Person or Entity Authentication, v1.0

Specifies that a health care related organization must implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.

Assessment Step

1
Verify Person Seeking Access (VerifyPersonSeekingAccess)
Does the covered entity or business associate implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
A covered entity or business associate must perform these requirements in accordance with Section 164.306 (Security standards: General rules).

Conformance Criteria (1)

Verify Person Seeking Access
The covered entity or business associate must implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.
Citations
HIPAA-Security-Rule
45 CFR Section 164.312(d)
HIPAA-Security-Rule
45 CFR Section 164.306