Module 1: Introduction to HIPAA
Module 2: Fundamentals of PHI
Module 3: The Privacy Rule – Uses, Disclosures, and Compliance
Module 4: The Security Rule – Uses, Disclosures, and Compliance
1 of 3

2.4 Computer Workstation Guidelines to Protect PHI

The following are the best practices to safeguard computer workstations:

  • Establish controls to ensure that PHI is accessible to those with access privileges
  • Exit any databases holding PHI before leaving workstations unattended
  • Do not disclose or release anything used to authenticate authority, create access, or change PHI, including but not limited to any password, badge, personal identification number, access card, or electronic signature.
  • Observe the guidance provided by the information technology department while installing security fixes and updating passwords
  • Put in place a system for retrieving any lost electronic PHI
  • Keep a precise record of where each workstation containing PHI is located
Notify of
0 Discussions
Inline Feedbacks
View all comments
Post a comment

Leave a Comment

Your email address will not be published. Required fields are marked *

Would love your thoughts, please comment.x