HIPAA Lesson 9 Flashcards
List the Security Rule three types of safeguards:
Administrative, physical, and technical.
Administrative actions, policies, and procedures to manage a covered entity’s security choices and the conduct of its workforce in relation to electronic protected health information.
Administrative Safeguards
List the nine administrative safeguard standards of the Security Rule:
- Security management process
- Assigned security responsibility
- Workforce security
- Information access management
- Security awareness and training
- Security incident procedures
- Contingency plan
- Evaluation
- Business associate contracts and other arrangements
Implement policies and procedures to prevent, detect, contain, and correct security violations.
Security management process
Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity.
Risk analysis
Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with the Security Rule.
Risk management
Apply appropriate penalties against workforce members who fail to comply with the entity’s security policies and procedures.
Sanction policy
Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.
Information system activity review
Identify the security official who is responsible for the development and implementation of the policies and procedures required by this Rule for the entity.
Assigned security responsibility
Implement policies and procedures to ensure that all members of [the] workforce have appropriate access to electronic protected health information, as provided under the Information Access Management standard, and to prevent those workforce members who do not have access from obtaining access.
Workforce security
Implement procedures for the authorization and/or supervision of workforce members who work with electronic protected health information or in locations where it might be accessed.
Authorization and/or supervision
Implement procedures to determine that the access of a workforce member to electronic protected health information is appropriate.
Workforce clearance procedure
Implement procedures for terminating access to electronic protected health information when the employment of a workforce member ends or as required by determinations made as specified in the Workforce Clearance Procedure of this Rule.
Termination procedures
Implement policies and procedures for authorizing access to electronic protected health information that are consistent with the applicable requirements of subpart E of this part [the Privacy Rule].
Information access management
If a healthcare clearinghouse is part of a larger organization, the clearinghouse operation must implement policies and procedures that protect the EPHI of the clearinghouse from unauthorized access by the larger organization.
Isolating healthcare clearinghouse function
Implement policies and procedures for granting access to electronic protected health information—for example, through access to a workstation, transaction, program, process, or other mechanism.
Access authorization
Implement policies and procedures that, based upon the entity’s access authorization policies, establish, document, review, and modify a user’s right of access to a workstation, transaction, program, or process.
Access establishment and modification
Implement a security awareness and training program for all members of [the] workforce (including management).
Security awareness and training