Page 3 - HIPAA Compliance Checklist
P. 3

Establish your organization’s security            Maintenance Checklist
             culture by following these simple steps.
                                                                   Policies are in place prescribing Electronic
                                                                   Health Record (EHR) system mainte-
             Mobile Device Checklist                               nance procedures.
                 Policies are in place prescribing use of
                 mobile devices.                                   Staff with responsibilities for maintenance
                                                                   understand and agree to system mainte-
                 All staff members understand and agree            nance policies and procedures.
                 to abide by mobile device policy and
                 procedures.                                       Computers are free of unnecessary soft-
                                                                   ware and data files.
                 Mobile devices are configured to prevent
                 unauthorized use.                                 Remote file sharing and printing (includ-
                                                                   ing remote printing) are disabled.

                 Protected Health Information (PHI) on
                 mobile devices is encrypted.                      Vendor remote maintenance connections
                                                                   are documented and fully secured.

                 Connections between authorized mobile
                 devices and Electronic Health Records             System and applications are updated or
                 (EHRs) are encrypted.                             patched regularly as recommended by
                                                                   the manufacturer.
             Firewall Checklist

                 Policies are in place prescribing use, con-
                 figuration, and operation of firewalls and
                 firewall logs.


                 All computers are protected by a proper-
                 ly configured firewall.

                 All staff members understand and agree
                 that they may not hinder the operation
                 of firewalls.
   1   2   3   4   5