User access monitoring: What should you be doing

1 minute read

It is helpful to occasionally reassess the processes covered entities use to meet compliance obligations under HIPAA regulations. One of those is user access monitoring. This is not a term used in HIPAA regulations; however, guidance from U.S. Department of Health & Human Services Office for Civil Rights (OCR) clearly identifies user audit controls as necessary.[1]

Under the HIPAA Security Rule, covered entities and business associates have an obligation to have policies and procedures in place to prevent, detect, contain, and correct security violations.[2] The regulations also require covered entities and business associates to “Implement procedures to regularly review records of information security system activity, such as audit logs, access reports and security incident tracking reports.”[3] It also dictates the implementation of hardware, software, and/or procedural processes that record and examine activity in information systems containing electronic protected health information (ePHI).[4]

This document is only available to members. Please log in or become a member.
 


Would you like to read this entire article?

If you already subscribe to this publication, just log in. If not, let us send you an email with a link that will allow you to read the entire article for free. Just complete the following form.

* required field