HIPAA69
45 CFR § 164.308(a)(1)(i) · 45 CFR § 164.308(a)(1)(ii)(A) · 45 CFR § 164.308(a)(1)(ii)(B) · 45 CFR § 164.308(a)(1)(ii)(C) · 45 CFR § 164.308(a)(1)(ii)(D) · 45 CFR § 164.308(a)(2) · 45 CFR § 164.308(a)(3)(i) · 45 CFR § 164.308(a)(3)(ii)(A) · 45 CFR § 164.308(a)(3)(ii)(B) · 45 CFR § 164.308(a)(3)(ii)(C) · 45 CFR § 164.308(a)(4)(i) · 45 CFR § 164.308(a)(4)(ii)(A) · 45 CFR § 164.308(a)(4)(ii)(B) · 45 CFR § 164.308(a)(4)(ii)(C) · 45 CFR § 164.308(a)(5)(i) · 45 CFR § 164.308(a)(5)(ii)(A) · 45 CFR § 164.308(a)(5)(ii)(B) · 45 CFR § 164.308(a)(5)(ii)(C) · 45 CFR § 164.308(a)(5)(ii)(D) · 45 CFR § 164.308(a)(6)(i) · 45 CFR § 164.308(a)(6)(ii) · 45 CFR § 164.308(a)(7)(i) · 45 CFR § 164.308(a)(7)(ii)(A) · 45 CFR § 164.308(a)(7)(ii)(B) · 45 CFR § 164.308(a)(7)(ii)(C) · 45 CFR § 164.308(a)(7)(ii)(D) · 45 CFR § 164.308(a)(7)(ii)(E) · 45 CFR § 164.308(a)(8) · 45 CFR § 164.308(b)(1) · 45 CFR § 164.308(b)(3) · 45 CFR § 164.310(a)(1) · 45 CFR § 164.310(a)(2)(i) · 45 CFR § 164.310(a)(2)(ii) · 45 CFR § 164.310(a)(2)(iii) · 45 CFR § 164.310(a)(2)(iv) · 45 CFR § 164.310(b) · 45 CFR § 164.310(c) · 45 CFR § 164.310(d)(1) · 45 CFR § 164.310(d)(2)(i) · 45 CFR § 164.310(d)(2)(ii) · 45 CFR § 164.310(d)(2)(iii) · 45 CFR § 164.310(d)(2)(iv) · 45 CFR § 164.312(a)(1) · 45 CFR § 164.312(a)(2)(i) · 45 CFR § 164.312(a)(2)(ii) · 45 CFR § 164.312(a)(2)(iii) · 45 CFR § 164.312(a)(2)(iv) · 45 CFR § 164.312(b) · 45 CFR § 164.312(c)(1) · 45 CFR § 164.312(c)(2) · 45 CFR § 164.312(d) · 45 CFR § 164.312(e)(1) · 45 CFR § 164.312(e)(2)(i) · 45 CFR § 164.312(e)(2)(ii) · 45 CFR § 164.316(a) · 45 CFR § 164.316(b)(1) · 45 CFR § 164.316(b)(2)(i) · 45 CFR § 164.316(b)(2)(ii) · 45 CFR § 164.316(b)(2)(iii) · HIPAA
Requirements in this framework
- Access Authorization
- Access Control
- Access Control and Validation Procedures
- Access control lifecycle management
- Access Establishment and Modification
- Accountability
- Administrative safeguards
- Applications and Data Criticality Analysis
- Assigned Security Responsibility
- Audit Controls
- Authorization and/or Supervision
- Automatic Logoff
- Availability
- Business Associate Contracts and Other Arrangements
- Business associate governance
- Contingency Operations
- Contingency Plan
- Contingency planning and backup safeguards
- Data Backup and Storage
- Data Backup Plan
- Device and Media Controls
- Disaster Recovery Plan
- Disposal
- Documentation
- Emergency Access Procedure
- Emergency Mode Operation Plan
- Encryption
- Encryption and Decryption
- Evaluation
- Facility Access Controls
- Facility Security Plan
- Information Access Management
- Information System Activity Review
- Integrity
- Integrity Controls
- Isolating Health Care Clearinghouse Functions
- Log-in Monitoring
- Maintenance Records
- Mechanism to Authenticate Electronic Protected Health Information
- Media Re-use
- Password Management
- Person or Entity Authentication
- Physical safeguards
- Policies and documentation
- Policies and Procedures
- Protection from Malicious Software
- Response and Reporting
- Risk Analysis
- Risk analysis and risk management
- Risk Management
- Sanction Policy
- Security Awareness and Training
- Security incident procedures
- Security Incident Procedures
- Security Management Process
- Security Reminders
- Technical safeguards
- Termination Procedures
- Testing and Revision Procedures
- Time Limit
- Transmission Security
- Unique User Identification
- Updates
- Workforce Clearance Procedure
- Workforce Security
- Workforce security and awareness training
- Workstation Security
- Workstation Use
- Written Contract or Other Arrangement