Transmission Security Measures, v1.0

Specifies that a health care related organization must implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.

Assessment Step

1
Unauthorized Access to e-PHI (UnauthorizedAccesstoe-PHI)
Does the covered entity or business associate implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
A covered entity or business associate must perform these requirements in accordance with Section 164.306 (Security standards: General rules).

Conformance Criteria (1)

Unauthorized Access to e-PHI
The covered entity or business associate must implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.
Citations
HIPAA-Security-Rule
45 CFR Section 164.312(e)(1)
HIPAA-Security-Rule
45 CFR Section 164.306