preview

Administrative Safeguards: NIST Guidelines

Decent Essays

Questionnaire:
The following questionnaire is necessary to guarantee the accuracy of the time estimates as well as the thoroughness of the assessment. Please fill out as much of the information as possible.

Administrative Safeguards: Security Management Process: Implement policies and procedures to prevent, detect, contain, and correct security violations

AUDIT PROCEDURE
IMPLEMENTATION SPECIFICATION
(R) = REQUIRED,
(A) = ADDRESSABLE STATUS
COMPLETE, N/A, BEING
IMPLEMENTED

Are all the Risk Analysis been finished IAW NIST Guidelines? (R)
Is Risk Management procedure been finished IAW NIST Guidelines? (R)
Do you have formal authorizations against workers who neglect to agree to security strategies and methods? (R)
Have you actualized …show more content…

Workforce Security: Implement approaches and systems to guarantee that all individuals from its workforce have proper access to EPHI, as provided under passage (a)(4) of this area, and to keep those workforce individuals who don't have entry under section (a)(4) of this segment from getting access to electronic protected health information (EPHI).
Have you actualized strategies for the approval and/or supervision of representatives who work with EPHI or in areas where it may be gotten to? (A)
Have you executed systems to establish that the Access of a worker to EPHI is fitting? (A)
Have you implemented systems for firing access to EPHI when a worker abandons you association or as needed by passage (a)(3)(ii)(B) of this segment? …show more content…

(A)
Do you have methodology for observing login endeavors and reporting inconsistencies? (A)
Do you have methodology for making, changing, and shielding passwords? (A)

Security Incident Procedures and Contingency Plan:

Do you have systems to recognize and react to suspect or know security episodes; alleviate to the degree practicable, hurtful impacts of known security occurrences; and record occurrences and their results? (R)
Have you set up and actualized methodology to make and keep up retrievable accurate duplicates of EPHI? (R)
Have you built up (and executed as required) methods to restore any loss of EPHI information that is put away electronically? (R)
Have you built up (and executed as required) methods to empower continuation of basic business forms and for insurance of EPHI while working in the crisis mode? (R)
Are strategies for intermittent testing and modification of alternate course of actions implemented? (A)
Have you surveyed the relative disparaging of particular applications and information in backing of other emergency course of action segments?

Get Access