HIPAA Security Implementation, Version 1.0

15.3 SECURITY ORGANIZATION

Another item of critical importance with respect to maintaining compliance and managing risk in the organization is to have a solid information security management infrastructure that reports up to the highest levels of the organization. HIPAA has a requirement for covered entities to have a security officer, but, depending upon the size and complexity of the organization, a formal security organization should exist with clear leadership and visibility at the highest levels of the organization.

Security matters often enter territories that extend beyond the traditional IT boundaries of an organization, so an effective security officer is one that has enough authority in the organization to make security-relevant decisions and enforce the security policy. This is not to say that the relationship with other elements of the organization should be an adversarial one. Quite to the contrary, this relationship should be one of partnership. Security management should work with all the elements of the organization to understand the business goals of each unit so that security can be incorporated in such a way as to not present roadblocks to progress and productivity. This is accomplished by having representation from all the organization's business units in the security management infrastructure.

15.3.1 Information Security Management Roles and Responsibilities

The information security management team has a very important role to play with respect to maintaining HIPAA compliance. This team should meet regularly to discuss security related issues, receive feedback regarding the performance of the overall security program, review and approve of security policy and make security relevant decisions. Such a body should also be composed of representatives from all the business units of the organization. These representatives will be able to make policy decisions that consider the business interests of their respective units, thus enabling a security solution for the whole organization that is both considerate of its business goals and well integrated into its operations. A broadly represented security organization will also engender a broad base of support throughout the entire organization.

Other things the security management team needs to consider are as follows :

Lastly, the organization should review and settle upon a standard set of security related roles and responsibilities for everyone in the organization. Having a standard set of roles and responsibilities defined can aid in the delegation of security responsibilities and in determining who gains access to information based on their specific role. One example of how this may be applied would be to identify all of the information assets in the organization and assigning the role of asset owner to individuals such that these owners become responsible for the security of these assets. Asset owners with a vested interest in the assets they are assigned to protect can participate in the process securing their assets. For example, the owner of an information asset may decide who gets what degree of access to the asset, or the information asset owner may aid in the creation of secure practices and procedures for handling the asset. The following list outlines some typical roles:

Категории