1 1 1 1
 

RO HIPAA Security Procedures [March 2006]

Number Title Keyword(s)
1 General Security Compliance General, Security Officer, Security Liaison
2 Security Management Risk, Management, EPHI Inventory
3 Workforce Security Workforce Authorization Security
4 Information Access Management Information Access, Termination, Transfer
5 Security Awareness and Training Training, Reminders, Virus, Log-in Monitoring
6 Incident Response and Reporting Incident Response, Helpdesk, NTS
7 Data Backups and Contingency Planning Backups, Disaster Recovery, Contingency Plan
8 Periodic Evaluation of Compliance Policies and Procedures Evaluation, Internal Audit
9 Facility Access Control Facility Access Control, Locks, Badges
10 Workstation Acceptable Use Acceptable Use
11 Server, Desktop, and Wireless Computer System Security Server, PC, Wireless, Laptop, PDA
12 Device and Media Controls Removable Media, Media Re-Use
13 Access Control Access Control, User Id, PW, FW, VPN
14 Audit Control Audit, System Activity, Review
15 EPHI Integrity and Authentication Integrity, Data Authentication
16 Person or Entity Authentication User Authentication
17 Transmission Security Encryption, Network Transfer, Wireless, E-Mail
Copyright Washington University School of Medicine Department of Radiation Oncology.