• Home
  • Blog
  • Contact
HIPAA ComplianceHIPAA Compliance
HIPAA ComplianceHIPAA Compliance
  • Home
  • Blog
  • Contact

Security Management Process: Information System Activity Review-What to Do and How to Do It

February 23, 2009 HIPAA Law No Comments

In our series on the HIPAA Administrative Simplification Security Rule, this is the fourth implementation specification for the Administrative Safeguard Standard (Security Management Process). This implementation specification is required.

What to Do

Implement procedures to regularly review records of information of system activity, such as audit logs, access reports, and security incident tracking reports.

How to Do It

Size of the covered entity and complexity of the business operation will be key considerations in the risk analysis and in fulfilling the requirements of this implementation specification.

First, regularly review information system activity for inappropriate use or security incidents, such as unauthorized disclosure. Many computer systems now have built-in reporting functionality that will facilitate the review requirement. If the covered entity has a business associate vendor that provides a practice management system software solution, the covered entity should ask the vendor for help in utilizing automatic reporting functionality, establishing audit logs and access reports, and identifying and tracking security violations. As part of the risk analysis, and in preparing security policies and procedures, the covered entity should identify information and reporting requirements for:

» Creating audit log entries.
» Safeguarding all written documentation, including policies and procedures.
» Establishing safe storage requirements for maintaining written documentation and for backup of electronic documentation for at least six years.

The requirement to report, review, and document is the same for all covered entities, irrespective of size or business complexity.

Tags: auditingbusiness associate vendorHIPAA Administrative Simplification Security Ruleimplementation specificationinformation system activitypolicies and proceduressecurity incident trackingsecurity violations
No Comments
Share
0

You also might be interested in

OCR Penalizes Physician Practice for HIPAA Privacy and Security Rule Violations

Apr 18, 2012

April 18, 2012.  Late last week, the Office for Civil[...]

CMS Issues Final Administrative Simplification Final Rules Regarding Identifiers and ICD-10 Code Set Compliance Delay

Aug 24, 2012

August 24, 2012.  Today, the Office of Management and Budget[...]

Contingency Plan: Emergency Mode Operation Plan-What to Do and How to Do It

Apr 7, 2009

In our series on the HIPAA Administrative Simplification Security Rule,[...]

Leave a Reply Cancel Reply

Categories

  • 5010
  • American Recovery and Reinvestment Act
  • Enforcement
  • GINA
  • Health Care Reform
  • Health IT and HITECH
  • HIPAA Law
  • Identifiers
  • Meaningful Use
  • Privacy
  • Red Flags Rules
  • Security
  • Transactions & Code Sets
  • Uncategorized

Recent Posts

  • Contracting with Vendors that are NOT HIPAA Business Associates: Best Practices
  • HIPAA Breach: Who You Gonna Call?
  • Can I Be Sued for a HIPAA Violation?
  • Business Associate Agreements – a First Look at Indemnification
  • Gmail, Google Apps for Business HIPAA Business Associate Agreements

Archives

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
HIPAA- Health Insurance Portability Accountability Act

© 2023 · hipaa.com

Prev Next