| New Section # | New Text | Old Section # | Old Text | 
 
  | 312 | § 164.312 Technical
  safeguards. | 312 | § 164.312 Technical safeguards. | 
 
  |  | Each covered entity or business associate must, in
  accordance with §§ 164.306 and 164.316,
  implement all of the following technical safeguards, including technical
  controls, to protect the confidentiality, integrity, and availability of all
  electronic protected health information that it creates, receives, maintains,
  or transmits: |  | A covered entity or business associate must, in
  accordance with § 164.306: | 
 
  | 312(a) | (a) Standard: Access control | 312(a)(1) | (a) (1) Standard: Access control.   | 
 
  | 312(a)(1) | —(1) General. |  |  | 
 
  |  | Deploy technical controls in relevant electronic
  information systems to allow access only to users and technology assets that
  have been granted access rights. |  | Implement technical policies and procedures for
  electronic information systems that maintain electronic protected health
  information to allow access only to those persons or software programs that
  have been granted access rights as specified in § 164.308(a)(4). | 
 
  | 312(a)(2) | (2) Implementation specifications | 312(a)(2) | (2) Implementation specifications:  | 
 
  | 312(a)(2)(i) | —(i) Unique identification. | 312(a)(2)(i) | (i) Unique user identification (Required).  | 
 
  |  | Assign a unique name, number, and/or other identifier for
  tracking each user and technology asset in the covered entity or business
  associate's relevant electronic information systems. |   |  Assign a unique
  name and/or number for identifying and tracking user identity. | 
 
  | 312(a)(2)(ii) | (ii) Administrative and increased access privileges. |  |  | 
 
  |  | Separate user identities from identities used for
  administrative and other increased access privileges. |  |  | 
 
  | 312(a)(2)(iii) | (iii) Emergency access procedure. | 312(a)(2)(ii) | (ii) Emergency access procedure (Required).   | 
 
  |  | Establish (and implement as needed) written and technical
  procedures for obtaining necessary electronic protected health information
  during an emergency. |   | Establish (and implement as needed) procedures for
  obtaining necessary electronic protected health information during an
  emergency. | 
 
  | 312(a)(2)(iv) | (iv) Automatic logoff. | 312(a)(2)(iii) | (iii) Automatic logoff (Addressable).   | 
 
  |  | Deploy technical controls that terminate an electronic
  session after a predetermined time of inactivity that is reasonable and
  appropriate. |   | Implement electronic procedures that terminate an
  electronic session after a predetermined time of inactivity. | 
 
  | 312(a)(2)(v) | (v) Log-in attempts. |  |  | 
 
  |  | Deploy technical controls that disable or suspend the
  access of a user or technology asset to relevant electronic information
  systems after a reasonable and appropriate predetermined number of
  unsuccessful authentication attempts. |  |  | 
 
  | 312(a)(2)(vi) | (vi) Network segmentation. |  |  | 
 
  |  | Deploy technical controls to ensure that the covered
  entity's or business associate's relevant electronic information systems are
  segmented in a reasonable and appropriate manner. |  |  | 
 
  | 312(a)(2)(vii) | (vii) Data controls. |  |  | 
 
  |  | Deploy technical controls to allow access to electronic
  protected health information only to those users and technology assets that
  have been granted access rights to the covered entity's or business
  associate's relevant electronic information systems as specified in § 164.308(a)(10). |  |  | 
 
  | 312(a)(2)(viii) | (viii) Maintenance. |  |  | 
 
  |  | Review and test the effectiveness of the procedures and
  technical controls required by this paragraph (a)(2) at least once every 12
  months or in response to environmental or operational changes, whichever is
  more frequent, and modify as reasonable and appropriate. |  |  | 
 
  | 312(b) | (b) Standard: Encryption and decryption |   |   | 
 
  | 312(b)(1) | —(1) General. |   |   | 
 
  |  | Deploy technical controls to encrypt and decrypt
  electronic protected health information using encryption that meets
  prevailing cryptographic standards. | 312(a)(2)(iv) | (iv) Encryption and decryption (Addressable).  Implement a mechanism to encrypt and
  decrypt electronic protected health information. | 
 
  | 312(b)(2) | (2) Implementation specification. |   |   | 
 
  |  | Encrypt all electronic protected health information at
  rest and in transit, except to the extent that an exception at paragraph
  (b)(3) of this section applies. | 312(e)(2)(ii) | (ii) Encryption (Addressable).  Implement a mechanism to encrypt electronic
  protected health information whenever deemed appropriate. | 
 
  | 312(b)(3) | (3) Exceptions. |  |  | 
 
  |  | This paragraph (b)(3) applies only to the electronic
  protected health information directly affected by one or more of the
  following exceptions and only to the extent that the covered entity or
  business associate documents that an exception applies and that all other
  applicable conditions are met. |  |  | 
 
  |  | (i) The technology asset in use does not support
  encryption of the electronic protected health information consistent with
  prevailing cryptographic standards, and the covered entity or business
  associate establishes and implements a written plan to migrate electronic
  protected health information to a technology asset that supports encryption
  consistent with prevailing cryptographic standards within a reasonable and
  appropriate period of time. |  |  | 
 
  |  | (ii) An individual requests pursuant to § 164.524 to receive their electronic protected health
  information in an unencrypted manner and has been informed of the risks
  associated with the transmission, receipt, and storage of unencrypted
  electronic protected health information. This exception does not apply where
  such individual will receive their electronic protected health information
  pursuant to § 164.524 and the technology used by the individual to
  receive the electronic protected health information is controlled by the
  covered entity or its business associate. |  |  | 
 
  |  | (iii) During an emergency or other occurrence that
  adversely affects the covered entity's or business associate's relevant
  electronic information systems in which encryption is infeasible, and the
  covered entity or business associate implements reasonable and appropriate
  compensating controls in accordance with and determined by the covered
  entity's or business associate's contingency plan under § 164.308(a)(13). |  |  | 
 
  |  | (iv) The technology asset in use is a device under
  section 201(h) of the Food, Drug, and Cosmetic Act, 21 U.S.C. 321(h) that has
  been authorized for marketing by the Food and Drug Administration, as
  follows: |  |  | 
 
  |  | (A) Pursuant to a submission received before March 29,
  2023, provided that the covered entity or business associate deploys in a
  timely manner any updates or patches required or recommended by the
  manufacturer of the device. |  |  | 
 
  |  | (B) Pursuant to a submission received on or after March
  29, 2023, where the device is no longer supported by its manufacturer,
  provided that the covered entity or business associate has deployed any
  updates or patches required or recommended by the manufacturer of the device. |  |  | 
 
  |  | (C) Pursuant to a submission received on or after March
  29, 2023, where the device is supported by its manufacturer. |  |  | 
 
  |  | (4) Alternative measures |  |  | 
 
  |  | —(i) Alternative measures. |  |  | 
 
  |  | Where an exception at paragraph (b)(3) of this section
  applies, a covered entity or business associate must document in real-time
  the existence of an applicable exception and implement reasonable and
  appropriate compensating controls in accordance with paragraph (b)(4)(ii) of
  this section. |  |  | 
 
  |  | (ii) Compensating controls. |  |  | 
 
  |  | (A) To the extent that a covered entity or business
  associate determines that an exception at paragraph (b)(3)(i), (ii), or (iii)
  or (b)(3)(iv)(A) or (B) of this section applies, the covered entity or
  business associate must secure such electronic protected health information
  by implementing reasonable and appropriate compensating controls reviewed and
  approved by the covered entity's or business associate's designated Security
  Official. |  |  | 
 
  |  | (B) To the extent that a covered entity or business
  associate determines that an exception at paragraph (b)(3)(iv)(C) of this
  section applies, the covered entity or business associate shall be presumed
  to have implemented reasonable and appropriate compensating controls where
  the covered entity or business associate has deployed the security measures
  prescribed and as instructed by the authorized label for the device,
  including any updates or patches recommended or required by the manufacturer
  of the device. |  |  | 
 
  |  | (C) To the extent that a covered entity or business
  associate is implementing compensating controls under this paragraph
  (b)(4)(ii), the implementation and effectiveness of compensating controls
  must be reviewed, documented, and signed by the designated Security Official
  at least once every 12 months or in response to environmental or operational
  changes, whichever is more frequent, to continue securing electronic
  protected health information and relevant electronic information systems. |  |  | 
 
  |  | (5) Maintenance. |  |  | 
 
  |  | Review and test the effectiveness of the technical
  controls required by this paragraph (b) at least once every 12 months or in
  response to environmental or operational changes, whichever is more frequent,
  and modify as reasonable and appropriate. |  |  | 
 
  |  |  |  |  | 
 
  | 312(c) | (c) Standard: Configuration management |  |  | 
 
  |  | —(1) General. |  |  | 
 
  |  | Establish and deploy technical controls for securing the
  covered entity's or business associate's relevant electronic information
  systems and technology assets in its relevant electronic information systems,
  including workstations, in a consistent manner, and maintain such electronic
  information systems and technology assets according to the covered entity's or
  business associate's established secure baselines. |  |  | 
 
  |  | (2) Implementation specifications |  |  | 
 
  |  | —(i) Anti-malware protection. |  |  | 
 
  |  | Deploy technology assets and/or technical controls that
  protect all of the covered entity's or business associate's technology assets
  in its relevant electronic information systems against malicious software,
  including but not limited to viruses and ransomware. |  |  | 
 
  |  | (ii) Software removal. |  |  | 
 
  |  | Remove extraneous software from the covered entity's or
  business associate's relevant electronic information systems. |  |  | 
 
  |  | (iii) Configuration. |  |  | 
 
  |  | Configure and secure operating system(s) and software
  consistent with the covered entity's or business associate's risk analysis
  under § 164.308(a)(2). |  |  | 
 
  |  | (iv) Network ports. |  |  | 
 
  |  | Disable network ports in accordance with the covered
  entity's or business associate's risk analysis under § 164.308(a)(2). |  |  | 
 
  |  | (v) Maintenance. |  |  | 
 
  |  | Review and test the effectiveness of the technical
  controls required by this paragraph (c) at least once every 12 months or in
  response to environmental or operational changes, whichever is more frequent,
  and modify as reasonable and appropriate. |  |  | 
 
  | 312(d) | (d) Standard: Audit trail and system log controls | 312(b) | (b) Standard: Audit controls.   | 
 
  | 312(d)(1) | —(1) General. |   |   | 
 
  |  | Deploy technology assets and/or technical controls that
  record and identify activity in the covered entity's or business associate's
  relevant electronic information systems. |   | Implement hardware, software, and/or procedural
  mechanisms that record and examine activity in information systems that
  contain or use electronic protected health information. | 
 
  | 312(d)(2) | (2) Implementation specifications |  |  | 
 
  |  | —(i) Monitor and identify. |  |  | 
 
  |  | The covered entity or business associate must deploy
  technology assets and/or technical controls that monitor in real-time all
  activity in its relevant electronic information systems, identify indications
  of unauthorized persons or unauthorized activity as determined by the covered
  entity's or business associate's risk analysis under § 164.308(a)(2), and alert workforce members of such
  indications in accordance with the policies and procedures required by § 164.308(a)(7). |  |  | 
 
  |  | (ii) Record. |  |  | 
 
  |  | The covered entity or business associate must deploy
  technology assets and/or technical controls that record in real-time all
  activity in its relevant electronic information systems. |  |  | 
 
  |  | (iii) Retain. |  |  | 
 
  |  | The covered entity or business associate must deploy
  technology assets and/or technical controls to retain records of all activity
  in its relevant electronic information systems as determined by the covered
  entity's or business associate's policies and procedures for information
  system activity review at § 164.308(a)(7)(ii)(A). |  |  | 
 
  |  | (iv) Scope. |  |  | 
 
  |  | Activity includes creating, accessing, receiving,
  transmitting, modifying, copying, or deleting any of the following: |  |  | 
 
  |  | (A) Electronic protected health information. |  |  | 
 
  |  | (B) Relevant electronic information systems and the
  information therein. |  |  | 
 
  |  | (v) Maintenance. |  |  | 
 
  |  | Review and test the effectiveness of the technology
  assets and/or technical controls required by this paragraph (d) at least once
  every 12 months or in response to environmental or operational changes,
  whichever is more frequent, and modify as reasonable and appropriate. |  |  | 
 
  |   | (e) Standard: Integrity. | 312(c)(1) | (c)(1) Standard: Integrity.   | 
 
  |   | Deploy technical controls to protect electronic protected
  health information from improper alteration or destruction, both at rest and
  in transit;  |   | Implement policies and procedures to protect electronic
  protected health information from improper alteration or destruction. | 
 
  |  | and review and test the effectiveness of such technical
  controls at least once every 12 months or in response to environmental or
  operational changes, whichever is more frequent, and modify as reasonable and
  appropriate. |  |  | 
 
  |  |  | 312(c)(2) | (2) Implementation specification: Mechanism to
  authenticate electronic protected health information (Addressable).  Implement electronic mechanisms to
  corroborate that electronic protected health information has not been altered
  or destroyed in an unauthorized manner. | 
 
  |  |  | 312(e)(2)(i) | (i) Integrity controls (Addressable).  Implement security measures to ensure that
  electronically transmitted electronic protected health information is not
  improperly modified without detection until disposed of. | 
 
  | 312(f) | (f) Standard: Authentication | 312(d) | (d) Standard: Person or entity authentication.  | 
 
  |  | —(1) General. |   |   | 
 
  |  | Deploy technical controls to verify that a person or
  technology asset seeking access to electronic protected health information
  and/or the covered entity's or business associate's relevant electronic
  information systems is the one claimed. |   |  Implement
  procedures to verify that a person or entity seeking access to electronic
  protected health information is the one claimed. | 
 
  |  | (2) Implementation specifications |  |  | 
 
  |  | —(i) Information access management policies. |  |  | 
 
  |  | Deploy technical controls in accordance with the covered
  entity's or business associate's information access management policies and
  procedures under § 164.308(a)(10),
  including technical controls that require users to adopt unique passwords
  that are consistent with the current recommendations of authoritative
  sources. |  |  | 
 
  |  | (ii) Multi-factor authentication. |  |  | 
 
  |  | (A) Deploy multi-factor authentication to all technology
  assets in the covered entity's or business associate's relevant electronic
  information systems to verify that a person seeking access to the relevant
  electronic information system(s) is the user that the person claims to be. |  |  | 
 
  |  | (B) Deploy multi-factor authentication for any action
  that would change a user's privileges to the covered entity's or business
  associate's relevant electronic information systems in a manner that would
  alter the user's ability to affect the confidentiality, integrity, or
  availability of electronic protected health information. |  |  | 
 
  |  | (iii) Exceptions. |  |  | 
 
  |  | Deployment of multi-factor authentication is not required
  in any of the following circumstances. |  |  | 
 
  |  | (A) The technology asset in use does not support
  multi-factor authentication, and the covered entity or business associate
  establishes and implements a written plan to migrate electronic protected
  health information to a technology asset that supports multi-factor
  authentication within a reasonable and appropriate period of time. |  |  | 
 
  |  | (B) During an emergency or other occurrence that
  adversely affects the covered entity's or business associate's relevant
  electronic information systems or the confidentiality, integrity, or
  availability of electronic protected health information in which multi-factor
  authentication is infeasible and the covered entity or business associate
  implements reasonable and appropriate compensating controls in accordance
  with its emergency access procedures under paragraph (a)(2)(iii) of this
  section and the covered entity's or business associate's contingency plan
  under § 164.308(a)(13). |  |  | 
 
  |  | (C) The technology asset in use is a device under section
  201(h) of the Food, Drug, and Cosmetic Act, 21 U.S.C. 321(h) that has been
  authorized for marketing by the Food and Drug Administration, as follows: |  |  | 
 
  |  | (1) Pursuant to a submission received before March 29,
  2023, provided that the covered entity or business associate has deployed any
  updates or patches required or recommended by the manufacturer of the device. |  |  | 
 
  |  | (2) Pursuant to a submission received on or after March
  29, 2023, where the device is no longer supported by its manufacturer,
  provided that the covered entity or business associate has deployed any
  updates or patches required or recommended by the manufacturer of the device. |  |  | 
 
  |  | (3) Pursuant to a submission received on or after March
  29, 2023, where the device is supported by its manufacturer. |  |  | 
 
  |  | (iv) Alternative measures |  |  | 
 
  |  | —(A) Alternative measures. |  |  | 
 
  |  | Where an exception at paragraph (f)(2)(iii) of this
  section applies, a covered entity or business associate must document in
  real-time the existence of an applicable exception and implement reasonable
  and appropriate compensating controls as required by paragraph (f)(2)(iv)(B)
  of this section. |  |  | 
 
  |  | (B) Compensating controls. |  |  | 
 
  |  | (1) To the extent that a covered entity or business
  associate determines that an exception at paragraph (f)(2)(iii)(A) or (B) or
  (f)(2)(iii)(C)(1) or (2) of this section applies, the covered entity or
  business associate must secure its relevant electronic information systems by
  implementing reasonable and appropriate compensating controls reviewed,
  approved, and signed by the covered entity's or business associate's
  designated Security Official. |  |  | 
 
  |  | (2) To the extent that a covered entity or business
  associate determines that an exception at paragraph (f)(2)(iii)(C)(3) of this
  section applies, the covered entity or business associate shall be presumed
  to have implemented reasonable and appropriate compensating controls where
  the covered entity or business associate has deployed the security measures
  prescribed and as instructed by the authorized label for the device,
  including any updates or patches recommended or required by the manufacturer
  of the device. |  |  | 
 
  |  | (3) To the extent that a covered entity or business
  associate is implementing compensating controls under this paragraph
  (f)(2)(iv)(B), the effectiveness of compensating controls must be reviewed
  and documented by the designated Security Official at least once every 12
  months or in response to environmental or operational changes, whichever is
  more frequent, to continue securing electronic protected health information
  and its relevant electronic information systems. |  |  | 
 
  |  | (v) Maintenance. |  |  | 
 
  |  | Review and test the effectiveness of the technical
  controls required by this paragraph (f) at least once every 12 months or in
  response to environmental or operational changes, whichever is more frequent,
  and modify as reasonable and appropriate. |  |  | 
 
  | 312(g) | (g) Standard: Transmission security. | 312(e) | (e)(1) Standard: Transmission security.   | 
 
  |  | Deploy technical controls to guard against unauthorized
  access to electronic protected health information that is being transmitted
  over an electronic communications network;  |   | Implement technical security measures to guard against
  unauthorized access to electronic protected health information that is being
  transmitted over an electronic communications network. | 
 
  |  | and review and test the effectiveness of such technical
  controls at least once every 12 months or in response to environmental or
  operational changes, whichever is more frequent, and modify as reasonable and
  appropriate. |  |  | 
 
  |  |  |  | (2) Implementation specifications:  | 
 
  | 312(h) | (h) Standard: Vulnerability management |  |  | 
 
  |  | —(1) General. |  |  | 
 
  |  | Deploy technical controls in accordance with the covered
  entity's or business associate's patch management policies and procedures
  required by § 164.308(a)(4)(ii)(A) to identify and address technical
  vulnerabilities in the covered entity's or business associate's relevant
  electronic information systems. |  |  | 
 
  |  | (2) Implementation specifications |  |  | 
 
  |  | —(i) Vulnerability scanning. |  |  | 
 
  |  | (A) Conduct automated vulnerability scans to identify
  technical vulnerabilities in the covered entity's or business associate's
  relevant electronic information systems in accordance with the covered
  entity's or business associate's risk analysis required by § 164.308(a)(2) or at least once every six months,
  whichever is more frequent. |  |  | 
 
  |  | (B) Review and test the effectiveness of the technology
  asset(s) that conducts the automated vulnerability scans required by
  paragraph (h)(2)(i)(A) of this section at least once every 12 months or in
  response to environmental or operational changes, whichever is more frequent,
  and modify as reasonable and appropriate. |  |  | 
 
  |  | (ii) Monitoring. |  |  | 
 
  |  | Monitor authoritative sources for known vulnerabilities
  on an ongoing basis and remediate such vulnerabilities in accordance with the
  covered entity's or business associate's patch management program under § 164.308(a)(4). |  |  | 
 
  |  | (iii) Penetration testing. |  |  | 
 
  |  | Perform penetration testing of the covered entity's or
  business associate's relevant electronic information systems by a qualified
  person. |  |  | 
 
  |  | (A) A qualified person is a person with appropriate
  knowledge of and experience with generally accepted cybersecurity principles
  and methods for ensuring the confidentiality, integrity, and availability of
  electronic protected health information. |  |  | 
 
  |  | (B) Penetration testing must be performed at least once
  every 12 months or in accordance with the covered entity's or business
  associate's risk analysis required by § 164.308(a)(2),
  whichever is more frequent. |  |  | 
 
  |  | (iv) Patch and update installation. |  |  | 
 
  |  | Deploy technical controls in accordance with the covered
  entity's or business associate's patch management program under § 164.308(a)(4) to ensure timely installation of software
  patches and critical updates as reasonable and appropriate. |  |  | 
 
  |  | (i) Standard: Data backup and recovery |  |  | 
 
  |  | —(1) General. |  |  | 
 
  |  | Deploy technical controls to create and maintain exact
  retrievable copies of electronic protected health information. |  |  | 
 
  |  | (2) Implementation specifications |  |  | 
 
  |  | —(i) Data backup. |  |  | 
 
  |  | Create backups of electronic protected health information
  in accordance with the policies and procedures required by § 164.308(a)(13)(ii)(B) and with such frequency to ensure
  retrievable copies of electronic protected health information are no more
  than 48 hours older than the electronic protected health information
  maintained in the covered entity or business associate's relevant electronic
  information systems. |  |  | 
 
  |  | (ii) Monitor and identify. |  |  | 
 
  |  | Deploy technical controls that, in real-time, monitor,
  and alert workforce members about, any failures and error conditions of the
  backups required by paragraph (i)(2)(i) of this section. |  |  | 
 
  |  | (iii) Record. |  |  | 
 
  |  | Deploy technical controls that record the success,
  failure, and any error conditions of backups required by paragraph (i)(2)(i)
  of this section. |  |  | 
 
  |  | (iv) Testing. |  |  | 
 
  |  | Restore a representative sample of electronic protected
  health information backed up as required by paragraph (i)(2)(i) of this
  section, and document the results of such test restorations at least monthly. |  |  | 
 
  |  | (j) Standard: Information systems backup and recovery. |  |  | 
 
  |  | Deploy technical controls to create and maintain backups
  of relevant electronic information systems; and review and test the
  effectiveness of such technical controls at least once every six months or in
  response to environmental or operational changes, whichever is more frequent,
  and modify as reasonable and appropriate. |  |  |