No Description
information system Activity Review:
Implement procedures to regularly review records of system information such as audit logs access reports and security incident tracking reports
Employee Security:
Develop a plan for granting and limiting different levels of access to PHI including clearance procedures and termination procedures
Security rule requirements include:
Security incident procedures instructions or reporting and dealing with security breaches
Physical safeguards including the following:
Facility access controls develop a security plan that deters intruders from accessing environments where sensitive information resides
Remember:
Keep PHI confidential and on a need to know basis.
If you find a breach report it to your supervisor immediately
Make sure you safeguard clients personal information at all times.