HIPAA Security Implementation, Version 1.0

3.1 THE SAFEGUARDS

This chapter is a brief introduction to the HIPAA Security Standards, each of which will be dealt with in great detail in the following chapters. The HIPAA Security Standards mandate 'Safeguards' be taken by cover entities in Administrative, Physical and Technical areas. A grid for each of these Safeguards is show at the end of this chapter.

HIPAA Administrative Safeguards make up 50% of the Security Rule. Most of these Safeguards require documented policies and procedures for daily operations, policies and procedures for managing the conduct of employees with Electronic Protected Health information (EPHI), and policies and procedures for managing the selection, development and use of 'security controls'.

HIPAA Physical Safeguards standards set forth the categories of policies and procedures that a covered entity (CE) must implement concerning the control of physical access to EPHI stored on hardware and electronic media.

HIPAA Technical Safeguards made up of several Security measures, they specify how to use technology to protect EPHI, and specify how to use technology to control access to EPHI

3.1.1 'Standards' vs. 'Implementation Specifications'

There are several key terms that must be understood when reviewing and applying the HIPAA Security rule. The first two of these terms are 'Standards' and 'Implementation Specifications'.

Standards explain what a Covered Entity must do . Implementation Specifications explain how to do it.

The HIPAA Security Rule requirements include 18 Standards; Administration Safeguards has 9 standards; Physical Safeguards has 4 standards; Technical Safeguards has 5 standards.

Of these 18 Security Standards; 12 of the standards have implementation specifications; 6 standards have no implementation specifications.

There are a total of 36 Implementation Specifications for these 12 standards; 14 Specifications are 'Required' and 22 Specifications are 'Addressable'.

3.1.2 'Addressable' vs. 'Required'

Here are two more key terms that must be understood when reviewing and applying the HIPAA Security rule: 'Addressable' and 'Required'.

Obviously, 'Required' mean the covered entity must comply with this standard.

However, 'Addressable' implementations can be met by alternative means, or an entity can decide the standard can be met without the implementation of an alternative, but it must be documented .

Some notable implementations that were made addressable in the final Security Rule: Automatic Logoff; Encryption of data at rest; Encryption of e-mail.

3.1.3 Addressable Options

The HIPAA Security rule required covered entities to do one of three things regarding any addressable standard:

3.1.4 Documentation Standards

The HIPAA Security rule mandates that covered entities maintain all documentation and policies and procedures required by the Security Rule for 6 years from the date of creation or last day in effect. This documentation must also be made available to the persons responsible for implementing related procedures.

Covered entities must also periodically review documentation to revise and update it as needed to ensure confidentiality , integrity and availability of EPHI (Bedrock Principles of Information Security).

3.1.5 Other 'Highlights' from the Security Rule

Категории