| Security Management Process |
[164.308(a)(1)] |
Risk Analysis (R) |
| Risk Management (R) |
| Sanction Policy (R) |
| Information System Activity Review (R) |
| Assigned Security Responsibility |
[164.308(a)(2)] |
(R) |
| Workforce Security |
[164.308(a)(3)] |
Authorization and/or Supervision (A) |
| Workforce Clearance Procedure (A) |
| Termination Procedures (A) |
| Information Access Management |
[164.308(a)(4)] |
Isolating Healthcare Clearinghouse Function (R) |
| Access Authorization (A) |
| Access Establishment and Modification (A) |
| Security Awareness and Training |
[164.308(a)(5)] |
Security Reminders (A) |
| Protection from Malicious Software (A) |
| Log-in Monitoring (A) |
| Password Management (A) |
| Security Incident Procedures |
[164.308(a)(6)] |
Response and Reporting (R) |
| Contingency Plan |
[164.308(a)(7)] |
Data Backup Plan (R) |
| Disaster Recovery Plan (R) |
| Emergency Mode Operation Plan (R) |
| Testing and Revision Procedure (A) |
| Applications and Data Criticality Analysis (A) |
| Evaluation |
[164.308(a)(8)] |
(R) |
| Business Associate Contracts and Other Arrangement. |
[164.308(b)(1)] |
Written Contract or Other Arrangement (R) |
| Facility Access Controls |
[164.310(a)(1)] |
Contingency Operations (A) |
| Facility Security Plan (A) |
| Access Control and Validation Procedures (A) |
| Maintenance Records (A) |
| Workstation Use |
[164.310(b)] |
(R) |
| Workstation Security |
[164.310(c)] |
(R) |
| Device and Media Controls |
[164.310(d)(1)] |
Disposal (R) |
| Media Re-use (R) |
| Accountability (A) |
| Data Backup and Storage (A) |
| Access Control |
[164.312(a)(1)] |
Unique User Identification (R) |
| Emergency Access Procedure (R) |
| Automatic Logoff (A) |
| Encryption and Decryption (A) |
| Audit Controls |
[164.312(b)] |
(R) |
| Integrity |
[164.312(c)(1)] |
Mechanism to Authenticate Electronic Protected Health Information (A) |
| Person or Entity Authentication |
[164.312(d)] |
(R) |
| Transmission Security |
[164.312(e)(1)] |
Integrity Controls (A) |
| Encryption (A) |