Page 3 - HIPAA Compliance Checklist
P. 3
Establish your organization’s security Maintenance Checklist
culture by following these simple steps.
Policies are in place prescribing Electronic
Health Record (EHR) system mainte-
Mobile Device Checklist nance procedures.
Policies are in place prescribing use of
mobile devices. Staff with responsibilities for maintenance
understand and agree to system mainte-
All staff members understand and agree nance policies and procedures.
to abide by mobile device policy and
procedures. Computers are free of unnecessary soft-
ware and data files.
Mobile devices are configured to prevent
unauthorized use. Remote file sharing and printing (includ-
ing remote printing) are disabled.
Protected Health Information (PHI) on
mobile devices is encrypted. Vendor remote maintenance connections
are documented and fully secured.
Connections between authorized mobile
devices and Electronic Health Records System and applications are updated or
(EHRs) are encrypted. patched regularly as recommended by
the manufacturer.
Firewall Checklist
Policies are in place prescribing use, con-
figuration, and operation of firewalls and
firewall logs.
All computers are protected by a proper-
ly configured firewall.
All staff members understand and agree
that they may not hinder the operation
of firewalls.