Policy

PHI Security Rule Policies –13 Email Security

1. Introduction 1.1 Purpose ITPROSEC LP’s and its U.S. indirect subsidiary, ITPROSEC Corporation’s (collectively referred to as “ITPROSEC”) is committed to ensuring that the organization’s email systems are used only for authorized purposes and that certain rules are followed in terms of the usage of email in general and any use of email for transmission …

PHI Security Rule Policies –13 Email Security Read More »

PHI Security Rule Policies –12 Wireless Security

1. Introduction 1.1 Purpose ITPROSEC LP and its U.S. indirect subsidiary, ITPROSEC Corporation (collectively referred to as “ITPROSEC”) is committed to safeguarding Electronic Protected Health Information (ePHI) while it is transmitted on wireless networks. As such, ITPROSEC will implement and ensure effective suitable physical, technical or procedural security safeguards in all wireless devices or networks …

PHI Security Rule Policies –12 Wireless Security Read More »

PHI Security Rule Policies –11 Data Classification & Handling

Introduction1.1 PurposeITPROSEC LP and its U.S. indirect subsidiary, ITPROSEC Corporation (collectively referred to as“ITPROSEC”) is committed to safeguarding Electronic Protected Health Information (ePHI) by identifyingand classifying all data sources or repositories containing ePHI as well as implementing a suitable policyfor handling of all media containing different data classifications. As such, ITPROSEC will ensure that thispolicy …

PHI Security Rule Policies –11 Data Classification & Handling Read More »

PHI Security Rule Policies –10 Mobile Device Security

Introduction1.1 PurposeITPROSEC LP and its U.S. indirect subsidiary, ITPROSEC Corporation (collectively referred to as“ITPROSEC”) is committed to safeguarding electronic Protected Health Information (ePHI) on all MobileDevices that store, process or access such data. As such, ITPROSEC will implement and ensure effectiveongoing physical and technical security safeguards in all Mobile Devices that may come into contact …

PHI Security Rule Policies –10 Mobile Device Security Read More »

PHI Security Rule Policies –9 Business Associates and Other Arrangements

1. Introduction 1.1 Purpose ITPROSEC LP and its U.S. indirect subsidiary, Corporation (collectively referred to as “ITPROSEC”) is committed to maintaining formal policies and procedures to ensure that all authorized workforce members have appropriate access to Protected Health Information (PHI) and electronic Protected Health Information (ePHI), and to preventing unauthorized personnel from obtaining access. In …

PHI Security Rule Policies –9 Business Associates and Other Arrangements Read More »

PHI Security Rule Policies –8 Maintain Availability of ePHI

1. Introduction 1.1 Purpose ITPROSEC LP and its U.S. indirect subsidiary, ITPROSEC Corporation (collectively referred to as “ITPROSEC”) is committed to maintaining availability of electronic Protected Health Information (ePHI) in the case of unexpected events (e.g., fire, vandalism, system failure, or natural disaster) that damage information systems containing ePHI. 1.2 Definitions For definitions of capitalized …

PHI Security Rule Policies –8 Maintain Availability of ePHI Read More »

PHI Security Rule Policies –7 Maintain Integrity of ePHI

1. Introduction 1.1 Purpose ITPROSEC LP and its U.S. indirect subsidiary, ITPROSEC Corporation (collectively referred to as “ITPROSEC”) is committed to safeguarding electronic Protected Health Information (ePHI) in order to ensure and confirm that ePHI is not altered or destroyed in an unauthorized manner while under ITPROSEC’s control, while in transit, or while at rest. …

PHI Security Rule Policies –7 Maintain Integrity of ePHI Read More »

PHI Security Rule Policies –6 Maintaining Confidentiality of ePHI

1. Introduction 1.1 Purpose ITPROSEC LP’s and its U.S. indirect subsidiary, ITPROSEC Corporation’s (collectively referred to as “ITPROSEC”) is committed to implementing appropriate access controls to ensure that electronic Protected Health Information (ePHI) is viewed and modified only by properly authenticated and authorized workforce members. 1.2 Definitions For definitions of capitalized terms or phrases, please …

PHI Security Rule Policies –6 Maintaining Confidentiality of ePHI Read More »

PHI Security Rule Policies –5 Workstation, Server and Device Security

1. Introduction 1.1 Purpose ITPROSEC LP’s and its U.S. indirect subsidiary, ITPROSEC Corporati on’s (collectively referred to as “ITPROSEC”) is committed to defining which workstati ons, servers and mobile devi ces can be used to interact with electronic Protected Health Information (ePHI) and ensuring only the appropriate use of such systems by authorized individuals. 1.2 …

PHI Security Rule Policies –5 Workstation, Server and Device Security Read More »

PHI Security Rule Policies –4 Facility Security

1. Introduction 1.1 Purpose So ftchoice LP’s and its U.S. indirect subsidiary, ITPROSEC Corporation’s (collectively referred to as “ITPROSEC”) is committed to maintaining formal procedures to limit physical access to the fadlities and equipment housing in formation systems containing electronic Pro tected Health Information (ePHI), while ensuring that properly authorized access is allowed. ITPROSEC will …

PHI Security Rule Policies –4 Facility Security Read More »