Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
technical_safeguards [2016/06/15 17:50] jillian_nadette_de_leon |
technical_safeguards [2016/06/15 18:11] jillian_nadette_de_leon |
||
---|---|---|---|
Line 42: | Line 42: | ||
**C. Integrity Controls**\\ | **C. Integrity Controls**\\ | ||
- | Implement policies and procedures to protect electronic health information from improper alteration or destruction. \\ | + | Protection of electronic health information from improper alteration or destruction. \\ |
I. Implementation specifications:\\ | I. Implementation specifications:\\ | ||
- | (A) Mechanism to authenticate electronic protected health information (addressable). Implement electronic mechanisms to corroborate that electronic health information has not been altered or destroyed in an unauthorized manner.\\ | + | (A) Mechanism to authenticate electronic protected health information (addressable). Mechanisms to corroborate that electronic health information has not been altered or destroyed in an unauthorized manner shall be implemented.\\ |
(B) Digital signatures (required). Digital signatures shall be used to identify authenticity of the entry in an electronic system.\\ | (B) Digital signatures (required). Digital signatures shall be used to identify authenticity of the entry in an electronic system.\\ | ||
(C) Sum Verification (required) shall be used to determine if the input data matches the source data.\\ | (C) Sum Verification (required) shall be used to determine if the input data matches the source data.\\ | ||
Line 50: | Line 50: | ||
(E) Data storage encryption (required). Data storage and transmission shall be encrypted. For websites, https encryption shall be used. \\ | (E) Data storage encryption (required). Data storage and transmission shall be encrypted. For websites, https encryption shall be used. \\ | ||
(F) Transmission encryption (required). Data transmission via wireless networks or the internet shall always be encrypted. \\ | (F) Transmission encryption (required). Data transmission via wireless networks or the internet shall always be encrypted. \\ | ||
- | (G) Proper Handling of Mechanical Components. Training on the proper use and handling of CPUs, Servers, flash drives, external hard drives shall be given to user of electronic systems. (addressable)\\ | + | (G) Proper Handling of Mechanical Components. Training on the proper use and handling of CPUs, Servers, flash drives, external hard drives shall be given to the user of electronic systems. (addressable)\\ |
(H) Back-up components such as servers, flashdrives, external hard drives shall be stored away from possible electromagnetic interference. (addressable)\\ | (H) Back-up components such as servers, flashdrives, external hard drives shall be stored away from possible electromagnetic interference. (addressable)\\ | ||
- | (I) Offline modes and Caching. Electronic systems shall ave online and offline modes. (addressable)\\ | + | (I) Offline modes and Caching. Electronic systems shall have online and offline modes. (addressable)\\ |
(J) Interface Integration of Information Systems. Data transmission from electronic medical records shall follow a standard for integration and interfacing to facilitate interoperability and data compatibility. (addressable)\\ | (J) Interface Integration of Information Systems. Data transmission from electronic medical records shall follow a standard for integration and interfacing to facilitate interoperability and data compatibility. (addressable)\\ | ||