11.07.2015 Views

Medical Records and the Law

Medical Records and the Law

Medical Records and the Law

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HIPAA Security Rule 465to ePHI must be made aware of a covered entity’s security policies, buta covered entity is not required to provide training to business associatesor anyone else who is not a member of its workforce. Covered entities<strong>the</strong>refore may, but are not required to, train vendors, independent contractors,temporary personnel, <strong>and</strong> consultants. Given this requirement,a covered entity should consider what information it will give <strong>the</strong>se individuals<strong>and</strong> what documentation of receipt, if any, it will require.Security IncidentsA “security incident” is “<strong>the</strong> attempted or successful unauthorized access,use, disclosure, modification, or destruction of information, or interferencewith system operations in an information system.” 90 The rulerequires a covered entity to establish policies <strong>and</strong> procedures for respondingto <strong>and</strong> reducing <strong>the</strong> harmful effects, if any, of a security incident.91 A covered entity’s risk assessment <strong>and</strong> security managementprograms should identify security incidents, document <strong>the</strong>ir occurrence<strong>and</strong> <strong>the</strong>ir outcomes, <strong>and</strong> provide direction for managing <strong>the</strong>m. 92 TheSecurity Rule permits, but does not require, covered entities to reportsecurity incidents to outside parties. Such reporting will depend upon acovered entity’s business operations <strong>and</strong> o<strong>the</strong>r legal requirements towhich it is subject (for example, local or state reporting requirements). 93Contingency PlanningCovered entities are required to develop a security contingency plan—which includes a data backup plan, a disaster recovery plan, <strong>and</strong> anemergency mode operation plan—<strong>and</strong> to address <strong>the</strong> need for an applications<strong>and</strong> data criticality analysis <strong>and</strong> testing <strong>and</strong> revision procedures.94 DHHS views this requirement as <strong>the</strong> “only way” to protect <strong>the</strong>“availability, integrity, <strong>and</strong> security of data” during unexpected events orcrises. The agency suggests that each covered entity determine its ownpotential risks in <strong>the</strong> event of an emergency that results in a loss of operations.95 Each covered entity is permitted to design its contingency9045 C.F.R. § 164.304.9145 C.F.R. § 164.308(a)(6)(i).9245 C.F.R. § 164.308(a)(6)(ii).9368 Fed. Reg. 8350 (Feb. 20, 2003).9445 C.F.R. § 164.308(a)(7).9568 Fed. Reg. 8351 (Feb. 20, 2003).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!