Ask
Search
Ask Question
Login
×
×
Welcome back.
and 4 others joined a min ago.
Continue with Google
Continue with email
0
2.2k
views
HIPAA - Key IT Requirements
written
5.3 years ago
by
teamques10
★
68k
need-tagging
ADD COMMENT
FOLLOW
SHARE
EDIT
1 Answer
0
356
views
written
5.3 years ago
by
teamques10
★
68k
Conduct an initial risk assessment, periodic reviews and reassessments.
Written security policy.
Designated security person.
Written incident handling policy.
Backup, Emergency Operations, and Disaster Recovery plan.
Reuse and disposal plan for reusable media.
Audit controls are required, including unique user identifiers.
Termination Policy and Procedures
Implement user level processes of least privilege.
Log/audit login and logoffs
Secure and authenticate before physical access to the facility and sensitive areas is granted.
Written usage policies by system type (laptop, desktop, server...)
Physical removal tracking and policy of all systems and data (including removable media).
Create an "exact copy" backup prior to being moving data or systems.
Logout/disconnect inactive sessions
Audit access to secure data
Encrypt sensitive data (addressable)
Monitor and audit access and alterations to sensitive data
Protect data in transmission
ADD COMMENT
SHARE
EDIT
Please
log in
to add an answer.
Community
Users
Levels
Badges
Content
All posts
Tags
Dashboard
Company
About
Team
Privacy
Submit question paper solutions and earn money