Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » HiTRUST » HITRUST Assessment Process

HITRUST Assessment Process

HITRUST requires organizations to follow a step by step process to evaluate their information security posture against its guidelines. The process includes:

  • Conduct a readiness assessment: It is a self assessment that helps organizations identify their current status and identify gaps in the control implementation. Doing this helps you understand how well your organization aligns with HITRUST requirements before you proceed for a formal assessment. 
  • Select controls: Choose the appropriate control set based on the level of your risk and regulatory requirements. HITRUST offers two primary assessment types: the Implemented 1-Year (i1) assessment and the Risk-Based 2-Year (r2) assessment. The i1 is designed for lower-risk environments, while the r2 is more comprehensive and suited for higher-risk organizations. 
  • Undergo the validated assessment: Once you have completed the readiness assessment phase, the next step is to undergo a validated assessment. A HITRUST Authorized External Assessor will review it, followed by an independent third party assessor who evaluates if you have implemented the right controls and if these controls operate as intended. 
  • Submit and get certified: Once the external assessor completes their evaluation, they will share the findings to HITRUST. At this stage, they will verify it for consistency and quality. If the standards are met, you will be certified, which is valid for either one year (i1) or two years (r2).

Additional reading

HIPAA Encryption Requirements: The Key to Protecting Patient Privacy

In the digital age, we are constantly juggling data privacy concerns. Emergence of new technologies and regulations like the Health Insurance Portability and Accountability Act (HIPAA), means healthcare organizations must be vigilant in protecting patient information from unauthorized access or use. Encryption is a powerful tool that protects patient data at rest and in transit. …

How to Get HIPAA Compliance for Startups (Free Guide)

Healthcare is a sector that cybercriminals have repeatedly targeted over the years due to its reliance on outdated software and the immense worth of its data, namely, people’s health information.  In fact, according to a Trustwave report, someone’s medical records can be sold for an astonishing $250 per record, while payment records only fetch an…

Who Must Comply with PCI DSS? Payment Security Explained

Key Points Introduction  The Payment Card Industry Data Security Standard (PCI DSS) was created by the PCI Security Standards Council (PCI SSC) to protect sensitive transaction data and keep it secure from cybersecurity threats. The PCI SSC is an independent organization founded in 2006 by major payment card companies like American Express, MasterCard, Visa, JCB International,…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.