Home

/

Features

Features

By accessing our website, you are agreeing to be bound by these terms of service, all applicable laws and regulations.

HipaaChecker Features

UNIQUE USER ID TRACKING

PHI EMERGENCY ACCESS

SESSION MANAGEMENT

ENCRYPTION AND DECRYPTION

PREVENT UNAUTHORIZED PHI ALTERATION AND DESTRUCTION

INTEGRITY CONTROLS OVER TRANSMISSION

PHI ENCRYPTION

ACCESS CONTROL

arrow-down

EMERGENCY ACCESS PROCEDURE (Required) - § 164.312(a)(2)(ii)

This implementation specification requires a covered entity to establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency.

HIPAAChecker to Evaluate Emergency Access Procedure

A strictly defined and controlled process should allow temporary elevated privileges under extenuating circumstances for emergency access to sensitive resources. HIPAAChecker evaluates the following emergency access procedure:

Authorization Protocol: Check whether the application implements a legitimate emergency scenario. In an emergency scenario, does the app satisfy electronic approval with a sign-off from the data owner before emergency access is granted?

Temporary Access: Check whether the emergency access permission is revoked automatically after a defined time.

Certify and Protect Your

Apps

with

HIPAAChecker