Skip to content
March 31, 2023
Blogolu

Blogolu

A Directory of Wonderful Things

Primary Menu Blogolu

Blogolu

  • Health and Fitness
  • Newsbeat
  • Compliance
  • Business
  • Food
  • Photography
  • WordPress
  • World
  • Questions & Answer

What does the Security Rule require a covered entity to do to comply with the Security Incidents Procedures standard?

746 viewsOctober 10, 2022Hospital and Healthcare
0
Sam Smith11.38K December 30, 2020 0 Comments

1 Answer

  • Active
  • Voted
  • Newest
  • Oldest
0
Blogolu28.38K Posted December 30, 2020 0 Comments

45 CFR § 164.304 defines security incident as the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system. The Security Incident Procedures standard at § 164.308(a)(6)(i) requires a covered entity to implement policies and procedures to address security incidents. The associated implementation specification for response and reporting at § 164.308(a)(6)(ii) requires a covered entity to identify and respond to suspected or known security incidents, mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity, and document security incidents and their outcomes. In order to maintain a flexible, scalable and technology neutral approach to the Security Rule, no single method is identified for addressing security incidents that will apply to all covered entities. As stated in the preamble to the Security Rule, 68 Fed. Reg. 8350 (February 20, 2003), an entity should be able to rely upon the information gathered in complying with the other security standards, for example, its risk assessment and risk management procedures and the Privacy Rule standards, to determine what constitutes a security incident in the context of its business operations. In addressing the Security Incident Procedures standard, a covered entity may consider some of the following questions: what specific actions would be considered security incidents; how will incidents be documented and reported; what information should be contained in the documentation; how often and to whom should incidents be reported; what are the appropriate responses to certain incidents; and whether identifying patterns of attempted security incidents is reasonable and appropriate. When taking into consideration the requirements of § 164.306(a) and (b), and its risk analysis, the covered entity may decide that certain types of attempted or successful security incidents or patterns of attempted or successful incidents warrant different actions.

For example, a covered entity may decide that a “ping” (a request-response utility used to determine whether a specific Internet Protocol (IP) address, or host, exists or is accessible) on the communications network initiated from an external source would require the following actions to comply with the standard; (1) minimal, if any, response; (2) no mitigation actions since no harmful effects were caused by the incident; and (3) brief documentation of the security incident and outcome, such as, a recording of aggregate statistical information. Based on its analysis, the entity may also determine that other types of incidents, such as suspicious patterns of “pings” on the communications network initiated from an external source or a specific malicious security incident would require a more detailed response, mitigation steps, and more detailed documentation of the incident and outcome. While internal reporting of security incidents is an inherent part of security incident policies and procedures, the Security Rule generally does not require a covered entity to report incidents to outside entities. However, § 164.314(a)(2)(i)(C) and (b)(2)(iv) require contracts between a covered entity and a business associate, and plan documents of a group health plan, respectively, to include provisions that require business associates and plan sponsors to report to the covered entity any security incidents of which they become aware. (Note that in certain circumstances a group health plan may not be required to amend its plan documents. See § 164.314(b)(1).

Register or Login

Other Categories

  • Art and Design
  • Blogolu
  • Book and Writing
  • Business
  • Compliance
  • Cricket
  • Entertainment
  • Fashion and Beauty
  • FDA
  • Finance
  • Food
  • Graphic Design
  • Health and Fitness
  • Home Services
  • ISO
  • ISO 2768
  • Lifestyle
  • Newsbeat
  • OSHA
  • Photography
  • Science
  • Smart Phones
  • Stories
  • Tech
  • Travel
  • USA
  • WordPress
  • World
  • Latest
  • Popular
  • Trending
    • WordPress

    How to Create Inquiry Form on WordPress Website

    2 months ago Blogolu
    • Compliance

    Anti-Corruption Laws – FCPA & UK Bribery Act

    5 months ago Anubha Srivastava
    • Compliance

    Business Ethics: Importance & Practices

    5 months ago Anubha Srivastava
    • Compliance

    Food and Drug Administration (FDA) of the United States- Import Requirements

    5 months ago Anubha Srivastava
    • Compliance

    Travel And Expenses (T&E): IRS Compliance and Identify & Preventing Fraud

    5 months ago Anubha Srivastava
    • WordPress

    How to Create Inquiry Form on WordPress Website

    2 months ago Blogolu
    • Health and Fitness
    • Newsbeat
    • Stories

    America’s abortion ban will effect women everywhere

    8 months ago Sam Smith
    • Health and Fitness

    Everything you need to know about BEDOYECTA TRI (HYDROXOCOBALAMIN, VITAMIN B1, VITAMIN B6)

    8 months ago Sam Smith
    • Book and Writing

    How to Write a Book – Beginners Guide

    8 months ago Sam Smith
    • Photography

    Tips for Capturing the Night Sky with Your Smartphone

    8 months ago Sam Smith
    • WordPress

    How to Create Inquiry Form on WordPress Website

    2 months ago Blogolu
    • Compliance

    Anti-Corruption Laws – FCPA & UK Bribery Act

    5 months ago Anubha Srivastava
    • Compliance

    Business Ethics: Importance & Practices

    5 months ago Anubha Srivastava
    • Compliance

    Food and Drug Administration (FDA) of the United States- Import Requirements

    5 months ago Anubha Srivastava
    • Compliance

    Travel And Expenses (T&E): IRS Compliance and Identify & Preventing Fraud

    5 months ago Anubha Srivastava

You may have missed

  • WordPress

How to Create Inquiry Form on WordPress Website

2 months ago Blogolu
  • Compliance

Anti-Corruption Laws – FCPA & UK Bribery Act

5 months ago Anubha Srivastava
  • Compliance

Business Ethics: Importance & Practices

5 months ago Anubha Srivastava
  • Compliance

Food and Drug Administration (FDA) of the United States- Import Requirements

5 months ago Anubha Srivastava
  • Compliance

Travel And Expenses (T&E): IRS Compliance and Identify & Preventing Fraud

5 months ago Anubha Srivastava

Blogolu

Blogolu is a bloging platform designed not only to inform readers, but to give complete information visibility of the topic and, ultimately, to push readers towards researched content of products, services, place or a thing. Blogolu blog post can vary in length but is usually design to provide complete information on any topic.

Trending Topics

Art and Design Blogolu Book and Writing Business Compliance Cricket Entertainment Fashion and Beauty FDA Finance Food Graphic Design Health and Fitness Home Services ISO ISO 2768 Lifestyle Newsbeat OSHA Photography Science Smart Phones Stories Tech Travel USA WordPress World
  • Facebook
  • LinkedIn
  • Twitter
  • Instagram
  • YouTube
Blogolu © All rights reserved |