Earlier this week I provided a side-by-side comparison of the HIPAA section 308 changes. Today I have a similar sheet for Section 312. Next week I should have a summary prepared of what this comparison tells you.
Once again, green background is new content. Yellow background is mostly unchanged, and red background is stuff that has been removed from the rule (there's not much that was removed).
New Section # |
New Text |
Old Section # |
Old Text |
312 |
§ 164.312 Technical
safeguards. |
312 |
§ 164.312 Technical safeguards. |
Each covered entity or business associate must, in
accordance with §§ 164.306 and 164.316,
implement all of the following technical safeguards, including technical
controls, to protect the confidentiality, integrity, and availability of all
electronic protected health information that it creates, receives, maintains,
or transmits: |
A covered entity or business associate must, in
accordance with § 164.306: |
||
312(a) |
(a) Standard: Access control |
312(a)(1) |
(a) (1) Standard: Access control. |
312(a)(1) |
—(1) General. |
||
Deploy technical controls in relevant electronic
information systems to allow access only to users and technology assets that
have been granted access rights. |
Implement technical policies and procedures for
electronic information systems that maintain electronic protected health
information to allow access only to those persons or software programs that
have been granted access rights as specified in § 164.308(a)(4). |
||
312(a)(2) |
(2) Implementation specifications |
312(a)(2) |
(2) Implementation specifications: |
312(a)(2)(i) |
—(i) Unique identification. |
312(a)(2)(i) |
(i) Unique user identification (Required). |
Assign a unique name, number, and/or other identifier for
tracking each user and technology asset in the covered entity or business
associate's relevant electronic information systems. |
|
Assign a unique
name and/or number for identifying and tracking user identity. |
|
312(a)(2)(ii) |
(ii) Administrative and increased access privileges. |
||
Separate user identities from identities used for
administrative and other increased access privileges. |
|||
312(a)(2)(iii) |
(iii) Emergency access procedure. |
312(a)(2)(ii) |
(ii) Emergency access procedure (Required). |
Establish (and implement as needed) written and technical
procedures for obtaining necessary electronic protected health information
during an emergency. |
|
Establish (and implement as needed) procedures for
obtaining necessary electronic protected health information during an
emergency. |
|
312(a)(2)(iv) |
(iv) Automatic logoff. |
312(a)(2)(iii) |
(iii) Automatic logoff (Addressable). |
Deploy technical controls that terminate an electronic
session after a predetermined time of inactivity that is reasonable and
appropriate. |
|
Implement electronic procedures that terminate an
electronic session after a predetermined time of inactivity. |
|
312(a)(2)(v) |
(v) Log-in attempts. |
||
Deploy technical controls that disable or suspend the
access of a user or technology asset to relevant electronic information
systems after a reasonable and appropriate predetermined number of
unsuccessful authentication attempts. |
|||
312(a)(2)(vi) |
(vi) Network segmentation. |
||
Deploy technical controls to ensure that the covered
entity's or business associate's relevant electronic information systems are
segmented in a reasonable and appropriate manner. |
|||
312(a)(2)(vii) |
(vii) Data controls. |
||
Deploy technical controls to allow access to electronic
protected health information only to those users and technology assets that
have been granted access rights to the covered entity's or business
associate's relevant electronic information systems as specified in § 164.308(a)(10). |
|||
312(a)(2)(viii) |
(viii) Maintenance. |
||
Review and test the effectiveness of the procedures and
technical controls required by this paragraph (a)(2) at least once every 12
months or in response to environmental or operational changes, whichever is
more frequent, and modify as reasonable and appropriate. |
|||
312(b) |
(b) Standard: Encryption and decryption |
|
|
312(b)(1) |
—(1) General. |
|
|
Deploy technical controls to encrypt and decrypt
electronic protected health information using encryption that meets
prevailing cryptographic standards. |
312(a)(2)(iv) |
(iv) Encryption and decryption (Addressable). Implement a mechanism to encrypt and
decrypt electronic protected health information. |
|
312(b)(2) |
(2) Implementation specification. |
|
|
Encrypt all electronic protected health information at
rest and in transit, except to the extent that an exception at paragraph
(b)(3) of this section applies. |
312(e)(2)(ii) |
(ii) Encryption (Addressable). Implement a mechanism to encrypt electronic
protected health information whenever deemed appropriate. |
|
312(b)(3) |
(3) Exceptions. |
||
This paragraph (b)(3) applies only to the electronic
protected health information directly affected by one or more of the
following exceptions and only to the extent that the covered entity or
business associate documents that an exception applies and that all other
applicable conditions are met. |
|||
(i) The technology asset in use does not support
encryption of the electronic protected health information consistent with
prevailing cryptographic standards, and the covered entity or business
associate establishes and implements a written plan to migrate electronic
protected health information to a technology asset that supports encryption
consistent with prevailing cryptographic standards within a reasonable and
appropriate period of time. |
|||
(ii) An individual requests pursuant to § 164.524 to receive their electronic protected health
information in an unencrypted manner and has been informed of the risks
associated with the transmission, receipt, and storage of unencrypted
electronic protected health information. This exception does not apply where
such individual will receive their electronic protected health information
pursuant to § 164.524 and the technology used by the individual to
receive the electronic protected health information is controlled by the
covered entity or its business associate. |
|||
(iii) During an emergency or other occurrence that
adversely affects the covered entity's or business associate's relevant
electronic information systems in which encryption is infeasible, and the
covered entity or business associate implements reasonable and appropriate
compensating controls in accordance with and determined by the covered
entity's or business associate's contingency plan under § 164.308(a)(13). |
|||
(iv) The technology asset in use is a device under
section 201(h) of the Food, Drug, and Cosmetic Act, 21 U.S.C. 321(h) that has
been authorized for marketing by the Food and Drug Administration, as
follows: |
|||
(A) Pursuant to a submission received before March 29,
2023, provided that the covered entity or business associate deploys in a
timely manner any updates or patches required or recommended by the
manufacturer of the device. |
|||
(B) Pursuant to a submission received on or after March
29, 2023, where the device is no longer supported by its manufacturer,
provided that the covered entity or business associate has deployed any
updates or patches required or recommended by the manufacturer of the device. |
|||
(C) Pursuant to a submission received on or after March
29, 2023, where the device is supported by its manufacturer. |
|||
(4) Alternative measures |
|||
—(i) Alternative measures. |
|||
Where an exception at paragraph (b)(3) of this section
applies, a covered entity or business associate must document in real-time
the existence of an applicable exception and implement reasonable and
appropriate compensating controls in accordance with paragraph (b)(4)(ii) of
this section. |
|||
(ii) Compensating controls. |
|||
(A) To the extent that a covered entity or business
associate determines that an exception at paragraph (b)(3)(i), (ii), or (iii)
or (b)(3)(iv)(A) or (B) of this section applies, the covered entity or
business associate must secure such electronic protected health information
by implementing reasonable and appropriate compensating controls reviewed and
approved by the covered entity's or business associate's designated Security
Official. |
|||
(B) To the extent that a covered entity or business
associate determines that an exception at paragraph (b)(3)(iv)(C) of this
section applies, the covered entity or business associate shall be presumed
to have implemented reasonable and appropriate compensating controls where
the covered entity or business associate has deployed the security measures
prescribed and as instructed by the authorized label for the device,
including any updates or patches recommended or required by the manufacturer
of the device. |
|||
(C) To the extent that a covered entity or business
associate is implementing compensating controls under this paragraph
(b)(4)(ii), the implementation and effectiveness of compensating controls
must be reviewed, documented, and signed by the designated Security Official
at least once every 12 months or in response to environmental or operational
changes, whichever is more frequent, to continue securing electronic
protected health information and relevant electronic information systems. |
|||
(5) Maintenance. |
|||
Review and test the effectiveness of the technical
controls required by this paragraph (b) at least once every 12 months or in
response to environmental or operational changes, whichever is more frequent,
and modify as reasonable and appropriate. |
|||
312(c) |
(c) Standard: Configuration management |
||
—(1) General. |
|||
Establish and deploy technical controls for securing the
covered entity's or business associate's relevant electronic information
systems and technology assets in its relevant electronic information systems,
including workstations, in a consistent manner, and maintain such electronic
information systems and technology assets according to the covered entity's or
business associate's established secure baselines. |
|||
(2) Implementation specifications |
|||
—(i) Anti-malware protection. |
|||
Deploy technology assets and/or technical controls that
protect all of the covered entity's or business associate's technology assets
in its relevant electronic information systems against malicious software,
including but not limited to viruses and ransomware. |
|||
(ii) Software removal. |
|||
Remove extraneous software from the covered entity's or
business associate's relevant electronic information systems. |
|||
(iii) Configuration. |
|||
Configure and secure operating system(s) and software
consistent with the covered entity's or business associate's risk analysis
under § 164.308(a)(2). |
|||
(iv) Network ports. |
|||
Disable network ports in accordance with the covered
entity's or business associate's risk analysis under § 164.308(a)(2). |
|||
(v) Maintenance. |
|||
Review and test the effectiveness of the technical
controls required by this paragraph (c) at least once every 12 months or in
response to environmental or operational changes, whichever is more frequent,
and modify as reasonable and appropriate. |
|||
312(d) |
(d) Standard: Audit trail and system log controls |
312(b) |
(b) Standard: Audit controls. |
312(d)(1) |
—(1) General. |
|
|
Deploy technology assets and/or technical controls that
record and identify activity in the covered entity's or business associate's
relevant electronic information systems. |
|
Implement hardware, software, and/or procedural
mechanisms that record and examine activity in information systems that
contain or use electronic protected health information. |
|
312(d)(2) |
(2) Implementation specifications |
||
—(i) Monitor and identify. |
|||
The covered entity or business associate must deploy
technology assets and/or technical controls that monitor in real-time all
activity in its relevant electronic information systems, identify indications
of unauthorized persons or unauthorized activity as determined by the covered
entity's or business associate's risk analysis under § 164.308(a)(2), and alert workforce members of such
indications in accordance with the policies and procedures required by § 164.308(a)(7). |
|||
(ii) Record. |
|||
The covered entity or business associate must deploy
technology assets and/or technical controls that record in real-time all
activity in its relevant electronic information systems. |
|||
(iii) Retain. |
|||
The covered entity or business associate must deploy
technology assets and/or technical controls to retain records of all activity
in its relevant electronic information systems as determined by the covered
entity's or business associate's policies and procedures for information
system activity review at § 164.308(a)(7)(ii)(A). |
|||
(iv) Scope. |
|||
Activity includes creating, accessing, receiving,
transmitting, modifying, copying, or deleting any of the following: |
|||
(A) Electronic protected health information. |
|||
(B) Relevant electronic information systems and the
information therein. |
|||
(v) Maintenance. |
|||
Review and test the effectiveness of the technology
assets and/or technical controls required by this paragraph (d) at least once
every 12 months or in response to environmental or operational changes,
whichever is more frequent, and modify as reasonable and appropriate. |
|||
|
(e) Standard: Integrity. |
312(c)(1) |
(c)(1) Standard: Integrity. |
|
Deploy technical controls to protect electronic protected
health information from improper alteration or destruction, both at rest and
in transit; |
|
Implement policies and procedures to protect electronic
protected health information from improper alteration or destruction. |
and review and test the effectiveness of such technical
controls at least once every 12 months or in response to environmental or
operational changes, whichever is more frequent, and modify as reasonable and
appropriate. |
|||
312(c)(2) |
(2) Implementation specification: Mechanism to
authenticate electronic protected health information (Addressable). Implement electronic mechanisms to
corroborate that electronic protected health information has not been altered
or destroyed in an unauthorized manner. |
||
312(e)(2)(i) |
(i) Integrity controls (Addressable). Implement security measures to ensure that
electronically transmitted electronic protected health information is not
improperly modified without detection until disposed of. |
||
312(f) |
(f) Standard: Authentication |
312(d) |
(d) Standard: Person or entity authentication. |
—(1) General. |
|
|
|
Deploy technical controls to verify that a person or
technology asset seeking access to electronic protected health information
and/or the covered entity's or business associate's relevant electronic
information systems is the one claimed. |
|
Implement
procedures to verify that a person or entity seeking access to electronic
protected health information is the one claimed. |
|
(2) Implementation specifications |
|||
—(i) Information access management policies. |
|||
Deploy technical controls in accordance with the covered
entity's or business associate's information access management policies and
procedures under § 164.308(a)(10),
including technical controls that require users to adopt unique passwords
that are consistent with the current recommendations of authoritative
sources. |
|||
(ii) Multi-factor authentication. |
|||
(A) Deploy multi-factor authentication to all technology
assets in the covered entity's or business associate's relevant electronic
information systems to verify that a person seeking access to the relevant
electronic information system(s) is the user that the person claims to be. |
|||
(B) Deploy multi-factor authentication for any action
that would change a user's privileges to the covered entity's or business
associate's relevant electronic information systems in a manner that would
alter the user's ability to affect the confidentiality, integrity, or
availability of electronic protected health information. |
|||
(iii) Exceptions. |
|||
Deployment of multi-factor authentication is not required
in any of the following circumstances. |
|||
(A) The technology asset in use does not support
multi-factor authentication, and the covered entity or business associate
establishes and implements a written plan to migrate electronic protected
health information to a technology asset that supports multi-factor
authentication within a reasonable and appropriate period of time. |
|||
(B) During an emergency or other occurrence that
adversely affects the covered entity's or business associate's relevant
electronic information systems or the confidentiality, integrity, or
availability of electronic protected health information in which multi-factor
authentication is infeasible and the covered entity or business associate
implements reasonable and appropriate compensating controls in accordance
with its emergency access procedures under paragraph (a)(2)(iii) of this
section and the covered entity's or business associate's contingency plan
under § 164.308(a)(13). |
|||
(C) The technology asset in use is a device under section
201(h) of the Food, Drug, and Cosmetic Act, 21 U.S.C. 321(h) that has been
authorized for marketing by the Food and Drug Administration, as follows: |
|||
(1) Pursuant to a submission received before March 29,
2023, provided that the covered entity or business associate has deployed any
updates or patches required or recommended by the manufacturer of the device. |
|||
(2) Pursuant to a submission received on or after March
29, 2023, where the device is no longer supported by its manufacturer,
provided that the covered entity or business associate has deployed any
updates or patches required or recommended by the manufacturer of the device. |
|||
(3) Pursuant to a submission received on or after March
29, 2023, where the device is supported by its manufacturer. |
|||
(iv) Alternative measures |
|||
—(A) Alternative measures. |
|||
Where an exception at paragraph (f)(2)(iii) of this
section applies, a covered entity or business associate must document in
real-time the existence of an applicable exception and implement reasonable
and appropriate compensating controls as required by paragraph (f)(2)(iv)(B)
of this section. |
|||
(B) Compensating controls. |
|||
(1) To the extent that a covered entity or business
associate determines that an exception at paragraph (f)(2)(iii)(A) or (B) or
(f)(2)(iii)(C)(1) or (2) of this section applies, the covered entity or
business associate must secure its relevant electronic information systems by
implementing reasonable and appropriate compensating controls reviewed,
approved, and signed by the covered entity's or business associate's
designated Security Official. |
|||
(2) To the extent that a covered entity or business
associate determines that an exception at paragraph (f)(2)(iii)(C)(3) of this
section applies, the covered entity or business associate shall be presumed
to have implemented reasonable and appropriate compensating controls where
the covered entity or business associate has deployed the security measures
prescribed and as instructed by the authorized label for the device,
including any updates or patches recommended or required by the manufacturer
of the device. |
|||
(3) To the extent that a covered entity or business
associate is implementing compensating controls under this paragraph
(f)(2)(iv)(B), the effectiveness of compensating controls must be reviewed
and documented by the designated Security Official at least once every 12
months or in response to environmental or operational changes, whichever is
more frequent, to continue securing electronic protected health information
and its relevant electronic information systems. |
|||
(v) Maintenance. |
|||
Review and test the effectiveness of the technical
controls required by this paragraph (f) at least once every 12 months or in
response to environmental or operational changes, whichever is more frequent,
and modify as reasonable and appropriate. |
|||
312(g) |
(g) Standard: Transmission security. |
312(e) |
(e)(1) Standard: Transmission security. |
Deploy technical controls to guard against unauthorized
access to electronic protected health information that is being transmitted
over an electronic communications network; |
|
Implement technical security measures to guard against
unauthorized access to electronic protected health information that is being
transmitted over an electronic communications network. |
|
and review and test the effectiveness of such technical
controls at least once every 12 months or in response to environmental or
operational changes, whichever is more frequent, and modify as reasonable and
appropriate. |
|||
(2) Implementation specifications: |
|||
312(h) |
(h) Standard: Vulnerability management |
||
—(1) General. |
|||
Deploy technical controls in accordance with the covered
entity's or business associate's patch management policies and procedures
required by § 164.308(a)(4)(ii)(A) to identify and address technical
vulnerabilities in the covered entity's or business associate's relevant
electronic information systems. |
|||
(2) Implementation specifications |
|||
—(i) Vulnerability scanning. |
|||
(A) Conduct automated vulnerability scans to identify
technical vulnerabilities in the covered entity's or business associate's
relevant electronic information systems in accordance with the covered
entity's or business associate's risk analysis required by § 164.308(a)(2) or at least once every six months,
whichever is more frequent. |
|||
(B) Review and test the effectiveness of the technology
asset(s) that conducts the automated vulnerability scans required by
paragraph (h)(2)(i)(A) of this section at least once every 12 months or in
response to environmental or operational changes, whichever is more frequent,
and modify as reasonable and appropriate. |
|||
(ii) Monitoring. |
|||
Monitor authoritative sources for known vulnerabilities
on an ongoing basis and remediate such vulnerabilities in accordance with the
covered entity's or business associate's patch management program under § 164.308(a)(4). |
|||
(iii) Penetration testing. |
|||
Perform penetration testing of the covered entity's or
business associate's relevant electronic information systems by a qualified
person. |
|||
(A) A qualified person is a person with appropriate
knowledge of and experience with generally accepted cybersecurity principles
and methods for ensuring the confidentiality, integrity, and availability of
electronic protected health information. |
|||
(B) Penetration testing must be performed at least once
every 12 months or in accordance with the covered entity's or business
associate's risk analysis required by § 164.308(a)(2),
whichever is more frequent. |
|||
(iv) Patch and update installation. |
|||
Deploy technical controls in accordance with the covered
entity's or business associate's patch management program under § 164.308(a)(4) to ensure timely installation of software
patches and critical updates as reasonable and appropriate. |
|||
(i) Standard: Data backup and recovery |
|||
—(1) General. |
|||
Deploy technical controls to create and maintain exact
retrievable copies of electronic protected health information. |
|||
(2) Implementation specifications |
|||
—(i) Data backup. |
|||
Create backups of electronic protected health information
in accordance with the policies and procedures required by § 164.308(a)(13)(ii)(B) and with such frequency to ensure
retrievable copies of electronic protected health information are no more
than 48 hours older than the electronic protected health information
maintained in the covered entity or business associate's relevant electronic
information systems. |
|||
(ii) Monitor and identify. |
|||
Deploy technical controls that, in real-time, monitor,
and alert workforce members about, any failures and error conditions of the
backups required by paragraph (i)(2)(i) of this section. |
|||
(iii) Record. |
|||
Deploy technical controls that record the success,
failure, and any error conditions of backups required by paragraph (i)(2)(i)
of this section. |
|||
(iv) Testing. |
|||
Restore a representative sample of electronic protected
health information backed up as required by paragraph (i)(2)(i) of this
section, and document the results of such test restorations at least monthly. |
|||
(j) Standard: Information systems backup and recovery. |
|||
Deploy technical controls to create and maintain backups
of relevant electronic information systems; and review and test the
effectiveness of such technical controls at least once every six months or in
response to environmental or operational changes, whichever is more frequent,
and modify as reasonable and appropriate. |
0 comments:
Post a Comment