Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
technical_safeguards [2016/06/09 18:28]
jillian_nadette_de_leon
technical_safeguards [2016/06/15 18:53]
jillian_nadette_de_leon
Line 1: Line 1:
 ##TECHNICAL SAFEGUARDS ##TECHNICAL SAFEGUARDS
- 
-* Disclaimer: For information purposes only. Standard terms, definition, sentence construction will still be edited. \\ 
  
 **A. Access Controls**\\ **A. Access Controls**\\
-Implement technical ​policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights:\\+Technical ​policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights:\\
  
 I. Information access management (required)\\ I. Information access management (required)\\
 1. Implementation specifications:​\\ 1. Implementation specifications:​\\
-(A) Isolating health care clearinghouse functions (required). If a health care clearinghouse is part of a larger organization,​ the clearinghouse must implement policies and procedures that protect the electronic protected health information ​of the clearinghouse ​from unauthorized access by the larger organization.\\ +(A) Isolating health care clearinghouse functions (required). If a health care clearinghouse is part of a larger organization,​ the clearinghouse must implement policies and procedures that protect the electronic protected health information from unauthorized access by the larger organization.\\ 
-(B) Access authorization (addressable). ​Implement policies ​and procedures for granting access to electronic ​protected ​health information, for example through ​access to a workstation,​ transaction,​ program, processor other mechanism.\\ +(B) Access authorization (addressable). ​Policies ​and procedures for granting access to electronic health information ​such as access to a workstation,​ transaction,​ program, process or other mechanisms shall be implemented by the health facility. Guidelines on the access of health information are provided in Rule III (Access of Health Information) in the SOR.\\ 
-(C) Access establishment and modification (addressable). ​Implement policies and procedures that, based upon the data controller and/or data processor's access authorization ​policies, ​establish, document, reviewand modify ​a user's rights ​of access ​to a workstation,​ transaction,​ programor process.\\+(C) Access establishment and modification (addressable). ​Based upon the access authorization policy of the data controller and/or data processorpolicies ​and procedures on the establishmentdocumentation, review and modification of a user's rights ​to access a workstation,​ transaction,​ program or process ​shall be implemented.\\
  
-II. Unique user identification (required). A process for unique user identification ​is made within a policy ​ad procedure of the organization.\\+II. Unique user identification (required). A process for unique user identification ​shall be made within a policy ​and procedure of the health facility.\\
 1. Implement specifications:​ \\ 1. Implement specifications:​ \\
-(A) unique user name and/or number for identifying user identity throughout all levels of the organization.\\ +(A) There shall be a unique user name and/or number for identifying user identity throughout all levels of the organization.\\ 
-(B) User identity ​cannot ​be shared, delegated or assigned to a group or individual.\\ +(B) User identity ​shall not be shared, delegated or assigned to a group or individual.\\ 
-(C) Unique user identity that was previously used cannot ​be reused for new and/or existing users.\\+(C) Unique user identity that was previously used shall not be reused for new and/or existing users.\\
  
-III. Emergency Access Procedure (Required). ​Establish (and implement as needed) procedures ​for obtaining necessary electronic ​protected ​health information during an emergency.\\ +III. Emergency Access Procedure (Required). ​Procedures ​for obtaining necessary electronic health information during an emergency.\\ 
-1. Identify, define, describe types of situations ​that may require emergency access.\\ +1. Situations ​that may require emergency access ​shall be identified, defined, and described by health facilities.\\ 
-2. Identify ​authorized personnel who will need to access health information.\\ +2. There shall be identification of authorized personnel who will need to access health information ​during emergency situations.\\ 
-3. Establish and implement procedures ​for obtaining necessary health information during emergency situations.\\ +3. Procedures ​for obtaining necessary health information during emergency situations ​shall be established and implemented.\\ 
-4. Create policies ​and procedures for governing access to health information.\\+4. Policies ​and procedures for governing access to health information ​shall be created.\\
  
-IV. Automatic log-off (addressable). Implement electronic procedures that terminate ​and electronic session after a predetermined time of inactivity.\\ +IV. Automatic log-off (addressable). Implement electronic procedures that terminate ​an electronic session after a predetermined time of inactivity.\\ 
-1. Create a policy and procedure that governs how automatic log-off is used.\\ +1. policy and procedure that governs how automatic log-off is used shall be created.\\ 
-2. A predetermined time should ​be documented within the policy based on the application.\\+2. A predetermined time shall be documented within the policy based on the application.\\
  
-V. Encryption and decryption (addressable). ​Method ​of converting an original message of regular text into encoded text using an algorithm.\\ +V. Encryption and decryption (addressable). ​The method ​of converting an original message of regular text into encoded text using an algorithm.\\ 
-1. Encryption ​in transit Secure Socket Layer (SSL) (addressable).\ +1. For encryption ​in transit, the standard security technology shall be Secure Socket Layer (SSL) (addressable).\ 
-2. Minimum requirement AES 128\\ +2. Minimum requirement AES (Advanced Encryption Standard) ​128\\ 
-3. Encryption in storage TKE\\+3. Encryption in storage TKE (Trusted Key Entry)\\
  
 VI. Multi-factor authentication (addressable). Policy, operational,​ and technical mechanisms must be in place to use multi-factor authentication for those systems identified to have significant risk (e.g. servers, unified threat management, etc.)\\ VI. Multi-factor authentication (addressable). Policy, operational,​ and technical mechanisms must be in place to use multi-factor authentication for those systems identified to have significant risk (e.g. servers, unified threat management, etc.)\\
  
 +**B. Audit Controls**\\
 +A record that shows who has accessed a computer system when it was accessed and what operations were performed.\\
 +I. Recording of information (required). Recorded information must include, but is not limited to, unique user identified, date and time of use/access, location (if applicable).\\
 +II. Audit Data Life Span (addressable). A policy shall be made by health facilities to specify the length of time the data must be stored and how it will be destroyed.\\
 +III. Access to Audit Data (addressable). The Medical Records Officer alongside with the Privacy Officer and/or Health Information Security Committee shall be authorized to audit data.
  
-------------------- +**C. Integrity Controls**\\ 
-**ACCESS CONTROLS**\\ +Protection of electronic health information from improper alteration ​or destruction. \\ 
-  * Standard user IDs shall be given to each staff whose work entails the need to access ​or process heath information.\\ +I. Implementation specifications:\\ 
-  * There shall be a three way process for authentication of userssomething they know (password), something they have (secure token), and something they are (biometrics).\\ +(AMechanism to authenticate electronic protected health information ​(addressable). Mechanisms to corroborate that electronic health information has not been altered or destroyed in an unauthorized manner ​shall be implemented.\\ 
-  * Multi-factor authentication ​shall be implemented, especially for admin and supervisory accounts+(B)  Digital signatures (required). Digital signatures ​shall be used to identify authenticity ​of the entry in an electronic system.\\ 
-  ​*   ​Passwords ​shall have the following characteristics:​ minimum ​of eight characters ​in length, have an upper case, lower case and special character in it.\\ +(C) Sum Verification (required) shall be used to determine if the input data matches the source data.\\ 
-  * The last user ID that logged in must not be displayed on the log-in screen.\\ +(D) Anti-virus software (required). Computers ​shall have an Industry Standard Antivirus Software with automatic ​updates turned ​on. The software ​shall be configured regularly and automatically download updates ​for the latest threats.\\ 
-  * There shall be an automatic ​screen or keyboard locking after 5 minutes of inactivity.\\ +(E) Data storage encryption ​(required). Data storage ​and transmission shall be encrypted. For websiteshttps encryption shall be used. \\ 
- +(F) Transmission encryption (required)Data transmission via wireless networks or the internet shall always ​be encrypted. \\ 
-//Leave of Absence// +(G) Proper Handling ​of Mechanical Components. Training on the proper use and handling of CPUs, Servers, flash drives, external hard drives ​shall be given to the user of electronic systems(addressable)\\ 
-  * User IDs of employees/​staff who are on extended leave of absence ​shall be disabled until they return ​for work.\\ +(H) Back-up ​components such as servers, flashdrives,​ external hard drives ​shall be stored ​away from possible ​electromagnetic interference. ​(addressable)\\ 
- +(I) Offline modes and Caching. Electronic systems shall have online ​and offline modes(addressable)\\ 
- +(J) Interface Integration of Information Systems. Data transmission from electronic medical records ​shall follow ​standard for integration ​and interfacing ​to facilitate interoperability ​and data compatibility(addressable)\\
-**DATA PROTECTION**\\ +
-  * Data on many computer devices can be damaged by being moved, knocked or even when turned off. If there is a hard disk, the heads on the drive should be "​parked"​ before moving the system to avoid destroying stored information ​(devices with solid state drives have a different system and are less vulnerable to movement).\\ +
-  *  Due to the different variations of computers ​and types of connectionsit is important to seize all the different cables and chargers for the seized equipment.\\ +
-  * Antivirus software must be loaded in every computer possibleThe software needs to be configured regularly and automatically download updates for the latest threats. \\ +
-  * Complete back-ups ​of the system ​shall be done periodically- once a month or every few months.\\ +
-  ​* ​Back-up ​data tapes shall not be stored ​near a computer monitor or uninterruptible power supply-the ​electromagnetic interference ​coming from these devices can corrupt data on them or completely delete them.\\ +
- +
-**CONFIGURATION MANAGEMENT** +
-  * It is important to document how the computer system is organized to know when and how to disconnect additional pieces of equipment such as telephone modems, auto-dialers, ​and printers from the system. Otherwise, important information can be lost.\\ +
-  * There shall be regular monitoring ​and maintenance of database and networks of health facilities ​to be conducted by the Database ​and Network administrator of the PHIE group.\\+
  
 +**D. Transmission Security**\\
 +Technical security measures to guard against unauthorized access to electronic health information that is being transmitted over an electronic communications network shall be implemented.\\
  
-**POINTS TO CONSIDER**\\ +**E. Identity Authentication**\\ 
-  * The minimum server configuration ​shall be specified.\\ +Procedures to verify that a person or entity seeking access to electronic health information is the one claimed ​shall be implementedRule III (Access ​of Health Informationprovides guidelines on authentication of access. \\
-  * Provide detailed and specific protocols on encryption ​(e.g. encryption ​of data at rest).\\ +
-(//Specific technical requirements should ideally be developed by DOST-ICTO.//​)\\ +
-  * Security features shall be incorporated in the system requirements.\\ +
-  * HIS should only be for recording and record keeping, but access ​to the medical records should be under the MRS.\\+
  
 +**F. Storage Security**\\
 +Implementation Specifications:​\\
 +(A) Data stored in portable data storage devices (e.g. USB drive, portable hard drives, etc.) must be encrypted. ​
 +(B) Data stored in cloud storage services (e.g. Dropbox, OneDrive, Google Drive, etc.) must be encrypted.
  
 ---- ----