HIPAA Security Implementation, Version 1.0

4.8 ACCESS CONTROLS

4.8.1 Summary

Access control is a means of limiting what people can see and what they can modify. In other words limit the number of people who can see the data to those who have a need to see it in order to do their jobs and ensure that the modification of data is limited to only those who are authorized to make modifications.

As discussed in its comment and response section, the final Privacy Rule states that role based access control is required.

Under the final security rule CEs are required to 'implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software who have been authorized to do so'

Specialized security technology and controls will usually be necessary to enforce these policies and procedures.

4.8.2 Detailed Requirements

The Privacy Rule requires that Role Based Access Controls (RBAC) be implemented. This means that CEs must create policies and procedures to identify (a) the types of roles i.e. doctor, nurse, billing clerk etc. which need access to PHI and (b) then identify what specific PHI that each of these roles require access to. Associated with this requirement is the need to audit for compliance and logging and review of access to PHI data.

The security rule goes into Access Control in much greater depth and specificity. Access Control is covered under Technical Controls, Authentication, Encryption, Physical Access controls etc.

4.8.3 Under 'Technical Controls' Access Controls focus on:

4.8.4 Under Facility Access Control a CE must:

Категории