Security Risk Analysis definition

Security Risk Analysis has the meaning set forth in Section 4(x).
Security Risk Analysis has the meaning set out in Schedule 3 [Design and Construction Specifications];
Security Risk Analysis. All providers who are “covered entities” under HIPAA are required to perform a risk analysis. Security requirements address Physical Safeguards, Administrative Safeguards, Technical Safeguards, Policies and Procedures, Organizational Requirements, and all electronic protected health information you maintain. AZCOMP may be able to provide information and assistance on the privacy and security, however, AZCOMP is not responsible for making their products compliant with HIPAA Privacy and Security Rules and does not provide any training and/or advice regarding all other aspects of the risk analysis. Notwithstanding anything to the contrary on this agreement, AZCOMP will comply with the Business Associate Agreement. It is the sole responsibility of the practice to have a complete risk analysis conducted. AZCOMP encourages practices to complete a thorough and professional risk analysis that will stand up to a compliance review. AZCOMP believes it is possible for small practices to do a risk analysis themselves using self-help tools such as the U.S. Department of Health and Human Services Office of the National Coordinator for Health Information Technology’s (ONC) risk analysis tool xxxxx://xxx.xxxxxxxx.xxx/topic/privacy-security-and-hipaa/security-risk- assessment-tool. However, given that some aspects of the risk analysis may require expert knowledge, AZCOMP recommends that practices seek the services of an experienced professional. For more information on security risk analysis requirements visit xxx.XxxxxxXX.xxx.

Examples of Security Risk Analysis in a sentence

  • Risk Analysis Management - HMIS Lead Agency Risk Analysis The HMIS Security Officer, in conjunction with executive management, and the HMIS Lead Agency Privacy Officer, will perform a modified Security Risk Analysis (RA) in accordance with the National Institute of Standards and Technology (NIST).

  • PROTECT PATIENT HEALTH INFORMATION (PHI)All EPs are required to upload a Security Risk Analysis (SRA) or Security Risk Review (SRR) to MAPIR for all locations/practices worked where certified EHR technology was utilized during the selected MU reporting period. Each SRA or SRR submitted must be dated, and list the name and title of the person who conducted the review or analysis.

  • If Business Associate chooses not to adopt such methodologies as defined in 74 FR 19006 based on its Security Risk Analysis, Business Associate shall document such rationale and submit it to the Covered Entity.

  • Security Risk Analysis – The process of identifying and documenting vulnerabilities and applicable threats to information resources.

  • Risk Analysis Management - HMIS Lead Agency Risk AnalysisThe HMIS Security Officer, in conjunction with executive management, and the HMIS Lead Agency Privacy Officer, will perform a modified Security Risk Analysis (RA) in accordance with the National Institute of Standards and Technology (NIST).

  • PROTECT PATIENT HEALTH INFORMATION (PHI)All EPs are required to upload a Security Risk Analysis (SRA) or Security Risk Review (SRR) to MAPIR for all locations/practices worked where certified EHR technology was utilized during the selected MU reporting period.• Each SRA or SRR submitted must be dated, and list the name and title of the person who conducted the review or analysis.

  • The most current and valid port and facility data should be entered into the Maritime Security Risk Analysis Model (MSRAM), which then uses the data to calculate relative risk based on the Coast Guard Risk-Based Decision Making (RBDM) methodology (using a “Threat X Vulnerability X Consequence” algorithm).

  • Key components of the Security Risk Analysis (SRA) are encryption and identification of an asset inventory which identifies where protected electronic health information (ePHI) is stored, how it is accessed, and how it is exchanged.

  • The Security Risk Analysis documentation should include any recommendations for further action which can also be known as a risk mitigation plan.

  • If Associate chooses not to adopt such methodologies as defined in 74 FR 19006 to secure the PHI governed by this Addendum, it must submit such written rationale, including its Security Risk Analysis, to the Agency Procurement Officer for review prior to the execution of the Addendum.

Related to Security Risk Analysis

  • risk analysis the analysis required under Rule 17f-7(a)(1)(i)(A).

  • Comprehensive resource analysis means an analysis including,

  • Sustainability Risk means an environmental, social or governance event or condition that, if it occurs, could cause an actual or a potential material negative impact on the value of the investment;

  • Spacecraft (9) means active and passive satellites and space probes.

  • Forensic analysis means the practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.

  • Country Risks means with respect to any Foreign Depository: (a) the financial infrastructure of the country in which it is organized, (b) such country’s prevailing custody and settlement practices, (c) nationalization, expropriation or other governmental actions, (d) such country’s regulation of the banking or securities industry, (e) currency controls, restrictions, devaluations or fluctuations, and (f) market conditions which affect the order execution of securities transactions or affect the value of securities.

  • Guaranteed analysis means the percentage of plant nutrients or measures of neutralizing capability claimed to be present in a fertilizer.

  • Diesel engine means an internal combustion, compression-ignition (CI) engine with operating characteristics significantly similar to the theoretical diesel combustion cycle. The regulation of power by controlling fuel supply in lieu of a throttle is indicative of a compression ignition engine.

  • Asset adequacy analysis means an analysis that meets the standards and other requirements referred to in 5.34(5)“d.”

  • Fissile material means the radionuclides uranium-233, uranium-235, plutonium-239, and plutonium-241, or any combination of these radionuclides. "Fissile material" means the fissile nuclides themselves, not material containing fissile nuclides. Unirradiated natural uranium and depleted uranium and natural uranium or depleted uranium, that has been irradiated in thermal reactors only, are not included in this definition. Certain exclusions from fissile material controls are provided in 10 CFR 71.15.

  • Sampler means a person who is employed by or is an owner of a licensed laboratory, grower, or processor and is authorized by that employer to collect samples in accordance with the testing laboratory's standard operating procedures and these Rules.

  • Risk assessment means a programme to determine any risk associated with any hazard at a construction site, in order to identify the steps needed to be taken to remove, reduce or control such hazard;

  • Engines means, as of any date of determination, all Engines then leased hereunder.

  • Applied behavior analysis means the design, implementation, and evaluation of environmental modifications, using behavioral stimuli and consequences, to produce socially significant improvement in human behavior, including the use of direct observation, measurement, and functional analysis of the relationship between environment and behavior.

  • Stability means structural stability.

  • Safety Data Sheet means a safety data sheet within the meaning of regulation 5 of the CHIP Regulations;

  • Delivery System means the design and construction

  • Engine under the Lease. The term "Engines" means, as of any date of determination, both Engines then leased to the Lessee pursuant to the Lease.

  • Data Security Requirements means the following, in each case to the extent relating to any sensitive or confidential information, or any matters relating to data privacy, protection, or security or the access, collection, use, processing, storage, sharing, distribution, transfer, disclosure, destruction, or disposal of any personally identifiable information: (i) all applicable Laws and any related security breach notification requirements, (ii) the Conveyed Companies’ own respective rules, policies, and procedures, and (iii) Contracts to which the Conveyed Companies are bound.

  • Own risk and solvency assessment means a confidential internal assessment, appropriate to the nature, scale, and complexity of an insurer or insurance group, conducted by that insurer or insurance group of the material and relevant risks associated with the insurer or insurance group's current business plan, and the sufficiency of capital resources to support those risks.

  • Sample means urine, blood, breath, saliva, or hair.

  • operational risk means the risk of loss for the individual portfolio resulting from inadequate internal processes and failures in relation to people and systems of the investment service provider or from external events, and includes legal and documentation risk and risk resulting from the trading, settlement and valuation procedures operated on behalf of the individual portfolio;

  • Production Environment means a logical group of virtual or physical computers comprised within the Cloud Environment to which the Customer will be provided with access and use the purchased Cloud Application(s) in production and for its generally marketed purpose.

  • Leak-detection system means a system capable of detecting the failure of either the primary or secondary containment structure or the presence of a release of hazardous waste or accumulated liquid in the secondary containment structure. Such a system must employ operational controls (e.g., daily visual inspections for releases into the secondary containment system of aboveground tanks) or consist of an interstitial monitoring device designed to detect continuously and automatically the failure of the primary or secondary containment structure or the presence of a release of hazardous waste into the secondary containment structure.