Handle, Store Or Have Access To Medical Records

Here Are 7 IT Policies And Procedures You Must Have In Place NOW 
HIPAA and HITECH have been around for quite some time, yet many medical practices – and their vendors, who are ALSO under these laws – are way behind the times when it comes to implementation. And with cyber-thieves getting smarter and more aggressive, it’s imperative that you work diligently at becoming HIPAA-compliant today. To that end, here are 7 things you can do to take major strides toward compliance. 

1.Access Control Policy. This is a plan for WHO is given access to various systems and data in your organization and HOW they are given access. To limit your liability, give access to sensitive data only to those who need it to perform their job. You also need to have a plan for disabling accounts and changing passwords when employees leave.

2. Workstation Use Policy.  This policy outlines how employees use their workstations, laptops, and other devices to access sensitive data (patient records). This policy should require that all employees use secure passwords and not download files from the Internet unless from a trusted, work-related source (no iTunes!). You should also monitor logins to your systems to watch for unauthorized access and employ other specific procedures for keeping that device secure.  

3.  Security Awareness Training.  Hackers are extremely clever and use phishing e-mails and false web sites to trick users into thinking they are accessing a trusted source when, in fact, they are opening the door for these hackers to gain access. Since new threats are created on a DAILY basis, it’s smart to teach your employees how to recognize threats AND provide ongoing training about new threats as they come online. You must also keep an audit trail of your reminders and communications in case you’re audited. 

4.  Malicious Software Controls.  You must have documented policies for the frequency with which anti-malware and antivirus software are updated and what happens if an infection/outbreak occurs.  

5.  Disaster Recovery Plan.  You must have a plan in place for how you will restore patient records and files in the event of a disaster – be it an office fire, flood, burglary of your systems (yes, that’s happened!), or any other data-erasing event. 

6.  Media Disposal Policy.  Have an old PC? DON’T just throw it away or give it to someone! Even if you delete all the files, a savvy hacker can use it to recover logins and data. Instead, have a qualified IT firm wipe the system first – then you can donate it or dispose of it properly. (Tip: Most firms that wipe PCs can also take care of donating it or disposing of it properly.) 

7.  Review And Audit Procedures.  As you may know, there’s a LOT more to HIPAA compliance than the items discussed here; however, be certain also that whatever you do has a firm audit trail/log that shows that everything has been executed according to plan. 

If you have questions related to this topic or IT issues in general, please feel free to contact us using the information provided below 

Email: contact@maavicorp.com
Telephone: (408) 400-0232
Website: http://maavicorp.com

How New Viruses Get Named

Thousands of viruses are currently circulating on the Internet with more being discovered daily. So how does a virus get its name?  There is no

Do You Want To Boost Your Business?

drop us a line and keep in touch