Information Access Management - Access Authorization Procedures, v1.0

Specifies that a health care related organization must implement procedures for granting access to electronic protected health information.

Assessment Step

1
Procedures to Grant Access (ProcedurestoGrantAccess)
Does the covered entity or business associate implement procedures for granting access to electronic protected health information, for example, through access to a workstation, transaction, program, process, or other mechanism?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
A covered entity or business associate must perform these requirements in accordance with Section 164.306 (Security standards: General rules).

Conformance Criteria (1)

Grant Access to PHI
The covered entity or business associate must implement procedures for granting access to electronic protected health information, for example, through access to a workstation, transaction, program, process, or other mechanism.
Citations
HIPAA-Security-Rule
45 CFR Section 164.308(a)(4)(ii)(B)
HIPAA-Security-Rule
45 CFR Section 164.306