• Print

Step 5: Achieve Meaningful Use Stage 1

Protect Electronic Health Information


Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities.


Conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process.

Clinical Importance

Maintaining the confidence of the personal health information of patients is an old and sacred responsibility for clinicians. One concern many practices have with implementing EHRs is the ability to provide the right amount of security for their patients records. Applying safeguards found in The HIPAA Privacy Rule can assist in avoiding common security gaps that lead to cyber attack or data loss which can help protect the people, information, technology, and practices.

CMS Resources

The following resources are available to help you meet the Protect Electronic Health Information meaningful use core measure:

CMS EHR Incentive Program Frequently Asked Questions

Lessons from the Field

 "In assisting rural clinics to meet meaningful use stage one requirements, we have realized several challenges associated with identifying and resolving privacy and security lapses. Utilizing existing tools is tremendously helpful in overcoming these challenges."

— Jason Felts, Health IT Practice Advisor, Oklahoma Foundation for Medical Quality 

A key to identifying outlying privacy and security risks is to utilize existing tools, such as the ONC Security Risk Assessment, in the analysis of a practice. An all-inclusive tool is essential for ensuring all areas of privacy and security are appropriately assessed. Once risks are identified, we recommend the use of sample policies and procedures that can be adjusted to fit the needs of each practice and assist in meeting the meaningful use requirement of protecting electronic health information.

"Many practices are unaware of the risks to electronic personal health information in an EHR environment. Utilizing tools that allow practices to identify risks in their environment and bring awareness to mitigation strategies is not only necessary for Meaningful Use, but also vital in safeguarding electronic health information."

Nicholas Heesters, Privacy and Security Specialist, Quality Insights of Delaware

Smaller practices have been very receptive to assistance with risk analysis of privacy and security. By using the ONC Security Risk Assessment, a practice can be guided through the tool to identify risks that exist and develop an action plan with risk mitigation strategies.  After risks are identified, it is important to include a follow-up assessment to adjust and update the tool to reflect any progress or action taken. The use of the risk assessment tool coupled with industry best practices allows providers to identify where improvements are needed during the initial assessment and have a process in place that will allow for continued monitoring of risks.

National Learning Consortium Resources

The NLC resources are examples of tools that are used in the field today, and that are recommended by “boots-on-the-ground” professionals. The NLC, in partnership with HealthIT.gov, shares this collective EHR implementation knowledge and resources throughout this site.

National Learning Consortium Resources
Resource NameDescriptionSource

Guidance on Risk Analysis Requirements under the HIPAA Security Rule


[PDF - 37 KB]

Guidance on the provisions in the HIPAA Security Rule to assist organizations in identifying and implementing the most effective and appropriate administrative, physical, and technical safeguards to secure electronic protected health information (e-PHI).

Office for Civil Rights (OCR)

Reassessing Your Security Practices in a Health IT Environment: A Guide for Small Health Care Practices


[PDF - 110 KB]

Guide intended to assist small health care practices in reassessing their existing health information security policies as they consider adopting and implementing emerging health IT capabilities.

Office of the National Coordinator for Health Information Technology (ONC)

Guide to Privacy and Security of Health Information, Chapter 2: Privacy & Security and Meaningful Use


[PDF - 1.56 MB]

Guide that addresses the electronic health record (EHR) privacy and security meaningful use requirements; this chapter is a subsection of ONC's Guide to Privacy and Security of Health Information.

Office of the National Coordinator for Health Information Technology (ONC)

Health Information Privacy and Security 10 Step Plan



10 step plan for health information privacy and security that covers activities from preparation, risk analysis, action planning, risk management, and attesting for meaningful use.

Office of the National Coordinator for Health Information Technology (ONC)

The material in these guides and tools represents the collective EHR implementation experiences and knowledge gained directly from the field of ONC’s outreach programs (REC, Beacon, State HIE) and through the Health Information Technology Research Center (HITRC) Communities of Practice (CoPs) in their performance of technical support and EHR implementation assistance to primary care providers. The information contained in these resources is not intended to serve as legal advice nor should it substitute for legal counsel. The resource list is not exhaustive, and readers are encouraged to seek additional detailed technical guidance to supplement the information contained herein.

Reference in this web site to any specific resources, tools, products, process, service, manufacturer, or company does not constitute its endorsement or recommendation by the U.S. Government or the U.S. Department of Health and Human Services.