KRAA Security launches new HIPAA Privacy Audit service for corporations facing HIPAA regulatory requirements.
Miami, FL, October 29th, 2012 — HIPAA’s Privacy provisions became effective 04/14/2003 and 04/14/2004 for Large Plans and Small Plans respectively. For these purposes, the same definitions as those used by the SBA apply. The Privacy provisions, when integrated with HIPAA’s Security provisions, require operational, document and educational performance. Adherence to Best Practice generally minimizes the possible considerable personal exposure of clients’ employees.
KRAA Security provides HIPAA specialists that are experienced former Privacy Officers who are process and compliance professionals to perform the best in third-party assessments. We work with each client to improve compliance on an ongoing basis accompanied by annual maintenance assessments.
Our HIPAA Privacy assessment includes but is not limited to:
Benefit plan compliance
- HR compliance relative to Protected Information
- Compliant Business Associates Agreements content and application
- Compliant Chain of Trust Agreements, when required
- Compliant Policy and Procedures
- Compliant physical environment
- Insurance coverage assessment
- Protected Information-related process improvement
- Learning system – five levels of involvement with Protected Information
KRAA Security specialists initiate the assessment process by reviewing each client’s responses to an Audit Target questionnaire and associated attachments. A Compliance Baseline is documented and a Gap Analysis which delineates the differences between the Baseline and Best Practice is presented. This is followed by a Risk Assessment commonly known as a risk vs. reward analysis.
About KRAA Security
KRAA Security (www.kraasecurity.com) was founded in 2007 to address the security needs of companies in all industries through a combination of Security Consulting Services. KRAA Security’s risk assessment services protect organizations from threats through a combination of preventative measures in Social Media Policy, Application Security, Network Security, Operating System Security and Compliance.