Advertisement
Tech

HIPAA Compliance Checklist for Information Technology

Why you need a dedicated analyst or officer to monitor your adherence.

By Steve Mallard
Desk Tech
Reading time 3 min read
Word count 627
Smb security Computing Compliance
HIPAA Compliance Checklist for Information Technology
Advertisement
Quick Take

Why you need a dedicated analyst or officer to monitor your adherence.

On this page

What is HIPAA?

HIPAA (the Health Insurance Portability and Accountability Act) mandates the use of computers and patient privacy when dealing with patient data and information. These standards ensure the data will be transmitted on a standard that patient privacy and information is secure and within guidelines established for this act.

Policies

Security Standards should be put into place that help to prevent, detect security events and allow for the correction of HIPAA Security violations.

Advertisement

Companies and hospitals need a Risk Analysis so the vulnerabilities and possible risks can be evaluated. This ensures that the integrity and confidentiality is maintained. With this in place, companies can then look in to Risk Management to help reduce the risk of exposure of their records. With these two critical items in place, employees should be trained and informed of any repercussions of failure to comply with these rules.

After setting the aforesaid policies in place, a review of the policies and procedures should take place. This includes the auditing of servers, workstations, logs, reports and any reports.

Advertisement

HIPAA Checklist

The information below is a partial list and description of different areas needed to protect data and information involving HIPAA. Links following this information gives more information on the standards required to meet HIPAA standards.

Roles

Advertisement

Organizations should assign a security analyst or security officer to help identify who is responsible or maintaining and enforcing the HIPAA standards within the organization. This assignment ensures the quality of the standards set forth by the organization

Workforce

Advertisement

Organizations should ensure that training is implemented and carried out to all employees. Decisions should be made on employee access and rights to individual and key records. This includes information on and how employees have access to records and which supervisors can give, modify or take away access to records.

Security Awareness and Training of Workforce

Advertisement

Organizations should provide a training program to raise awareness of HIPAA rights. Every individual in the organization must be trained on a regular basis (Including all management personnel). Training should be provided to include employee awareness, password safeguarding and changing, workstation access, software use, virus and malware information and other mission critical operations.

Records and Information Access

Advertisement

Policies should define roles on who can have what access to programs and information. These policies should further define the roles in information technology of the IT personnel who have the rights to modify the access.

Incident Response

Advertisement

Policies and procedures should be implemented to include incident response. This information should be used to identify security incidents and how to respond to such incidents. The security officer for the organization along with management should evaluate the effects of any incidents. Documentation of any incidents should be made along with the outcomes for the possible modification of the policies along with the ending result of the incident to prevent any further incidents.

Contingency and Emergency Operations Plan

Advertisement

Policies and Procedures should include the Disaster Backup and Recovery plan to ensure the business can continue operations in the event of a disaster. This information includes the team that keeps the business going, recovering lost data, testing of backup procedures and replacement of equipment.

Hardware, Software and Transmission Security

Advertisement

Organizations should have a hardware firewall in place along with professional versions of operating systems. Transmission of personal information should be encrypt and comply with HIPAA rulings. Operating Systems should be hardened and up to date. Policies should cover the updating of hardware, hardware firmware, software, operating systems and applications. Data integrity control should be in place for data and data transmission.

Audit Control

Advertisement

Procedure audit mechanisms should be in place for all hardware, software and data control. This information should be reviewed by the security supervisor on a regular basis.

Links to Checklists and Educational Materials

Advertisement
Keep Exploring

More from Tech

Filed under
Smb security Computing
More topics
Compliance
Advertisement