Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
administrative_security [2016/07/02 15:52]
jillian_nadette_de_leon
administrative_security [2016/07/07 20:13]
jillian_nadette_de_leon
Line 1: Line 1:
 ##​ORGANIZATIONAL SECURITY MEASURES ##​ORGANIZATIONAL SECURITY MEASURES
  
-**1. Policies and Procedures.** Privacy and security policies must be documented, maintained and updated as appropriate.\\+**1. Policies and Procedures.** ​The Health Facility shall be required to create its own privacy protocol. ​Privacy and security policies must be documented, maintained and updated as appropriate.\\
  
 1.1. The PHCP shall create policies and procedures to specify the groups and positions that need to access health information to perform their job responsibilities,​ as well as the type of health information to which they need access.\\ 1.1. The PHCP shall create policies and procedures to specify the groups and positions that need to access health information to perform their job responsibilities,​ as well as the type of health information to which they need access.\\
Line 13: Line 13:
 1.5. A regular privacy and security audit shall be done by participating health care providers.\\ ​ 1.5. A regular privacy and security audit shall be done by participating health care providers.\\ ​
  
-**Contract with Third Party.**Contract or agreements between health care providers and a third party shall include:\\+**2. Contract with Third Party.**Contract or agreements between health care providers and a third party shall include:\\
 a.) Policies for document storage and disposal;\\ a.) Policies for document storage and disposal;\\
 b.) Data management process including methods for tracking and controlling records- such as dates and time stamps- as well as the type of data sent and received, and the individuals who have access to records;\\ b.) Data management process including methods for tracking and controlling records- such as dates and time stamps- as well as the type of data sent and received, and the individuals who have access to records;\\