| Standards |
Sections |
Implementation Specifications (R)=Required, (A)=Addressable |
| Security Management Process |
[164.308(a)(1)] |
Risk Analysis (R) |
| Risk Management (R) |
| Sanction Policy (R) |
| Information System Activity Review (R) |
| Assigned Security Responsibility |
[164.308(a)(2)] |
(R) |
| Information Access Management |
[164.308(a)(4)] |
Isolating Healthcare Clearinghouse Function (R) |
| Security Incident Procedures |
[164.308(a)(6)] |
Response and Reporting (R) |
| Contingency Plan |
[164.308(a)(7)] |
Data Backup Plan (R) |
| Disaster Recovery Plan (R) |
| Emergency Mode Operation Plan (R) |
| Evaluation |
[164.308(a)(8)] |
(R) |
| Business Associate Contracts and Other Arrangement. |
[164.308(b)(1)] |
Written Contract or Other Arrangement (R) |
| Workstation Use |
[164.310(b)] |
(R) |
| Workstation Security |
[164.310(c)] |
(R) |
| Device and Media Controls |
[164.310(d)(1)] |
Disposal (R) |
| Media Re-use (R) |
| Access Control |
[164.312(a)(1)] |
Unique User Identification (R) |
| Emergency Access Procedure (R) |
| Audit Controls |
[164.312(b)] |
(R) |
| Person or Entity Authentication |
[164.312(d)] |
(R) |