East Carolina University HIPAA Security Policies Subject: Security Incident Procedures Policy #: Security-0006 Supersedes: Effective Date: April 21, 2005 Coverage: ECU Health Care Components Page: 1 of 2 Approved: Revised: December 9, 2010, March 29, 2012, May 30, 2013 Review Date: May 30, 2013 HIPAA Security Rule Language: “Implement policies and procedures to address security incidents.” Regulatory Reference: 45 CFR 164.308(a)(6)(i) I. PURPOSE This policy reflects East Carolina University’s commitment to implement policies and procedures for detecting and responding to security incidents. II. AUTHORIZATION AND ENFORCEMENT Health Care component management and/or administrator(s) are responsible for monitoring and enforcing this policy, in consultation with the ECU IT Security Officer, ECU HIPAA Security Officer, and ECU HIPAA Privacy Officer. III. POLICY ECU Health Care Components must have a formal, documented process for quickly and effectively detecting and responding to security incidents that may impact the confidentiality, integrity, or availability of the University’s information systems. All ECU Health Care Components’ actions to respond to and recover from security incidents must be carefully and formally controlled. At a minimum, formal procedures must ensure that all actions taken are intended to minimize the damage of a security incident and prevent further damage, all actions taken are carefully documented, and all actions taken are reported to appropriate management and reviewed in a timely manner. All ECU workforce members must report any observed or suspected security incidents as quickly as possible via the University’s security incident reporting procedure. Copyright 2003 Phoenix Health Systems, Inc. Limited rights granted to licensee for internal use only. All other rights reserved Page 1 of 2 HIPAA Security Policy #0006: Security Incident Procedures IV. APPICABILITY This policy is applicable to all workforce members who are responsible for or otherwise administer a healthcare computing system. A healthcare computing system is defined as a device or group of devices that store EPHI which is shared across the network and accessed by healthcare workers. V. PROCEDURE The following safeguards must be implemented to satisfy the requirements of this policy: 1. ECU Health Care Components must have a formal, documented process for quickly and effectively detecting and responding to security incidents, as specified in the Response and Reporting Standard. VI. DEFINITION A security incident is defined as any event that creates a risk to the confidentiality, integrity, or availability of EPHI. VII. COORDINATING INSTRUCTIONS 1. All section policies, standards and procedures will be reviewed annually. Every section policy, standard and procedure revision/replacement will be maintained for a minimum of six years from the date of its creation or when it was last in effect, whichever is later. Other East Carolina University, University of North Carolina system, or state of North Carolina requirements may stipulate a longer retention. Copyright 2003 Phoenix Health Systems, Inc. Limited rights granted to licensee for internal use only. All other rights reserved Page 2 of 2