4med1072 Understanding The Hipaa Security Rule
4med1072 Understanding The Hipaa Security Rule
4med1072 Understanding The Hipaa Security Rule
The HIPAA Security Rule is designed to create safeguards to protect primarily electronic
Protected Health Information (ePHI). Just as the Minimum Necessary principle is central
to the Privacy Rule, safeguarding the Confidentiality, Integrity, and Availability (CIA) of
ePHI is central to the Security Rule. The Security Rule was originally implemented in 2005
and was updated in 2013 by the HIPAA Omnibus Final Rule.
The Security Rule is a risk-based security framework, that enables organizations to identify
risks, manage them, and maintain security over time. The Rule is broken down into Technical,
Physical, and Administrative Safeguards. The Safeguards are further divided into Standards
and Implementation specifications.
About half of Security Rule regulations are Administrative Safeguards, which are designed to
create a culture of compliance and security through properly implemented policies,
procedures, and documentation. Physical Safeguards address the physical security of devices
that access or store ePHI. The Technical Safeguards include rules on passwords, encryption,
and other electronic security tools.
Flexible Requirements
HIPAA Security Rule implementation specifications range from relatively simple requirements,
such as the Assigned Security Responsibilityofficially appointing an employee as the HIPAA
Security Officerto the requirement for an Emergency Mode Operations Plan, which may
require extensive planning if the organization is large. Like many other elements of HIPAA, the
specifications are general, to accommodate the diverse requirements of the many different
types of organizations that must comply.
Business Associates
Although the HITECH Act requires Business Associates to comply to the same extent as
Covered Entities, Business Associate should craft their policies and procedures with careful
thought about the circumstances in which they encounter protected information.
For instance, many IT service providers will not encounter PHI on their own systems. Such a
companys policies and procedures should be appropriate for the technical services it offers.
Hard drive replacements, computer repairs, and moving data using portable devices may all
create compliance risks if the devices are not properly tracked and controlled. A technician
losing a hard drive after a repair can easily breach thousands of patient records. By contrast, a
document shredding company will face a different set of concerns. Because Business
Associates represent a wide range of services, HIPAA compliance presents an unusual
challenge.
Required or Addressable
Some implementation specifications are Required, while others are Addressable. It is important
to understand that Addressable Specifications are not optional or voluntary. Rather, Covered
Entities and Business Associates must provide an account of the alternate procedure they are
using to satisfy the specification, and provide a documented explanation of why the specification
does not apply to the organization.
For example, consider the specification that calls for encryption of ePHI at rest. This
specification is addressable, but that does not mean it can be ignored. In 2014, Concentra
Health was fined more than $1.7 million because it failed to adequately execute risk
Administrative Safeguards
Security Management Process 164.308(a)(1)
Specialists to conduct the Security Risk Analysis. One reason is that the Risk Analysis requires
a depth of understanding of HIPAA and other security requirements, plus a knowledge of IT
systems and security tools, that is not available to most providers. Another reason is that an
independent Security Specialist can view the organizations compliance and security
environment with fresh eyes, with an understanding of the protocols used by auditors. Also, an
independent Security Specialist will have no conflicts of interest, which might otherwise apply,
such as in cases where an internal IT specialist is tasked with evaluating IT security.
Risk Management (R)
The Risk Management specification requires that measures be taken to limit risk. Again, this
specification should be satisfied by conducting a proper Security Risk Analysis and by
implementing HIPAA policies and procedures.
Sanction Policy (R)
The Sanction Policy specification requires the organization to have policies and procedures in
place to discipline employees that violate the organizations security and privacy policies.
Information System Activity Review (R)
The Information System Activity Review specification requires regularly reviewing audit logs or
similar records of how PHI has been accessed. This requirement essentially demands an
administrative commitment to actually use the audit capability that is required by other parts of
the Security Rule.
Assigned Security Responsibility (R) 164.308(a)(2)
This standard requires that an organization designate a HIPAA Security Officer. In most
organizations, a single individual will serve as both the Security and Privacy Officer, charged
with ensuring compliance with both the Privacy and the Security rules. In some organizations,
these roles are divided.
Workforce Security 164.308(a)(3)
This specification essentially calls for the implementation of policies and procedures to modify
the level of access available to a person or system.
Security Awareness and Training 164.308(a)(5)
The Evaluation standard essentially requires an organization to assess whether it is following its
HIPAA policies and procedures, and to keeps its Risk Analysis current.
Business Associate Contracts (R) 164.308(b)(1)
This standard requires that organizations maintain Business Associate Contracts with any
organization that provides service involving access to ePHI. The language required for Business
Associate Contracts was updated in 2013 to comply with the HIPAA Omnibus Final Rule.
Physical Safeguards
Facility Access Controls 164.310(a)(1)
The Workstation Use standard requires written policies and procedures that specify the proper
functions to be performed on workstations that have access to PHI, along with the physical
surroundings of those workstations. An important element of this requirement is identifying all
devices that can access PHI.
Workstation Security (R) 164.310(c)
This standard requires physical safeguards for all workstations that access ePHI, such as locks
or other measures to provide physical security.
Device and Media Controls 164.310(d)(1)
Media Disposal (R)
The Media Disposal specification requires policies on how hardware and media that contain
ePHI are discarded. For example, hard drives could be degaussed, (exposed to a powerful
magnetic field to wipe all the data) or physically destroyed (smashed or shredded) prior to
disposal.
Media Re-Use (R)
Media Re-use requires procedures for completely removing ePHI from media such as hard
drives. For example, formatting a hard drive is not enough, because formatting typically only
removes the directory, leaving the ePHI accessible. Specialized software is available to
completely wipe all remnants of data from a device prior to re-use.
Media Accountability (A)
This specification calls for documentation of where media are moved, which could be critically
important during an audit or breach investigation.
Data Backup and Storage (A)
This specification directs organizations to back up the data on equipment before it is moved.
Technical Safeguards
Access Control 164.312(a)(1)
Unique User Identification (R)
Unique User Identification is essential to the Security Rule. Organizations must be able to
identify each user who has access to ePHI. This requirement prohibits the use of generic logins
to networks or EHR systems. Every user must log in using their own credentials.
Emergency Access Procedure (R)
This specification requires organizations to develop the technical means to access data during
an emergency.
Automatic Logoff (A)
Automatic logoff calls for users to be logged out of the system after a period of inactivity, which
can be accomplished by setting screen savers to black out screens and require a password to
resume.
Encryption and Decryption of Data At Rest (A)
Encryption and decryption of data at rest is addressable specification, but as the example above
illustrates, addressable specifications are not option. Generally, ePHI at rest should be
encrypted whenever possible.
Audit Controls (R) 164.312(b)
The Audit Controls standard requires the ability to monitor activity in computer systems that
house ePHI.
Integrity 164.312(c)(1)
Guidance
The National Institute of Standards and Technology (NIST) has published the document NIST
800-66, offering best practices for implementing controls to comply with the HIPAA Security
Rule.
http://csrc.nist.gov/publications/nistpubs/800-66-Rev1/SP-800-66-Revision1.pdf