Information Access Management - Access Establishment and Modification Policies, v1.0

Specifies that a health care related organization must have policies that, based upon the organization's access authorization policies, establish, document, review, and modify a user's right of access to a workstation.

Assessment Step

1
Policies to Manage User Access (PoliciestoManageUserAccess)
Does the covered entity or business associate have policies that, based upon the covered entity's or the business associate's access authorization policies, establish, document, review, and modify a user's right of access to a workstation, transaction, program, or process?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
A covered entity or business associate must perform these requirements in accordance with Section 164.306 (Security standards: General rules).

Conformance Criteria (1)

Manage User Access
The covered entity or business associate must have policies that, based upon the covered entity's or the business associate's access authorization policies, establish, document, review, and modify a user's right of access to a workstation, transaction, program, or process.
Citations
HIPAA-Security-Rule
45 CFR Section 164.308(a)(4)(ii)(C)
HIPAA-Security-Rule
45 CFR Section 164.306