the evidence.
The answers!
Yes - this answer is not the end of the tale. Any "Yes" answer must be backed up by solid evidence. Auditors will expect
verification of any "Yes" answer.
No - Even "No" answers can use explanations. For example, if a training program is not yet in place, but is 90% developed an
will be launched soon, it is appropriate to put this fact in the assessment.
Uncertain - answers obviously indicate that there is more work to do. HIPAA auditors will expect firm answers to all question
N/A - If a question is not applicable to your covered entity, provide some justification or evidence to that effect.
Please note that if an item refers to existing campus policy, the covered unit is still responsible for knowing the policy, making s
they are fully addressing the issue, and providing evidence of compliance.
Click on the "Privacy Section" button at the bottom of the screen to continue.
Privacy Section
Security Section
Item
Specific Requirement
Yes/ No/
Uncertain
Section of
Manual
5
6
10
13
14
11
12
15
16
17
D
E
E
E
E
E, F, L
18
19
20
21
22
Page 2 of 5
Subsection
Comments
Item
Specific Requirement
Yes/ No/
Uncertain
Section of
Manual
23
We have determined if and how we will create deidentified health information, pursuant to the University
policy. We have identified the circumstances and
process used to decide on release of de-identified
information. This process also includes adherence to
other applicable regulations such as FERPA and GLBA.
24
25
26
27
28
29
30
33
34
35
36
37
38
39
31
32
Totals:
Yes
No
Uncertain
N/A
Not Answered
No comments
L
L
L
0
0
0
0
0
0
Page 3 of 5
Subsection
Comments
Item
Specific Requirement
Yes/ No/
Uncertain
Standards
Specs
Security
Management
Process
164.308(a)(1)
Risk Analysis
Security
Management
Process
164.308(a)(1)
Risk Management
Security
Management
Process
164.308(a)(1)
Sanction Policy
Security
Management
Process
164.308(a)(1)
Information
System Activity
Review
Assigned Security No
Responsibility
Implementation
164.308(a)(2)
Specifications
Security Incident
Procedures
164.308(a)(6)(i)
Response and
Reporting
Security Incident
Procedures
164.308(a)(6)(i)
Response and
Reporting
Security Incident
Procedures
164.308(a)(6)(i)
Response and
Reporting
Security Incident
Procedures
164.308(a)(6)(i)
Response and
Reporting
Contingency Plan
164.308(a)(7)(i)
Contingency Plan
164.308(a)(7)(i)
Contingency Plan
164.308(a)(7)(i)
Contingency Plan
164.308(a)(7)(i)
Contingency Plan
164.308(a)(7)(i)
Contingency Plan
164.308(a)(7)(i)
Contingency Plan
164.308(a)(7)(i)
Disaster Recovery
Plan
Contingency Plan
164.308(a)(7)(i)
Emergency Mode
Operation Plan
17
Contingency Plan
164.308(a)(7)(i)
Emergency Mode
Operation Plan
18
Evaluation
164.308(a)(8)
No
Implementation
Specifications
19
9
10
11
12
13
14
15
16
Comments
Evaluation
164.308(a)(8)
No
Implementation
Specifications
Business
Associate
Contracts and
Other
Arrangements
164.308(b)(1)
Written Contract
or Other
Arrangement
Business
Associate
Contracts and
Other
Arrangements
164.308(b)(1)
Written Contract
or Other
Arrangement
Workstation Use
164.310(b)
No
Implementation
Specifications
Workstation
Security
164.310(c)
No
Implementation
Specifications
Workstation
Security
164.310(c)
No
Implementation
Specifications
Disposal
26
Media Re-use
27
Access Control
164.312(a)(1)
Unique User
Identification
Access Control
164.312(a)(1)
Unique User
Identification
Access Control
164.312(a)(1)
Unique User
Identification
Access Control
164.312(a)(1)
Emergency
Access
Procedures
Audit Controls
164.312(b)
No
Implementation
Specifications
Audit Controls
164.312(b)
No
Implementation
Specifications
Audit Controls
164.312(b)
No
Implementation
Specifications
Person or Entity
Authentication
164.312(d)
No
Implementation
Specifications
Business
Associate
Contracts and
Other
Arrangements
164.314(a)(1)
Business
Associate
Contracts
Policy and
Procedures
164.316(a)
No
Implementation
Specifications
Documentation
164.316(b)(1)
Time Limit
38
Documentation
164.316(b)(1)
Availability
39
20
21
22
23
24
25
28
29
30
31
32
33
34
35
36
37
Totals:
Yes
No
Uncertain
N/A
Not Answered
Blank comments
0
0
0
0
0
0