{"id":14601,"date":"2019-10-30T13:46:37","date_gmt":"2019-10-30T17:46:37","guid":{"rendered":"https:\/\/healthit-gov.go-vip.net\/buzz-blog\/?p=14601"},"modified":"2025-08-21T21:48:35","modified_gmt":"2025-08-21T21:48:35","slug":"4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization","status":"publish","type":"post","link":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/","title":{"rendered":"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization"},"content":{"rendered":"\n<p>As ONC works to advance the development and use of health IT, we know that you play an important and equal role in maintaining the public\u2019s confidence and trust. The privacy and security of health information is always at the forefront of our work and your organization\u2019s business practices. In the spirit of <a href=\"https:\/\/staysafeonline.org\/ncsam\/\">National Cyber Security Awareness Month<\/a> (NCSAM), we want to highlight the <a href=\"https:\/\/healthit.gov\/security-risk-assessment-tool\/\">HHS Security Risk Assessment (SRA) Tool<\/a>, which you can use to assess your organization\u2019s security risks. If you are responsible for the privacy or security of <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/laws-regulations\/index.html\">electronic protected health information (ePHI)<\/a>, you may be particularly interested in the SRA Tool.<\/p>\n\n\n\n<p>In the health care sector, security is the way your organization implements <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/guidance\/index.html\">administrative, technical, and physical safeguards<\/a> to provide for the <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/guidance\/cybersecurity-newsletter-summer-2019\/index.html\">confidentiality, integrity, and availability<\/a> of health information. Conducting a security risk assessment is one way to identify and assess risks to ePHI within your organization, check if your organization has appropriate safeguards in place, and reveal any areas where ePHI may be at risk. You can then take action to mitigate any risks that are found. For example, assessing security risks can help your organization reduce the chance of being impacted by a variety of cyber-attacks, malware, ransomware, and other online scams.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote icon yellow tweet is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Conducting a security risk assessment is one way to identify and assess risks to ePHI within your organization, check if your organization has appropriate safeguards in place, and reveal any areas where ePHI may be at risk.<\/p>\n<\/blockquote>\n\n\n\n<p>With <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/guidance\/cybersecurity-newsletter-summer-2019\/index.html\">known and emerging cyber security risks<\/a> in the health care sector, using the SRA Tool can help your organization in the following 4 ways. Best of all, it\u2019s free!<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identify potential threats and vulnerabilities to ePHI<\/strong>. The SRA Tool is designed to help small and medium-sized healthcare practices or organizations assess risks to ePHI. Organizations can use the SRA Tool to help identify potential threats (e.g., cyber-attack, theft) and vulnerabilities (e.g., weak login to access EHR) which can be used to inform an organization\u2019s development of mitigation plans to protect electronic patient data.<\/li>\n\n\n\n<li><strong>Review all electronic devices involved with ePHI<\/strong>. The SRA Tool gives users the ability to include the review of all electronic devices that store or capture ePHI. The SRA Tool provides functionality to add documentation detailing your risk identification and analysis process (e.g., vulnerability scans, site walk-throughs). Include electronic health record (EHR) hardware, software (e.g., technical endpoints\/<a href=\"https:\/\/healthit.gov\/\/educational-videos\">APIs<\/a>) and devices that can access data maintained in an EHR (e.g., your smart phone, tablet computer). Involve your EHR developer in the process.<\/li>\n\n\n\n<li><strong>Assess your overall security risks routinely. <\/strong>Some providers may perform these reviews annually or as needed depending on circumstances of their environment (e.g., when new technology is introduced in the health care provider\u2019s technical environment). You must continue to review, correct, modify, and update security protections to provide for continued protection of ePHI in the face of new and emerging threats and vulnerabilities. The <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/guidance\/guidance-risk-analysis\/index.html?language=es\">security risk management process<\/a> is iterative and ongoing.<\/li>\n\n\n\n<li><strong>Assists with HIPAA Security Rule requirements. <\/strong>The SRA Tool can help organization\u2019s meet requirements of the <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/guidance\/index.html\">Health Insurance Portability and Accountability Act (HIPAA) Security Rule<\/a> by uncovering potential weaknesses in organizational security policies, processes, and systems. HIPAA Security Rule requirements pertain to all ePHI your organization creates, receives, maintains, or transmits, not just what is contained in your EHR or other health IT product.&nbsp; Although use of this tool can assist with HIPAA compliance activities, use of the tool is neither required by nor guarantees compliance with of the HIPAA Security Rule requirements.<\/li>\n<\/ul>\n\n\n\n<p>All you need to do to get started is download the <a href=\"https:\/\/healthit.gov\/security-risk-assessment-tool\/\">SRA Tool<\/a>. Be sure to review the <a href=\"https:\/\/healthit.gov\/wp-content\/uploads\/2017\/09\/SRAT_v3.0.1_User_Guide.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">User Guide<\/a> for tips on using the SRA Tool. Questions? Email the <a href=\"mailto:SRAHelpDesk@altarum.org\">Help Desk<\/a> or check out the <a href=\"https:\/\/healthit.gov\/wp-content\/uploads\/2019\/07\/SRAInstructionalPresentation.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">materials <\/a>from and <a href=\"https:\/\/www.youtube.com\/watch?time_continue=3&amp;v=xsDD2fFn-uE\">audio recording<\/a> of our August webinar. The current version of the <a href=\"https:\/\/healthit.gov\/security-risk-assessment-tool\/\">SRA Tool<\/a> includes functionality updates based on public input. We want to continue to make improvements, so if you have suggestions after using the SRA Tool, please reach out to us via the <a href=\"https:\/\/healthit.gov\/\/form\/healthit-feedback-form\">Health IT Feedback Form<\/a>.<\/p>\n\n\n\n<p>Assessing risk is an important step in your security management process and helps your organization recognize where safeguards are needed to protect ePHI, including guarding against <a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/RansomwareFactSheet.pdf\">ransomware<\/a> and other types of cyber-attacks. Get started today \u2013 <a href=\"https:\/\/healthit.gov\/security-risk-assessment-tool\/\">download and use the SRA Tool<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As ONC works to advance the development and use of health IT, we know that [&hellip;]<\/p>\n","protected":false},"author":619,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_selected_menu":"","_show_breadcrumbs":"true","_blog_show_featured_image":false,"footnotes":""},"categories":[45],"archived-category":[],"featured":[],"topics":[438,425,437,435,456],"class_list":["post-14601","post","type-post","status-publish","format-standard","hentry","category-privacy-and-security","topics-hipaa-compliance","topics-hit-policy","topics-security","topics-security-privacy","topics-security-risk-tool"],"acf":{"blog_authors":[{"blog_author_profiles":"193015"},{"blog_author_profiles":"198680"}],"hp_news_hide":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.3 (Yoast SEO v24.8.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization - ONC Blog<\/title>\n<meta name=\"description\" content=\"Protect ePHI with the free HHS Security Risk Assessment Tool. Identify vulnerabilities, assess risks, and ensure HIPAA compliance in your healthcare organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization\" \/>\n<meta property=\"og:description\" content=\"Protect ePHI with the free HHS Security Risk Assessment Tool. Identify vulnerabilities, assess risks, and ensure HIPAA compliance in your healthcare organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/\" \/>\n<meta property=\"og:site_name\" content=\"ONC Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-30T17:46:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-21T21:48:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/ONC.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"sleigh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sleigh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/\"},\"author\":{\"name\":\"sleigh\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7\"},\"headline\":\"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization\",\"datePublished\":\"2019-10-30T17:46:37+00:00\",\"dateModified\":\"2025-08-21T21:48:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/\"},\"wordCount\":737,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\"},\"articleSection\":[\"Privacy &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/\",\"url\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/\",\"name\":\"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization - ONC Blog\",\"isPartOf\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#website\"},\"datePublished\":\"2019-10-30T17:46:37+00:00\",\"dateModified\":\"2025-08-21T21:48:35+00:00\",\"description\":\"Protect ePHI with the free HHS Security Risk Assessment Tool. Identify vulnerabilities, assess risks, and ensure HIPAA compliance in your healthcare organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/healthit.gov\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/healthit.gov\/blog\/#website\",\"url\":\"https:\/\/healthit.gov\/blog\/\",\"name\":\"ONC - Office of the National Coordinator for Health IT\",\"description\":\"Better health enabled by data\",\"publisher\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\"},\"alternateName\":\"ONC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/healthit.gov\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\",\"name\":\"ONC - Office of the National Coordinator for Health IT\",\"alternateName\":\"ONC\",\"url\":\"https:\/\/healthit.gov\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png\",\"contentUrl\":\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png\",\"width\":800,\"height\":176,\"caption\":\"ONC - Office of the National Coordinator for Health IT\"},\"image\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7\",\"name\":\"sleigh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g\",\"caption\":\"sleigh\"},\"url\":\"https:\/\/healthit.gov\/blog\/author\/sleigh\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization - ONC Blog","description":"Protect ePHI with the free HHS Security Risk Assessment Tool. Identify vulnerabilities, assess risks, and ensure HIPAA compliance in your healthcare organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/","og_locale":"en_US","og_type":"article","og_title":"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization","og_description":"Protect ePHI with the free HHS Security Risk Assessment Tool. Identify vulnerabilities, assess risks, and ensure HIPAA compliance in your healthcare organization.","og_url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/","og_site_name":"ONC Blog","article_published_time":"2019-10-30T17:46:37+00:00","article_modified_time":"2025-08-21T21:48:35+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/ONC.jpg","type":"image\/jpeg"}],"author":"sleigh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sleigh","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/#article","isPartOf":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/"},"author":{"name":"sleigh","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7"},"headline":"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization","datePublished":"2019-10-30T17:46:37+00:00","dateModified":"2025-08-21T21:48:35+00:00","mainEntityOfPage":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/"},"wordCount":737,"commentCount":0,"publisher":{"@id":"https:\/\/healthit.gov\/blog\/#organization"},"articleSection":["Privacy &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/","url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/","name":"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization - ONC Blog","isPartOf":{"@id":"https:\/\/healthit.gov\/blog\/#website"},"datePublished":"2019-10-30T17:46:37+00:00","dateModified":"2025-08-21T21:48:35+00:00","description":"Protect ePHI with the free HHS Security Risk Assessment Tool. Identify vulnerabilities, assess risks, and ensure HIPAA compliance in your healthcare organization.","breadcrumb":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/healthit.gov\/blog\/"},{"@type":"ListItem","position":2,"name":"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization"}]},{"@type":"WebSite","@id":"https:\/\/healthit.gov\/blog\/#website","url":"https:\/\/healthit.gov\/blog\/","name":"ONC - Office of the National Coordinator for Health IT","description":"Better health enabled by data","publisher":{"@id":"https:\/\/healthit.gov\/blog\/#organization"},"alternateName":"ONC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/healthit.gov\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/healthit.gov\/blog\/#organization","name":"ONC - Office of the National Coordinator for Health IT","alternateName":"ONC","url":"https:\/\/healthit.gov\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png","contentUrl":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png","width":800,"height":176,"caption":"ONC - Office of the National Coordinator for Health IT"},"image":{"@id":"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7","name":"sleigh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g","caption":"sleigh"},"url":"https:\/\/healthit.gov\/blog\/author\/sleigh\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization","url":"http:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/healthit.gov\/blog\/privacy-and-security\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\/"},"thumbnailUrl":"","image":{"@type":"ImageObject","url":""},"articleSection":"Privacy &amp; Security","author":[{"@type":"Person","name":"sleigh"}],"creator":["sleigh"],"publisher":{"@type":"Organization","name":"ONC Blog","logo":""},"keywords":[],"dateCreated":"2019-10-30T17:46:37Z","datePublished":"2019-10-30T17:46:37Z","dateModified":"2025-08-21T21:48:35Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"4 Ways Using the HHS Security Risk Assessment Tool Can Help Your Organization\",\"url\":\"http:\\\/\\\/healthit.gov\\\/blog\\\/privacy-and-security\\\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/healthit.gov\\\/blog\\\/privacy-and-security\\\/4-ways-using-the-hhs-security-risk-assessment-tool-can-help-your-organization\\\/\"},\"thumbnailUrl\":\"\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"\"},\"articleSection\":\"Privacy &amp; Security\",\"author\":[{\"@type\":\"Person\",\"name\":\"sleigh\"}],\"creator\":[\"sleigh\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"ONC Blog\",\"logo\":\"\"},\"keywords\":[],\"dateCreated\":\"2019-10-30T17:46:37Z\",\"datePublished\":\"2019-10-30T17:46:37Z\",\"dateModified\":\"2025-08-21T21:48:35Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/healthit.gov\/p.js"},"_links":{"self":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/14601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/users\/619"}],"replies":[{"embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/comments?post=14601"}],"version-history":[{"count":5,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/14601\/revisions"}],"predecessor-version":[{"id":178063,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/14601\/revisions\/178063"}],"wp:attachment":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/media?parent=14601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/categories?post=14601"},{"taxonomy":"archived-category","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/archived-category?post=14601"},{"taxonomy":"featured","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/featured?post=14601"},{"taxonomy":"topics","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/topics?post=14601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}