{"catalog":{"description":"The Health Insurance Portability and Accountability Act (HIPAA) regulations are divided into several major standards or rules: Privacy Rule, Security Rule, Transactions and Code Sets (TCS) Rule, Unique Identifiers Rule, Breach Notification Rule, Omnibus Final Rule, and the HITECH Act.","uuid":"482aee93-74f8-49df-99a9-b23a175b60f2","datePublished":"1996-08-21T00:00:00","version":"1.0.0","master":false,"url":"https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity/index.html","abstract":"To improve the efficiency and effectiveness of the health care system, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law 104-191, included Administrative Simplification provisions that required HHS to adopt national standards for electronic health care transactions and code sets, unique health identifiers, and security. At the same time, Congress recognized that advances in electronic technology could erode the privacy of health information. Consequently, Congress incorporated into HIPAA provisions that mandated the adoption of Federal privacy protections for individually identifiable health information.","defaultName":"hipaa","title":"HIPAA","lastRevisionDate":"2024-01-29","regulationDatePublished":"1996-08-21","keywords":"HIPAA, Healthcare, Cyber Security, Privacy, Physical Security, HITECH","securityControls":[{"dateLastUpdated":"2022-03-29T00:04:11.8968086","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"","mappings":"","title":"Ensure Confidentiality, Integrity and Availability","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.306(a)","uuid":"5fd1c998-8fc6-4979-a223-6845bdecca8d","dateCreated":"2022-03-29T00:04:11.8967532","id":32716,"family":"GENERAL","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Ensure CIA and protect against threats

Regulation
(a) General requirements. Covered entities must do the following: \r\n(1) Ensure the confidentiality, integrity, and availability of all electronic protected health information the covered entity creates, receives, maintains, or transmits. \r\n(2) Protect against any reasonably anticipated threats or hazards to the security or integrity of such information. \r\n(3) Protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required under subpart E of this part. \r\n(4) Ensure compliance with this subpart by its workforce.
"},{"dateLastUpdated":"2022-03-29T00:04:13.2287772","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"","mappings":"","title":"Flexibility of Approach","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.306(b)","uuid":"5dabd9c5-4629-45a2-b3bd-0237d9cebc6d","dateCreated":"2022-03-29T00:04:13.2287189","id":32717,"family":"GENERAL","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Reasonably consider factors in security compliance

Regulation
(b) Flexibility of approach. \r\n(1) Covered entities may use any security measures that allow the covered entity to reasonably and appropriately implement the standards and implementation specifications as specified in this subpart. \r\n(2) In deciding which security measures to use, a covered entity must take into account the following factors: \r\n(i) The size, complexity, and capabilities of the covered entity. \r\n(ii) The covered entity's technical infrastructure, hardware, and software security capabilities. \r\n(iii) The costs of security measures. \r\n(iv) The probability and criticality of potential risks to electronic protected health information.
"},{"dateLastUpdated":"2022-03-29T00:04:13.9461036","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"","mappings":"","title":"Standards","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.306(c)","uuid":"7a0c765b-1268-4f35-9665-b29971b3e220","dateCreated":"2022-03-29T00:04:13.9461023","id":32718,"family":"GENERAL","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
CEs must comply with standards

Regulation
(c) Standards. A covered entity must comply with the standards as provided in this section and in § 164.308, \r\n§ 164.310, § 164.312, § 164.314, and § 164.316 with respect to all electronic protected health information.
"},{"dateLastUpdated":"2022-03-29T00:04:14.2260879","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"","mappings":"","title":"Implementation Specifications","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.306(d)","uuid":"a05e5049-4a1d-471a-9517-7c7d98113e4a","dateCreated":"2022-03-29T00:04:14.2260869","id":32719,"family":"GENERAL","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Required and Addressable Implementation Specification requirements

Regulation
(d) Implementation specifications. \r\nIn this subpart: \r\n(1) Implementation specifications are required or addressable. If an implementation specification is required, the word \"Required\" appears in parentheses after the title of the implementation specification. If an implementation specification is addressable, the word \"Addressable\" appears in parentheses after the title of the implementation specification. \r\n(2) When a standard adopted in § 164.308, § 164.310, § 164.312, § 164.314, or § 164.316 includes required implementation specifications, a covered entity must implement the implementation specifications. \r\n(3) When a standard adopted in § 164.308, § 164.310, \r\n§ 164.312, § 164.314, or § 164.316 includes addressable implementation specifications, a covered entity must-- \r\n(i) Assess whether each implementation specification is a reasonable and appropriate safeguard in its environment, when analyzed with reference to the likely contribution to protecting the entity's electronic protected health information; and \r\n(ii) As applicable to the entity-- \r\n(A) Implement the implementation specification if reasonable and appropriate; or \r\n(B) If implementing the implementation specification is not reasonable and appropriate-- \r\n(1) Document why it would not be reasonable and appropriate to implement the implementation specification; and \r\n(2) Implement an equivalent alternative measure if reasonable and appropriate.
"},{"dateLastUpdated":"2022-03-29T00:04:14.461832","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"","mappings":"","title":"Maintenance","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.306(e)","uuid":"b6c9192d-b577-4074-aeb9-6c4d2a3f1083","dateCreated":"2022-03-29T00:04:14.4617789","id":32720,"family":"GENERAL","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Ongoing review and modification of security measures

Regulation
(e) Maintenance. Security measures implemented to comply with standards and implementation specifications adopted under § 164.105 and this subpart must be reviewed and modified as needed to continue provision of reasonable and appropriate protection of electronic protected health information as described at § 164.316.
"},{"dateLastUpdated":"2022-03-29T00:04:14.8919289","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Security Management Process","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(1)(i)","uuid":"70662b5d-25e4-4432-9a98-0e5836eb29ae","dateCreated":"2022-03-29T00:04:14.8919278","id":32721,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to manage security violations

Regulation
Implement policies and procedures to prevent, detect, contain and correct security violations
"},{"dateLastUpdated":"2022-03-29T00:04:15.1557387","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Risk Analysis","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(1)(ii)(A)","uuid":"b97e9bdd-e5cf-45ed-8fe1-cc0efeb5add8","dateCreated":"2022-03-29T00:04:15.1557378","id":32722,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Conduct vulnerability assessment

Regulation
Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity.
"},{"dateLastUpdated":"2022-03-29T00:04:15.3442331","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Risk Management","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(1)(ii)(B)","uuid":"43d3d4a4-6bc9-4be3-bfb4-ed034123db2a","dateCreated":"2022-03-29T00:04:15.3442322","id":32723,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Implement security measures to reduce risk of security breaches

Regulation
Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with Sec 164.206(a).
"},{"dateLastUpdated":"2022-03-29T00:04:15.548415","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Sanction Policy","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(1)(ii)(C)","uuid":"24f1b9f8-29a3-4c84-b4a9-f187412d7aa4","dateCreated":"2022-03-29T00:04:15.5484116","id":32724,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Worker sanction for P&P violations

Regulation
Apply appropriate sanctions against workforce members who fail to comply with the security policies and procedures of the covered entity.
"},{"dateLastUpdated":"2022-03-29T00:04:15.9388982","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Information System Activity Review","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(1)(ii)(D)","uuid":"54c04c70-9df7-417d-92a9-f45c36336869","dateCreated":"2022-03-29T00:04:15.9388971","id":32725,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Procedures to review system activity

Regulation
Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.
"},{"dateLastUpdated":"2022-03-29T00:04:16.2073609","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Assigned Security Responsibility","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(2)","uuid":"722bd5c3-c6ee-47fe-a387-e4856e1634ff","dateCreated":"2022-03-29T00:04:16.2073598","id":32726,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Identify security official responsible for P&P

Regulation
Identify the security official who is responsible for the development and implementation of the policies and procedures required by this subpart for the entity.
"},{"dateLastUpdated":"2022-03-29T00:04:16.396014","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Workforce Security","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(3)(i)","uuid":"655e58ec-e96e-4fa7-ad8d-e19b1a421051","dateCreated":"2022-03-29T00:04:16.396013","id":32727,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Implement P&P to ensure appropriate PHI access

Regulation
Implement policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information, as provided under paragraph (a)(4) of this section, and to prevent those workforce members who do not have access under paragraph (a))(4) of this section from obtaining access to electronic protected health information.
"},{"dateLastUpdated":"2022-03-29T00:04:16.5738338","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Authorization and/or Supervision","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(3)(ii)(A)","uuid":"ebfb427a-420d-4074-b4c3-9ac2fb88437c","dateCreated":"2022-03-29T00:04:16.5738328","id":32728,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Authorization/supervision for PHI access

Regulation
Implement procedures for authorization and/or supervision of workforce members who work with electronic protected health information or in locations where it might be accessed.
"},{"dateLastUpdated":"2022-03-29T00:04:16.9985164","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Workforce Clearance Procedure","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(3)(ii)(B)","uuid":"8772e057-b8b9-4b57-96bb-a123c931e745","dateCreated":"2022-03-29T00:04:16.9985155","id":32729,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Procedures to ensure appropriate PHI access

Regulation
Implement procedures to determine that the access of a workforce member to electronic protected health information is appropriate.
"},{"dateLastUpdated":"2022-03-29T00:04:17.279828","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Termination Procedures","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(3)(ii)(C)","uuid":"41e074ce-9113-40eb-8600-8afb99900115","dateCreated":"2022-03-29T00:04:17.2798267","id":32730,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Procedures to terminate PHI access

Regulation
Implement procedures for termination access to electronic protected health information when the employment of a workforce member ends or as required by determination made as specified in paragraph (a)(3)(ii)(B) of this section.
"},{"dateLastUpdated":"2022-03-29T00:04:17.4830863","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Information Access Management","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(4)(i)","uuid":"302e3037-54c4-4d67-8f9b-b586c2f99c0d","dateCreated":"2022-03-29T00:04:17.483085","id":32731,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to authorize access to PHI

Regulation
Implement policies and procedures for authorizing access to electronic protected health information that are consistent with the applicable requirements of subpart E of this part.
"},{"dateLastUpdated":"2022-03-29T00:04:17.678152","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Required","mappings":"","title":"Isolation Health Clearinghouse Functions","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(4)(ii)(A)","uuid":"c3342875-35c7-46a7-8cae-474f153b360e","dateCreated":"2022-03-29T00:04:17.6781514","id":32732,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to separate PHI from other operations

Regulation
If a health care clearinghouse is part of a larger organization, the clearinghouse must implement polices and procedures that protect the electronic protected health information of the clearinghouse from unauthorized access by the larger organization.
"},{"dateLastUpdated":"2022-03-29T00:04:18.0651641","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Addressable","mappings":"","title":"Access Authorization","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(4)(ii)(B)","uuid":"7888dbe8-8440-4dcc-b47f-4321dbf03958","dateCreated":"2022-03-29T00:04:18.065163","id":32733,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to authorize access to PHI

Regulation
Implement policies and procedures for granting access to electronic protected health information, for example, through access to a workstation, transaction, program, process or other mechanism.
"},{"dateLastUpdated":"2022-03-29T00:04:18.335645","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Access Establishment and Modification","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(4)(ii)(C)","uuid":"b293e82e-dbdf-4b39-b0ea-3bfac629a87b","dateCreated":"2022-03-29T00:04:18.3356439","id":32734,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to grant access to PHI

Regulation
Implement policies and procedures that, based upon the entity's access authorization policies, establish, document, review, and modify a user's right of access to a workstation, transaction, program, or process.
"},{"dateLastUpdated":"2022-03-29T00:04:18.5538862","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"","mappings":"","title":"Security Awareness Training","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(5)(i)","uuid":"66a8810d-a984-4ebc-bab3-1ed4ece6765f","dateCreated":"2022-03-29T00:04:18.5538852","id":32735,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Training program for workers and managers

Regulation
Implement a security awareness and training program for all members of its workforce (including management).
"},{"dateLastUpdated":"2022-03-29T00:04:19.0236913","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Security Reminders","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(5)(ii)(A)","uuid":"119e58f0-8524-43c4-a1d6-bb8da3907197","dateCreated":"2022-03-29T00:04:19.0236896","id":32736,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Distribute periodic security updates

Regulation
Periodic security updates.
"},{"dateLastUpdated":"2022-03-29T00:04:19.2203249","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Protection from Malicious Software","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(5)(ii)(B)","uuid":"045c8ca1-3c6c-4b5b-bd38-27308d9b8782","dateCreated":"2022-03-29T00:04:19.2203241","id":32737,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Procedures to guard against malicious software

Regulation
Procedures for guarding against, detecting, and reporting malicious software.
"},{"dateLastUpdated":"2022-03-29T00:04:19.6973327","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Log-in Monitoring","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(5)(ii)(C)","uuid":"f76ee50c-f5b1-4be1-bbbe-918e77aaf547","dateCreated":"2022-03-29T00:04:19.697332","id":32738,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Procedures and monitoring of log-in attempts

Regulation
Procedures for monitoring log-in attempts and reporting discrepancies.
"},{"dateLastUpdated":"2022-03-29T00:04:20.1563448","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Password Management","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(5)(ii)(D)","uuid":"2b2e9c33-d9ce-4b61-aadd-84f2c13cc665","dateCreated":"2022-03-29T00:04:20.1563437","id":32739,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Procedures for password management

Regulation
Procedures for creating, changing, and safeguarding passwords.
"},{"dateLastUpdated":"2022-03-29T00:04:20.619754","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"","mappings":"","title":"Security Incident Procedures","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(6)(i)","uuid":"4107c387-3aa8-4211-bf26-c6b2fc95cf36","dateCreated":"2022-03-29T00:04:20.6197532","id":32740,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to manage security incidents

Regulation
Implement policies and procedures to address security incidents.
"},{"dateLastUpdated":"2022-03-29T00:04:20.8182988","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Response and Reporting","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(6)(ii)","uuid":"9dbc60f5-a05c-4786-954d-f5c5a2804b31","dateCreated":"2022-03-29T00:04:20.8182978","id":32741,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Mitigate and document security incidents

Regulation
Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity; and document security incidents and their outcomes.
"},{"dateLastUpdated":"2022-03-29T00:04:21.2334749","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Contingency Plan","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(7)(i)","uuid":"a6b1be5e-097c-4e86-a5b0-9ad49b07bdd4","dateCreated":"2022-03-29T00:04:21.2334742","id":32742,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Emergency response P&P

Regulation
Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain electronic protected health information.
"},{"dateLastUpdated":"2022-03-29T00:04:21.6099216","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Data Backup Plan","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(7)(ii)(A)","uuid":"25f54b75-4093-4b97-96e7-7cda17936f99","dateCreated":"2022-03-29T00:04:21.609921","id":32743,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Data backup planning & procedures

Regulation
Establish and implement procedures to create and maintain retrievable exact copies of electronic protected health information.
"},{"dateLastUpdated":"2022-03-29T00:04:21.7994662","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Disaster Recovery Plan","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(7)(ii)(B)","uuid":"f233480b-e308-4821-89a4-f7c0edbaa30f","dateCreated":"2022-03-29T00:04:21.7994656","id":32744,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Data recovery planning & procedures

Regulation
Establish (and implement as needed) procedures to restore loss of data.
"},{"dateLastUpdated":"2022-03-29T00:04:22.1864842","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Emergency Mode Operation Plan","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(7)(ii)(C)","uuid":"203ee67d-98c6-4744-b348-0bbbaa37fb84","dateCreated":"2022-03-29T00:04:22.1864833","id":32745,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Business continuity procedures

Regulation
Establish (and implement as needed) procedures to enable continuation of critical business processes for protection of the security of electronic protected health information while operation in emergency mode.
"},{"dateLastUpdated":"2022-03-29T00:04:22.3746427","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Testing and Revision Procedures","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(7)(ii)(D)","uuid":"2fedb2ee-9b42-42c7-8119-20d69ea37676","dateCreated":"2022-03-29T00:04:22.3746422","id":32746,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Contingency planning periodic testing procedures

Regulation
Implement procedures for periodic testing and revision of contingency plans.
"},{"dateLastUpdated":"2022-03-29T00:04:22.748355","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Applications and Data Criticality Analysis","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(7)(ii)(E)","uuid":"235be081-e2da-43e0-9af7-0011440a2ec5","dateCreated":"2022-03-29T00:04:22.7483544","id":32747,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Prioritize data and system criticality for contingency planning

Regulation
Assess the relative criticality of specific applications and data in support of other contingency plan components.
"},{"dateLastUpdated":"2022-03-29T00:04:23.1504623","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Evaluation","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(a)(8)","uuid":"6c66547a-aa93-4a3e-ad52-d2b9e7450701","dateCreated":"2022-03-29T00:04:23.1504615","id":32748,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Periodic security evaluation

Regulation
Perform a periodic technical and nontechnical evaluation, based initially upon the standards implemented under this rule and subsequently, in response to environmental or operational changes affecting the security of electronic protected health information, that established the extent to which an entity's security policies and procedures meet the requirements of this subpart.
"},{"dateLastUpdated":"2022-03-29T00:04:23.354398","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Business Associate Contracts and Other Arrangements","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(b)(1)","uuid":"e75c13d0-b5f5-4620-b6d4-bc5b1ce61344","dateCreated":"2022-03-29T00:04:23.3543968","id":32749,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
CE implement BACs to ensure safeguards

Regulation
A covered entity, in accordance with § 164.306, may permit a business associate to create, receive, maintain, or transmit electronic protected health information on the covered entity's behalf only if the covered entity obtains satisfactory assurances, in accordance with § 164.314(a) that the business associate will appropriately safeguard the information. \r\n(2) This standard does not apply with respect to - \r\n(i) The transmission by a covered entity of electronic protected health information to a health care provider concerning the treatment of an individual. \r\n(ii) The transmission of electronic protected health information by a group health plan or an HMO or health insurance issuer on behalf of a group health plan to a plan sponsor, to the extent that the requirements of § 164.314(b) and § 164.504(f) apply and are met; or \r\n(iii) The transmission of electronic protected health information from or to other agencies providing the services at § 164.502(e)(1)(ii)(C), when the covered entity is a health plan that is a government program providing public benefits, if the requirements of § 164.502(e)(1)(ii)(C) are met. \r\n(3) A covered entity that violates the satisfactory assurances it provided as a business associate of another covered entity will be in noncompliance with the standards, implementation specifications, and requirements of this paragraph and § 164.314(a).
"},{"dateLastUpdated":"2022-03-29T00:04:23.7579246","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Required","mappings":"","title":"Written Contract","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.308(b)(4)","uuid":"6bfe7b0e-1fb7-49e0-a316-0757f0898e49","dateCreated":"2022-03-29T00:04:23.757924","id":32750,"family":"ADMINISTRATIVE SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Implement compliant BACs

Regulation
Document the satisfactory assurances required by paragraph (b)(1) of this section through a written contract or other arrangement with the business associate that meets the applicable requirements of § 164.314(a).
"},{"dateLastUpdated":"2022-03-29T00:04:23.9467458","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Facility Access Controls","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310 (a)(1)","uuid":"52419ea3-2ac5-4db7-8e81-9b2872c7ae7e","dateCreated":"2022-03-29T00:04:23.946745","id":32751,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to limit access to systems and facilities

Regulation
Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed.
"},{"dateLastUpdated":"2022-03-29T00:04:24.3203738","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Contingency Operations","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(a)(2)(i)","uuid":"7b0ebd0f-3a02-45cf-acb6-9412711a9441","dateCreated":"2022-03-29T00:04:24.3203725","id":32752,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Procedures to support emergency operations and recovery

Regulation
Establish (and implement as needed) procedures that allow facility access in support of restoration of lost data under the disaster recovery plan and emergency mode operations plan in the event of an emergency.
"},{"dateLastUpdated":"2022-03-29T00:04:24.4932214","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Facility Security Plan","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(a)(2)(ii)","uuid":"d1365e1d-9986-4d37-af0e-e1a8ab136b38","dateCreated":"2022-03-29T00:04:24.4932207","id":32753,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to safeguard equipment and facilities

Regulation
Implement policies and procedures to safeguard the facility and the equipment there in from unauthorized physical access, tampering, and theft.
"},{"dateLastUpdated":"2022-03-29T00:04:24.850096","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Access Control Validation Procedures","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(a)(2)(iii)","uuid":"99331122-f72f-400a-802f-f7d59f02d1dd","dateCreated":"2022-03-29T00:04:24.8500952","id":32754,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Facility access procedures for personnel

Regulation
Implement procedures to control and validate a person's access to facilities based on their role or function, including visitor control, and control of access to software programs for testing and revision.
"},{"dateLastUpdated":"2022-03-29T00:04:25.2426604","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Addressable","mappings":"","title":"Maintenance Records","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(a)(2)(iv)","uuid":"4052867e-1894-4325-a2a8-68a74eb049bf","dateCreated":"2022-03-29T00:04:25.2426596","id":32755,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to document security-related repairs and modifications

Regulation
Implement policies and procedures to document repairs and modifications to the physical components of a facility that are related to security (for example, hardware, walls, doors, and locks).
"},{"dateLastUpdated":"2022-03-29T00:04:25.4327135","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Workstation Use","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(b)","uuid":"9ee5b39b-86c8-4f74-86ef-1c9bcef62e76","dateCreated":"2022-03-29T00:04:25.4327128","id":32756,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to specify workstation environment & use

Regulation
Implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access electronic protected health information.
"},{"dateLastUpdated":"2022-03-29T00:04:25.8473402","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Workstation Security","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(c)","uuid":"58dba6df-2a6e-4f34-aee9-a5c94570d339","dateCreated":"2022-03-29T00:04:25.8473393","id":32757,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Physical safeguards for workstation access

Regulation
Implement physical safeguards for all workstations that access electronic protected health information, to restrict access to authorized users.
"},{"dateLastUpdated":"2022-03-29T00:04:26.0641094","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Device and Media Controls","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(d)(1)","uuid":"fbe6a7f6-d706-4352-84e7-e135ceda12e3","dateCreated":"2022-03-29T00:04:26.0641087","id":32758,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to govern receipt and removal of hardware and media

Regulation
Implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain electronic protected health information into and out of a facility, and the movement of these items within the facility.
"},{"dateLastUpdated":"2022-03-29T00:04:26.425057","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Disposal","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(d)(2)(i)","uuid":"2e917f67-d2d8-4683-9062-797455313268","dateCreated":"2022-03-29T00:04:26.425056","id":32759,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to manage media and equipment disposal

Regulation
Implement policies and procedures to address the final disposition of electronic protected health information, and/or the hardware or electronic media on which it is stored.
"},{"dateLastUpdated":"2022-03-29T00:04:26.8240599","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Media Re-use","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(d)(2)(ii)","uuid":"7e72070f-0a68-4d5d-aee7-830cf781587a","dateCreated":"2022-03-29T00:04:26.8240593","id":32760,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to remove PHI from media and equipment

Regulation
Implement procedures for removal of electronic protected health information from electronic media before the media are made available for re-use.
"},{"dateLastUpdated":"2022-03-29T00:04:27.0187976","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Accountability","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(d)(2)(iii)","uuid":"0a3b85cb-eddb-492d-b03b-1639b6c84ace","dateCreated":"2022-03-29T00:04:27.0187968","id":32761,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Document hardware and media movement

Regulation
Maintain a record of the movements of hardware and electronic media and any person responsible therefore.
"},{"dateLastUpdated":"2022-03-29T00:04:27.4259056","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Data Backup and Storage","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.310(d)(2)(iv)","uuid":"437c5eca-f382-4a06-be18-7a5a3053ba67","dateCreated":"2022-03-29T00:04:27.4259047","id":32762,"family":"PHYSICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Backup PHI before moving equipment

Regulation
Create a retrievable, exact copy of electronic protected health information, when needed, before movement of equipment.
"},{"dateLastUpdated":"2022-03-29T00:04:27.627139","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"","mappings":"","title":"Access Control ","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(a)(1)","uuid":"d621feea-05c0-4214-b4a4-7fcee3d90fd5","dateCreated":"2022-03-29T00:04:27.6271383","id":32763,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Technical (administrative) P&P to manage PHI access

Regulation
Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in § 164.308(a)(4).
"},{"dateLastUpdated":"2022-03-29T00:04:27.9932638","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Unique User Identification","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(a)(2)(i)","uuid":"98b0054b-0adc-47c5-968a-37c1682d2d52","dateCreated":"2022-03-29T00:04:27.9932632","id":32764,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Assign unique IDs to support tracking

Regulation
Assign a unique name and/or number for identifying and tracking user identity.
"},{"dateLastUpdated":"2022-03-29T00:04:28.4022715","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Emergency Access Procedure","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(a)(2)(ii)","uuid":"f14b080d-3f4d-4f5d-a5d4-7196e3c3e023","dateCreated":"2022-03-29T00:04:28.4022707","id":32765,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Procedures to support emergency access

Regulation
Establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency.
"},{"dateLastUpdated":"2022-03-29T00:04:28.5909471","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Automatic Logoff","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(a)(2)(iii)","uuid":"a6100ed5-6f3b-40b7-89ef-2dd5b76e99bc","dateCreated":"2022-03-29T00:04:28.5909464","id":32766,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Session termination mechanisms

Regulation
Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity.
"},{"dateLastUpdated":"2022-03-29T00:04:28.9958714","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Encryption and Decryption","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(a)(2)(iv)","uuid":"22c62da6-9960-4175-a3ef-b887d7b0d31c","dateCreated":"2022-03-29T00:04:28.9958708","id":32767,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Mechanism for encryption of stored PHI

Regulation
Implement a mechanism to encrypt and decrypt electronic protected health information.
"},{"dateLastUpdated":"2022-03-29T00:04:29.1995612","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Audit Controls","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(b)","uuid":"79b5a4c0-879d-4e72-a3d3-4f3470277d86","dateCreated":"2022-03-29T00:04:29.1995603","id":32768,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Procedures and mechanisms for monitoring system activity

Regulation
Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.
"},{"dateLastUpdated":"2022-03-29T00:04:29.5931824","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Integrity","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(c)(1)","uuid":"4e9100bf-5437-4b61-9324-59793a4e945e","dateCreated":"2022-03-29T00:04:29.5931818","id":32769,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to safeguard PHI unauthorized alteration

Regulation
Implement policies and procedures to protect electronic protected health information from improper alteration or destruction.
"},{"dateLastUpdated":"2022-03-29T00:04:29.9980521","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Mechanism to Authenticate Electronic Protected Health Information","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(c)(2)","uuid":"eac1344d-a0da-499c-b883-fcd69673ed7f","dateCreated":"2022-03-29T00:04:29.9980511","id":32770,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Mechanisms to corroborate PHI not altered

Regulation
Implement electronic mechanisms to corroborate that electronic protected health information has not been altered or destroyed in an unauthorized manner.
"},{"dateLastUpdated":"2022-03-29T00:04:30.1995416","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Person or Entity Authentication","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(d)","uuid":"6d2cc80d-9108-4dc3-857d-cce746c20208","dateCreated":"2022-03-29T00:04:30.1995408","id":32771,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Procedures to verify identities

Regulation
Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.
"},{"dateLastUpdated":"2022-03-29T00:04:30.604133","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Transmission Security","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(e)(1)","uuid":"667635e1-72d0-40be-82e1-dac628c13e2a","dateCreated":"2022-03-29T00:04:30.6041323","id":32772,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Measures to guard against unauthorized access to transmitted PHI

Regulation
Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.
"},{"dateLastUpdated":"2022-03-29T00:04:31.0127251","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Integrity Controls","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(e)(2)(i)","uuid":"5bf0a886-02e0-437c-989e-66621e4c3f07","dateCreated":"2022-03-29T00:04:31.0127241","id":32773,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Measures to ensure integrity of PHI on transmission

Regulation
Implement security measures to ensure that electronically transmitted electronic protected health information is not improperly modified without detection until disposed of.
"},{"dateLastUpdated":"2022-03-29T00:04:31.2181535","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Addressable","mappings":"","title":"Encryption","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.312(e)(2)(ii)","uuid":"8c6f00eb-cbb6-4bfa-b262-779fa7c6d910","dateCreated":"2022-03-29T00:04:31.2181529","id":32774,"family":"TECHNICAL SAFEGUARDS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Mechanism for encryption of transmitted PHI

Regulation
Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate.
"},{"dateLastUpdated":"2022-03-29T00:04:31.6263971","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Business Associate Contracts or Other Arrangements","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.314(a)(1)","uuid":"a7577095-6dfb-49ac-9913-387268e5a014","dateCreated":"2022-03-29T00:04:31.6263964","id":32775,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
CE must ensure BA safeguards PHI

Regulation
(i) The contract or other arrangement between the covered entity and its business associate required by \r\n§ 164.308(b) must meet the requirements of paragraph (a)(2)(i) or (a)(2)(ii) of this section, as applicable. \r\n(ii) A covered entity is not in compliance with the standards in § 164.502(e) and paragraph (a) of this section if the covered entity knew of a pattern of an activity or practice of the business associate that constituted a material breach or violation of the business associate's obligation under the contract or other arrangement, unless the covered entity took reasonable steps to cure the breach or end the violation, as applicable, and, if such steps were unsuccessful. \r\n(A) Terminated the contract or arrangement, if feasible; or \r\n(B) If termination is not feasible, reported the problem to the Secretary.
"},{"dateLastUpdated":"2022-03-29T00:04:31.8063651","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Required","mappings":"","title":"Business Associate Contracts","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.314(a)(2)","uuid":"47b05a45-e155-4720-a57d-b2b530d44e1e","dateCreated":"2022-03-29T00:04:31.8063644","id":32776,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
BACs must contain security language

Regulation
(i) Business associate contracts. The contract between a covered entity and a business associate must provide that the business associate will-- \r\n(A) Implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the electronic protected health information that it creates, receives, maintains, or transmits on behalf of the covered entity as required by this subpart; \r\n(B) Ensure that any agent, including a subcontractor, to whom it provides such information agrees to implement reasonable and appropriate safeguards to protect it; \r\n(C) Report to the covered entity any security incident of which it becomes aware; \r\n(D) Authorize termination of the contract by the covered entity, if the covered entity determines that the business associate has violated a material term of the contract. \r\n(ii) Other arrangements. \r\n(A) When a covered entity and its business associate are both governmental entities, the covered entity is in compliance with paragraph (a)(1) of this section, if - \r\n(1) It enters into a memorandum of understanding with the business associate that contains terms that accomplish the objectives of paragraph (a)(2)(i) of this section; or \r\n(2) Other law (including regulations adopted by the covered entity or its business associate) contains requirements applicable to the business associate that accomplish the objectives of paragraph (a)(2)(i) of this section. \r\n(B) If a business associate is required by law to perform a function or activity on behalf of a covered entity or to provide a service described in the definition of business associate as specified in § 160.103 of this subchapter to a covered entity, the covered entity may permit the business associate to create, receive, maintain, or transmit electronic protected health information on its behalf to the extent necessary to comply with the legal mandate without meeting the requirements of paragraph (a)(2)(i) of this section, provided that the covered entity attempts in good faith to obtain satisfactory assurances as required by paragraph (a)(2)(ii)(A) of this section, and documents the attempt and the reasons that these assurances cannot be obtained. \r\n(C) The covered entity may omit from its other arrangements authorization of the termination of the contract by the covered entity, as required by paragraph (a)(2)(i)(D) of this section if such authorization is inconsistent with the statutory obligations of the covered entity or its business associate.
"},{"dateLastUpdated":"2022-03-29T00:04:32.1869127","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"","mappings":"","title":"Requirements for Group Health Plans","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.314(b)(1)","uuid":"2c46c98d-4a3f-4d18-b808-9bee796a536f","dateCreated":"2022-03-29T00:04:32.186912","id":32777,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Plan documents must reflect security safeguards

Regulation
Except when the only electronic protected health information disclosed to a plan sponsor is disclosed pursuant to § 164.504(f)(1)(ii) or (iii), or as authorized under § 164.508, a group health plan must ensure that its plan documents provide that the plan sponsor will reasonably and appropriately safeguard electronic protected health information created, received, maintained, or transmitted to or by the plan sponsor on behalf of the group health plan.
"},{"dateLastUpdated":"2022-03-29T00:04:32.5856426","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Required","mappings":"","title":"Implement Safeguards","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.314(b)(2)(i)","uuid":"3125c72f-04cb-4295-85a1-1068ab477c39","dateCreated":"2022-03-29T00:04:32.5856418","id":32778,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Plan sponsor to implement safeguards as appropriate

Regulation
The plan documents of the group health plan must be amended to incorporate provisions to require the plan sponsor to-- \r\n(i) Implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the electronic protected health information that it creates, receives, maintains, or transmits on behalf of the group health plan;
"},{"dateLastUpdated":"2022-03-29T00:04:32.7896006","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Required","mappings":"","title":"Ensure Adequate Separation","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.314(b)(2)(ii)","uuid":"c9fb2a3a-0249-4562-a46a-3b2d4ea858de","dateCreated":"2022-03-29T00:04:32.7895998","id":32779,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Security measures to separate PHI from plan sponsor and plan

Regulation
Ensure that the adequate separation required by \r\n§ 164.504(f)(2)(iii) is supported by reasonable and appropriate security measures;
"},{"dateLastUpdated":"2022-03-29T00:04:33.0825522","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Required","mappings":"","title":"Ensure Agents Safeguard","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.314(b)(2)(iii)","uuid":"315b8b89-d55a-4b37-bdf7-daaad42f89de","dateCreated":"2022-03-29T00:04:33.0825512","id":32780,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Ensure subcontractors safeguard PHI

Regulation
Ensure that any agent, including a subcontractor, to whom it provides this information agrees to implement reasonable and appropriate security measures to protect the information; and
"},{"dateLastUpdated":"2022-03-29T00:04:33.2643493","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"Implementation: Required","mappings":"","title":"Report Security Incidents","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.314(b)(2)(iv)","uuid":"dc2ce6e3-7a70-4d06-b7f6-3db54464bfae","dateCreated":"2022-03-29T00:04:33.2643486","id":32781,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Plan sponsors report breaches to health plan

Regulation
Report to the group health plan any security incident of which it becomes aware.
"},{"dateLastUpdated":"2022-03-29T00:04:33.7324914","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"
Roles and Responsibilities

","enhancements":"","mappings":"","title":"Policies and Procedures","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.316(a)","uuid":"9ff9e25d-633c-4c67-a5b3-d2d0a5e6a751","dateCreated":"2022-03-29T00:04:33.7324906","id":32782,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
P&P to ensure safeguards to PHI

Regulation
A covered entity must, in accordance with § 164.306: Implement reasonable and appropriate policies and procedures to comply with the standards, implementation specifications, or other requirements of this subpart, taking into account those factors specified in § 164.306(b)(2)(i), (ii), (iii), and (iv). This standard is not to be construed to permit or excuse an action that violates any other standard, implementation specification, or other requirements of this subpart. A covered entity may change its policies and procedures at any time, provided that the changes are documented and are implemented in accordance with this subpart.
"},{"dateLastUpdated":"2022-03-29T00:04:33.918094","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Required","mappings":"","title":"Documentation","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.316(b)(1)","uuid":"8f73d8f9-3c8c-4491-8e5a-19036fe19cec","dateCreated":"2022-03-29T00:04:33.918093","id":32783,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Document P&P and actions & activities

Regulation
Documentation.\r\n(i) Maintain the policies and procedures implemented to comply with this subpart in written (which may be electronic) form; and\r\n(ii) If an action, activity or assessment is required by this subpart to be documented, maintain a written (which may be electronic) record of the action, activity, or assessment.
"},{"dateLastUpdated":"2022-03-29T00:04:34.338235","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Required","mappings":"","title":"Time Limit","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.316(b)(2)(i)","uuid":"4808746a-4616-4cc4-8032-297effaa3ccf","dateCreated":"2022-03-29T00:04:34.3382344","id":32784,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Retain documentation for 6 years

Regulation
Retain the documentation required by paragraph (b)(1) of this section for 6 years from the date of its creation or the date when it last was in effect, whichever is later.
"},{"dateLastUpdated":"2022-03-29T00:04:34.7798363","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Required","mappings":"","title":"Availability","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.316(b)(2)(ii)","uuid":"d39e13c4-a54a-4ef7-9d28-d3232e359d46","dateCreated":"2022-03-29T00:04:34.7798357","id":32785,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Documentation available to system administrators

Regulation
Make documentation available to those persons responsible for implementing the procedures to which the documentation pertains.
"},{"dateLastUpdated":"2022-03-29T00:04:35.2054447","subControls":"","lastUpdatedById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","practiceLevel":"","tenantsId":1,"relatedControls":"","enhancements":"Implementation: Required","mappings":"","title":"Updates","weight":0,"catalogueID":205,"createdById":"52f86957-eb18-4ec5-bddd-ae54d93bfcce","archived":false,"assessmentPlan":"","controlId":"164.316(b)(2)(iii)","uuid":"cad0a88e-60f9-4545-8d82-7be3a74a465d","dateCreated":"2022-03-29T00:04:35.2054438","id":32786,"family":"ORGANIZATIONAL REQUIREMENTS","references":"","isPublic":true,"controlType":"Stand-Alone","description":"
Description
Periodic review and updates to changing needs

Regulation
Review documentation periodically, and update as needed, in response to environmental or operational changes affecting the security of the electronic protected health information.
"}]}}