HIPAA Security Rule Flashcards
2 purposes of the Security Rule
- implement appropriate security safeguards to protect ePHI
- Protect an indv health info
What does the Security Rule protect?
electronic PHI
Difference between Privacy and Security Rules
Privacy: protects PHI regardless of medium
Security: ePHI
Which office enforces the security rule?
Office for Civil Rights of HHS
What does it mean to “protect” the data?
CEs must ensure integrity and confidentiality
What is integrity?
Lack of alteration of destruction in an unauthorized manner
What is a key characteristic of the Security Rule?
It must be flexible
(NOTE: small orgs cannot implement the same as large orgs).
Security Rule: Required (R) implementation
Must be implemented as laid out
Security Rule: Addressable (A) implementation
Must be implemented as laid out OR in an alternate manner OR documented if not needed
Can addressable implementation specifications be ignored?
No
5 components of HIPAA Security Rule
A. General Requirements
B. Flexibility of Approach
C. Standards
D. Implementation Specifications
E. Maintenance
HIPAA Security Rule: A- General Requirements (4)
- ensure confidentiality and integrity
- protect ePHI from threats
- protect against reasonably anticipated ePHI uses/disclosures
- ensure workforce compliance
HIPAA Security Rule: B- Flexibility of Approach (4)
- CE size and complexity
- security capabilities
- cost of security measures
- risk management
HIPAA Security Rule: C- Standards Safeguards (5)
- Administrative
- Physical
- Technical
- Org Requirements
- Policies, Procedures and Documentation
Admin Safeguards (Security management process)
Implement procedures to prevent, detect, contain, and correct security violations
Ex:
- Risk analysis (R)
- Risk management (R)
- Sanction policy (R)
- Info system activity review (R)
Admin Safeguards (Security management process) - Sanction Policy
(R) Apply sanctions for non-compliance
Admin Safeguards (Security management process) - Info System Activity Review
(R) regular procedures to review system activity
Admin Safeguards (Assigned Security Responsibility)
(R) identifying security official to develop and implement security policies
Admin Safeguards (Workforce Security)
Policies to ensure appropriate access to ePHI
Ex:
- Authorization/Supervision (A)
- Clearance procedures (A)
- Termination procedures (A)
Administrative Safeguards: Info Access Management
Procedures authorizing access to ePHI
ex:
- Isolate clearinghouse functions (R)
- access authorization (A)
- access establishments & modifications (A)
Administrative Safeguards: Security Awareness Training
Implementing a security and awareness training program for workforce members
Ex:
- security reminders (A)
- login monitoring (A)
- Password management (A)
Administrative Safeguards: Security Incident Reporting
policies to address security incidents
Ex:
- Response & reporting (R)