Experience                   Integrity                        Results

Proteus Consulting, LLC

10323 N. Strahorn Rd

Hayden, ID, 83835

(208) 215.5607

Copyright © 2018 Proteus Consulting, LLC

HIPAA Security Rule Policy and Procedure Implementation

The Problem

It's a fact: Most people don't enjoy writing policy and procedure documentation.  And when policies and procedures are created, they are often unorganized and lack important details that are required to comply with the HIPAA Security Rule.

We've seen what other HIPAA consulting companies offer and frankly, don't understand how anyone is supposed to implement and maintain those overwhelming, bloated volumes of information.

Our Solution

Our exclusive focus is the HIPAA Security Rule.  To begin, we break down each HIPAA Security Rule standard and implementation specification.  Next, each citation is aligned to one of nine organized policy documents that a Covered Entity (CE) or Business Associate (BA) – sized from a practice group to a critical access sized hospital – can manage:

We then check the Office of Civil Rights Audit Protocol and include any additional requirements:

Finally, we use our practical experience to draft a fully referenced policy and procedure document that even the busiest HIPAA Security Officer can understand and implement:

Our Service

There is no need to struggle or feel buried in volumes of paper when you can count on Proteus Consulting to make your HIPAA Security program top-shelf, OCR ready. When you purchase a Proteus Policy and Procedure document, we will provide consulting services to help customize the document to your organization. No one can claim a "ready-out-of-the-box" policy or procedure – every organization is different and so are their policies and procedures.

The Proteus Policy and Procedure Library©

  • Policy One: Security Management Processes

  • Policy Two: Workforce Security

  • Policy Three: Security Awareness and Training

  • Policy Four: Facility Access Controls

  • Policy Five: Workstation and Media Security

  • Policy Six: ePHI Confidentiality

  • Policy Seven: ePHI Integrity

  • Policy Eight: ePHI Availability

  • Policy Nine: Business Associates