Service Deliverables

Intersect offers a highly differentiated HIPAA compliance service. Intersect's technology-driven process is aimed at assuring that the achievement of HIPAA compliance isn't just a one-time event. The program is intended to prevent breaches and ensure that clients remain HIPAA commpliant. Read on to learn more.

Reports

Deliverables include the following:

    • HIPAA Policy and Proceedures
    • HIPAA Compliance Power Point
    • Evidence of HIPAA Policy Compliance
    • HIPAA Risk Analysis and Management Plan
    • Security Exception Worksheet
    • Supporting Documents
      • Response Form - HIPPA On-Site Survey
      • User Identification Worksheet
      • Network Share Identification Worksheet
      • Login History by Computer
      • Share Permission Report
      • Drive Encryption Report
      • External Vulnerability Scan by Issue
      • File Scan Report
      • Internal Vulnerability Scan by Issue

Report Usage

The Evidence of Compliance report is most important. That is because, once the Risk Analysis and the Management Plans are complete, evidence of gap remediation the must be substantiated. The Evidence of Compliance Report achieves this by proceeding section by describing the environment, presenting details about generic accounts that were discovered such as those not associated with specific individuals, and listing accounts for former vendors, and former employees. Additional information relates to an evaluation of "standards." One example is a "Termination Standard." The Termination Standard describes the proceedure for terminating access to electronic health information. Do former employees or vendors still have eanbled accounts which could potentially provide access to e-PHI? A further evaluation is made of login dates. Those accounts which haven't logged in during the past 30 days are flagged so that an investigation can be performed. The evidence report goes on further.

A sample report was 84 pages in length. It details all of the different items while referencing them to CFRs. In this way, so it becomes possible to demonstrate in the "Former View" what an auditor would expect, and to document how this all ties together.

 

Prevent Breaches

Finally, Risk Profiles, month over month, combine to create the managed service. The value isn't just related to HIPAA compliance, but also to network security.