PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact



essentials of a risk analysis1589 .pdf


Original filename: essentials of a risk analysis1589.pdf

This PDF 1.4 document has been generated by / iTextSharp™ 5.4.1 ©2000-2012 1T3XT BVBA (AGPL-version), and has been sent on pdf-archive.com on 16/02/2018 at 20:35, from IP address 146.148.x.x. The current document download page has been viewed 152 times.
File size: 3 KB (1 page).
Privacy: public file




Download original PDF file









Document preview


essentials of a risk analysis
There are plentiful methods of performing risk analysis and there is no solitary technique or "best
practice" that ensures compliance with the Security Rule. A few examples of procedures that
might be applied in a risk analysis process are outlined in NIST SP 800-30.6. The remainder of
this guidance paper explains quite a few fundamentals a risk analysis must incorporate, apart
from of the technique utilized.
Scope of the Analysis
The scope of risk analysis that the Security Rule utilizes encompasses the likely risks and
vulnerabilities to the secrecy, availability and integrity of all e-PHI that an company makes, gets,
maintains, or transmits. (45 C.F.R. § 164.306(a).) This encompasses e-PHI in all styles of
electronic media, such as hard drives, floppy disks, CDs, DVDs, smart cards or other storage
devices, PDAs, transmission
media, or portable digital media. Digital media also means a only workstation as well as
complicated networks associated between several areas. In this manner, an organization's risk
analysis ought to take into account all of its e-PHI, apart from of the specific electronic method in
that it is fashioned, received, maintained or transmitted or the source or site of its e-PHI.
Data Collection
An organization must identify where the e-PHI is stored, received, maintained or transmitted. An
association may perhaps get together important records by: reviewing earlier and/or existing
projects; performing interviews; reviewing documentation; or using additional facts collecting
approaches. The records lying on e-PHI gathered by these methods have to be recognized. (See
45 C.F.R. §§ 164.308(a)(1)(ii)(A) and 164.316(b)(1).) Detect and Verify Impending Threats and
Vulnerabilities
Organizations should classify and record realistically anticipated dangers to e-PHI. (See 45
C.F.R. §§ 164.306(a)(2) and 164.316(b)(1)(ii).) Organizations might recognize different threats
that are exceptional to the situation of their milieu. Organizations be obliged to as well recognize
and record vulnerabilities which, if triggered or exploited by a menace, would build a risk of
inappropriate entrance to or leak of e-PHI. (See 45 C.F.R. §§164.308(a)(1)(ii)(A) and
164.316(b)(1)(ii).) ecw security risk assessment


Document preview essentials of a risk analysis1589.pdf - page 1/1

Related documents


essentials of a risk analysis1589
basics of a risk analysis1330
essentials of a risk analysis1464
elements of a risk analysis1090
fundamentals of a risk analysis1484
maclear egrc suite threat management final draft


Related keywords