Do You Have an Audit Log to Protect Privacy?

Do you know who is accessing the practice’s patient’s protected health information (“PHI”)?

While many healthcare providers would quickly respond, “of course,” healthcare providers would be surprised to find out how easily it is to access electronic PHI stored on hard drives and electronic medical records (“EMR”).

As with all technology, there is a guise of secrecy when an individual can click on a file, view it, and close it.  If that same individual wanted to view a paper chart, they would likely have to open the file cabinet, find the paper chart, view it and put it away with other office personnel becoming suspect.  With technology, an individual can view a patient’s chart with a click of a button from the privacy of his/her workstation.

 The American Health Information Management Association (“AHIMA”) recently published its “Privacy and Security Audits of Electronic Health Information” guide, which laid out some healthcare security audit best practices.  Article.  “While maintaining equilibrium between making the data useful and available for users and keeping it secure, AHIMA provided some reminders and tips security audits using audit trails and audit logs to peer into back-end systems.”
Healthcare providers should implement and proactively review audit logs.
Audit logs are vital for recognizing inappropriate access to patient’s charts.  For example, audit logs can:
  1. Identify when VIP patient records (i.e., board members, celebrities, governmental or community figures, physician providers, management staff, or other highly publicized individuals) are accessed;
  2. Identify when patient files are accessed after no activity for 120 days; and
  3. Identify when patients’ files are accessed by employees or workstations that should not have access to said files (scheduler accessing patient’s PHI);
Audit logs can be very helpful in allowing a practice to analyze how well patient’s PHI is being protected from inappropriate access.

If your organization needs assistance with protecting its data – we can help.  For assistance CLICK HERE.

Get “News You Can Use” delivered directly to your e-mail inbox. Click here to Subscribe.

Related Posts


Recent Posts

Getting Remarried? Here’s What You Need to Know
March 21, 2024
What is the Biggest Threat to Healthcare?
January 30, 2024
How Can I Simplify Estate Planning?
January 11, 2024
I Have a Trust. Now What?
December 7, 2023
Breaking: Corewell Health Breach
December 5, 2023


Subscribe to Our Newsletter

Subscribe and get your FREE copy of Easy Guide to HIPAA Risk Assessments

An essential tool for all healthcare providers, Easy Guide to HIPAA Risk Assessments breaks down the requirements of HIPAA so you can successfully complete your required risk assessment. (an $8.99 value)

Thank you for subscribing to the Rickard & Associates healthcare blog. You'll receive a confirmation email shortly. After verifying your subscription request, you'll be sent to the "Easy Guide to HIPAA Risk Assessments" download page.