Table 5: Sources for Development of HIPAA Security Assessment Tool
Table 6: Security Policy and Procedure Review Matrix
Table 7: Definition of Remediation Options & WBS Activities
Table 8: Result Summary Presentation Section 164.308(a)(7): Contingency Planning Requirement: This section requires a routinely updated plan for responding to emergencies or other conditions that can involve or damage health information systems.
Table 9: Remediation Findings/Work Breakdown Structure Elements Relative to HIPAA Security Rule
Chapter 10: Risk Analysis and Risk Management
Table 10: Qualitative Risk Assessment Ratings
Table 11: Likelihood of Threat
Table 12: Sample Risk Statements
Table 13: Risk Determination Table
Table 14: Threat Frequencies
Chapter 11: Administrative and Documentation Safeguards
Table 15: Administrative and Documentation Safeguards
Chapter 13: Technical Safeguards
Table 16: Examples of encryption schemes and key exchange: