SecurityWho should participate?
Why should you participate?
To provide an opportunity for information sharing and identification of best practices for implementing the security rules. To provide opportunities to participate in the creation of security deliverables (sample policies, procedures, position statements, whitepapers, preemption documents, etc.) and the option to take advantage of those deliverables. To establish a forum for participants to voice concerns and seek assistance in resolving troublesome security issues. What topics are covered?
This group has generated template security policies covering the majority of the security rule and several whitepapers addressing specific security-related topics. In the future, our goal is to give guidance on practical operation implementation of the rules as the security rule is not a one size fits all rule. Meetings
One hour calls are scheduled for the fourth Wednesday of the month from 12-1pm CT. |
|