top of page



The sample seven steps which will be discussed in Chapter 6 are:


1: Lead Your Culture, Select Your Team, and Learn Step

2: Document Your Process, Findings, and Actions Step

3: Review Existing Security of ePHI (Perform Security Risk Analysis) Step

4: Develop an Action Plan Step

5: Manage and Mitigate Risks Step

6: Attest for Meaningful Use Security-Related Objective Step

7: Monitor, Audit, and Update Security on an Ongoing Basis


Chapter 6 [PDF - 561 KB] describes the sample seven-step approach that can help you implement a security management process in your organization. The approach includes help for addressing security-related requirements of Meaningful Use.

bottom of page