
HIPAA Audit, HITECH, NIST 800-66 and Meaningful Use Audit and Assessments; we are ready when you are! Call +1 (888) 896-7580 today.

The professionals at Lazarus Alliance are completely committed to you and your business’ HIPAA Audit, HITECH, NIST 800-66 and Meaningful Use audit success. Regardless of whether you represent the private sector or the public sector, we stand ready to partner with your organizations. Our competition may want to keep you and your employees in the dark where security, risk, privacy and governance are concerned hoping to conceal their methodology and expertise.
We don’t prescribe to that philosophy. We believe the best approach is transparent and built on a partnership developed on trust and credibility.
Lazarus Alliance’s primary purpose is to help organizations attain, maintain, and demonstrate compliance and information security excellence – in any jurisdiction. Lazarus Alliance specializes in IT security, risk, privacy, governance, cyberspace law and HIPAA Audit, HITECH, NIST 800-66 and Meaningful Use audit compliance leadership solutions and is fully dedicated to global success in these disciplines. We can help your organization too! Our client’s come from all business sectors across the world.
Want to learn more?
Find out more by calling +1 (888) 896-7580 today.
Just the facts ...
Our Cybervisors will proactively and collaboratively identify risk exposures that threaten your organization.
Comprehensive HIPAA Audit, HITECH, NIST 800-66 and Meaningful Use Audit Services

Lazarus Alliance’s HIPAA Audit, HITECH, NIST 800-66 and Meaningful Use audit process initially takes just a few weeks from start to completion to baseline your organization depending on your team’s availability. We are cognizant that our clients have full time, everyday obligations in addition to dealing with auditors so we are flexible to your needs and work around your schedule to provide a quality audit and report in the time frame you desire.

With increased compliance standards, more organizations are held accountable for adhering to the Health Insurance Portability & Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) which includes all medical practices and business associates of medical practices—lawyers, CPAs, data centers, payroll providers and others who have access to patient health information (PHI).



HIPAA Accreditation: You don’t just get accredited, you get Lazarus Alliance accredited!

HIPAA Awareness & Compliance Survey
Quiz-summary
0 of 38 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
Information
The HIPAA Awareness & Compliance Survey helps to determine your office’s degree of HIPAA compliance and awareness.
Topics covered in this review:
- Policies & Procedural Awareness
- Audit & Compliance Awareness
- Risk Assessment & Management Awareness
- Cyber Security Awareness
- Incident Response & Business Continuity Awareness
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 38 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
-
Congratulations!
You have just completed the HIPAA Awareness & Compliance Survey for your organization. All organizations need assistance in improving some area, or many facets, of their business as it pertains to Audit & Compliance, Risk Assessment & Management, Governance & Policies, and Cyber Security.
We have some suggestions for you!
- Continuum GRC: HIPAA, HITECH, NIST 800-66, and Meaningful Use tools and resources.
- Lazarus Alliance: HIPAA, HITECH, NIST 800-66, and Meaningful Use Assessment and Audit Services.
Thank You!
This concludes the HIPAA Awareness & Compliance Survey. Please click the Exit Course button, or close this browser window to finish the survey.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- Answered
- Review
-
Question 1 of 38
1. Question
When did you last conduct a review of security policies and procedures?
Correct
Incorrect
-
Question 2 of 38
2. Question
Privacy Policies and Procedures – Have you created and do you regularly review and update written privacy policies and procedures as required by law?
Correct
Incorrect
-
Question 3 of 38
3. Question
Information Management and Security Program – Do you have written policies and procedures for information management and security?
Correct
Incorrect
-
Question 4 of 38
4. Question
Confidentiality Agreements – Do you have signed confidentiality agreements with employees, partners, and other businesses with access to confidential information (such as “business associate agreements”) and do you keep copies of these agreements?
Correct
Incorrect
-
Question 5 of 38
5. Question
Notice of Privacy Policy and Procedures – If you are a health care practitioner, do you obtain a signed acknowledgement of receipt of your privacy policies and procedures when required?
Correct
Incorrect
-
Question 6 of 38
6. Question
Risk Assessment – Have you conducted an information security risk assessment?
Correct
Incorrect
-
Question 7 of 38
7. Question
When did you last conduct an information security risk assessment?
Correct
Incorrect
-
Question 8 of 38
8. Question
Annual Review – Do you annually review your information security policy and procedures to ensure the suitability and effectiveness of information security?
Correct
Incorrect
-
Question 9 of 38
9. Question
Forms Review – Do you annually review your standard forms for compliance with state and federal regulations?
Correct
Incorrect
-
Question 10 of 38
10. Question
When did you last review or update your practice forms?
Correct
Incorrect
-
Question 11 of 38
11. Question
Authorization – Do you obtain proper authorization for disclosure of personal information when needed and maintain a record of these authorizations?
Correct
Incorrect
-
Question 12 of 38
12. Question
Authorization – Do you obtain proper authorization for disclosure of personal information when needed and maintain a record of these authorizations?
Correct
Incorrect
-
Question 13 of 38
13. Question
Complaints – Do you have a privacy complaint form that you provide when someone has a problem related to your use or disclosure of information?
Correct
Incorrect
-
Question 14 of 38
14. Question
Information Privacy and Security Training – Do you provide annual training to all employees that covers information privacy and security requirements and consequences of legal and policy violations?
Correct
Incorrect
-
Question 15 of 38
15. Question
When did you last conduct training?
Correct
Incorrect
-
Question 16 of 38
16. Question
Access Limits – Do you have procedures for limiting the disclosure of information to the minimum necessary needed for each job function?
Correct
Incorrect
-
Question 17 of 38
17. Question
Access Termination – Do you have a written checklist that you follow to restrict a person’s access to information and the facility (keys, passwords) when the person leaves or changes their employment role?
Correct
Incorrect
-
Question 18 of 38
18. Question
Personnel Screening – Do you request and verify employee background and work history for employees who will have access to confidential or personal information?
Correct
Incorrect
-
Question 19 of 38
19. Question
Physical Assessment – Have you conducted a review of your facility’s physical and environmental security, such as building entry controls, alarms, fire detection, and temperature controls?
Correct
Incorrect
-
Question 20 of 38
20. Question
When did you last conduct this review?
Correct
Incorrect
-
Question 21 of 38
21. Question
Physical Access Control – Do you have procedures to monitor and control physical access to facilities?
Correct
Incorrect
-
Question 22 of 38
22. Question
Environmental Controls – Do you maintain systems for backup power for an orderly computer shutdown process, fire detection, temperature and humidity controls and water damage detection?
Correct
Incorrect
-
Question 23 of 38
23. Question
Disaster Recovery Plan – Check each of the following disaster recovery options you have to support your ability to continue your business in the event of a catastrophic loss of information:
Correct
Incorrect
-
Question 24 of 38
24. Question
Monitoring – Do you maintain an unalterable computer system log and routinely audit logs, security events and system use?
Correct
Incorrect
-
Question 25 of 38
25. Question
Data Classification – Do you maintain policies and procedures to classify information by its value, sensitivity, and critical need to your business?
Correct
Incorrect
-
Question 26 of 38
26. Question
Access Controls – Check each of the following procedures you use to limit or prevent access to information:
Correct
Incorrect
-
Question 27 of 38
27. Question
Data Storage and Portable Media Protection – Do you follow written policies and procedures to protect data on electronic storage media, including CDs and DVDs, USB storage devices and portable hard drives?
Correct
Incorrect
-
Question 28 of 38
28. Question
Lock-Out for Inactive Computing Devices – Do you configure devices to automatically lock after a period of inactivity is enforced?
Correct
Incorrect
-
Question 29 of 38
29. Question
Anti-Virus Protection – Do you regularly use and update security software to protect against computer viruses and malware?
Correct
Incorrect
-
Question 30 of 38
30. Question
Software Changes – Is your software and systems designed to detect and protect against unauthorized changes to software and information?
Correct
Incorrect
-
Question 31 of 38
31. Question
Information Input – Do you have policies and procedures to verify information for accuracy, completeness, and validity?
Correct
Incorrect
-
Question 32 of 38
32. Question
Information Correction – Do you have a policy and procedure for identification, reporting, and correction of information errors?
Correct
Incorrect
-
Question 33 of 38
33. Question
Software Usage Restrictions – Do you have procedures to comply with software usage restrictions in accordance with contact agreements and copyright laws?
Correct
Incorrect
-
Question 34 of 38
34. Question
User Installed Software – Do you have an explicit policy governing the downloading and installation of software by users?
Correct
Incorrect
-
Question 35 of 38
35. Question
Outsourced Information Services – Do you ensure that third-party providers of information system services employ adequate security controls in accordance with applicable laws, your policies and service agreements?
Correct
Incorrect
-
Question 36 of 38
36. Question
Device Security – Do you apply operating system and application updates, patches, and fixes as soon as they become available?
Correct
Incorrect
-
Question 37 of 38
37. Question
Incident Response – Do you have and follow a written information breach notification process and incident response policy and procedure?
Correct
Incorrect
-
Question 38 of 38
38. Question
Breach Assessment – Do you have a procedure and guidelines for conducting a breach assessment to determine whether you must provide breach notification under state or federal law?
Correct
Incorrect