Security Program and Policies: by Sari Stern Greene
Security Program and Policies: by Sari Stern Greene
Security Program and Policies: by Sari Stern Greene
Policies
Principles and Practices
Administrative Safeguards:
The documented policies and procedures for
Managing operations
Conduct and access of workforce to ePHI
Selection, development, and use of security controls
Physical Safeguards:
Requirements for protecting ePHI from unauthorized physical
access
Organizational Requirements:
Includes standards for business associate contracts and
and ePHI.
Implement procedures for authorization and supervision of
workforce members
Establish a workforce clearance procedure for hiring and
assigning tasks
Establish termination procedures
that CEs have formal policies and procedures for granting access to
ePHI.
Isolate healthcare clearinghouse functions – addressable function
software (malware)
Provide training on login monitoring
procedures
Provide training on password management
analysis
Establish and implement a data backup plan
required
addressable
particularly laptops
Workstation Security:
Covers restricting workstation access to
authorized users
electronic media
Develop data backup and storage procedures
Access Control:
Require unique user identification
Integrity Controls:
To protect ePHI from improper alteration or
destruction
Includes antivirus and antispyware, firewalls,
and e-mail scanning
Transmission Security:
Implement integrity controls
Implement encryption
contract.
Contracts must meet specific requirements to ensure the
are met
Actual activities of the covered entity are
reflected
A CE may change its policies and procedures
personnel
Update documentation as necessary to reflect