Download:
pdf |
pdfPhase 2 Application Readiness Checklist
Phase 2 Application Readiness Checklist
This checklist helps entities through the Phase 2 application by providing a brief overview of each
application component.
Table 1: Phase 2 Application Readiness Checklist
Element
Readiness Assessment
•
Checkbox
Complete the following tasks and documents:
• Data Security Review
2.1 Data
Security
Review
• Data Flow Diagram with annotations
• Policy and Procedures documents for five control families
[Checkbox]
• Contract with partner/vendor/cloud service provider (CSP), as
applicable
2.2 Non-Public
Analyses
Intentions
2.3 Requests
for Corrections
and Appeals
2.4 Use Secure
Transmission
of Beneficiary
Data
•
Attest intention to provide or sell provider identifier non-public analyses to
authorized users
•
Provide evidence of a Corrections and Appeals process if intending to report
at the provider identifiable level
•
Provide evidence of masking methodology if intending to report at the
regional level
•
Provide evidence of secure transmission of beneficiary data if intending to
report at the provider identifiable level
•
Select NA in engaging in regional reporting
[Checkbox]
[Checkbox]
[Checkbox]
1
File Type | application/pdf |
File Title | Phase 2 Application Readiness Checklist |
Subject | Phase 2 Application Readiness Checklist |
Author | CMS |
File Modified | 2024-01-18 |
File Created | 2024-01-15 |