• info@anvayasolutions.com
  • +1 (916) 673-9300
Thumb

What we do

We provide end-to-end HIPAA consulting and implementation support services, including setting up the objectives of your HIPAA program, training your team members, identification and assessment of PHI, risk and vulnerability assessments, gap analysis, program development, and implementation.

What is PHI?

PHI stands for Protected Health Information. It can refer to a medical record that can identify a patient and details the medical services rendered. It can include conversations between doctors and nurses about treatment and includes billing information and any patient-identifiable information in a health insurance company’s computer system. Protected Health Information is defined by HIPAA (Health Insurance Portability and Accountability Act), which outlines the type of patient and healthcare information that falls under the jurisdiction of the law.

What are the elements of HIPAA compliance?

HIPAA Rule covers the following key areas


1.
Administrative Safeguards

2.
Physical Safeguards

3.
Organizational Requirements

4.
Technical Safeguards
  • Security Management Process
  • Assigned Security Responsibility
  • Workforce Security
  • Information Access Management
  • Security Awareness and Training
  • Security Incident Procedures
  • Contingency Plan
  • Evaluation
  • Business Associate Contracts and Other Arrangements
  • Facility Access Controls
  • Workstation Use
  • Workstation Security
  • Device and Media Controls
  • Business Associate Contracts or Other Arrangements
  • Requirements for Group Health Plans
  • Access Control
  • Audit Controls
  • Integrity
  • Person or Entity
  • Authentication
  • Transmission Security

How Anvaya can help you achieve HIPAA compliance

We take a five-phased approach to achieve HIPAA compliance

 PHASE I – Scope Definition

  • The overall scope of HIPAA compliance – technologies and processes to be brought under the purview of controls

PHASE II – Asset Identification/Risk Assessment/Gap Analysis

  • Understanding the Risk from a process, technology, and infrastructure standpoint.
  • Defining the control requirements and current gaps

PHASE III – Implementation

  • Defining policies, procedures, and documentation for each control
  • Determining investment needs
  • Creating a system of record for each control.

PHASE IV – Internal Audit

  • Internal audit provides the bedrock for successful implementation
  • We train your people on the control requirements and gap identification.

Phase V – External Audit and Compliance

  • Our team of experts review all control requirements and enables you to create a sustainable HIPAA compliance program

Contact us to see how you can establish and implement a strategy to protect your assets.

Thumb
Thumb