HIPAA/HITECH Compliance Checklist for Multi-User Health Kiosk | |||
---|---|---|---|
PRIVACY | Yes | NO | N/A |
1. Personal Information (§164.506, §164.514 (Swanson, 2001; Watzlaf et al., 2010) | |||
|
|||
|
|||
|
|||
|
|||
2. Retention of Personal Information | |||
|
|||
|
|||
|
|||
|
|||
CONFIDENTIALITY §164.522 (Swanson, 2001) | |||
3. Request of Information | |||
|
|||
SECURITY §164.308 (Swanson, 2001; Watzlaf et al., 2010; Watzlaf et al., 2011) | |||
4. Security Management Process | |||
|
|||
|
|||
|
|||
|
|||
5. Assigned Security Responsibility | |||
|
|||
6. Workforce Security | |||
|
|||
|
|||
|
|||
|
|||
7. Information Access Management | |||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
8. Contingency Plan | |||
|
|||
|
|||
|
|||
|
|||
|
|||
9. Evaluation | |||
|
|||
10. Business Associate (BA) Contracts | |||
|
|||
11. Physical Security | |||
|
|||
|
|||
|
|||
|
|||
12. Computer Component Use | |||
|
|||
|
|||
|
|||
13. Workstation and Server Security | |||
|
|||
|
|||
14. Device and Media Controls | |||
|
|||
15. Access Control | |||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
|
|||
16. Audit Control | |||
|
|||
Are there any audit control policies in place? | |||
More than three times a year? |
|||
Integrity | |||
Who has access to information or e-PHI stored in the kiosk systems? | |||
Is there a well-defined policy or procedure to identify these individuals? | |||
Person or Entity Authentication | |||
What kind of authentication procedure or mechanism is in place within the kiosk system? | |||
Are there any policies to govern this and also evaluate the authentication mechanisms in place to assess the strengths and weaknesses of the mechanism? | |||
If so does the policy also look at the cost benefit ratio of the various types of authentication mechanisms? | |||
Is there a policy to test and upgrade the authentication mechanism tested on a periodic basis? | |||
Transmission Security | |||
Is there any formal data transmission policy for the kiosk system? | |||
Is there any risk assessment policy to determine the security level of the data transmission procedure in the kiosk system? | |||
Is there a formal policy for breach notification? | |||
Is there a template or letter or other defined means of breach notification? | |||
Does the notification policy include procedure for notification of media outlets? | |||
Does the policy also spell out notification procedures for Business Associates, if any? |