The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures



Similar documents
HIPAA Security. assistance with implementation of the. security standards. This series aims to

HIPAA Security Alert

HIPAA Information Security Overview

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

HIPAA Security Checklist

HIPAA Security Series

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

SECURITY RISK ASSESSMENT SUMMARY

VMware vcloud Air HIPAA Matrix

HIPAA Compliance Guide

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

How To Write A Health Care Security Rule For A University

HIPAA SECURITY RULES FOR IT: WHAT ARE THEY?

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

HIPAA Security Matrix

HIPAA ephi Security Guidance for Researchers

HIPAA Security COMPLIANCE Checklist For Employers

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

State HIPAA Security Policy State of Connecticut

Healthcare Compliance Solutions

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Healthcare Compliance Solutions

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE

Datto Compliance 101 1

Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,

CHIS, Inc. Privacy General Guidelines

Welcome to part 2 of the HIPAA Security Administrative Safeguards presentation. This presentation covers information access management, security

C.T. Hellmuth & Associates, Inc.

HIPAA Security and HITECH Compliance Checklist

Procedure Title: TennDent HIPAA Security Awareness and Training

HIPAA Compliance Guide

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA RISK ASSESSMENT

HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as

HIPAA Security Education. Updated May 2016

What is HIPAA? The Health Insurance Portability and Accountability Act of 1996

Krengel Technology HIPAA Policies and Documentation

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA HANDBOOK. Keeping your backup HIPAA-compliant

HIPAA and Mental Health Privacy:

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

Montclair State University. HIPAA Security Policy

HIPAA Security Rule Compliance

HIPAA/HITECH: A Guide for IT Service Providers

HIPAA Privacy & Security White Paper

HIPAA Risk Assessments for Physician Practices

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

HIPAA: Bigger and More Annoying

This is the third and final presentation on HIPAA Security Administrative Safeguards. This presentation focuses on the last 2 standards under the

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

Policies and Compliance Guide

The County of San Bernardino Department of Behavioral Health. Facility Physical Security and Access Control Pr

Other terms are defined in the Providence Privacy and Security Glossary

Privacy and Security Meaningful Use Requirement HIPAA Readiness Review

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

HIPAA: In Plain English

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

SECURITY RULE POLICIES AND PROCEDURES

University of Pittsburgh Security Assessment Questionnaire (v1.5)

An Effective MSP Approach Towards HIPAA Compliance

ISLAND COUNTY SECURITY POLICIES & PROCEDURES

Volume UC DAVIS HEALTH SYSTEM. HIPAA Security Compliance Workbook. Multi User Guide

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Cyber Self Assessment

HIPAA Security Policies and Procedures

8.03 Health Insurance Portability and Accountability Act (HIPAA)

Joseph Suchocki HIPAA Compliance 2015

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Volume UC DAVIS HEALTH SYSTEM. HIPAA Security Compliance Workbook. Single - User Guide

Administrators Guide Multi User Systems. Calendar Year

HIPAA Training for Hospice Staff and Volunteers

System Security Plan University of Texas Health Science Center School of Public Health

HIPAA PRIVACY AND SECURITY FOR EMPLOYERS

SAFEGUARDING PROTECTED HEALTH INFORMATION (PHI): FOCUS POINTS FOR OFFSITE TRANSCRIPTIONISTS

CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS STANDARD 012 IMAGE SECURITY STANDARD

HIPAA Privacy and Security Risk Assessment and Action Planning

ITS HIPAA Security Compliance Recommendations

HIPAA PRIVACY AND SECURITY AWARENESS. Covering Kids and Families of Indiana April 10, 2014

The HIPAA Security Rule Primer A Guide For Mental Health Practitioners

HIPAA. Security Procedures. Resource Manual

Supplier Security Assessment Questionnaire

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

Transcription:

The second section of the HIPAA Security Rule is related to physical safeguards. Physical safeguards are physical measures, policies and procedures to protect and secure a covered entity s electronic information systems. The safeguards are focused on protecting electronic information systems and related buildings and equipment from natural hazards, environmental hazards, and unauthorized intrusion.

The first standard under physical safeguards is Facility and Access Controls. This standard focuses on implementing policies and procedures to limit physical access to electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed. This standard is comprised of 4 addressable standards: Contingency Operations Facility Security Plan Access Control and Validation Procedures Maintenance Records

Each of the addressable specifications under Facility and Access Controls require policies and procedures to be created and implemented. The first specification is Contingency Operations which requires a covered entity to establish procedures that allow facility access in support of restoration of lost data under the disaster recovery plan and emergency mode operations plan in the event of an emergency. The Facility Security Plan is intended to have covered entities create and implement policies and procedures that document physical access controls, meaning only people with a legitimate business reason can access certain areas of the facility. Some simple controls can be locked doors, surveillance cameras, controls tags, ID badges, and visitor badges. The next specification is Access Control and Validation Procedures and requires covered entities to create a procedure that will validate a person s need to access a specific area of the physical space as well as access to software systems. In general, you need to align a person s access to their role and job responsibilities. The last specification under Facility and Access Controls is Maintenance Records. This specification requires a covered entity to create and implement policies and procedures that document repairs and modifications to the physical components of a facility that relate to security.

The next standard under Physical Safeguards is Workstation Use. Under the HIPAA Security Rule, a workstation is defined as an electronic computing device, for example, a laptop or desktop computer, or any other device that performs similar functions, and electronic media stored in its immediate environment. This standard doesn t have any specifications. The standard requires a covered entity to implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access ephi. Some requirements for the Workstation Use standard are Assure that policies and procedures that define and set business needs of physical work stations include information regarding security of ephi. Assure that policies and procedures include all employees with workstations, including those that work from home, work in satellite offices, or work in another facility. Review and implement additional security measures such as placement of workstation for minimal viewing, enable password protected screen savers, and define log-off procedures for workstations.

To complement the Workstation Use standard, the next standard is Workstation Security. This standard requires covered entities to implement physical safeguards for all workstations that access ephi, to restrict access to unauthorized viewers. Requirements for this standard include: Defining how workstations should be physically protected for unauthorized users Based on the use of specific workstations, facility may chose to restrict or minimize physical access to a workstation If needed, complete a risk assessment to determine the risks and best mitigations for workstation security

The next standard under the HIPAA Security Rule is Device and Media Controls. This standard requires a covered entity to implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain ephi, into and out of a facility, and the movement of these items within the facility. This standard is made up of 2 required standards and 2 addressable standards. The required standards are media disposal and media re-use and the two addressable standards are accountability and data backup and storage.

Taking a look at each of the specifications under Device and Media Controls, the first of the required standards is disposal. This specification requires a covered entity to create a policy and procedure to address the final disposition of ephi, and/or the hardware or electronic media where it is stored. The next required standard of media re-use, again, requires a covered entity to establish a policy and procedure to address the removal of ephi from electronic media before the media are made available for re-use. The first addressable specification is accountability, which requires a covered entity to maintain a record of the movement of hardware and electronic media and any person responsible. This should be addressed in a policy and procedure. The other addressable standard is data backup and storage. This requirement differs from the data back up and storage of ephl in the administrative safeguards. It is focused on creating a retrievable, exact copy of ephi before movement of equipment. This should also be addressed in a policy and procedure.

Here are some recommendations to support the device and medical controls policies and procedures Maintain a record of the movements of hardware and electronic media and the person(s) responsible for computer surplus and reconfiguration activities. Prior to destruction of items, the retention period should be verified and the Privacy & Security Official(s) notified of the plans to destroy the documents. Destroy media (paper, fiche, floppies, CDs, etc.) that contain PHI using one of the following acceptable methods of destruction: crosscut shredding, burning, pulping or pulverizing. Maintain a Destruction Log to identify the individual records and Designated Record Set (DRS) destroyed. If a commercial destruction company is used, a Certificate of Destruction must be provided by the company for each load or destruction session. Attach this certificate to the Destruction Log as verification of the process.