Table 1

Privacy and Security Toolkit10

Administrative
    Routine risk analysis of systems and personnel involved in their processes
    Security personnel and a designated security officer
    Implementation of policies and procedures for authorizing role-based access to information
    Authorization, training, and supervision of workforce members, and application of appropriate sanctions should those procedures be violated
    Periodic assessment and evaluation of meeting of standards
Physical
    Limited and differentiated facility access and control
    Development of policies and procedures regarding workstation and device security, including transfer, removal, disposal, and reuse of electronic media containing e-PHI
Technical
    Development of policies and procedures to control access to e-PHI, and to ensure the integrity of e-PHIs
    Implementation of hardware, software, and/or procedural mechanisms to record and examine activities of e-PHI
    Implementation of technical security measures that guard against unauthorized access to e-PHI while being transmitted over an electronic network