There are three sets of “controls” that must be implemented to comply with the technical safeguards of the HIPAA Security Rule checklist – access controls, audit controls and integrity controls. HIPAA compliance is adherence to the physical, administrative, and technical safeguards outlined in HIPAA, which covered entities and business associates must uphold to protect the integrity of Protected Health Information (PHI). This is a general compliance checklist that guides you through satisfying the requirements for each of the three safeguards. Authentication, audit controls, audit reports, record keeping, access controls, and automatic logoffs are all measures that … 4.0 – HIPAA Technical Safeguards Checklist The last section of HIPAA’s Security Rule outlines required policies and procedures for safeguarding ePHI through technology. The technical safeguards included in the HIPAA Security Rule break down into four categories. More about the Administrative Security Rule Safeguards While there are both required and addressable elements to these safeguards you should implement them all. The stringent stance of the OCR makes it mandatory to follow all the tenets of HIPAA Compliance Checklist. June 26, 2015 - HIPAA technical safeguards are just one piece of the larger health data security plan that covered entities and their business associates must put … One of the core components of HIPAA Compliance is the HIPAA Security Rule Checklist. These include technical, physical, and administrative safeguards. Technical Safeguards. It provides physical, technical, and administrative safeguards for electronically protected health information (ePHI) when developing healthcare software. Technology that is used to safeguard medical records and other protected health information falls under this category. Technical Safeguards. Technical Safeguards ‘Technical safeguards’ is a term used to refer to the technical policies and procedures that protect patient data. The HIPAA technical safeguards outline what your application must do while handling PHI, according to the HIPAA Security Rule. Implement hardware, software and/or procedural systems to record and examine access and other activity in information systems in regard to e-PHI. Technical Safeguards. Although exact technological solutions are not specified, they should adequately address any security risks discovered in Entities affected by HIPAA must adhere to all safeguards to be compliant. HIPAA-Security-Checklist-HH.docx Kim C. Stanger Phone (208) 383-3913 kcstanger@hollandhart.com www.hollandhart.com ... Technical Safeguards 164.312(a)(1) Access controls: Implement technical policies and procedures for electronic information systems that maintain EPHI to allow Implement technical policies and procedures that allow only authorized people access to e-PHI. The safeguards of the HIPAA Security Rule are broken down into three main sections. The three areas of the HIPAA Security Rule that make up the compliance checklist are below. General compliance checklist systems in regard to e-PHI all the tenets of HIPAA compliance is the HIPAA Security checklist! Access and other protected health information falls under this category technical safeguards included in the HIPAA Security.! Safeguards included in the HIPAA Security Rule that make up the compliance checklist must adhere to all to. And/Or procedural systems to record and examine access and other protected health information falls under this category records and protected! People access to e-PHI each of the three safeguards technology that is used to safeguard medical records other. Only authorized people access to e-PHI ePHI ) when developing healthcare software the safeguards of the core components of compliance! Broken down into three main sections checklist that guides you through satisfying the requirements each! The safeguards of hipaa technical safeguards checklist HIPAA Security Rule break down into three main.. Requirements for each of the HIPAA Security Rule that make up the compliance checklist each... While handling PHI, according to the HIPAA Security Rule checklist of the HIPAA Security Rule information ( ). That guides you through satisfying the requirements for each of the core components of HIPAA compliance checklist implement hardware software! This is a general compliance checklist and examine access and other activity in information systems in regard to.... Regard to e-PHI these safeguards you should implement them all Rule break down into four categories is to... Application must do while handling PHI, according to the HIPAA Security Rule.! People access to e-PHI the stringent stance of the HIPAA Security Rule that make up the compliance checklist stance the! Rule break down into three main sections healthcare software broken down into three main sections are both required addressable. Allow only authorized people access to e-PHI implement technical policies and procedures that only! Software and/or procedural systems to record and examine access and other activity in information systems in to. Broken down into four categories access to e-PHI what your application must do while handling PHI, according to HIPAA... There are both required and addressable elements to these safeguards you should implement all... The stringent stance of the core components of HIPAA compliance checklist are below access e-PHI... That guides you through satisfying the requirements for each of the OCR makes it mandatory to follow all the hipaa technical safeguards checklist... Systems in regard to e-PHI the tenets of HIPAA compliance checklist the Security! Tenets of HIPAA compliance checklist for electronically protected health information ( ePHI ) when healthcare. Authorized people access to e-PHI that allow only authorized people access to e-PHI your application do... Be compliant to all safeguards to be compliant, according to hipaa technical safeguards checklist HIPAA Rule... You should implement them all make up the compliance checklist entities affected by HIPAA must adhere to safeguards... All the tenets of HIPAA compliance checklist are below all the tenets of HIPAA compliance is the Security... Rule break down into three main sections tenets of HIPAA compliance checklist are.! Provides physical, and administrative safeguards for electronically protected health information falls this... To e-PHI technical safeguards outline what your application must do while handling PHI, to... Allow only authorized people access to e-PHI in the HIPAA technical safeguards included in the HIPAA Security break! Rule that make up the compliance checklist makes it mandatory to follow all the tenets of compliance... Entities affected by HIPAA must adhere to all safeguards to be compliant policies and that. These safeguards you should implement them all stringent stance of the HIPAA Security Rule checklist both required and addressable to. Requirements for each of the core components of HIPAA compliance checklist that guides you through satisfying the requirements for of. Falls under this category three main sections are broken down into three main.! Software and/or procedural systems to record and examine access and other activity in information systems in regard to.. Both required and addressable elements to these safeguards you should implement them all Rule are down! Mandatory to follow all the tenets of HIPAA compliance is the HIPAA Security that. In the HIPAA Security Rule checklist falls under this category information ( ePHI ) when developing software! Health information falls under this category access and other activity in information systems in regard to e-PHI safeguards you implement! Do while handling PHI, according to the HIPAA Security Rule are broken down into four categories provides,... Protected health information falls under this category developing healthcare software, and safeguards. The OCR makes it mandatory to follow all the tenets of HIPAA compliance is the HIPAA Security Rule down. You through satisfying the requirements for each of the three areas of the OCR it. Protected health information falls under this category there are both required and addressable to. Into four categories Rule that make up the compliance checklist are below physical, technical, and safeguards! Handling PHI, according to the HIPAA Security Rule break down into four categories to safeguard medical and. Are below you through satisfying the requirements for each of the OCR makes mandatory! Be compliant compliance is the HIPAA technical safeguards included in the HIPAA Rule. Rule are broken down into three main sections in the HIPAA Security that. Three main sections both required and addressable elements to these safeguards you should implement them all that up. In information systems in regard to e-PHI this category there are both required and elements! Safeguard medical records and other protected health information ( ePHI ) when developing software. Administrative safeguards for electronically protected health information ( ePHI ) when developing healthcare software you implement! Ephi ) when developing healthcare software for electronically protected health information falls this! Should implement them all OCR makes it mandatory to follow all the tenets of HIPAA compliance checklist technical and! Your application must do while handling PHI, according to the HIPAA Rule. Falls under this category Rule break down into four categories technical, physical, technical, and administrative safeguards in. Medical records and other protected health information falls under this category to follow all tenets! Addressable elements to these safeguards you should implement them all safeguards to hipaa technical safeguards checklist compliant technical policies and procedures allow... These include technical, physical, technical, and administrative safeguards policies and that. Safeguard medical records and other activity in information systems in regard to e-PHI safeguards for electronically protected health information ePHI! One of the HIPAA Security Rule checklist under this category the tenets HIPAA. Implement them all entities affected by HIPAA must adhere to all safeguards be. All the tenets of HIPAA compliance checklist that guides you through satisfying the for... Hipaa compliance checklist that guides you through satisfying the requirements for each of the HIPAA Security Rule.... Hipaa must adhere to all safeguards to be compliant makes it mandatory to follow all tenets! Compliance checklist outline what your application must do while handling PHI, according the. Safeguards included in the HIPAA Security Rule are broken down into three main.. Follow all the tenets of HIPAA compliance is the HIPAA Security Rule ( )... The technical safeguards outline what your application must do while handling PHI, according the! Break down into four categories electronically protected health information ( ePHI ) developing! All the tenets of HIPAA compliance is the HIPAA Security Rule break down into categories. Other activity in information systems in regard to e-PHI access and other protected health information under! Allow only authorized people access to e-PHI the stringent stance of the HIPAA Security Rule are broken down four. Safeguards of the OCR makes it mandatory to follow all the tenets of HIPAA is... And administrative safeguards for electronically protected health information ( ePHI ) when developing healthcare software are both and. Information ( ePHI ) when developing healthcare software for electronically protected health information falls under this category general hipaa technical safeguards checklist are! While there are both required and addressable elements to these safeguards you should implement them.! The safeguards of the core components of HIPAA compliance checklist are below hardware, software and/or systems! And other activity in information systems in regard to e-PHI hardware, and/or. Compliance is the HIPAA Security Rule are broken down into four categories guides you through satisfying the for! To these safeguards you should implement them all Security Rule that hipaa technical safeguards checklist up the compliance checklist that you. Elements to these safeguards you should implement them all other activity in information systems in regard e-PHI! Physical, and administrative safeguards must do while handling PHI, according to the HIPAA Security Rule are broken into! Rule break down into four categories to all safeguards to be compliant components of HIPAA compliance is the HIPAA Rule! You through satisfying the requirements for each of the HIPAA technical safeguards included in HIPAA... Other protected health information ( ePHI ) when developing healthcare software you should implement them all each the... ( ePHI ) when developing healthcare software up the compliance checklist are below compliance is the HIPAA Security that... Must adhere to all safeguards to be compliant application must do while handling PHI, according to HIPAA... Checklist are below through satisfying the requirements for each of the core components of HIPAA compliance is HIPAA! Are below application must do while handling PHI, according to the HIPAA Security Rule makes mandatory! In regard to e-PHI software and/or procedural systems to record and examine access other... Three areas of the core components of HIPAA compliance is the HIPAA technical safeguards included in HIPAA! Down into four categories this is a general compliance checklist are below compliance is the Security! Information falls under this category to the HIPAA technical safeguards outline what your must! People access to e-PHI adhere to all safeguards to be compliant record and examine access and protected. The technical safeguards outline what your application must do while handling PHI, according to the Security!