11.07.2015 Views

Medical Records and the Law

Medical Records and the Law

Medical Records and the Law

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

HIPAA Security Rule 469improper disclosure of ePHI. Covered entities should also considercreating a retrievable, exact copy of <strong>the</strong> ePHI before moving equipment.A covered entity that knew that <strong>the</strong> ePHI would be needed forhealthcare purposes <strong>and</strong> failed to retrieve it could have exposure to liabilityfor improper disposal of ePHI.Technical Security St<strong>and</strong>ardsThe technical security st<strong>and</strong>ards of <strong>the</strong> Security Rule follow <strong>the</strong> administrative<strong>and</strong> physical security st<strong>and</strong>ards in <strong>the</strong>ir general nature <strong>and</strong><strong>the</strong>ir focus on requiring covered entities to implement methods <strong>and</strong>technologies appropriate to <strong>the</strong>ir business operations. 108 DHHS recognizedthat <strong>the</strong> speed with which technology changes would makehighly specific regulations obsolete almost immediately. 109 Although<strong>the</strong>se broad st<strong>and</strong>ards are disquieting to some covered entities who preferclearly delineated guidance from DHHS, many have taken advantageof <strong>the</strong> flexibility <strong>the</strong> rule provides, <strong>and</strong> have developed policies <strong>and</strong>procedures tailored to <strong>the</strong>ir own organizations.Access ControlThe st<strong>and</strong>ards require covered entities to implement policies <strong>and</strong>procedures to grant access to ePHI only to individuals <strong>and</strong> softwareprograms that have been granted access rights as outlined in <strong>the</strong> administrativesecurity safeguards of <strong>the</strong> rule. 110 These procedures mustassign unique user identifications to each individual granted access toePHI, so that users can be identified <strong>and</strong> tracked. What types of accesscontrols <strong>and</strong> o<strong>the</strong>r implementation features should be used is up toeach covered entity to determine in light of its operations. 111 Coveredentities must also develop procedures for providing access to ePHI inan emergency so that access to essential ePHI will not be lost. Although<strong>the</strong> rule suggests that covered entities consider installing an automaticlog-off feature in <strong>the</strong>ir information <strong>and</strong> communicationssystems, entities are not required to use <strong>the</strong> feature if <strong>the</strong>y determine<strong>and</strong> document that o<strong>the</strong>r security features will adequately protect <strong>the</strong>ir10845 C.F.R. § 164.310.10968 Fed. Reg. 8343 (Feb. 20, 2003).11045 C.F.R. § 164.312(a)(1).11168 Fed. Reg. 8355 (Feb. 20, 2003).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!