HIPAA Security Checklist

Similar documents
HIPAA Security Checklist

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.

HIPAA Security Rule Policy Map

Policy and Procedure: SDM Guidance for HIPAA Business Associates

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

HIPAA Security and Privacy Policies & Procedures

EXHIBIT A. - HIPAA Security Assessment Template -

HIPAA Privacy and Security. Kate Wakefield, CISSP/MLS/MPA Information Security Analyst

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c.

HIPAA Compliance Checklist

HIPAA COMPLIANCE FOR VOYANCE

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

HIPAA Federal Security Rule H I P A A

How Managed File Transfer Addresses HIPAA Requirements for ephi

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

HIPAA Technical Safeguards and (a)(7)(ii) Administrative Safeguards

Healthcare Privacy and Security:

Summary Analysis: The Final HIPAA Security Rule

HIPAA FINAL SECURITY RULE 2004 WIGGIN AND DANA LLP

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

Meaningful Use & Security Protecting Electronic Health Information in Accordance with the HIPAA Security Rule

Support for the HIPAA Security Rule

HIPAA Controls. Powered by Auditor Mapping.

Integrating HIPAA into Your Managed Care Compliance Program

University of Wisconsin-Madison Policy and Procedure

HIPAA Regulatory Compliance

A Security Risk Analysis is More Than Meaningful Use

Reference Architecture Assessment Report Cisco Healthcare Solution

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

HIPAA Security Compliance for Konica Minolta bizhub MFPs

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

The simplified guide to. HIPAA compliance

Guide: HIPAA. GoToMeeting and HIPAA Compliance. Privacy, productivity and remote support. gotomeeting.com

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

Checklist: Credit Union Information Security and Privacy Policies

SECURITY & PRIVACY DOCUMENTATION

HIPAA Compliance and OBS Online Backup

HIPAA Requirements. and Netwrix Auditor Mapping. Toll-free:

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016

HIPAA Cloud Computing Guidance

HIPAA Security Manual

HIPAA RISK ADVISOR SAMPLE REPORT

HIPAA For Assisted Living WALA iii

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Information Security Policy

ISO based Written Information Security Program (WISP) (a)(1)(i) & (a)(3)(i) & (ii) & (A) (A)(5)(ii) & (ii)(a)

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Employee Security Awareness Training Program

What s New with HIPAA? Policy and Enforcement Update

Vendor Security Questionnaire

Red Flags/Identity Theft Prevention Policy: Purpose

Recommendations for Implementing an Information Security Framework for Life Science Organizations

How to Respond to a HIPAA Breach. Tuesday, Oct. 25, 2016

HIPAA COMPLIANCE AND

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

HIPAA Privacy, Security Lessons from 2016 and What's Next in 2017

Data Backup and Contingency Planning Procedure

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

efolder White Paper: HIPAA Compliance

The ABCs of HIPAA Security

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

HIPAA & Privacy Compliance Update

NMHC HIPAA Security Training Version

Virginia Commonwealth University School of Medicine Information Security Standard

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

HIPAA Privacy, Security and Breach Notification 2018

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

HIPAA Privacy, Security and Breach Notification

Annex 1 to NIST Special Publication Recommended Security Controls for Federal Information Systems

Putting It All Together:

University of Pittsburgh Security Assessment Questionnaire (v1.7)

201 CMR COMPLIANCE CHECKLIST Yes No Reason If No Description

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

HIPAA Compliance. with O365 Manager Plus.

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston

HIPAA Security Rule s Technical Safeguards - Compliance

Table of Contents. PCI Information Security Policy

HIPAA Privacy, Security and Breach Notification 2017

3/24/2014. Agenda & Objectives. HIPAA Security Rule. Compliance Institute. Background and Regulatory Overlay. OCR Statistics/

The Common Controls Framework BY ADOBE

Information Technology Update

Security and Privacy Breach Notification

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

Data Processing Agreement

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

01.0 Policy Responsibilities and Oversight

Access to University Data Policy

Transcription:

HIPAA Security Checklist The following checklist summarizes the HIPAA Security Rule requirements that should be implemented by both covered entities and business associates. The citations are to 45 CFR 164.300 et seq. For additional resources regarding the Security Rule requirements and compliance guidance, see the Office for Civil Rights website. As with all government regulations and policies, the HIPAA Security Rule is subject to periodic amendment. Users should review the current rule requirements on a regular basis to ensure continued compliance. Disclaimer: Performing the following checklist does not guarantee that your organization is compliant with the HIPAA Audit protocol or OCR regulations. As a best practice, seek assistance from a certified HIPAA Auditor when completing a Security Risk Analysis. HIPAA Security Rule Reference 164.308(a)(1)(i) 164.308(a)(1)(ii)(A) 164.308(a)(1)(ii)(B) 164.308(a)(1)(ii)(C) 164.308(a)(1)(ii)(D) 164.308(a)(2) 164.308(a)(3)(i) Safeguard (R) = Required, (A) = Addressable Administrative Safeguards Security management process: Implement policies and procedures to prevent, detect, contain, and correct security violations. (R) Has a risk analysis been completed using IAW NIST Guidelines? (R) Has the risk management process been completed using IAW NIST Guidelines? (R) Do you have formal sanctions against employees who fail to comply with security policies and procedures? (R) Have you implemented procedures to regularly review records of IS activity such as audit logs, access reports, and security incident tracking? (R) Assigned security responsibility: Identify the security official who is responsible for the development and implementation of the policies and procedures required by this subpart for the entity. (R) Workforce security: Implement policies and procedures to ensure that all members of workforce have appropriate access to Status (Complete, N/A)

electronic protected health information (ephi), as provided under paragraph (a)(4) of this section, and to prevent those workforce members who do not have access under paragraph (a)(4) of this section from obtaining access to ephi. (R) 164.308(a)(3)(ii)(A) 164.308(a)(3)(ii)(B) 164.308(a)(3)(ii)(C) 164.308(a)(4)(i) 164.308(a)(4)(ii)(A) 164.308(a)(4)(ii)(B) 164.308(a)(4)(ii)(C) 164.308(a)(5)(i) Have you implemented procedures for the authorization and/or supervision of employees who work with ephi or in locations where it might be accessed? (A) Have you implemented procedures to determine the access of an employee to ephi is appropriate? (A) Have you implemented procedures for terminating access to ephi when an employee leaves your organization or as required by paragraph (a)(3)(ii)(b) of this section? (A) Information access management: Implement policies and procedures for authorizing access to ephi that are consistent with the applicable requirements of subpart E of this part. (R) If you are a clearinghouse that is part of a larger organization, have you implemented policies and procedures to protect ephi from the larger organization? (A) procedures for granting access to ephi, for example, through access to a workstation, transaction, program, or process? (A) procedures that are based upon your access authorization policies, established, document, review, and modify a user's right of access to a workstation, transaction, program, or process? (A) Security awareness and training: Implement a security awareness and training program for all members of the workforce (including

management). (A) 164.308(a)(5)(ii)(A) 164.308(a)(5)(ii)(B) 164.308(a)(5)(ii(C) 164.308(a)(5)(ii)(D) 164.308(a)(6)(i) 164.308(a)(6)(ii) 164.308(a)(7)(i) 164.308(a)(7)(ii)(A) 164.308(a)(7)(ii)(B) 164.308(a)(7)(ii)(C) 164.308(a)(7)(ii)(D) Do you provide periodic information security reminders? (A) Do you have policies and procedures for guarding against, detecting, and reporting malicious software? (A) Do you have procedures for monitoring login attempts and reporting discrepancies? (A) Do you have procedures for creating, changing, and safeguarding passwords? (A) Security incident procedures: Implement policies and procedures to address security incidents. (A) Do you have procedures to identify and respond to suspected or known security incidents; to mitigate them to the extent practicable, measure harmful effects of known security incidents; and document incidents and their outcomes? (R) Contingency plan: Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, or natural disaster) that may damage systems which contain ephi. (A) Have you established and implemented procedures to create and maintain retrievable exact copies of ephi? (R) Have you established (and implemented as needed) procedures to restore any loss of ephi data stored electronically? (R) Have you established (and implemented as needed) procedures to enable continuation of critical business processes and for protection of ephi while operating in the emergency mode? (R) Have you implemented procedures for

periodic testing and revision of contingency plans? (A) 164.308(a)(7)(ii)(E) 164.308(a)(8) 164.308(b)(1) 164.308(b)(4) 164.314(a)(2)(i)(A)- (C) 164.314(a)(2)(ii)-(iii) 164.316(b)(2)(i) Have you assessed the relative criticality of specific applications and data in support of other contingency plan components? (A) Have you established a plan for periodic technical and nontechnical evaluation, based initially upon the standards implemented under this rule and subsequently, in response to environmental or operational changes affecting the security of ephi, that establishes the extent to which an entity's security policies and procedures meet the requirements of this subpart? (R) Business associate contracts and other arrangements: A covered entity, in accordance with Sec. 164.306, may permit a business associate to create, receive, maintain, or transmit ephi on the covered entity's behalf only if the covered entity obtains satisfactory assurances, in accordance with Sec. 164.314(a) that the business associate appropriately safeguards the information. (R) Have you established written contracts or other arrangements with your trading partners that document satisfactory assurances required by paragraph (b)(1) of this section that meets the applicable requirements of Sec. 164.314(a)? (R) Does your Business Associate Agreement contain the required components for your vendors to take responsibility for protecting your ephi, including the obligation to likewise obligate their sub-contractors to notify you immediately if they have a breach and to take responsibility? (R) Does the organization retain its risk assessment or compliance audit related documentation for at least 6 years from

creation? (R) 164.316(b)(2)(ii) 164.316(b)(2)(iii) 164.310(a)(1) 164.310(a)(2)(i) 164.310(a)(2)(ii) 164.310(a)(2)(iii) 164.310(a)(2)(iv) 164.310(b) Are the HIPAA related Policies and Procedures available to those persons responsible for implementing these procedures? (R) Is the documentation periodically reviewed, updated as needed in response to changes in the security of ephi? (R) Physical Safeguards Facility access controls: Implement policies and procedures to limit physical access to electronic information systems and the facility or facilities in which they are housed, while ensuring properly authorized access is allowed. (A) Have you established (and implemented as needed) procedures that allow facility access in support of restoration of lost data under the disaster recovery plan and emergency mode operations plan? (A) procedures to safeguard the facility and the equipment therein from unauthorized physical access, tampering, and theft? (A) Have you implemented procedures to control and validate a person s access to facilities based on his/her role or function, including visitor control, and control of access to software programs for testing and revision? (A) procedures to document repairs and modifications to the physical components of a facility that are related to security (for example, hardware, walls, doors, and locks)? (A) 164.310(b) procedures that specify the proper functions to be performed, the manner in which those

functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access ephi? (R) 164.310(c) 164.310(d)(1) 164.310(d)(2)(i) 164.310(d)(2)(ii) 164.310(d)(2)(iii) 164.310(d)(2)(iv) Have you implemented physical safeguards for all workstations that access ephi to restrict access to authorized users? (R) Device and media controls: Implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain ephi into and out of a facility, and the movement of these items within the facility. (R) procedures to address final disposition of ephi, and/or hardware or electronic media on which it is stored? (R) Have you implemented procedures for removal of ephi from electronic media before the media are available for reuse? (R) Do you maintain a record of the movements of hardware and electronic media and the person responsible for its movement? (A) Do you create a retrievable, exact copy of ephi, when needed, before moving equipment? (A) Technical Safeguards 164. 312(a)(1) Access controls: Implement technical policies and procedures for electronic information systems that maintain ephi to allow access only to those persons or software programs that have been granted access rights as specified in Sec. 164.308(a)(4). (A)

164.312(a)(2)(i) 164.312(a)(2)(ii) 164.312(a)(2)(iii) 164.312(a)(2)(iv 164.312(b) 164.312(c)(1) 164.312(c)(2) 164.312(d) 164.312(e)(1) 164.312(e)(2)(i) 164.312(e)(2)(ii) Have you assigned a unique name and/or number for identifying and tracking user identity? (R) Have you established (and implemented as needed) procedures for obtaining necessary ephi during an emergency? (R) Have you implemented procedures that terminate an electronic session after a predetermined time of inactivity? (A) Have you implemented a mechanism to encrypt and decrypt ephi? (A) Have you implemented audit controls, hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ephi? (R) Integrity: Implement policies and procedures to protect ephi from improper alteration or destruction. (R) Have you implemented electronic mechanisms to corroborate that ephi has not been altered or destroyed in an unauthorized manner? (A) Have you implemented person or entity authentication procedures to verify a person or entity seeking access ephi is the one claimed? (R) Transmission security: Implement technical security measures to guard against unauthorized access to ephi being transmitted over an electronic communications network. (A) Have you implemented security measures to ensure electronically transmitted ephi is not improperly modified without detection until disposed of? (A) Have you implemented a mechanism to encrypt ephi whenever deemed

appropriate? (A) 164.312(a)(2)(iv) 164.314(b)(1) 164.316(a)(b)(1) procedures to address strong encryption enabled for any data at rest? (A) Does the group health plan have policies and procedures in place to ensure that its plan documents provide that the plan sponsor will reasonably and appropriately safeguard ephi created, received, maintained or transmitted to or by the plan sponsor on behalf of the group health plan? (R) Does the entity have policies and procedures to maintain written policies and procedures related to the security rule and written documents of (if any) actions, activities, or assessments required of the security rule? (R) Let s Connect! For additional questions, please contact us! Email: info@hipaaone.com Phone: (801) 770-1199 Web: www.hipaaone.com/contact-us Follow Us: @moderncompliance HIPAA One @HIPAAOne