MHC HIPAA Policy Format

advertisement
DRAFT
Version 3: 3/20/14
Based on HIPAA/HITECH Omnibus Rules 9/23/13
HIPAA COW
SECURITY NETWORKING GROUP
FACILITY REPAIRS AND MAINTENANCE
Disclaimer
This Facility Repairs and Maintenance Policy is Copyright  by the HIPAA Collaborative of
Wisconsin (“HIPAA COW”). It may be freely redistributed in its entirety provided that this
copyright notice is not removed. When information from this document is used, HIPAA COW
shall be referenced as a resource. It may not be sold for profit or used in commercial documents
without the written permission of the copyright holder. This Facility Repairs and Maintenance
Policy is provided “as is” without any express or implied warranty. This Facility Repairs and
Maintenance Policy is for educational purposes only and does not constitute legal advice. If you
require legal advice, you should consult with an attorney. Unless otherwise noted, HIPAA
COW has not addressed all state pre-emption issues related to this Facility Repairs and
Maintenance Policy. Therefore, this document may need to be modified in order to comply with
Wisconsin/State law.
****
Table of Contents
Policy …………………………………………………………………………………………….1
Responsible for Implementation ................................................................................................... .2
Applicable To ……………………………………………………………………………….……2
Key Definitions …………………………………………………………………………….…….2
Procedures ..................................................................................................................................... .2
1. Identify ePHI Security Risk(s) .......................................................................................... .2
2. Reduce or Eliminate the ePHI Security Risks(s) .............................................................. .2
3. Monitor for Additional Risks ............................................................................................ .3
4. Documentation of the Project ........................................................................................... .3
Applicable Standards and Regulations …………………………………………………….…….4
Sources ………………………………………………………………………………….………..4
Version History:
Policy:
In accordance with the standards set forth in the HIPAA Security Rule, <ORGANIZATION> is
committed to ensuring the confidentiality, integrity, and availability of all electronic protected
health information (ePHI) it creates, receives, maintains, and/or transmits. To establish
documentation guidelines for maintenance, repairs, and modifications to the physical
components of its facilities when related to the security of the ePHI as well as limit physical
access to electronic information systems and the facility(s) in which they are housed, while
ensuring that properly authorized access is allowed.
______________________________________________________________________________
 Copyright HIPAA COW
1
DRAFT
Version 3: 3/20/14
Based on HIPAA/HITECH Omnibus Rules 9/23/13
Responsible for Implementation:
<Facilities/Building Services/Security Manager>
Applicable To:
All workforce members
Violation of this policy and its procedures by workforce members may result in corrective
disciplinary action, up to and including termination of employment. Violation of this policy and
procedures by others, including providers, providers' offices, business associates and partners
may result in termination of the relationship and/or associated privileges. Violation may also
result in civil and criminal penalties as determined by federal and state laws and regulations
Key Definitions:
Electronic Protected Health Information (ePHI): Protected health information means individually
identifiable health information that is: transmitted by electronic media, maintained in electronic
media, or transmitted or maintained in any other form or medium.
Workforce: employees, volunteers (board members, community representatives), trainees
(students), contractors and other persons whose conduct, in the performance of work for a
covered entity, is under the direct control of such entity, whether or not they are paid by the
covered entity.
Procedures:
1. Identify ePHI Security Risk(s). Prior to approving plans to repair, modify, or schedule
maintenance any of <ORGANIZATION’s> owned or leased facilities the <Lead Project
Coordinator> works with the <Facilities/Building Services/Security Manager> , to determine
whether or not the scheduled maintenance, repairs, changes, or the construction process
itself, increases the security risk of ePHI. These security risks include, but are not limited to,
work completed on the internal and/or external perimeter of the facilities (entryways, doors,
locks, controlled access systems, walls, removing windows, etc.) and may result in:
A. Will or has the potential to limit or remove an authorized user’s ability to access
workstations and systems in which ePHI is created, received, maintained, or
transmitted during regularly scheduled hours and at regularly scheduled locations.
B. Increases the potential for unauthorized access to ePHI.
C. Otherwise has the potential to decrease the security, confidentiality, and/or integrity
of the ePHI in any way.
2. Reduce or eliminate the ePHI Security Risks(s). If the changes indicate an increased
security risk to ePHI, the <Lead Project Coordinator> amends the plans to contain the
following conditions:
A. All users that need access to ePHI have access to ePHI during their regularly
scheduled hours.
______________________________________________________________________________
 Copyright HIPAA COW
2
DRAFT
Version 3: 3/20/14
Based on HIPAA/HITECH Omnibus Rules 9/23/13
i.
If, however, any user will not have access to ePHI during their regularly
scheduled hours, the <Lead Project Coordinator> notifies that user’s supervisor
“X” days prior to the unavailability of the ePHI. The <Lead Project
Coordinator>, develop a plan to accommodate necessary changes. Document
all decisions made and followed as required in this policy.
ii. If the plans increase the potential for unauthorized access to ePHI, the <Lead
Project Coordinator> works with the <Facilities/Building Services/Security
Manager>, <IT department>, and <supervisor>, to identify ways to secure
ePHI throughout the project from unauthorized access.
a. This may include requiring measures such as 24 hour monitoring of the
area with security guards or cameras, changing locks and distributing
keys to individuals on the project to limit the number of individuals with
access, creating new entryways for workforce members and/or patients,
etc.
b. Document all decisions made and followed as required in this policy.
iii. If the plans otherwise decrease the security, confidentiality, and/or integrity of
the ePHI in any way the <Lead Project Coordinator> works with
<Facilities/Building Services/Security Manager>, <IT department>, and
<supervisor>, to identify ways to secure ePHI throughout the project.
Document all decisions made and followed as required in this policy.
3. Monitor for Additional Risks. The <Lead Project Coordinator> continuously monitors the
project and immediately notifies <Facilities/Building Services/Security Manager>, <IT
department>, and <supervisor>of any increase or change in security risks to ePHI noted
during the course of the project. Document all decisions made and followed as required in
this policy. If a violation of <ORGANIZATION’s> security policies and procedures is
identified, it is reported and investigated according to <ORGANIZATION’s> Security
Incident Policy.
4. Documentation of the Project. The <Lead Project Coordinator> or <Facilities/Building
Services/Security Manager> facilitates documentation of all meetings and other efforts made
to protect the confidentiality, integrity, and availability of ePHI throughout the project.
A. Documentation includes, at a minimum, the following information:
i. Description of the repair or modification including a summary of the original
plans, any changes made to the plans, and reasons for any changes made to the
plans.
ii. Reason for the repair or modification.
iii. Repair or modification start and end dates.
iv. Individual(s) that completed the repair or modification.
v. Summary of all steps taken to eliminate or decrease the identified security
risk(s) to ePHI (including those identified before, during, and after the work
was completed). At a minimum, this summary includes:
a. Description of the identified security risk.
b. Date the security risk was identified.
c. Specifically what was done to eliminate or reduce the security risk(s).
______________________________________________________________________________
 Copyright HIPAA COW
3
DRAFT
Version 3: 3/20/14
Based on HIPAA/HITECH Omnibus Rules 9/23/13
d. Dates and times steps were taken to eliminate or reduce the security
risk(s).
e. Individuals involved in eliminating or reducing the security risk(s).
B. After completion of the project, forward all documentation to the
<Facilities/Building Services/Security Manager>.
i. The <Facilities/Building Services/Security Manager> maintains all
documentation for a minimum of six years.
Applicable Standards/Regulations:


45 CFR §164.310(a)(1) – HIPAA Security Facility Access Controls
45 CFR §164.310(a)(2)(iv) – HIPAA Security Rule Maintenance Records
Original Sources:

Phoenix Health Systems, Inc. Maintenance Records Policy
Version History:
Current Version: 3/20/14
Prepared by:
Reviewed by:
Content Changed:
James Sehloff, CareTech
Solutions
Kirsten Wild, Wild
Consulting, Inc.
HIPAA COW Security Networking
Group Members:
Collen Galetka, Frank Ruelas, Lois
Kallunki, Ginny Gerlach, Holly
Schlenvogt, Ray Langford, Todd
Fitzgerald, Allan Mundt
Revised to reflect
current rules,
technologies, and
standards.
**You may request a
copy of the all the
changes made in this
current version by
contacting
administration at
admin2@hipaacow.org.
Original Version: 4/19/05
Prepared by:
Reviewed by:
HIPAA COW Administrative
Workgroup
HIPAA COW Technical
Security Workgroup
HIPAA COW Physical
Security Workgroup
HIPAA COW Privacy Policy
and Procedure Workgroup
______________________________________________________________________________
 Copyright HIPAA COW
4
Download