Page 4 - HIPAA Compliance Checklist
P. 4

Password Checklist                                Network Access Checklist

                 Policies are in place prescribing pass-           Policies are in place prescribing network
                 word practices for the organization.              configuration and access.

                 All staff members understand and agree            All staff members understand and agree
                 to abide by password policies.                    to abide by network use policy.

                 Each staff member has a unique user-              Access to the network is restricted to
                 name and password.                                authorize users and devices.

                 Passwords are not revealed to or shared           Guest devices are prohibited from ac-
                 with others.                                      cessing networks that contain Protected
                                                                   Health Information (PHI).
                 Passwords are not written down or dis-
                 played on screen.                                 Wireless networks use appropriate en-
                                                                   cryption.
                 Passwords are hard to guess, but easy
                 to remember.                                      Computers contain no peer-to-peer appli-
                                                                   cations.
                 Passwords are changed routinely.
                                                                   Public instant messaging services are not
                 Passwords are not reused.                         used.

                 Any default passwords that come with              Private instant messaging services, where
                 a product are changed during product              used, are secured appropriately.
                 installation.
                                                               Physical Access Checklist
                 Any devices or programs that allow op-
                 tional password protection have pass-             Policies are in place prescribing the phys-
                 word protection turned on and in use.             ical safety and security of devices.

                                                                   All staff members understand and agree
                                                                   to abide by physical access policies.

            95% of Healthcare                                      All devices containing Protected Health

            Organizations have                                     Information (PHI) are inventoried and
                                                                   can be accounted for.
            Internet Connectivity.                                 Computers are protected from environ-

                                                                   mental hazards.
            25% Have No Firewall.                                  Physical access to secure areas is limited

                                                                   to authorized individuals.

                                                                   Computers running Electronic Health
                                                                   Record (EHR) systems are shielded from
                                                                   unauthorized viewing.

                                                                   Equipment located in high-traffic or less
                                                                   secure areas is physically secured.
   1   2   3   4   5