The following questions adapted from NIST Special Publication 800-66 are examples organizations could consider as part of a risk analysis. These sample questions are not prescriptive and merely identify issues an organization may wish to consider in implementing the Security Rule.
Have you identified the e-PHI within your organization?
(This includes e-PHI that you create, receive, maintain or transmit.)
What are the external sources of e-PHI?
(For example, do vendors or consultants create, receive, maintain or transmit e-PHI?)
What are the human, natural, and environmental threats to information systems that contain e-PHI?
HiPAA HUB will provide you with a Current Network Diagram, Network Vulnerability Outline, Application Criticality Matrix, Probable Threat/Impact Matrix (external issues), Vulnerability Matrix (internal issues), ePHI Inventory, Security Risk Matrix, and Remediation Recommendations as part of a typcial engagement.