We're sorry, but OSHAcademy doesn't work properly without JavaScript enabled. Please turn on JavaScript or install a browser that supports Javascript.

625 HIPAA Privacy Training
Skip to main content

Safeguards

Several administrative, physical, and technical measures should be implemented to secure e-PHI.

Man in a suit pointing to an icon on a screen.
Ensure HIPAA security through administrative, physical, and technical safeguards.

Administrative Safeguards: Here are some recommended administrative measures:

  • Security Management Process: A covered entity needs to spot and analyze risks to e-PHI. It should also put in place security measures that minimize these risks to a reasonable level.
  • Security Personnel: A covered entity should appoint a security official. This person is in charge of creating and implementing the entity's security policies.
  • Information Access Management: Like the Privacy Rule, which limits the use and sharing of PHI, the Security Rule demands that a covered entity set rules for accessing e-PHI. Access should be given only if it aligns with the user or receiver's role (role-based access).
  • Workforce Training and Management: A covered entity needs to properly authorize and supervise staff who interact with e-PHI. It should also train all staff about its security policies and apply suitable penalties for violations.
  • Evaluation: A covered entity should regularly check how well its security policies meet the Security Rule's standards.

Physical Safeguards: Here are some physical measures that can be put in place:

  • Facility Access and Control: A covered entity should control physical access to its buildings while still allowing entry to authorized people.
  • Workstation and Device Security: A covered entity needs to set rules for the right use and access of workstations and electronic media. It should also have guidelines for the transfer, removal, disposal, and re-use of these media to properly safeguard electronic protected health information (e-PHI).

Knowledge Check Choose the best answer for the question.

3-7. Which is an example of an Administrative Safeguard to protect the security of electronic protected health information (e-PHI)?