Features
By accessing our website, you are agreeing to be bound by these terms of service, all applicable laws and regulations.
HipaaChecker Features
UNIQUE USER ID TRACKING
PHI EMERGENCY ACCESS
SESSION MANAGEMENT
ENCRYPTION AND DECRYPTION
PREVENT UNAUTHORIZED PHI ALTERATION AND DESTRUCTION
INTEGRITY CONTROLS OVER TRANSMISSION
PHI ENCRYPTION
ACCESS CONTROL
EMERGENCY ACCESS PROCEDURE (Required) - § 164.312(a)(2)(ii)
This implementation specification requires a covered entity to establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency.
HIPAAChecker to Evaluate Emergency Access Procedure
A strictly defined and controlled process should allow temporary elevated privileges under extenuating circumstances for emergency access to sensitive resources. HIPAAChecker evaluates the following emergency access procedure:
Authorization Protocol: Check whether the application implements a legitimate emergency scenario. In an emergency scenario, does the app satisfy electronic approval with a sign-off from the data owner before emergency access is granted?
Temporary Access: Check whether the emergency access permission is revoked automatically after a defined time.