Address : 1939 Lambeth Way San Ramon, CA 94582 USA

Reduce Cost
Increase Revenue?

Comply with Medicaid,
Meaningful Use & HHS?

Protect Your Reputation
and Your Patient's Data?

A Little Background...

A Little Background...

 E-Health Privacy Risk Assurance is stepping up HIPAA enforcement and the CMS Meaningful Use program has begun the audit process. Both require that a current Security Risk Assessment be available to their auditors Preparation means that your organization is ready with the right documentation showing a current assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information (e-PHI) held AND progress on remediation of those risks identified.

The HIPAA Security Rule identifies over 78 controls, to include “required” and “addressable” controls. HIPAA One has consolidated these with other industry best practices into a Common Control Framework that is aligned to the HIPAA Security Rule. Key areas addressed are:

DISCOVER - Learn the requirements and meet with the responsible parties.

EVALUATE - Review the scope of current systems, audit trails and processes.

TEST - Conduct IT penetration testing and ethical hacking to identify weaknesses.

ANALYZE - Review results to determine the applicable areas of focus.

UPDATE - Implement systems and procedures then provide ongoing updates and reports.

Learn More

How Can Rimici E-Health Help?

Matching a "Turbo-tax" like software solution, the HIPAA One team has spent years automating and simplifying the HIPAA Gap Assessment and Security Risk Analysis process. HIPAA One can be used to quickly and effectively self-assess your own environment’s HIPAA compliance, and provide ongoing remediation tracking, email reminders and automated reporting. Rimici E-Health has partnered with HIPAA One®, the leader in HIPAA Security software, to deliver a simplified, automated, and affordable software-driven approach to the Security Risk Assessment (SRA) as required under the HIPAA Security Rule and the Meaningful Use Incentive program. As a result of the changes driven by The HITECH (Health Information Technology for Economic and Clinical Health) Act, all Covered Entities and Business Associates must be compliant and completing a formal Security Risk Analysis is a crucial step in doing so. Enforcement of compliance has increased significantly over the last year and includes the following:

  •   Mandatory Audits
  •   Business Associates Must Comply With New Laws
  •   Subcontractors Must Comply With New Laws
  •   Non-Compliance Fines Are Being Enforced
  •   Stiffer Penalties
  •   Jurisdiction Provided To State Attorneys General To File Civil Actions Against Violators


Because of this, it is more important now, than ever before, to build your organizations risk management program on a methodical and proven software solution. All 78 Security Rule citations are addressed; and based on NIST 800-series methodologies; HIPAA One® rigorously follows the 9-step process to allow you to conduct a Security Risk Analysis.

 Join Us

What is Included:


  •    1 year of access to our SaaS platform
  •    Nessus Professional Feed® Vulnerability Scan
  •    Policies and Procedures Templates
  •    $100,000 Breach Assurance
  •    Automated Risk Analysis, documentation and reporting
  •    Unlimited users and remediation updates
  •    State, Federal and Best Practice updates
  •    Access to our Certified Audit Support Team
  •    Web site "Certified Compliant Seal"
  •    All data exportable to PDF or .csv file
Is Security Risk Assessment Right for My Practice?

Is Security Risk Assessment Right for My Practice?

Our HIPAA forms, checklists and documentation reports are intended to provide guidance, including suggested policies, processes, and tracking mechanisms that help you to make sense of the new HIPAA regulations. They combine reusable solutions with analysis patterns, research, and useful organizational techniques that can be tailored specifically to the unique needs of your organization. In short, utilizing our software-driven approach to the Security Risk Assessment will assure compliance for your practice!

Learn More