Page 1
S.no Standard Clause
1 Security Management Process 164.308(a)(1)
2 Security Management Process 164.308(a)(1)
3 Security Management Process 164.308(a)(1)
4 Security Management Process 164.308(a)(1)
5 Assigned Security Responsibility 164.308(a)(2)
6 Workforce security 164.308(a)(3)(i)
7 Workforce security 164.308(a)(3)(i)
8 Workforce security 164.308(a)(3)(i)
9 Workforce security 164.308(a)(3)(i)
10 Workforce security 164.308(a)(3)(i)
11 Workforce security 164.308(a)(3)(i)
12 Workforce security 164.308(a)(3)(i)
Page 2
13 Information Access management 164.308(a)(4)(i)
14 Information Access management 164.308(a)(4)(i)
15 Information Access management 164.308(a)(4)(i)
16 Information Access management 164.308(a)(4)(i)
17 Information Access management 164.308(a)(4)(i)
18 Security Awareness & Training 164.308(a)(5)(i)
19 Security Awareness & Training 164.308(a)(5)(i)
20 Security Awareness & Training 164.308(a)(5)(i)
21 Security Awareness & Training 164.308(a)(5)(i)
22 Security Awareness & Training 164.308(a)(5)(i)
23 Security Awareness & Training 164.308(a)(5)(i)
24 Security Awareness & Training 164.308(a)(5)(i)
25 Security Awareness & Training 164.308(a)(5)(i)
Page 3
26 Security Awareness & Training 164.308(a)(5)(i)
27 Security Awareness & Training 164.308(a)(5)(i)
28 Security Awareness & Training 164.308(a)(5)(i)
29 Security Incident procedures 164.308(a)(6)(i)
30 Security Incident procedures 164.308(a)(6)(i)
31 Security Incident procedures 164.308(a)(6)(i)
32 Security Incident procedures 164.308(a)(6)(i)
33 Contigency Plan 164.308(a)(7)(i)
34 Contigency Plan 164.308(a)(7)(i)
35 Contigency Plan 164.308(a)(7)(i)
36 Contigency Plan 164.308(a)(7)(i)
37 Contigency Plan 164.308(a)(7)(i)
Page 4
38 Contigency Plan 164.308(a)(7)(i)
39 Contigency Plan 164.308(a)(7)(i)
40 Contigency Plan 164.308(a)(7)(i)
41 Contigency Plan 164.308(a)(7)(i)
42 Contigency Plan 164.308(a)(7)(i)
43 Contigency Plan 164.308(a)(7)(i)
44 Contigency Plan 164.308(a)(7)(i)
45 Evaluations 164.308(a)(8)
46 Evaluations 164.308(a)(8)
47
Business Associates contracts and
other arrangements 164.308(b)(1)
48
Business Associates contracts and
other arrangements 164.308(b)(1)
49 Facility Access control 164.310(a)(1)
50 Facility Access control 164.310(a)(1)
Page 5
51 Facility Access control 164.310(a)(1)
52 Facility Access control 164.310(a)(1)
53 Facility Access control 164.310(a)(1)
54 Facility Access control 164.310(a)(1)
55 Facility Access control 164.310(a)(1)
56 Workstation Use 164.310(b)
57 Workstation Use 164.310(b)
58 Workstation Use 164.310(b)
59 Device and Media control 164.310(d)(1)
60 Device and Media control 164.310(d)(1)
61 Device and Media control 164.310(d)(1)
62 Device and Media control 164.310(d)(1)
63 Access control 164.312(a)(1)
64 Access control 164.312(a)(1)
Page 6
65 Access control 164.312(a)(1)
66 Access control 164.312(a)(1)
67 Access control 164.312(a)(1)
68 Access control 164.312(a)(1)
69 Access control 164.312(a)(1)
70 Access control 164.312(a)(1)
71 Access control 164.312(a)(1)
72 Audit controls 164.312(b)
73 Audit controls 164.312(b)
74 Audit controls 164.312(b)
75 Integrity 164.312©(1)
76 Person or entity authentication 164.312(d)
Page 7
77 Transmission Security 164.312€(1)
78 Transmission Security 164.312€(1)
79 Transmission Security 164.312€(1)
80 Transmission Security 164.312€(1)
81
Business Associate contracts and
other arrangements 164.314 (a)(1)
82
Business Associate contracts and
other arrangements 164.314 (a)(1)
83
Business Associate contracts and
other arrangements 164.314 (a)(1)
84
Requirements for Group Health
plans 164.314 (b)(1)
85 Policy & Procedures 164.316 (a)
86 Policy & Procedures 164.316 (a)
87 Documentation 164.316 (b)(1)
88 Documentation 164.316 (b)(1)
Page 8
89 Documentation 164.316 (b)(1)
Page 9
Specifications
Risk Analysis
Risk Management
Sanction Policy
Information Systems activity
review
Authorization and/or Supervision
Workforce clerance procedures
Workforce clerance procedures
Termination Procedures
Termination Procedures
Termination Procedures
Termination Procedures
Page 10
Isolating healthcare clearinghouse
function
Access Authorization
Access establishment and
modification
Access establishment and
modification
Access establishment and
modification
Security Reminders
Security Reminders
Security Reminders
Protection from malicious software
Protection from malicious software
Protection from malicious software
Log-in monitoring
Log-in monitoring
Page 11
Password Management
Password Management
Password Management
Response & Reporting
Response & Reporting
Response & Reporting
Response & Reporting
Data Backup plan
Data Backup plan
Data Backup plan
Data Backup plan
Data Backup plan
Page 12
Data Backup plan
Disaster Recovery plan
Emergency mode operation plan
Emergency mode operation plan
Testing and Revision Procedure
Applications and data criticality
analysis
Applications and data criticality
analysis
Written contract or other
arrangement
Written contract or other
arrangement
Contigency Operations
Facility Security plan
Page 13
Facility Security plan
Access control and validation
procedures
Maintenance records
Maintenance records
Maintenance records
No Implementation Specification
No Implementation Specification
No Implementation Specification
Disposal
Media Re-use
Accountability
Data backup and storage
Unique User Identification
Unique User Identification
Page 14
Unique User Identification
Emergency access procedures
Automatic logoff
Automatic logoff
Encryption and Decryption
Encryption and Decryption
Encryption and Decryption
No Implementation Specification
No Implementation Specification
No Implementation Specification
Mechanism to Authenticate EPHI
No Implementation Specification
Page 15
Integrity Controls
Integrity Controls
Encryption
Encryption
Business associate contracts
Other Arrangement
Other Arrangement
Plan Documents
Plan Documents
No Implementation Specification
Time Limit
Availability
Page 17
Questions
Is a risk anlaysis process used to ensure cost-effective
security measures are used to mitigate expected losses ?
If yes, is the Risk Anlaysis process documented ?
Are secuirty measures implemented to reduce risks and vulnerabilities
to an appropriate level to the organization.
Do documented policies and procedures exist regarding disciplinary
actions (stipulations for misuse or misconduct) ? Have they been
communicated to the employees?
Are audit logs reviewed ? If yes, how often ? Is there a responsible entity? If the
effort documented ? Is audit logging for communication enabled.
Has the Security responsibilities for the organization been issued to
an individual or group ? If yes, is it documented ?
Are procedures in place to ensure personnel performing technical
system maintenance activities are supervised by authorized/knowledgeable
individuals, and that operational personnel are appropriately authorized to access
systems ? Are these
procedures documented ?
Are personnel procedures established and maintained ? Are these
procedures documented ?
Does the organization follow personnel clerance procedures to verify
access privileges before admissions? Are these procedures documented ?
Are access lists up-dated in a timely manner when employee accesses
change? If yes, are they documented and updated consistently ?
Does the organization follow termination procedures that include checklist for
collecting access-providing materials? If yes,are these
procedures followed consistently? Are these termination procedures
documented ?
Does the organization follow procedures for changing combination
and locking mechanism ? Are these procedures documented ?
Does the organization have documented termination checklists which
include procedures for removing user accounts in a timely manner.
Page 18
If the organization includes a healthcare clearinghouse, what policies
and procedures are in place to isolate the clearinghouse electronic
protected healthcare information from the rest of the organization ?
Are the rules established to determine the initial level of access an
individual may have ? Are these rules documented ?
Does the organization follow procedures for governing access to information on a
need to know basis ? If yes, who is responsible for
maintaining documentation of these procedures ?
Does the organization have different level of access to health information/data ?
Are these rules established for granting access and authorization? If yes, are these
rules documented ?
Are these rules established for the modication of individual access? If
yes, are these rules documented ?
Are Periodic security reminders issued to all employees? If yes, are these reminders
documented and do you feel that it is effective?
Is formal information Security awareness training conducted for all
employees, agents and contractors? Yes, how often it is performed and is periodic
re-attendance required ? Is the security awareness training program documented ?
Does the organization conduct customized training conducted to all
employees, agents, and contractors? Yes, how often it is performed and is periodic
attendance required? Is the security awareness training
awareness documented ?
If security awareness training is conducted does it includes (at a minimum): (A) Virus
protection, (B) importance of monitoring login Success/failure, and ©Password
management? Are these minimal requirements for Security Awareness training
documented ?
Are procedures in place to make sure virus checking software is installed
and running on all computer system within the organization ?
Do these procedures include the requirements that virus definitions
be consistently updated ?If yes, what procedures do you use to update
them and how often ?
Are procedures implemented that provide for monitoring of failed log-in
attempts in an organizations server ?
What procedures are in place to ensure failed log-in attemtps are
reported to the proper authority ?
Page 19
What password guidelines exist and what procedures are followed to ensure the
user makes a good selection ?
Do users sign a security statement when issued a password ?
What password guidelines are in place to protect integrity of
administrator type account ?
Is there a formal process in place to allow the reporting the security breaches? If
yes, to whom are these breaches reported to and are these
process documented ?
Are formal procedures follwoed for responding to incidents? If yes, which
entity is reposible and are handled in a timely manner? Are these procedures
documented ?
Are procedures followed for mitigating incidents that may occur ? Do the
procedures also identify a team assigned to handle these incidents ?
At the conclusion of an incident, are procedures followed to document
the outcome of the incident investigation? Are the results maintained in
an historical file for subsequent review ?
Has a data backup plan been implemented and followed within your
organization? If yes, is the data backup plan documented?
Does the Data backup plan contain procedures for testing and revision? If
so, are these procedures documented ?
Does the organization follow data backup plan procedures that allow for
an exact copy of information to be retrieved? If yes, are data backup plan policies
and procedures formally documented?
What type of backup does the Data backup plan call for? Full or incremental ?
Where is backup media stored ? For how long ?
Page 20
What phsyical protection mechanism exist for local and remote copies of
backups? What handling instructions are in place ?
Has a disaster recovery plan been developed? If yes, is the disaster recovery plan
documented ?
Has an emergency mode operation plan been tested to determine continual
operations ?If yes, is the emergency mode operations plan and
procedures fully documented?
Does the emergency mode operation plan and disaster recovery plan
address physical access to appropriate personnel ? Is the emergency Mode
operations plan and procedures formally documented ?
Is the disaster recovery plan periodically tested to insure adequacy ? If yes,is the
testing documented ? What types of testing documented ? What types of testing
are accomplished ?
Have critical systems been identified within your organization and documented
within the contigency plan ?
What other types of mechanism are in place to allow for mission for critical hosts or
systems to properly shutdown.
Has internal or external entity performed an assessment on any network
or individual systems within the network to determine if they meet a pre
specified set of security standards ? If yes, has the assessment(s) been documented
?
Does the organization maintain a history of technical evaluations for
computer systems and network(s)
Has an inventory of all electronic data exchanges with third parties, vendors or
business partners taken place ? If yes, has a business associate agreement been
executed ? Is the inventory and agreement documented ?
Are you aware of any trusted internal or external business connections, or
any third party connections or accesses? What are they ?
Have procedures been implemented that provide for facility access and other
business functions during contigency operations ?
Does the organization have a facility security plan ? Is the facility Security plan
formally documented?
Page 21
Has the organization implemented procedures within the facility to sign in
visitors and provide escorts, if appropriate ? Are these formally documented
procedures for visitor escort and sign in ?
What procedures are in place to ensure that maintenance personnel have proper
access and authorization ? Are these procedures documented ?
Does the organization retain facility maintenance records ? Is there formal
documentation for this procedure ?
Does the organization retain facility maintenance records ? Is there formal
documentation for this procedure ?
Does the organization maintain a access authorization records? If so, how long are
these records retained ? Are these authorization documented ?
Does the organization follow procedures for defined acceptable workstation
use ? Are documented procedures which outline proper fucntions ?
Has the organization implemented physical safeguards to eliminate or
minimize unauthorized access/viewing of health information on
workstations ?
Does the organization implement console locking features ?
Does the organization follow procedures for the final disposition of electronic data
(including PHI) and the hardware that it resides on ? Are these procedures
documented ?
Have procedures been developed for removing electronic protected health
information from media before it is scheduled for re-use?
Does the organization follow procedures for taking hardware and software
into or out of a facility ? Are these procedures documented ? Who is
accountable for the movement of media ?
Does the organization follow data storage procedures for electronic retention of
individual health care information ? Are these formally documented policies and
procedures ?
Are unique user id(s) in place/use (network and application) ? If yes, for
which systems and are they governed by writtent security procedures ?
Are they any shared ID's or non-unique ID's in use ?
Page 22
Do all end users of network resources have a unique user ID ?
Is an emergency access procedures documented and followed ?
Are controls in place and configured to allow for automatic logoffs (network
and application ) ?
Are controls in place to ensure that data has not been altered or destroyed
during transmission ?
Is encryption currently in use with any access control solutions that are in place? If
yes how ?
Are access control or encryption technologies used to secure transmission
of sensitive information ? If yes, what and for which systems ?
Are encryption technologies used to secure data at rest ? If yes, for which
systems ?
Are networked systems configured to allow event reporting ? If yes, which
types of systems ?
Are auditing capabilities enabled for file/record accesses modifications or
deletions ? If yes, for which systems and what activites are audited ?
Are software or hardware solutions in place that will provide notifications
of abnormal conditions that may occur networked systems ?
What process exist to determine who will have the authority to change or
manipulate health information ? Is this process documented ?
How is the signature on the document/data verified as trust-worthy? IS online or
offline validation as well as entity or non-entity certificate used ?
Page 23
What policies, procedures, and technical mechanisms are in place to protect
health information as it is transmitted across internal and external networks? Are
these policies, procedures and technical mechanisms documented ?
What technical and administrative processes, and mechanisms are in place to
ensure secure storage of health information ? Are these processes documented ?
Is the message encrypted,or signed ? What practice are in place for the storage
private (secret) keys ?
What crytpographic methods and parameters are used to ensure the integrity of the
message during transmission unaltered?
Are business associate contracts in place between the organization and any
business associate that might common in contact with the organization electronic
protected health information ?
Are both the organization and the business associate a government agency ?
If yes, does a memorandum of understanding exist between the organization and
the business associate that requires the business associate implement reasonable
and appropriate administrative, physical and technical safeguards to protect ephi ?
IS the business associate required by law to perform a function or activity
on behalf of the organization? If yes, describe what steps the organization
completed in order to ensure the business associate complied with the
provisions of the HIPAA security rule
Does the organization have a group health plan ? If yes, do the plan documents
require the plan sponsor reasonably and appropriately safeguard EPHI ?
Does the organization have a group health plan ? If yes, do the plan documents
require the plan sponsor reasonably and appropriately safeguard EPHI?
Does the organization have a process for developing, approving, and publishing
formal security policies ?
Are documented related to EPHI maintained for the time period prescribed
by this rule ?
Is this documentation available to those persons responsible for implementing the
various procedures required by HIPAA rule ?
Page 24
Are the policies and procedures reviewed on a periodic basis to ensure adequacy
and timeliness ?
Page 25
Example
For example, does the organization use a process to determine
cost effective security control measures in a relation to the loss
that would occur if these measures were not in place .
Each organization must accept a certain level of risk and must be able to determine and document that
appropriate level.
These would be a displinary actions for misuse or misaapropriation of health
information (e.g verbal warning, notice disciplinary action placed in personnel
files, removal of system privileges, termination of employment, and contract
penalties).
Organizations will be required to provide and maintain ongoing analysis/reviews of the records of system
activity (logins, file access, security incidents) to help identify security violations. This will include
operating systems, applications and networked systems.
Organization will be required to assign security resposibility to a particular or
individual or group. They will be responsible to ensuring security measures to
protect data and ensure individuals act accordingly in the protection of data.
This is important in providing an organizational focus towards security and
ability to pinpoint responsibility.
Example, Maintenance personnel are directly monitored by escorts near health
information. Operational personnel should also have the appropriate access to
data or systems.
Organization will be required to have formal documented policies and procedures for validating the
access privileges of an entity before granting those privileges.
Despite the nature of access lists, employees must be removed upon termination or modified to reflect
when a job function or role changes.
Termination procedures will be required to be documented are implemented.
These are important to prevent the possibility of unauthorized access to secure data by those who are no
longer authorized to access data (e.g voluntary or
inoluntary exit). Organizations will need to collect keys, tokens, and identification cards.
Documented procedures for changing of combinations and locking mechanism,
on a defined time schedule, and when personnel no longer have a need to
know.
Organization will be responsible for removing user accounts from computer
systems (emails), in a timely manner.
Page 26
Organizations are required to implement policies and procedures to protect
against unauthorized or inadvertent disclosure of electronic protected healthcare information from the
larger organization.
Organization will be required to track the establishment of initial access through documentation efforts.
For example documentation on why individual will require access.
Organization will be required to support a users given access level information.
A user should have access only to the data needed to perform a particular function.
Organization will be required to maintain policies and procedures for identified
access levels of access to a terminal transaction, program, process or X of that user?
Organization will be required to track the modification of an individual access. For
example, procedures for why access for an existing individual may change.
It's purpose is to refresh knowledge of policies and procedures and to keep all
employees alert to the latest types of security threats (occuring incidents or CERT
alerts).
The information Security awareness training should include at a minimum: virus protection, password use
and protection.
Information Security training should address issues that are directly related to the
employee duties (e.g appropriate handling indivdual health information and
unattended workstation procedures)
Employees must understand virus protection efforts, why login are monitored,
and how to effectively manage their passwords.
Virus protection will be required on computer system(s), that can detect virus
programs that attach to other files or program to replicate, a code fragment that
reproduce by attaching itself to another program, or an embedded code that can
copy or insert itself into one or more programs.
Accurate virus protection relies on the update of definition on a timely manner.
Procedures must be implemented to provide methods of monitoring attempts
access to servers containing sensitive informations.
procedures requiring the monitoring of failed lon-in attempts must contain
instructions on reporting discrepancies.
Page 27
Guidelines would be (minimum length, minimum time, maximum time, prevention of re-use, force of
change for default and initial passwords, maximum number of change times). It is a good pratice to run
password crackers and verification tools to ensure that users have selected solid passwords.
This statement should explain appropriate use and selection along with change
management procedures for the password.
Guidelines and restrictions should be placed on the use of administrator, root &
default accounts. Minimal numbers to employees should be allowed access to
these types of acounts, different levels of access should be used, and tracking
should be enforced for the use of these types of accounts.
These procedures will allow employees to effectively report security incidents or
breaches. The organization's will be required to document these procedures, and
the employees should be aware of the policies and procedures and willing to use them
The organization will be required to document reporting review, and response
policies and procedures in relation to security violations and should handle security violations promplty.
Procedures should be developed and implemented that provide guidance on selected type of incident and
how to mitigate them.
Incident reporting should include documenting the results of the incident investigations. These results
should be reviewed and maintained to assist in future investigations.
For example, a formally documented and routinely updated plan to create and maintain, for a specific
period of time, retrievable exact copies of information for the organization.
For example, formally documented and regularly maintained testing and revision
procedures.
Organization must be able to retrieve an exact copy of data while maintaining
accountability and access control integrity.
Incremental and fullbackup should be specified within the databackup plan, each
serves a different purpose and these time frames should be planned appropriately.
Backup tapes should be stored offsite or in a safe. (e.g Medium types may be tape
, cd, diskettes).
Page 28
Data backup should not be left in an insecure environment as it contains sensitive
network and system data.
Most specifically, the Disaster recovery plan should address IT and information
security breaches and allow for the restoration of data loss to the entity in the event of fire, vandalism,
natrual disaster or system failure ?
For example, formally documented plans and processes to enable the continuing
operation of the organization in the short term (48 hours or less). This may be result of fire, vandilism,
minor natural disaster or system failure).
For example, formally documented plans and processes to enable the continuing
operation of the organization in the short term (48 hours or less).
Regularly maintained, formally documented plans and processes to enable the
continuing operation of the organization in the short term (48 hours or less)
Crtical systems include those systems that provide services that if lost could result in significant backlog
and monetary loss.
A proper shutdown will allow current sessions, applications and transcations to close before the system
powers off.
Such as a technical member of your internal audit team or IT team responsible for
evaluation, and testing . Technical evaluations include vendor certification or
applications prior to go-live. External entities include any accrediting agency
completing annual external penetrations, and/or infrastrcuture integrity testing
to ensure they meet industry best practices for information security.
The information maintained should support certification of the computer systems
or network designs as having implemented appropriate security.
If the data is processed through a third party, the parties must enter into a Business associate agreement.
This contract states the agreement to exchange data electronically and assurance of data transmission
integrity and storage. Third parties are vendors, business partners, or internal entities that have access to
your computer systems and infrastrucuture. These third parties will require business associate
agreements. For example, a provider may contract with a clearinghouse to transmit claims.
Third parties are vendors, business partners, or internal entities that have access to your computer
systems and infrastrucuture. These third parties types of accesses are considered less-trusted and will
require a business associate agreement.
These procedures would assist the organization in recovering the business functions after a crisis. This is
completely separate from recovering the data and involves planning for office space, communications,
equipment needs etc.
Facility Security is a group of plans that encompass all aspects of the identified
facility (e.g Cameras, perimeter protection)
Page 29
Organization will be required to have formally documented procedures governing
the reception and hosting of visitors. For example: vendors, maintenance personnel.
The organization will be required to maintain ongoing documentation for granting
access to individuals working on near health information.
Organization will be required to have documentation of repairs and modification to
the physical components of a facility (e.g walls, doors, lights and rocks).
Organization will be required to have documentation of repairs and modification to hardware /software
and computer systems. Note: a helpdesk tracking system
may be used to record maintenance records.
The organization will be required to retain ongoing documentation of levels of access granted to user,
program, procedures, assessing health information.
Each organization will be required to have guidelines delineating the proper function to be performed,
and the manner in which the functions are performed.
Each organization will be required to put in place physical safeguards for workstations that will prevent
public areas from accidentally dispensing patient identifiable health information from workstation. For
example, privacy screens, monitor postions,cubicle walls or locked rooms.
Different systems will allow for the use of different types of mechanism to be used to lock workstations.
(e.g Monitor, NLM,Screen savers with passwords)
Organization will be required to document policies and procedures for the disposition`of electronic data
and the hardware on which it resides. (e.g wiping hard drives, or other method of destruction.
These procedures would inlude some form of sanitization process for the media
and a form of written verification tha the media has been cleansed prior to re-use.
Organization will be required to govern the receipt, movement, and removal of hardware /software and
in and out of the facility. This includes the marking, handling, and disposal of hardware and storage
media. This will impact your offsite backup procedures.
Organizations will be required to document electronic data retention policies and
procedures. This is to include length of time, storage, receipt and format.
Unique user ids are a combination name/number assigned to identify and track
individuals.
High profile shared accounts could be a lan admin ID or business unit that is highly
impacted by login/logout inefficiencies (nurses)
Page 30
Organization will be required to irrefutably identify authorized users and processes, and to deny access to
those unauthorized. An example best praticse woule be "no group User ID's are permitted. Entity
authentication can be done through name and password through the network or application and by IP
address, service or protocol at the firewall)
Emergency Access can include access to a system or appplication immediately for
a user without current access (normal changes bypassed). Also, short system outages requiring manual
procedures.
Application will be required to provide automatic user logoff
Organization will be required to provide corroboration that data in its possession
has not been altered or destroyed in an unauthorized manner. For example:
Check Sums, double keying, message authentication code, digital signature applied to files or data.
Encryption is optional within the proposed regulations for section 142.308 c in relation to access control
methods. Encryption with access control example are VPNs, SSL
SSh.
For example PKI, IPSEC, VPN, SMARTcard or SSL.
For example, database content, file contents, directory contents containing
sensitive data.
Different types of systems will allow for different types of logging to take place
(e.g syslog server, application event logs (IIS, exchange), specific service use (ftp, http), specific activities,
NT event logging, Firewall events or intrusion detection.
Audit will be required to record and examine system activity such as who has read,accessed, or changed a
file (e.g system actives could be audited for applications,operating systems or network devices.
Any software of hardware device that can sense an abnormal condition within the
system and provide a signal. The signal can be a contact, auto showdown or restart.For example intrusion
detection system, firewalls, NT event logging)
Changes to health information should be audited to ensure proper use and accesses
Online validation of offline validation. Online validation allow the user to ask the CA directly about a
certificates validity everytime is used. Offline validation gives a validity period a pair of dates defining the
valid range of the certificate. Entity certificates are known as identity certificates (charateristics), and non-
entity
certificates are known as credential certificates
Page 31
Policies and procedures would ensure that security of health information as it is
transmitted from start, middle, to end point.
Storage of health information should be secure, and follow appropriate retention
guidelines.
Encrypted message is encrypted by the symmetric key and the public key encrypts
the symmetric key. Signed message is hashed and encrypted with the senders
private key. Signed and encrypted is signed by the senders private key, and the message is encrypted with
the senders public key.
For example, please describe the parameters used for signing a message (e.g hash algorithm(md5 or SHA1
and encrypting the message (DES, Diffie hellman, RSA, or elliptic curve)
These contracts should stipulate the business associate implement reasonable and
appropriate safeguards to protect this sensitive information.
The memorandum of understanding should detail the measures the business assocaite
has in place to provide reasonable and appropriate security protection for EPHI.
When the business associate is required by law to perform certain activities, the organization needs to
document its attempts to ensure the business associate has reasonable an appropriate security measures
to protect the organizations EPHI.
The plan documents must require the plan to sponsor to implement administrative,
physical and technical safeguards to protect EPHI.
The plan document must require the plan sponsor to implement administrative, physical and technical
safeguards to protect EPHI.
A formal Security policy process ensures the right people in the organization assist in the
development, approval, and dissemination of the organization's Security policies
The final HIPAA Security rule calls for documentation related to EPHI to be maintained to a period of six
years from the date of its creation or last was it used, whichever is later .
Either written and electronic forms of all documentation should be available to those persons
responsible for implementing the procedures described in the HIPAA security rule.
Page 32
All policies and procedures should undergo a periodic review to ensure the organization remain
in its security posture in order to protect EPHI.