ADMINISTRATIVE PROCEDURES LifeStream Services, Inc. Policy Name: Encrypted PHI Department: Administration Initial Date: January 28, 2011 Authorized by: _______________________________________________________ Kenneth Adkins, President/CEO PURPOSE: The purpose of this policy is to ensure that mobile computers containing Protected Health Information (PHI) are properly encrypted to prevent breach and misuse of such information in the event the mobile computer is lost or stolen. The compelling reason for this policy is the introduction of Health Information Technology for Economic and Clinical Health (HITECH) Act, which requires HIPAA-covered entities to send notification letters if there is a breach of unsecured PHI. However, as HHS pointed out, the use of encryption grants safe harbor in the event of a breach because encrypted PHI is not unsecured PHI. POLICY: All mobile computing devices containing PHI and that are at risk of breach will be encrypted with an Advanced Encryption Standard (AES) encryption technology. LifeStream Services will also implement and maintain an encryption key management policy. PERSONNEL EFFECTED: Any personnel using mobile computing devices containing PHI and that are at risk of breach. PROCEDURE: 1. The hard drives of all mobile computers containing client information will be encrypted with a HIPAA compliant encryption technology. 2. The IT Support Specialist will generate the encryption key for each mobile computer and keep a text copy of the key on file as well as make it available to effected personnel supervisors in the event the key is forgotten. 3. Effected personnel will be responsible for memorizing the encryption key and will not be allowed to keep a written or other text copy of the encryption key with their mobile computer. 4. A rescue disk will be kept on file by the IT Support Specialist that will allow restoration of the device in the event of encryption key failure. 5. All Flash / Zip drives must be encrypted by IT if Protected Health Information is on the drive. (This includes Insite back-up files.) Page | - 1 Printed: 2/17/2016 7:22 AM 106750853 6. All email sent containing Protected Health Information (PHI) will be sent encrypted or via secure email website. Staff utilizing encrypted email will receive training in the process. 1/9/12 5/25/12 5/3/13 5/1/14 8/22/14 8/3/15 Please track revision dates in the table above Page | - 2 Printed: 2/17/2016 7:22 AM 106750853