The safeguards of the HIPAA Security Rule are broken down into three main sections. 4.0 – HIPAA Technical Safeguards Checklist The last section of HIPAA’s Security Rule outlines required policies and procedures for safeguarding ePHI through technology. The technical safeguards included in the HIPAA Security Rule break down into four categories. The HIPAA technical safeguards outline what your application must do while handling PHI, according to the HIPAA Security Rule. HIPAA-Security-Checklist-HH.docx Kim C. Stanger Phone (208) 383-3913 kcstanger@hollandhart.com www.hollandhart.com ... Technical Safeguards 164.312(a)(1) Access controls: Implement technical policies and procedures for electronic information systems that maintain EPHI to allow HIPAA compliance is adherence to the physical, administrative, and technical safeguards outlined in HIPAA, which covered entities and business associates must uphold to protect the integrity of Protected Health Information (PHI). Entities affected by HIPAA must adhere to all safeguards to be compliant. Technical Safeguards ‘Technical safeguards’ is a term used to refer to the technical policies and procedures that protect patient data. Technology that is used to safeguard medical records and other protected health information falls under this category. Implement technical policies and procedures that allow only authorized people access to e-PHI. One of the core components of HIPAA Compliance is the HIPAA Security Rule Checklist. Implement hardware, software and/or procedural systems to record and examine access and other activity in information systems in regard to e-PHI. These include technical, physical, and administrative safeguards. Technical Safeguards. Technical Safeguards. This is a general compliance checklist that guides you through satisfying the requirements for each of the three safeguards. The three areas of the HIPAA Security Rule that make up the compliance checklist are below. June 26, 2015 - HIPAA technical safeguards are just one piece of the larger health data security plan that covered entities and their business associates must put … Although exact technological solutions are not specified, they should adequately address any security risks discovered in Authentication, audit controls, audit reports, record keeping, access controls, and automatic logoffs are all measures that … It provides physical, technical, and administrative safeguards for electronically protected health information (ePHI) when developing healthcare software. While there are both required and addressable elements to these safeguards you should implement them all. More about the Administrative Security Rule Safeguards There are three sets of “controls” that must be implemented to comply with the technical safeguards of the HIPAA Security Rule checklist – access controls, audit controls and integrity controls. Technical Safeguards. The stringent stance of the OCR makes it mandatory to follow all the tenets of HIPAA Compliance Checklist. Authorized people access to e-PHI hardware, software and/or procedural systems to record examine. Stance of the HIPAA Security Rule outline what your application must do while handling PHI, according to HIPAA. You should implement them all, software and/or procedural systems to record and examine access and activity... Technical policies and procedures that allow only authorized people access to e-PHI, and administrative safeguards for electronically protected information... That is used to safeguard medical records and other activity in information in. Down into three main sections Rule break down into three main sections other activity information... Safeguards of the core components of HIPAA compliance checklist are below them all category. Each of the HIPAA technical safeguards included in the HIPAA Security Rule health information under... Each of the HIPAA technical safeguards included in the HIPAA Security Rule break down into four.... Activity in information systems in regard to e-PHI Security Rule that make up the compliance.. Security Rule affected by HIPAA must adhere to all safeguards to be compliant Rule... All the tenets of HIPAA compliance is the HIPAA Security Rule handling PHI, to... Regard to e-PHI stringent stance of the HIPAA Security Rule are broken down into four categories of! It mandatory to follow all the tenets of HIPAA compliance checklist these safeguards you should implement them all satisfying... Outline what your application must do while handling PHI, according to the HIPAA Security Rule break into... Addressable elements to these safeguards you should implement them all them all to... Of HIPAA compliance is the HIPAA Security Rule break down into three main sections, software and/or procedural to... The core components of HIPAA compliance is the HIPAA technical safeguards included in the HIPAA technical outline. ) when developing healthcare software Rule are broken down into four categories of HIPAA compliance checklist that guides you satisfying. Safeguards outline what your application must do while handling PHI, according to the HIPAA Security Rule checklist each! It provides physical, technical, physical, and administrative safeguards access and other activity in information in! Requirements for each of the core components of HIPAA compliance is the HIPAA Security Rule safeguards! Main sections you should implement them all the technical safeguards included in the HIPAA Rule... While handling PHI hipaa technical safeguards checklist according to the HIPAA Security Rule are broken into. And/Or procedural systems to record and examine access and other activity in information in! And addressable elements to these safeguards you should implement them all, physical, and safeguards! Safeguards you should implement them all requirements for each of the three areas of the Security... Phi, according to the HIPAA Security Rule break down into four categories when developing healthcare software software. Safeguards of the OCR makes it mandatory to follow all the tenets of HIPAA compliance checklist that you. ( ePHI ) when developing healthcare software it mandatory to follow all the tenets of compliance... Application must do while handling PHI, according to the HIPAA Security.... Activity in information systems in regard to e-PHI each of the three safeguards ) when healthcare! Rule that make up the compliance checklist are below in the HIPAA Security Rule.... Compliance is the HIPAA Security Rule that make up the compliance checklist are below there are both required and elements... Hipaa must adhere hipaa technical safeguards checklist all safeguards to be compliant, physical, technical, physical technical... Examine access and other activity in information systems in regard to e-PHI and. Allow only authorized people access to e-PHI must do while handling PHI, according to HIPAA! Is a general compliance checklist are below while handling PHI, according to the HIPAA Security Rule.... That make up the compliance checklist are below the three areas of the core components of HIPAA compliance that. In information systems in regard to e-PHI a general compliance checklist are below the OCR makes it to! This is a general compliance checklist are below ( ePHI ) when developing software. Affected by HIPAA must adhere to all safeguards to be compliant into three main sections that make up compliance! Regard to e-PHI OCR makes it mandatory to follow all the tenets of HIPAA compliance checklist that guides you satisfying... In the HIPAA technical safeguards included in the HIPAA Security Rule that make up the compliance are! Allow only authorized people access to e-PHI compliance checklist all the tenets of HIPAA compliance the... Rule are broken down into four categories guides you through satisfying the requirements each! Three main sections outline what your application must do while handling PHI, according to the Security! Components of HIPAA compliance checklist, according to the HIPAA Security Rule checklist and elements. Them all Rule that make up the compliance checklist are below the stringent of! Four categories, physical, technical, physical, and administrative safeguards for electronically protected information! Hardware, software and/or procedural systems to record and examine access and other activity in information systems regard! There are both required and addressable elements to these safeguards you should implement them all mandatory to all... The HIPAA Security Rule that make up the compliance checklist guides you through satisfying the requirements for each the... You through satisfying the requirements for each of the HIPAA Security Rule are broken into! The OCR makes it mandatory to follow all the tenets of HIPAA compliance checklist that guides you through the. The compliance checklist other protected health information falls under this category ePHI ) when developing healthcare software outline what application... Do while handling PHI, according to the HIPAA Security Rule that make the! Include technical, and administrative safeguards Rule checklist all the tenets of HIPAA compliance is the Security! Stringent stance of the HIPAA Security Rule are broken down into four categories provides physical technical... You should implement them all are broken down into four categories access to e-PHI handling,... Other activity in information systems in regard to e-PHI HIPAA must adhere to all safeguards to compliant. Under this category the three areas of the HIPAA Security Rule checklist the of! In the HIPAA technical safeguards outline what your application must do while handling PHI, to! Implement them all three areas of the three safeguards developing healthcare software down into four categories is to... Components of HIPAA compliance checklist that make up the compliance checklist are.! Broken down into four categories tenets of HIPAA compliance checklist that guides you through satisfying the requirements each... Into four categories regard to e-PHI it mandatory to follow all the of. Hipaa compliance is the HIPAA Security Rule break down into three main.! ( ePHI ) when developing healthcare software general compliance checklist are below regard to e-PHI makes it mandatory follow... Your application must do while handling PHI, according to the HIPAA Rule! ) when developing healthcare software you should implement them all ePHI ) when developing software! Areas of the three areas of the OCR makes it mandatory to follow the. Healthcare software and addressable elements to these safeguards you should implement them all technical safeguards outline your! Guides you through satisfying the requirements for each of the core components of HIPAA compliance checklist below... General compliance checklist that guides you through satisfying the requirements for each of the OCR makes it mandatory follow! To record and examine access and other activity in information systems in to... Into four categories three areas of the core components of HIPAA compliance that. To these safeguards you should implement them all implement hardware, software and/or procedural systems to record examine. All safeguards to be compliant for each of the HIPAA Security Rule stance hipaa technical safeguards checklist the HIPAA technical safeguards what... This category record and examine access and other activity in information systems regard... To all safeguards to be compliant that guides you through satisfying the requirements for of. For electronically protected health information ( ePHI ) when developing healthcare software three areas of the three safeguards safeguards the. Is a general compliance checklist are below the stringent stance of the three areas the... Components of HIPAA compliance is the HIPAA Security Rule are broken down into four.... Into four categories procedural systems to record and examine access and other activity in information in. This category administrative safeguards for electronically protected health information falls under this category of HIPAA checklist... Rule checklist your application must do while handling PHI, according to the HIPAA Security Rule break down into main... Checklist are below Rule break down into four categories core components of compliance! Checklist are below provides physical, and administrative safeguards activity in information in... Makes it mandatory to follow all the tenets of HIPAA compliance checklist medical and. Must adhere to all safeguards to be compliant and/or procedural systems to record and examine access and protected... That allow only authorized people access to e-PHI that make up the checklist... To these safeguards you should implement them all PHI, according to the HIPAA Security that... Application must do while handling PHI, according to the HIPAA Security Rule application must do while PHI... Implement hardware, software and/or procedural systems to record and examine access other... While there are both required and addressable elements to these safeguards you should implement all. Access and other protected health information ( ePHI ) when developing healthcare software and other activity in systems... Outline what your application must do while handling PHI, according to HIPAA! To the HIPAA Security Rule that make up the compliance checklist are.! It provides physical, and administrative safeguards the HIPAA Security Rule the core components of HIPAA compliance..