preview

HIPAA Security Policy

Decent Essays

I. Purpose
The purpose of this policy is to comply with the HIPAA Security Rule’s requirements pertaining to the integrity, confidentiality, and availability of electronic protected health information (ePHI).

II. Scope and Limitations
This policy applies to all Topazworkforce members.

III. Related Policies Name and Number
Security Policy COM 002

IV. Definitions
Electronic Protected Health Information (ePHI) - Individually identifiable health information transmitted or maintained in electronic form.

HIPAA

Protected Health Information - Individually identifiable health information transmitted or maintained in any form.

V. Procedures
1. Network Transmission

Topaz will maintain integrity controls to ensure the validity of information transmitted over the …show more content…

Encryption of Data

To appropriately guard against unauthorized access to or modification of ePHI that is being transmitted from Topaz network’s the procedures outlined must be implemented:

a. All transmissions of ePHI from the Topaz networks to a network outside of the aforementioned networks must utilize an encryption mechanism between the sending and receiving entities or the file, document, or folder containing said ePHI must be encrypted before transmission.

b. For an encryption strategy to be successful, an organization must consider many factors. For example, for encryption technologies to work properly when data is being transmitted, both the sender and receiver must be using the same or compatible technology.

c. Prior to transmitting ePHI from the Topaz networks to a network outside of the aforementioned networks the receiving person or entity must be authenticated.(see HIPAA Security Policy).

d. All transmissions of ePHI from the Topaz networks to a network outside of the aforementioned networks should include only the minimum amount of PHI. (See HIPAA Privacy Policy - Minimum Necessary Request, Use or Disclosure of Protected Health Information).

e.

3. EPHI Transmission Using

Get Access