2012 OCR HIPAA Audit Program Protocol on Security Training OCR

advertisement
2012 OCR HIPAA Audit Program Protocol on Security Training
OCR HIPAA Audit Program Protocol on Security Training
At the Standard Level:
OCR Audit Established Performance Criteria:
§164.308(a)(5) Security Awareness and Training - Implement a security awareness and training program for all
members of its workforce (including management).
OCR Audit Key Activity 1:
Develop and Approve a Training Strategy and a Plan.
OCR Audit Protocol Procedures 1:
Inquire of management as to whether security awareness and training programs address the specific required
HIPAA policies. Obtain and review a list of security awareness and training programs and evaluate the content in
relation to the specified criteria. Determine if the specific HIPAA policies are addressed in these courses.
Determine if the security awareness and training programs are provided to the entire organization. If the
covered entity has chosen not to fully implement this specification, the entity must have documentation on
where they have chosen not to fully implement this specification and their rationale for doing so.
OCR Audit Key Activity 2:
Develop and Approve a Training Strategy and a Plan.
OCR Audit Protocol Procedures 2:
Inquire of management as to whether security awareness and training programs outline the scope of the
program. Obtain and review a sample of security awareness and training programs and evaluate the content in
relation to the specified criteria. Determine if security awareness and training programs have been reviewed
and approved. If the covered entity has chosen not to fully implement this specification, the entity must have
documentation on their rational as to why and where they have chosen not to fully implement this specification.
Evaluate this documentation if applicable.
OCR Audit Key Activity 3:
Develop Appropriate Awareness and Training Content, Materials, and Methods.
OCR Audit Protocol Procedures 3:
Inquire of management as to whether training materials incorporate relevant current IT security topics. Obtain
and review a sample of training materials and determine if training materials are updated with relevant and
current information. Determine if training materials are reviewed to ensure relevant and current information is
included. If the covered entity has chosen not to fully implement this specification, the entity must have
documentation on where they have chosen not to fully implement this specification and their rationale for doing
so.
OCR Audit Key Activity 4:
Implement the Training.
OCR Audit Protocol Procedures 4:
Inquire of management as to whether employees receive all required training. Obtain and review a list of
required training. Determine if required training courses are designed to help employees fulfill their security
responsibilities. Determine if training courses are provided to employees to fulfill their security responsibilities.
If the covered entity has chosen not to fully implement this specification, the entity must have documentation on
where they have chosen not to fully implement this specification and their rationale for doing so.
OCR Audit Key Activity 5:
Monitor and Evaluate Training Plan.
OCR Audit Protocol Procedures 5:
Inquire of management as to whether security policies and procedures are updated periodically. Obtain and
review security policies and procedures. Determine if security policies and procedures are approved and
updated on a periodic basis. If the covered entity has chosen not to fully implement this specification, the entity
must have documentation on where they have chosen not to fully implement this specification and their
rationale for doing so.
2012 OCR HIPAA Audit Program Protocol on Security Training
At the Implementation Specification Level:
OCR Audit Established Performance Criteria:
§164.308(a)(5)(ii)(A):Security Awareness and Training - Periodic security updates.
OCR Audit Key Activity:
Implement Security Reminders.
OCR Audit Protocol Procedures:
Inquire of management as to whether security policies and procedures are updated periodically. Obtain and
review security policies and procedures. Determine if security policies and procedures are approved and
updated on a periodic basis. If the covered entity has chosen not to fully implement this specification, the entity
must have documentation on where they have chosen not to fully implement this specification and their
rationale for doing so.
OCR Audit Established Performance Criteria:
§164.308(a)(5)(ii)(B): Security Awareness and Training - Procedures for guarding against, detecting, and
reporting malicious software. §164.308(a)(5)(ii)(C): Security Awareness and Training - Procedures for
monitoring log-in attempts and reporting discrepancies. §164.308(a)(5)(ii)(D): Security Awareness and
Training - Procedures for creating, changing, and safeguarding passwords.
OCR Audit Key Activity:
Protection from Malicious Software; Log-in Monitoring; and Password Management.
OCR Audit Protocol Procedures:
Inquire of management as to whether formal or informal policy and procedures exist to inform employees of the
importance of protecting against malicious software and exploitation of vulnerabilities. Obtain and review
formal or informal policy and procedures for informing employees of the importance of protecting against
malicious software and exploitation of vulnerabilities. Determine if the formal or informal policy and procedures
have been approved and updated as needed. If the covered entity has chosen not to fully implement this
specification, the entity must have documentation on where they have chosen not to fully implement this
specification and their rationale for doing so.
Download