Do You Have an Audit Log to Protect Privacy?

Do you know who is accessing the practice’s patient’s protected health information (“PHI”)?

While many healthcare providers would quickly respond, “of course,” healthcare providers would be surprised to find out how easily it is to access electronic PHI stored on hard drives and electronic medical records (“EMR”).

As with all technology, there is a guise of secrecy when an individual can click on a file, view it, and close it.  If that same individual wanted to view a paper chart, they would likely have to open the file cabinet, find the paper chart, view it and put it away with other office personnel becoming suspect.  With technology, an individual can view a patient’s chart with a click of a button from the privacy of his/her workstation.

 The American Health Information Management Association (“AHIMA”) recently published its “Privacy and Security Audits of Electronic Health Information” guide, which laid out some healthcare security audit best practices.  Article.  “While maintaining equilibrium between making the data useful and available for users and keeping it secure, AHIMA provided some reminders and tips security audits using audit trails and audit logs to peer into back-end systems.”
Healthcare providers should implement and proactively review audit logs.
Audit logs are vital for recognizing inappropriate access to patient’s charts.  For example, audit logs can:
  1. Identify when VIP patient records (i.e., board members, celebrities, governmental or community figures, physician providers, management staff, or other highly publicized individuals) are accessed;
  2. Identify when patient files are accessed after no activity for 120 days; and
  3. Identify when patients’ files are accessed by employees or workstations that should not have access to said files (scheduler accessing patient’s PHI);
Audit logs can be very helpful in allowing a practice to analyze how well patient’s PHI is being protected from inappropriate access.

If your organization needs assistance with protecting its data – we can help.  For assistance CLICK HERE.

Get “News You Can Use” delivered directly to your e-mail inbox. Click here to Subscribe.

Related Posts

Categories

Recent Posts

Red Flags in Physician Contracts
December 6, 2022
Estate Planning Terms to Know
December 1, 2022
Are You Providing Patients with their Records Quickly Enough?
November 29, 2022
Happy Thanksgiving from Rickard & Associates!
November 24, 2022
Protect Your Practice Against Telemedicine Fraud
November 22, 2022

Subscribe

Enter your email to subscribe now and receive your FREE HIPAA Risk Assessment book!

An essential tool for all healthcare providers, Easy Guide to HIPAA Risk Assessments breaks down the requirements of HIPAA so you can successfully complete your required risk assessment.

 

Get it now for FREE (an $8.99 value!)

One more step! Please check your email to confirm your subscription and receive your FREE book!