SlideShare a Scribd company logo
1 of 7
ADMINISTRATIVE SAFEGUARDS:
SECURITY AWARENESS TRAINING
MELISSA HOLLEY PRESIDENT
MHA690: HEALTHCARE CAPSTONE
DR. HWANG-JI LU
SEPTEMBER 26, 2013
WHERE SECURITY OF HIPAA
BEGIN:
• SECURITY STANDARDS FOR THE PROTETION OF ELECTRONIC
PROTEDTED HEALTH INFORMATION BEGINS WITH ENSURING THE
ADMINISTRATIVE STAFF HAS CLEAR BACKGROUNDS.
• ENSURING EACH USER HAS AUTHORIZATION TO ACCESS THE
ELECTRONIC PROTEDTED HEALTH INFORMATION
• ENSURING THE TRAINING IMPLEMENT ALL THE SECURITY
STANDARDS
SECURITY REMINDERS
• PERIODIC SECURITY UPDATES
• AUTOMATIC EMAIL REMINDERS TO USERS
• DISCUSSION IN MONTHLY MEETINGS
• RETRAINING ON SECURITY PROCEDURES
PROTECTION FROM MALICIOUS
SOFTWARE
• PROCEDURES FOR GUARDING AGAINST, DETECTING, AND
REPORTING MALICIOUS SOFTWARE
• USERS MUST BE VIGILANT OF OPENING EMAILS, PROGRAMS
AND DOWNLOADING FROM THE INTERNET
• IMPLEMENTATION OF TRAINING IN REGARDS TO
MALICIOIUS SOFTWARE
LOG-IN MONITORING
• PROCEDURES FOR MONITORING LOG ON ATTEMPTS AND
REPORTING DISCREPANCIES
• MANY SYSTEMS CAN IDENTIFY MULTIPLE UNSUCESSFUL
ATTEMPTS WHICH RAISE CONCERNS
• WORKFORCE MUST BE MADE AWARE OF HOW TO USE AND
MONITOR LOG-IN ATTEMPTS
PASSWORD MANAGEMENT
• PROCEDURES FOR CREATING, CHANGING, AND
SAFEGUARDING PASSWORDS
• CREATE PASSWORDS THAT ARE A COMBINATION OF
SYMBOLS, NUMBERS AND CASE SENSITIVE
• ENSURE USERS DO NOT EXPOSE PASSWORDS OR SHARE
WITH OTHERS
REFERENCE
(2007). Security standards: Administrative safeguards.
HIPAA SECURITY SERIES, 2, Retrieved from
http://www.hhs.gov/ocr/privacy/hipaa/administrative
/securityrule/adminsafeguards.pdf

More Related Content

What's hot

Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaaTina Peña
 
Confidentiality Rules
Confidentiality RulesConfidentiality Rules
Confidentiality Ruleskholman1
 
Pt hr confidentiality
Pt hr confidentialityPt hr confidentiality
Pt hr confidentialitycorbsan
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
Modernizing Security for the Healthcare Industry
Modernizing Security for the Healthcare IndustryModernizing Security for the Healthcare Industry
Modernizing Security for the Healthcare IndustryKevin O'Brien
 
Managed Services Sales Sheet
Managed Services Sales SheetManaged Services Sales Sheet
Managed Services Sales SheetScott Baines
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsDLA Piper (Canada) LLP
 
A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security Jeff Horsager
 
Week 1 privacy and security training
Week 1 privacy and security trainingWeek 1 privacy and security training
Week 1 privacy and security trainingSonja Davis
 
HIPAA Compliance Email
HIPAA Compliance EmailHIPAA Compliance Email
HIPAA Compliance EmailL Andersen
 

What's hot (16)

Introduction hippaa
Introduction hippaaIntroduction hippaa
Introduction hippaa
 
Confidentiality Rules
Confidentiality RulesConfidentiality Rules
Confidentiality Rules
 
HIPAA-2-_FINAL
HIPAA-2-_FINALHIPAA-2-_FINAL
HIPAA-2-_FINAL
 
Pt hr confidentiality
Pt hr confidentialityPt hr confidentiality
Pt hr confidentiality
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
MobileSecurity WhitePaper
MobileSecurity WhitePaperMobileSecurity WhitePaper
MobileSecurity WhitePaper
 
Modernizing Security for the Healthcare Industry
Modernizing Security for the Healthcare IndustryModernizing Security for the Healthcare Industry
Modernizing Security for the Healthcare Industry
 
Managed Services Sales Sheet
Managed Services Sales SheetManaged Services Sales Sheet
Managed Services Sales Sheet
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic Systems
 
A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security A Framework for Health Information Technology and Network Security
A Framework for Health Information Technology and Network Security
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
Cybersecurity 101 final
Cybersecurity 101 finalCybersecurity 101 final
Cybersecurity 101 final
 
Discussion 2
Discussion 2Discussion 2
Discussion 2
 
Week 1 privacy and security training
Week 1 privacy and security trainingWeek 1 privacy and security training
Week 1 privacy and security training
 
HIPAA Compliance Email
HIPAA Compliance EmailHIPAA Compliance Email
HIPAA Compliance Email
 

Similar to Administrative safeguards

New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentationRudeboy2006
 
Cybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdfCybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdfLarisaAlbanians
 
Things to Consider Before Buying Cyber Liability Insurance
Things to Consider Before Buying Cyber Liability InsuranceThings to Consider Before Buying Cyber Liability Insurance
Things to Consider Before Buying Cyber Liability InsuranceTexas Medical Liability Trust
 
Marlene brooks week 1 discussion 2 - confidentiality
Marlene brooks   week 1 discussion 2 - confidentialityMarlene brooks   week 1 discussion 2 - confidentiality
Marlene brooks week 1 discussion 2 - confidentialitybablot33
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmcanpaksolutions04
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality trainingpburton60
 
Week 1 Discussion 2
Week 1 Discussion 2Week 1 Discussion 2
Week 1 Discussion 2Imagetheband
 
Confidentail Avoidance
Confidentail AvoidanceConfidentail Avoidance
Confidentail AvoidanceJason Hamm
 
Presentation2 (2)
Presentation2 (2)Presentation2 (2)
Presentation2 (2)ITNet
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0stevemeltzer
 
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...Conference Panel
 
Jeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanetteRankins
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointbradleyl2
 
Policy on ia 1st assignment
Policy on ia   1st assignmentPolicy on ia   1st assignment
Policy on ia 1st assignmentTimir Shah
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...Michigan Primary Care Association
 
Life Science Patient Data Privacy
Life Science Patient Data PrivacyLife Science Patient Data Privacy
Life Science Patient Data PrivacyTracey Zdravkovic
 
hipaa presentation
 hipaa presentation hipaa presentation
hipaa presentationRenee Bell
 

Similar to Administrative safeguards (20)

New microsoft power point presentation
New microsoft power point presentationNew microsoft power point presentation
New microsoft power point presentation
 
Cybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdfCybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdf
 
Things to Consider Before Buying Cyber Liability Insurance
Things to Consider Before Buying Cyber Liability InsuranceThings to Consider Before Buying Cyber Liability Insurance
Things to Consider Before Buying Cyber Liability Insurance
 
Marlene brooks week 1 discussion 2 - confidentiality
Marlene brooks   week 1 discussion 2 - confidentialityMarlene brooks   week 1 discussion 2 - confidentiality
Marlene brooks week 1 discussion 2 - confidentiality
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmm
 
Patient confidentiality training
Patient confidentiality trainingPatient confidentiality training
Patient confidentiality training
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Week 1 Discussion 2
Week 1 Discussion 2Week 1 Discussion 2
Week 1 Discussion 2
 
Confidentail Avoidance
Confidentail AvoidanceConfidentail Avoidance
Confidentail Avoidance
 
Final copy 7
Final copy 7Final copy 7
Final copy 7
 
Presentation2 (2)
Presentation2 (2)Presentation2 (2)
Presentation2 (2)
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0
 
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
 
Jeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy TrainingJeanette Rankins Patient Privacy Training
Jeanette Rankins Patient Privacy Training
 
Mha 690 wk1_db2_V2
Mha 690 wk1_db2_V2Mha 690 wk1_db2_V2
Mha 690 wk1_db2_V2
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power point
 
Policy on ia 1st assignment
Policy on ia   1st assignmentPolicy on ia   1st assignment
Policy on ia 1st assignment
 
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
MPCA HIPAA Compliance/Meaningful Use Requirements and Security Risk Assessmen...
 
Life Science Patient Data Privacy
Life Science Patient Data PrivacyLife Science Patient Data Privacy
Life Science Patient Data Privacy
 
hipaa presentation
 hipaa presentation hipaa presentation
hipaa presentation
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Administrative safeguards

  • 1. ADMINISTRATIVE SAFEGUARDS: SECURITY AWARENESS TRAINING MELISSA HOLLEY PRESIDENT MHA690: HEALTHCARE CAPSTONE DR. HWANG-JI LU SEPTEMBER 26, 2013
  • 2. WHERE SECURITY OF HIPAA BEGIN: • SECURITY STANDARDS FOR THE PROTETION OF ELECTRONIC PROTEDTED HEALTH INFORMATION BEGINS WITH ENSURING THE ADMINISTRATIVE STAFF HAS CLEAR BACKGROUNDS. • ENSURING EACH USER HAS AUTHORIZATION TO ACCESS THE ELECTRONIC PROTEDTED HEALTH INFORMATION • ENSURING THE TRAINING IMPLEMENT ALL THE SECURITY STANDARDS
  • 3. SECURITY REMINDERS • PERIODIC SECURITY UPDATES • AUTOMATIC EMAIL REMINDERS TO USERS • DISCUSSION IN MONTHLY MEETINGS • RETRAINING ON SECURITY PROCEDURES
  • 4. PROTECTION FROM MALICIOUS SOFTWARE • PROCEDURES FOR GUARDING AGAINST, DETECTING, AND REPORTING MALICIOUS SOFTWARE • USERS MUST BE VIGILANT OF OPENING EMAILS, PROGRAMS AND DOWNLOADING FROM THE INTERNET • IMPLEMENTATION OF TRAINING IN REGARDS TO MALICIOIUS SOFTWARE
  • 5. LOG-IN MONITORING • PROCEDURES FOR MONITORING LOG ON ATTEMPTS AND REPORTING DISCREPANCIES • MANY SYSTEMS CAN IDENTIFY MULTIPLE UNSUCESSFUL ATTEMPTS WHICH RAISE CONCERNS • WORKFORCE MUST BE MADE AWARE OF HOW TO USE AND MONITOR LOG-IN ATTEMPTS
  • 6. PASSWORD MANAGEMENT • PROCEDURES FOR CREATING, CHANGING, AND SAFEGUARDING PASSWORDS • CREATE PASSWORDS THAT ARE A COMBINATION OF SYMBOLS, NUMBERS AND CASE SENSITIVE • ENSURE USERS DO NOT EXPOSE PASSWORDS OR SHARE WITH OTHERS
  • 7. REFERENCE (2007). Security standards: Administrative safeguards. HIPAA SECURITY SERIES, 2, Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/administrative /securityrule/adminsafeguards.pdf