New Section # |
New Text |
Old Section # |
Old Text |
308 |
§ 164.308 Administrative safeguards. |
308 |
§ 164.308 Administrative safeguards. |
308 (a) |
(a) A covered entity or business associate must, in
accordance with § 164.306 and 164.316, |
308 (a) |
(a) A covered entity or business associate must, in
accordance with § 164.306: |
308 (a)(1)(i) |
(1)(i) Standard: Security management process. |
||
implement all of
the following administrative safeguards to protect the confidentiality,
integrity, and availability of all electronic protected health information
that it creates, receives, maintains, or transmits: |
Implement policies and procedures to prevent, detect,
contain, and correct security violations. |
||
308 (a)(1)(ii) |
(ii) Implementation specifications: |
||
308 (a)(1) |
(1) Standard: Technology asset inventory |
|
|
|
—(i) General. |
|
|
|
Conduct and maintain an accurate and thorough written
inventory and a network map of the covered entity's or business associate's
electronic information systems and all technology assets that may affect the
confidentiality, integrity, or availability of electronic protected health
information. |
|
|
|
(ii) Implementation specifications |
|
|
|
—(A) Inventory. |
|
|
|
Develop a written inventory of the covered entity's or
business associate's technology assets that contains the identification,
version, person accountable, and location of each technology asset. |
|
|
|
(B) Network map. |
|
|
|
Develop a network map that illustrates the movement of
electronic protected health information throughout the covered entity's or
business associate's electronic information systems, including but not
limited to how electronic protected health information enters and exits such
information systems, and is accessed from outside of such information systems. |
|
|
|
(C) Maintenance. |
|
|
|
Review and update the written inventory of technology
assets required by paragraph (a)(1)(ii)(A) of this section and the network
map required by paragraph (a)(1)(ii)(B) of this section in the following
circumstances: |
|
|
|
(1) On an ongoing basis, but at least once every 12
months. |
|
|
|
(2) When there is a change in the covered entity's or
business associate's environment or operations that may affect electronic
protected health information, including but not limited to the adoption of
new technology assets; the upgrading, updating, or patching of technology
assets; newly recognized threats to the confidentiality, integrity, or
availability of electronic protected health information; a sale, transfer,
merger, or consolidation of all or part of the covered entity or business
associate with another person; a security incident that affects the
confidentiality, integrity, and availability of electronic protected health
information; and relevant changes in Federal, State, Tribal, or territorial
law. |
|
|
308 (a)(2) |
(2) Standard: Risk analysis |
308 (a)(1)(ii)(A) |
(A) Risk analysis (Required). |
|
—(i) General. |
|
|
|
Conduct an accurate and comprehensive written assessment
of the potential risks and vulnerabilities to the confidentiality, integrity,
and availability of all electronic protected health information created,
received, maintained, or transmitted by the covered entity or business
associate. |
|
Conduct an accurate and thorough assessment of the
potential risks and vulnerabilities to the confidentiality, integrity, and
availability of electronic protected health information held by the covered
entity or business associate. |
|
(ii) Implementation specifications |
|
|
|
—(A) Assessment. |
|
|
|
The written assessment must include, at a minimum, all of
the following: |
|
|
|
(1) A review of the technology asset inventory required
by paragraph (a)(1)(ii)(A) of this section and the network map required by
paragraph (a)(1)(ii)(B) of this section to identify where electronic
protected health information may be created, received, maintained, or
transmitted within the covered entity's or business associate's electronic
information systems. |
|
|
|
(2) Identification of all reasonably anticipated threats
to the confidentiality, integrity, and availability of electronic protected
health information that the covered entity or business associate creates,
receives, maintains, or transmits. |
|
|
|
(3) Identification of potential vulnerabilities and
predisposing conditions to the covered entity's or business associate's
relevant electronic information systems. |
|
|
|
(4) An assessment and documentation of the security
measures the covered entity or business associate uses to ensure the
confidentiality, integrity, and availability of the electronic protected
health information created, received, maintained, or transmitted by the
covered entity or business associate. |
|
|
|
(5) A reasonable determination of the likelihood that
each threat identified in accordance with paragraph (a)(2)(ii)(A)(2) of this
section will exploit the vulnerabilities identified in accordance with
paragraph (a)(2)(ii)(A)( |
|
|
|
3) of this section. |
|
|
|
(6) A reasonable determination of the potential impact of
each threat identified in accordance with paragraph (a)(2)(ii)(A)(2) of this
section successfully exploiting the vulnerabilities identified in accordance
with paragraph (a)(2)(ii)(A)(3) of this section. |
|
|
|
(7) An assessment of risk level for each threat
identified in accordance with paragraph (a)(2)(ii)(A)(2) of this section and
vulnerability identified in accordance with paragraph (a)(2)(ii)(A)(3) of
this section, based on the determinations made in accordance with paragraphs
(a)(2)(ii)(A)(5) and (6) of this section. |
|
|
|
(8) An assessment of the risks to electronic protected
health information posed by entering into or continuing a business associate
contract or other written arrangement with any prospective or current
business associate, respectively, based on the written verification obtained
from the prospective or current business associate in accordance with
paragraph (b)(1) of this section. |
|
|
|
(B) Maintenance. |
|
|
|
Review, verify, and update the written assessment on an
ongoing basis, but at least once every 12 months and, in accordance with
paragraph (a)(1)(ii)(C)(2) of this section, in response to a change in the
covered entity's or business associate's environment or operations that may
affect electronic protected health information. |
|
|
308 (a)(3) |
(3) Standard: Evaluation |
|
|
|
—(i) General. |
|
|
|
Perform a written technical and nontechnical evaluation
to determine whether a change in the covered entity's or business associate's
environment or operations may affect the confidentiality, integrity, or
availability of electronic protected health information. |
|
|
|
(ii) Implementation specifications |
|
|
|
—(A) Performance. |
|
|
|
Perform a written technical and nontechnical evaluation
within a reasonable period of time before making a change in the covered
entity's or business associate's environment or operations as described in
paragraph (a)(1)(ii)(C)(2) of this section. |
|
|
|
(B) Response. |
|
|
|
Respond to the written technical and nontechnical
evaluation in accordance with the covered entity's or business associate's
risk management plan required by paragraph (a)(5)(ii)(A) of this section. |
|
|
308 (a)(4) |
(4) Standard: Patch management |
|
|
|
—(i) General. |
|
|
|
Implement written policies and procedures for applying
patches and updating the configuration(s) of the covered entity's or business
associate's relevant electronic information systems. |
|
|
|
(ii) Implementation specifications |
|
|
|
—(A) Policies and procedures. |
|
|
|
Establish written policies and procedures for
identifying, prioritizing, acquiring, installing, evaluating, and verifying
the timely installation of patches, updates, and upgrades throughout the
covered entity's or business associate's relevant electronic information
systems. |
|
|
|
(B) Maintenance. |
|
|
|
Review and test written policies and procedures required
by paragraph (a)(4)(ii)(A) of this section at least once every 12 months, and
modify such policies and procedures as reasonable and appropriate. |
|
|
|
(C) Application. |
|
|
|
Patch, update, and upgrade the configurations of relevant
electronic information systems in accordance with the written policies and
procedures required by paragraph (a)(4)(ii)(A) of this section and based on
the results of the covered entity's or business associate's risk analysis
required by paragraph (a)(2) of this section, the vulnerability scans
required by § 164.312(h)(2)(i), the monitoring of authoritative sources
required by § 164.312(h)(2)(ii), and penetration tests required by
§ 164.312(h)(2)(iii), within a reasonable and appropriate period of time, as
follows, except to the extent that an exception at paragraph (a)(4)(ii)(D) of
this section applies: |
|
|
|
(1) Within 15 calendar days of identifying the need to
patch, update, or upgrade the configuration of a relevant electronic
information system to address a critical risk in accordance with this
paragraph (a)(4)(ii)(C), where a patch, update, or upgrade is available; or,
where a patch, update, or upgrade is not available, within 15 calendar days
of a patch, update, or upgrade becoming available. |
|
|
|
(2) Within 30 calendar days of identifying the need to
patch, update, or upgrade the configuration of a relevant electronic
information system to address a high risk in accordance with this paragraph
(a)(4)(ii)(C), where a patch, update, or upgrade is available; or, where a
patch, update, or upgrade is not available, within 30 calendar days of a
patch, update, or upgrade becoming available. |
|
|
|
(3) As determined by and documented in the covered
entity's or business associate's policies and procedures under paragraph
(a)(4)(ii)(A) of this section for all other patches, updates, and upgrades to
the configuration of a relevant electronic information system. |
|
|
|
(D) Exceptions. |
|
|
|
This paragraph (a)(4)(ii)(D) applies only to the extent
that a covered entity or business associate documents that an exception in
this paragraph (a)(4)(ii)(D) applies and that all other applicable conditions
are met. |
|
|
|
(1) A patch, update, or upgrade to the configuration of a
relevant electronic information system is not available to address a risk
identified in the risk analysis under paragraph (a)(2) of this section. |
|
|
|
(2) The only available patch, update, or upgrade would
adversely affect the confidentiality, integrity, or availability of
electronic protected health information. |
|
|
|
(E) Alternative measures. |
|
|
|
Where an exception at paragraph (a)(4)(ii)(D) of this
section applies, a covered entity or business associate must document in
real-time the existence of an applicable exception and implement reasonable
and appropriate compensating controls in accordance with paragraph
(a)(4)(ii)(F) of this section. |
|
|
|
(F) Compensating controls. |
|
|
|
To the extent that a covered entity or business associate
determines that an exception at paragraph (a)(4)(ii)(D) of this section
applies, a covered entity or business associate must implement reasonable and
appropriate security measures to address the identified risk in a timely manner
as required by paragraph (a)(5)(ii)(D) of this section until a patch, update,
or upgrade that does not adversely affect the confidentiality, integrity, or
availability of electronic protected health information becomes available. |
|
|
308 (a)(5) |
(5) Standard: Risk management |
308 (a)(1)(ii)(B) |
(B) Risk management (Required). |
|
—(i) General. |
|
|
|
Implement security measures sufficient to reduce risks
and vulnerabilities to all electronic protected health information to a
reasonable and appropriate level. |
|
Implement security measures sufficient to reduce risks
and vulnerabilities to a reasonable and appropriate level to comply with §
164.306(a). |
|
(ii) Implementation specifications |
|
|
|
—(A) Planning. |
|
|
|
Establish and implement a written risk management plan
for reducing risks to all electronic protected health information, including
but not limited to those risks identified by the risk analysis under
paragraph (a)(2)(ii)(A) of this section, to a reasonable and appropriate
level. |
|
|
|
(B) Maintenance. |
|
|
|
Review the written risk management plan required by
paragraph (a)(5)(ii)(A) of this section at least once every 12 months and as
reasonable and appropriate in response to changes in the risk analysis made
in accordance with paragraph (a)(2)(ii)(B) of this section, and modify as
reasonable and appropriate. |
|
|
|
(C) Priorities. |
|
|
|
The written risk management plan must prioritize the
risks identified in the risk analysis required by paragraph (a)(2)(ii)(A) of
this section, based on the risk levels determined by such risk analysis. |
|
|
|
(D) Implementation. |
|
|
|
Implement security measures in a timely manner to address
the risks identified in the covered entity's or business associate's risk
analysis in accordance with the priorities established under paragraph
(a)(5)(ii)(C) of this section. |
|
|
308 (a)(6) |
(6) Standard: Sanction policy |
308 (a)(1)(ii)(C) |
(C) Sanction policy (Required). |
|
—(i) General. |
|
|
|
Apply appropriate sanctions against workforce members who
fail to comply with the security policies and procedures of the covered
entity or business associate. |
|
Apply appropriate sanctions against workforce members who
fail to comply with the security policies and procedures of the covered
entity or business associate. |
|
(ii) Implementation specifications |
|
|
|
—(A) Policies and procedures. |
|
|
|
Establish written policies and procedures for sanctioning
workforce members who fail to comply with the security policies and
procedures of the covered entity or business associate. |
|
|
|
(B) Modifications. |
|
|
|
Review written sanctions policies and procedures at least
once every 12 months, and modify as reasonable and appropriate. |
|
|
|
(C) Application. |
|
|
|
Apply and document appropriate sanctions against
workforce members who fail to comply with the security policies and
procedures of the covered entity or business associate in accordance with the
written policies and procedures for sanctioning workforce members required by
paragraph (a)(6)(ii)(A) of this section. |
|
|
308 (a)(7) |
(7) Standard: Information system activity review |
308 (a)(1)(ii)(D) |
(D) Information system activity review (Required). |
—(i) General. |
|||
Implement written policies and procedures for regularly
reviewing records of activity in the covered entity's or business associate's
relevant electronic information systems. |
Implement procedures to regularly review records of
information system activity, such as audit logs, access reports, and security
incident tracking reports. |
||
|
(ii) Implementation specifications |
|
|
|
—(A) Policies and procedures. |
|
|
|
Establish written policies and procedures for retaining
and reviewing records of activity in the covered entity's or business
associate's relevant electronic information systems by persons and technology
assets, including the frequency for reviewing such records. |
|
|
|
(B) Scope. |
|
|
|
Records of activity in the covered entity's or business
associate's relevant electronic information systems by persons and/or
technology assets include but are not limited to audit trails, event logs,
firewall logs, system logs, data backup logs, access reports, anti-malware
logs, and security incident tracking reports. |
|
|
|
(C) Record review. |
|
|
|
Review records of activity in a covered entity's or
business associate's relevant electronic information systems by persons and
technology assets as often as reasonable and appropriate for the type of
report or log and document such review. |
|
|
|
(D) Record retention. |
|
|
|
Retain records of activity in the covered entity's or
business associate's relevant electronic information systems by persons and
technology assets for a period of time that is reasonable and appropriate for
the type of report or log. |
|
|
|
(E) Response. |
|
|
|
Where a suspected or known security incident is
identified during the review required by paragraph (a)(7)(ii)(C) of this
section, respond in accordance with the covered entity's or business
associate's security incident response plan required by paragraph
(a)(12)(ii)(A)(1) of this section. |
|
|
|
(F) Maintenance. |
|
|
|
Review and test the written policies and procedures
required by paragraph (a)(7)(ii)(A) of this section at least once every 12
months and modify as reasonable and appropriate. |
|
|
308 (a)(8) |
(8) Standard: Assigned security responsibility. |
308 (a)(2) |
(2) Standard: Assigned security responsibility. |
In writing, identify the security official who is
responsible for the development and implementation of the policies and
procedures, written or otherwise, and deployment of technical controls
required by this subpart for the covered entity or business associate. |
Identify the security official who is responsible for the
development and implementation of the policies and procedures required by
this subpart for the covered entity or business associate. |
||
308 (a)(9) |
(9) Standard: Workforce security |
308 (a)(3)(i) |
(3) (i) Standard: Workforce security. |
308 (a)(9)(i) |
—(i) General. |
||
Implement written policies and procedures to ensure that
all members of its workforce have appropriate access to electronic protected
health information and relevant electronic information systems, and to
prevent those workforce members who are not authorized to have access from
obtaining access to electronic protected health information and relevant
electronic information systems. |
Implement policies and procedures to ensure that all
members of its workforce have appropriate access to electronic protected
health information, as provided under paragraph (a)(4) of this section, and
to prevent those workforce members who do not have access under paragraph
(a)(4) of this section from obtaining access to electronic protected health
information. |
||
308 (a)(9)(ii) |
(ii) Implementation specifications |
308 (a)(3)(ii) |
(ii) Implementation specifications: |
308 (a)(9)(ii)(A) |
—(A) Authorization and/or supervision. |
308 (a)(3)(ii)(A) |
(A) Authorization and/or supervision (Addressable). |
Establish and implement written procedures for the
authorization and/or supervision of workforce members who access electronic
protected health information or relevant electronic information systems, or
who work in facilities where electronic protected health information or
relevant electronic information systems might be accessed. |
Implement
procedures for the authorization and/or supervision of workforce members who
work with electronic protected health information or in locations where it
might be accessed. |
||
308 (a)(9)(ii)(B) |
(B) Workforce clearance procedure. |
308 (a)(3)(ii)(B) |
(B) Workforce clearance procedure (Addressable). |
Establish and implement written procedures to determine
that the access of a workforce member to electronic protected health
information or relevant electronic information systems is appropriate in
accordance with paragraph (a)(10)(ii)(B) of this section. |
Implement procedures to determine that the access of a
workforce member to electronic protected health information is appropriate. |
||
308 (a)(9)(ii)(C) |
(C) Modification and termination procedures. |
308 (a)(3)(ii)(C) |
(C) Termination procedures (Addressable). |
308 (a)(9)(ii)(C)(1) |
(1) Establish and implement written procedures, in
accordance with paragraph (a)(9)(ii)(C)(2) of this section, to terminate a
workforce member's access to electronic protected health information and
relevant electronic information systems, and to facilities where electronic
protected health information or relevant electronic information systems might
be accessed. |
Implement procedures for terminating access to electronic
protected health information when the employment of, or other arrangement
with, a workforce member ends or as required by determinations made as
specified in paragraph (a)(3)(ii)(B) of this section. |
|
|
(2) A workforce member's access must be terminated as
soon as possible but no later than one hour after the employment of, or other
arrangement with, a workforce member ends. |
|
|
308 (a)(9)(ii)(D) |
(D) Notification. |
|
|
|
(1) Establish and implement written procedures, in
accordance with paragraph (a)(9)(ii)(D)(2) of this section, to notify another
covered entity or business associate of a change in or termination of access
where the workforce member is or was authorized to access such electronic
protected health information or relevant electronic information systems by
the covered entity or business associate making the notification. |
|
|
|
(2) Notification must occur as soon as possible but no
later than 24 hours after a change in or termination of a workforce member's
authorization to access electronic protected health information or relevant
electronic information systems maintained by such other covered entity or
business associate. |
|
|
308 (a)(9)(ii)(E) |
(E) Maintenance. |
|
|
|
Review and test written policies and procedures required
under paragraph (a)(9)(ii)(A) through (D) of this section at least once every
12 months, and modify as reasonable and appropriate. |
|
|
308 (a)(10) |
(10) Standard: Information access management |
308 (a)(4)(i) |
(4)(i) Standard: Information access management. |
|
—(i) General. |
|
|
|
Establish and implement written policies and procedures
for authorizing access to electronic protected health information and
relevant electronic information systems that are consistent with the
applicable requirements of subpart E of this part. |
|
Implement policies and procedures for authorizing access
to electronic protected health information that are consistent with the
applicable requirements of subpart E of this part. |
|
(ii) Implementation specifications |
308 (a)(4)(ii) |
(ii) Implementation specifications: |
308 (a)(10)(A) |
—(A) Isolating health care clearinghouse functions. |
308 (a)(4)(ii)(A) |
(A) Isolating health care clearinghouse functions
(Required). |
If a health care clearinghouse is part of a larger
organization, the clearinghouse must establish and implement written policies
and procedures that protect the electronic protected health information and
relevant electronic information systems of the clearinghouse from
unauthorized access by the larger organization. |
If a health care clearinghouse is part of a larger
organization, the clearinghouse must implement policies and procedures that
protect the electronic protected health information of the clearinghouse from
unauthorized access by the larger organization. |
||
308 (a)(10)(B) |
(B) Access authorization. |
308 (a)(4)(ii)(B) |
(B) Access authorization (Addressable). |
Establish and implement written policies and procedures
for granting and revising access to electronic protected health information
and relevant electronic information systems as necessary and appropriate for
each prospective user and technology asset to carry out their assigned
function(s). |
Implement policies and procedures for granting access to
electronic protected health information, for example, through access to a
workstation, transaction, program, process, or other mechanism. |
||
308 (a)(10)(C) |
(C) Authentication management. |
|
|
|
Establish and implement written policies and procedures
for verifying the identities of users and technology assets prior to
accessing the covered entity's or business associate's relevant electronic
information systems, including written policies and procedures for
implementing multi-factor authentication technical controls required by
§ 164.312(f)(2)(ii) through (v). |
|
|
308 (a)(10)(D) |
(D) Access determination and modification. |
308 (a)(4)(ii)(C) |
(C) Access establishment and modification
(Addressable). |
Establish and implement written policies and procedures
that, based upon the covered entity's or the business associate's access
authorization policies, determine, document, review, and modify the access of
each user and technology asset to specific components of the covered entity's
or business associate's relevant electronic information systems. |
Implement policies and procedures that, based upon the
covered entity's or the business associate's access authorization policies,
establish, document, review, and modify a user's right of access to a
workstation, transaction, program, or process. |
||
308 (a)(10)(E) |
(E) Network segmentation. |
|
|
|
Establish and implement written policies and procedures
that ensure that a covered entity's or business associate's relevant
electronic information systems are segmented to limit access to electronic
protected health information to authorized workstations. |
|
|
308 (a)(10)(F) |
(F) Maintenance. |
|
|
|
Review and test the written policies and procedures
required by this paragraph (a)(10)(ii) at least once every 12 months, and
modify as reasonable and appropriate. |
|
|
308 (a)(11) |
(11) Standard: Security awareness training |
308 (a)(5)(i) |
(5)(i) Standard: Security awareness and training. |
—(i) General. |
|||
Implement security awareness training for all workforce
members on protection of electronic protected health information and
information systems as necessary and appropriate for the members of the
workforce to carry out their assigned function(s). |
Implement a security awareness and training program for
all members of its workforce (including management). |
||
(ii) Implementation specifications |
(ii) Implementation specifications. Implement: |
||
308 (a)(5)(ii)(A) |
(A) Security reminders (Addressable). Periodic security updates. |
||
308 (a)(5)(ii)(C) |
(C) Log-in monitoring (Addressable). Procedures for monitoring log-in attempts
and reporting discrepancies. |
||
308 (a)(11)(ii)(A) |
—(A) Training. |
||
A covered entity or business associate must develop and
implement security awareness training for all workforce members that
addresses all of the following: |
|||
308 (a)(11)(ii)(A)(1) |
(1) The written policies and procedures with respect to
electronic protected health information required by this subpart as necessary
and appropriate for the workforce members to carry out their assigned
functions. |
||
308 (a)(11)(ii)(A)(2) |
(2) Guarding against, detecting, and reporting suspected
or known security incidents, including but not limited to, malicious software
and social engineering. |
308 (a)(5)(ii)(B) |
(B) Protection from malicious software
(Addressable). Procedures for guarding
against, detecting, and reporting malicious software. |
308 (a)(11)(ii)(A)(3) |
(3) The written policies and procedures for accessing the
covered entity's or business associate's relevant electronic information
systems, including but not limited to: safeguarding passwords; setting unique
passwords of sufficient strength to ensure the confidentiality, integrity,
and availability of electronic protected health information; and limitations
on sharing passwords. |
308 (a)(5)(ii)(D) |
(D) Password management (Addressable). Procedures for creating, changing, and
safeguarding passwords. |
|
(B) Timing. |
|
|
|
A covered entity or business associate must provide
security awareness training as follows: |
|
|
|
(1) As required by paragraph (a)(11)(ii)(A) of this
section, to each member of its workforce by no later than the compliance
date, and at least once every 12 months thereafter. |
|
|
|
(2) As required by paragraph (a)(11)(ii)(A) of this
section, to each new member of its workforce within a reasonable period of
time but no later than 30 days after the person first has access to the
covered entity's or business associate's relevant electronic information
systems. |
|
|
|
(3) On a material change to the policies or procedures
required by this subpart, to each member of its workforce whose functions are
affected by such change, within a reasonable period of time but no later than
30 days after the material change occurs. |
|
|
|
(C) Ongoing education. |
|
|
|
A covered entity or business associate must provide its
workforce members ongoing reminders of their security responsibilities and
notifications of relevant threats, including but not limited to new and
emerging malicious software and social engineering. |
|
|
|
(D) Documentation. |
|
|
|
A covered entity or business associate must document that
the training required by paragraph (a)(11)(ii)(A) of this section and ongoing
reminders required by paragraph (a)(11)(ii)(C) of this section have been
provided. |
|
|
308 (a)(12) |
(12) Standard: Security incident procedures |
308 (a)(6)(i) |
(6)(i) Standard: Security incident procedures. |
308 (a)(12)(i) |
—(i) General. |
|
|
Implement written policies and procedures to respond to
security incidents. |
|
Implement policies and procedures to address security
incidents. |
|
308 (a)(12)(ii) |
(ii) Implementation specifications |
308 (a)(6)(ii) |
(ii) Implementation specification: |
|
—(A) Planning and testing. |
|
|
308 (a)(12)(ii)(A)(1) |
(1) Establish written security incident response plan(s)
and procedures documenting how workforce members are to report suspected or
known security incidents and how the covered entity or business associate
will respond to suspected or known security incidents in accordance with
paragraph (a)(12)(ii)(B) of this section. |
|
|
308 (a)(12)(ii)(A)(2) |
(2) Implement written procedures for testing and revising
security incident response plan(s) required by paragraph (a)(12)(ii)(A)(1) of
this section. |
|
|
308 (a)(12)(ii)(A)(3) |
(3) Review and test security incident response plan(s)
and procedures required by paragraph (a)(12)(ii)(A)(1) of this section at
least once every 12 months, document the results of such tests, and modify
security incident response plan(s) and procedures as reasonable and
appropriate. |
|
|
308 (a)(12)(ii)(B) |
(B) Response. |
308 (a)(6)(ii)(B) |
Response and reporting (Required). |
308 (a)(12)(ii)(B)(1) |
(1) Identify and respond to suspected or known security
incidents. |
308 (a)(6)(ii)(B)(1) |
Identify and respond to suspected or known security
incidents; |
308 (a)(12)(ii)(B)(2) |
(2) Mitigate, to the extent practicable, harmful effects
of security incidents that are suspected or known to the covered entity or
business associate. |
308 (a)(6)(ii)(B)(2) |
mitigate, to the extent practicable, harmful effects of
security incidents that are known to the covered entity or business
associate; |
308 (a)(12)(ii)(B)(3) |
(3) Identify and remediate, to the extent practicable,
the root cause(s) of security incidents that are suspected or known to the
covered entity or business associate. |
|
|
308 (a)(12)(ii)(B)(4) |
(4) Eradicate the security incidents that are suspected
or known to the covered entity or business associate. |
|
|
308 (a)(12)(ii)(B)(5) |
(5) For suspected and known security incidents, develop
and maintain documentation of investigations, analyses, mitigation, and
remediation. |
and document security incidents and their outcomes. |
|
308 (a)(13) |
(13) Standard: Contingency plan |
308 (a)(7)(i) |
(7)(i) Standard: Contingency plan. |
308 (a)(13)(i) |
—(i) General. |
||
Establish and implement as needed a written contingency
plan, consisting of written policies and procedures for responding to an
emergency or other occurrence—including but not limited to fire, vandalism,
system failure, natural disaster, or security incident—that adversely affects
relevant electronic information systems. |
Establish (and implement as needed) policies and
procedures for responding to an emergency or other occurrence (for example,
fire, vandalism, system failure, and natural disaster) that damages systems
that contain electronic protected health information. |
||
308 (a)(13)(ii) |
(ii) Implementation specifications |
308 (a)(7)(ii) |
(ii) Implementation specifications: |
308 (a)(13)(ii)(A) |
—(A) Criticality analysis. |
308 (a)(7)(ii)(E) |
(E) Applications and data criticality analysis
(Addressable). |
Perform and document an assessment of the relative
criticality of the covered entity's or business associate's relevant
electronic information systems and technology assets in its relevant
electronic information systems. |
Assess the relative criticality of specific applications
and data in support of other contingency plan components. |
||
308 (a)(13)(ii)(B) |
(B) Data backups. |
308 (a)(7)(ii)(A) |
(A) Data backup plan (Required). |
Establish and implement written procedures to create and
maintain exact retrievable copies of electronic protected health information,
including verification that the electronic protected health information has
been copied accurately. |
Establish and implement procedures to create and maintain
retrievable exact copies of electronic protected health information. |
||
308 (a)(13)(ii)(C) |
(C) Information systems backups. |
|
|
|
Establish and implement written procedures to create and
maintain backups of the covered entity's or business associate's relevant
electronic information systems, including verification of success of backups. |
|
|
308 (a)(13)(ii)(D) |
(D) Disaster recovery plan. |
308 (a)(7)(ii)(B) |
(B) Disaster recovery plan (Required). |
308 (a)(13)(ii)(D)(1) |
(1) Establish (and implement as needed) written
procedures to restore loss of the covered entity's or business associate's
critical relevant electronic information systems and data within 72 hours of
the loss. |
Establish (and implement as needed) procedures to restore
any loss of data. |
|
308 (a)(13)(ii)(D)(2) |
(2) Establish (and implement as needed) written
procedures to restore loss of the covered entity's or business associate's
other relevant electronic information systems and data in accordance with the
criticality analysis required by paragraph (a)(13)(ii)(A) of this section. |
|
|
308 (a)(13)(ii)(E) |
(E) Emergency mode operation plan. |
308 (a)(7)(ii)(C) |
(C) Emergency mode operation plan (Required). |
Establish (and implement as needed) written procedures to
enable continuation of critical business processes for protection of the
security of electronic protected health information while operating in
emergency mode. |
Establish (and implement as needed) procedures to enable
continuation of critical business processes for protection of the security of
electronic protected health information while operating in emergency mode. |
||
308 (a)(13)(ii)(F) |
(F) Testing and revision procedures. |
308 (a)(7)(ii)(D) |
(D) Testing and revision procedures (Addressable). |
308 (a)(13)(ii)(F)(1) |
(1) Establish written procedures for testing and revising
contingency plans as required by this paragraph (a)(13) in accordance with
paragraph (a)(13)(ii)(F)(2) of this section. |
Implement procedures for periodic testing and revision of
contingency plans. |
|
308 (a)(13)(ii)(F)(2) |
(2) Review and test contingency plans required by this
paragraph (a)(13) at least once every 12 months, document the results of such
tests, and modify such contingency plans as reasonable and appropriate in
accordance with the results of those tests. |
|
|
308 (a)(14) |
(14) Standard: Compliance audit. |
308 (a)(8) |
(8) Standard: Evaluation.
|
Perform and document an audit at least once every 12
months of the covered entity's or business associate's compliance with each
standard and implementation specification in this subpart. |
Perform a periodic technical and nontechnical evaluation,
based initially upon the standards implemented under this rule and,
subsequently, in response to environmental or operational changes affecting
the security of electronic protected health information, that establishes the
extent to which a covered entity's or business associate's security policies
and procedures meet the requirements of this subpart. |
||
308 (b)(1)(i) |
(b)(1) Standard: Business associate contracts and other
arrangements. |
308 (b)(1) |
(b)(1) Business associate contracts and other
arrangements. |
(i)(A) A covered entity may permit a business associate
to create, receive, maintain, or transmit electronic protected health
information on the covered entity's behalf only if the covered entity obtains
satisfactory assurances, in accordance with § 164.314(a), that the business
associate will comply with this subpart and verifies that the business
associate has deployed technical safeguards in accordance with the
requirements of § 164.312. |
A covered entity may permit a business associate to
create, receive, maintain, or transmit electronic protected health
information on the covered entity's behalf only if the covered entity obtains
satisfactory assurances, in accordance with § 164.314(a), that the business
associate will appropriately safeguard the information. |
||
(B) A covered entity is not required to obtain such
satisfactory assurances or verification from a business associate that is a
subcontractor. |
A covered entity is not required to obtain such
satisfactory assurances from a business associate that is a subcontractor. |
||
308 (b)(1)(ii) |
(ii) A business associate may permit a business associate
that is a subcontractor to create, receive, maintain, or transmit electronic
protected health information on its behalf only if the business associate
obtains satisfactory assurances, in accordance with § 164.314(a), that the
subcontractor will comply with the requirements of this subpart and verifies
that the business associate that is a subcontractor has deployed technical
safeguards in accordance with the requirements of § 164.312. |
308 (b)(2) |
(2) A business associate may permit a business associate
that is a subcontractor to create, receive, maintain, or transmit electronic
protected health information on its behalf only if the business associate
obtains satisfactory assurances, in accordance with § 164.314(a), that the
subcontractor will appropriately safeguard the information. |
308 (b)(2) |
(2) Implementation specifications |
308 (b)(3) |
(3) Implementation specifications: |
—(i) Written contract or other arrangement. |
Written contract or other arrangement (Required). |
||
Document the satisfactory assurances required by
paragraph (b)(1)(i) or (ii) of this section through a written contract or
other arrangement with the business associate that meets the applicable
requirements of § 164.314(a). |
Document the
satisfactory assurances required by paragraph (b)(1) or (b)(2) of this
section through a written contract or other arrangement with the business
associate that meets the applicable requirements of § 164.314(a). |
||
|
(ii) Written verification. |
|
|
|
Obtain written verification from the business associate
at least once every 12 months that the business associate has deployed the
technical safeguards as required by § 164.312 through both of the following: |
|
|
|
(A) A written analysis of the business associate's
relevant electronic information systems by a person with appropriate
knowledge of and experience with generally accepted cybersecurity principles
and methods for ensuring the confidentiality, integrity, and availability of
electronic protected health information to verify compliance with each
standard and implementation specification in § 164.312. |
|
|
|
(B) A written certification that the analysis has been
performed and is accurate by a person who has the authority to act on behalf
of the business associate. |
|
|
|
(3) Standard: Delegation to business associate. |
|
|
|
(i) A covered entity or business associate may permit a
business associate to serve as their designated security official. |
|
|
|
(ii) A covered entity or business associate that
delegates actions, activities, or assessments required by this subpart to a
business associate remains liable for compliance with all applicable
provisions of this subpart. |
|
|
Tuesday, February 4, 2025
HIPAA Security Section 308 Changes
As previously mentioned, sections 308 and 312 of the proposed changes to HIPAA Security in 45 CFR 164 require deeper analysis. My first step in that analysis is to do a side-by-side comparison of the text for section 308. Green background is new content, gold background unchanged content, and red background is content that no longer exists in the new rule. My next post will summarize the changes below. New rule text comes from Federal Register :: HIPAA Security Rule To Strengthen the Cybersecurity of Electronic Protected Health Information and old rule text from eCFR :: 45 CFR 164.308 -- Administrative safeguards.
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment