Enforcement Rule

164.312(a)(1) - Access control
Description: The organization has implemented comprehensive technical policies and procedures governing electronic information systems that store and ma...
Tue, 14 Nov, 2023 at 3:12 PM
164.312(a)(2)(iv) - Encryption and decryption
Description: The organization has implemented a robust mechanism to ensure the encryption and decryption of electronic protected health information (ePH...
Tue, 14 Nov, 2023 at 3:06 PM
164.312(e)(1) - Transmission security
Description: The organization has implemented robust technical security measures to safeguard against unauthorized access to electronic protected health...
Tue, 14 Nov, 2023 at 3:01 PM
164.312(e)(2)(i) - Integrity controls
Description: The organization has implemented robust security measures to ensure the integrity of electronically transmitted electronic protected health...
Tue, 14 Nov, 2023 at 2:57 PM
164.312(e)(2)(ii) - Encryption
Description: The organization has implemented a robust mechanism to encrypt electronic protected health information (ePHI) whenever deemed appropriate, ...
Tue, 14 Nov, 2023 at 2:51 PM
164.312(b) - Audit controls
Description: The organization has implemented comprehensive mechanisms, including hardware, software, and procedural controls, to record and examine act...
Tue, 14 Nov, 2023 at 2:47 PM
164.312(c)(1) - Integrity
Description: The organization has implemented robust policies and procedures to safeguard electronic protected health information (ePHI) from improper a...
Tue, 14 Nov, 2023 at 2:43 PM
164.312(c)(2) - Mechanism to authenticate electronic protected health information
Description: The organization has implemented electronic mechanisms to corroborate that electronic protected health information (ePHI) remains unaltered...
Tue, 14 Nov, 2023 at 2:38 PM
164.312(a)(2)(iii) - Automatic logoff
Description: The organization has implemented electronic procedures to enhance the security of electronic protected health information (ePHI) by automat...
Tue, 14 Nov, 2023 at 2:34 PM
164.312(a)(2)(i) - Unique user identification
Description: The organization has established a comprehensive system for user identity management by assigning a unique name and/or number to each user....
Tue, 14 Nov, 2023 at 2:30 PM