bmad-plus 0.4.4 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +54 -0
- package/README.md +5 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +76 -12
- package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
- package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
- package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +31 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,568 @@
|
|
|
1
|
+
# HIPAA Document Templates Reference
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
|
|
5
|
+
## Table of Contents
|
|
6
|
+
1. [Notice of Privacy Practices (NPP)](#1-notice-of-privacy-practices-npp)
|
|
7
|
+
2. [Business Associate Agreement (BAA)](#2-business-associate-agreement-baa)
|
|
8
|
+
3. [HIPAA Privacy Policy (Internal)](#3-hipaa-privacy-policy-internal)
|
|
9
|
+
4. [HIPAA Authorization Form](#4-hipaa-authorization-form)
|
|
10
|
+
5. [Workforce Training Acknowledgment](#5-workforce-training-acknowledgment)
|
|
11
|
+
6. [Security Incident Report Form](#6-security-incident-report-form)
|
|
12
|
+
7. [Breach Risk Assessment Template](#7-breach-risk-assessment-template)
|
|
13
|
+
8. [Risk Analysis Template](#8-risk-analysis-template)
|
|
14
|
+
9. [HIPAA Compliance Checklist](#9-hipaa-compliance-checklist)
|
|
15
|
+
|
|
16
|
+
---
|
|
17
|
+
|
|
18
|
+
## 1. Notice of Privacy Practices (NPP)
|
|
19
|
+
|
|
20
|
+
> Required for all Covered Entities. Must be in plain language.
|
|
21
|
+
|
|
22
|
+
```
|
|
23
|
+
NOTICE OF PRIVACY PRACTICES
|
|
24
|
+
[ORGANIZATION NAME]
|
|
25
|
+
Effective Date: [EFFECTIVE DATE]
|
|
26
|
+
|
|
27
|
+
THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND
|
|
28
|
+
DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.
|
|
29
|
+
PLEASE REVIEW IT CAREFULLY.
|
|
30
|
+
|
|
31
|
+
─────────────────────────────────────────
|
|
32
|
+
OUR PLEDGE REGARDING YOUR HEALTH INFORMATION
|
|
33
|
+
─────────────────────────────────────────
|
|
34
|
+
[ORGANIZATION NAME] is committed to protecting the privacy of your health
|
|
35
|
+
information ("Protected Health Information" or "PHI"). We are required by law to:
|
|
36
|
+
• Maintain the privacy of your PHI
|
|
37
|
+
• Provide you with this notice of our legal duties and privacy practices
|
|
38
|
+
• Notify you if there is a breach of your unsecured PHI
|
|
39
|
+
• Abide by the terms of this notice
|
|
40
|
+
|
|
41
|
+
─────────────────────────────────────────
|
|
42
|
+
HOW WE MAY USE AND DISCLOSE YOUR PHI // 45 CFR §164.520(b)(1)(ii)
|
|
43
|
+
─────────────────────────────────────────
|
|
44
|
+
|
|
45
|
+
FOR TREATMENT: We may use or disclose your PHI to coordinate or manage your
|
|
46
|
+
healthcare. Example: We share your records with a specialist we refer you to.
|
|
47
|
+
|
|
48
|
+
FOR PAYMENT: We may use or disclose your PHI to bill and receive payment for
|
|
49
|
+
services. Example: We send your diagnosis and procedure codes to your insurer.
|
|
50
|
+
|
|
51
|
+
FOR HEALTH CARE OPERATIONS: We may use or disclose your PHI to run our
|
|
52
|
+
organization. Example: We review records to assess quality of care.
|
|
53
|
+
|
|
54
|
+
OTHER PERMITTED USES AND DISCLOSURES (without your authorization):
|
|
55
|
+
• As required by law
|
|
56
|
+
• For public health activities (reporting communicable diseases, FDA reporting)
|
|
57
|
+
• For health oversight activities (government audits, inspections)
|
|
58
|
+
• For law enforcement purposes (limited, as required by law)
|
|
59
|
+
• To avert a serious threat to health or safety
|
|
60
|
+
• For workers' compensation
|
|
61
|
+
• [Add others applicable to your organization]
|
|
62
|
+
|
|
63
|
+
─────────────────────────────────────────
|
|
64
|
+
USES AND DISCLOSURES REQUIRING YOUR WRITTEN AUTHORIZATION
|
|
65
|
+
// 45 CFR §164.508
|
|
66
|
+
─────────────────────────────────────────
|
|
67
|
+
We will ask for your written authorization before using or disclosing your PHI for:
|
|
68
|
+
• Psychotherapy notes (with limited exceptions)
|
|
69
|
+
• Marketing purposes
|
|
70
|
+
• Sale of your PHI
|
|
71
|
+
• Any other use or disclosure not described in this Notice
|
|
72
|
+
|
|
73
|
+
You may revoke your authorization at any time in writing.
|
|
74
|
+
|
|
75
|
+
─────────────────────────────────────────
|
|
76
|
+
YOUR RIGHTS REGARDING YOUR PHI // 45 CFR §164.520(b)(1)(iv)
|
|
77
|
+
─────────────────────────────────────────
|
|
78
|
+
|
|
79
|
+
RIGHT TO ACCESS: You have the right to inspect and receive a copy of your PHI.
|
|
80
|
+
To request access, contact: [CONTACT INFORMATION]. We will respond within 30 days.
|
|
81
|
+
A reasonable fee may apply. // 45 CFR §164.524
|
|
82
|
+
|
|
83
|
+
RIGHT TO AMEND: You have the right to request a correction to your PHI.
|
|
84
|
+
We may deny your request in certain circumstances. // 45 CFR §164.526
|
|
85
|
+
|
|
86
|
+
RIGHT TO AN ACCOUNTING OF DISCLOSURES: You have the right to receive a list of
|
|
87
|
+
disclosures of your PHI made in the past 6 years (excluding TPO and certain
|
|
88
|
+
other disclosures). // 45 CFR §164.528
|
|
89
|
+
|
|
90
|
+
RIGHT TO REQUEST RESTRICTIONS: You may request we restrict uses/disclosures
|
|
91
|
+
of your PHI. We are not required to agree, EXCEPT: if you pay out-of-pocket in
|
|
92
|
+
full for a service and request we not share with your health plan, we must honor
|
|
93
|
+
that restriction. // 45 CFR §164.522(a)
|
|
94
|
+
|
|
95
|
+
RIGHT TO CONFIDENTIAL COMMUNICATIONS: You may request we contact you by
|
|
96
|
+
alternative means or locations. // 45 CFR §164.522(b)
|
|
97
|
+
|
|
98
|
+
RIGHT TO RECEIVE THIS NOTICE: You have the right to a paper copy of this
|
|
99
|
+
Notice at any time.
|
|
100
|
+
|
|
101
|
+
─────────────────────────────────────────
|
|
102
|
+
OUR DUTIES // 45 CFR §164.520(b)(1)(v)
|
|
103
|
+
─────────────────────────────────────────
|
|
104
|
+
We are required to abide by the terms of this Notice. We reserve the right to
|
|
105
|
+
change our privacy practices and this Notice. If we make a material change, we
|
|
106
|
+
will provide a revised Notice.
|
|
107
|
+
|
|
108
|
+
─────────────────────────────────────────
|
|
109
|
+
COMPLAINTS // 45 CFR §164.520(b)(1)(vi)
|
|
110
|
+
─────────────────────────────────────────
|
|
111
|
+
If you believe your privacy rights have been violated, you may file a complaint
|
|
112
|
+
with us or with the U.S. Department of Health and Human Services Office for Civil
|
|
113
|
+
Rights. We will not retaliate against you for filing a complaint.
|
|
114
|
+
|
|
115
|
+
To file with us: [CONTACT NAME, TITLE, ADDRESS, PHONE, EMAIL]
|
|
116
|
+
To file with HHS: www.hhs.gov/ocr/privacy/hipaa/complaints/
|
|
117
|
+
|
|
118
|
+
─────────────────────────────────────────
|
|
119
|
+
CONTACT US
|
|
120
|
+
─────────────────────────────────────────
|
|
121
|
+
Privacy Official: [NAME AND TITLE]
|
|
122
|
+
[ADDRESS]
|
|
123
|
+
[PHONE NUMBER]
|
|
124
|
+
[EMAIL ADDRESS]
|
|
125
|
+
```
|
|
126
|
+
|
|
127
|
+
---
|
|
128
|
+
|
|
129
|
+
## 2. Business Associate Agreement (BAA)
|
|
130
|
+
|
|
131
|
+
> Required before sharing PHI with any vendor/partner who will create, receive, maintain, or transmit PHI on your behalf.
|
|
132
|
+
|
|
133
|
+
```
|
|
134
|
+
BUSINESS ASSOCIATE AGREEMENT
|
|
135
|
+
|
|
136
|
+
This Business Associate Agreement ("Agreement") is entered into as of [DATE]
|
|
137
|
+
by and between:
|
|
138
|
+
|
|
139
|
+
[COVERED ENTITY / BUSINESS ASSOCIATE NAME] ("Covered Entity" / "Business Associate")
|
|
140
|
+
[ADDRESS]
|
|
141
|
+
|
|
142
|
+
and
|
|
143
|
+
|
|
144
|
+
[BUSINESS ASSOCIATE NAME] ("Business Associate")
|
|
145
|
+
[ADDRESS]
|
|
146
|
+
|
|
147
|
+
RECITALS
|
|
148
|
+
Business Associate performs [DESCRIPTION OF SERVICES] for Covered Entity
|
|
149
|
+
("Services") pursuant to [UNDERLYING SERVICES AGREEMENT, if applicable].
|
|
150
|
+
In connection with these Services, Business Associate may create, receive,
|
|
151
|
+
maintain, or transmit Protected Health Information ("PHI") on behalf of
|
|
152
|
+
Covered Entity.
|
|
153
|
+
|
|
154
|
+
DEFINITIONS // 45 CFR §164.304
|
|
155
|
+
Terms used but not otherwise defined shall have the same meaning as under
|
|
156
|
+
the HIPAA Rules (45 CFR Parts 160 and 164).
|
|
157
|
+
|
|
158
|
+
1. OBLIGATIONS OF BUSINESS ASSOCIATE // 45 CFR §164.504(e)(2)
|
|
159
|
+
|
|
160
|
+
1.1 Use and Disclosure Limitations. Business Associate shall not use or
|
|
161
|
+
disclose PHI other than as permitted or required by this Agreement or as
|
|
162
|
+
Required by Law.
|
|
163
|
+
|
|
164
|
+
1.2 Permitted Uses and Disclosures. Business Associate may:
|
|
165
|
+
(a) Use and disclose PHI as necessary to perform the Services;
|
|
166
|
+
(b) Use PHI for Business Associate's proper management and administration;
|
|
167
|
+
(c) Disclose PHI for Business Associate's proper management and administration
|
|
168
|
+
if Required by Law or if Business Associate obtains reasonable assurances
|
|
169
|
+
of confidential handling and prompt notification of any breaches.
|
|
170
|
+
|
|
171
|
+
1.3 Safeguards. Business Associate shall implement and maintain appropriate
|
|
172
|
+
administrative, physical, and technical safeguards that reasonably and
|
|
173
|
+
appropriately protect the confidentiality, integrity, and availability of
|
|
174
|
+
ePHI in accordance with 45 CFR §§164.308, 164.310, 164.312, and 164.316.
|
|
175
|
+
|
|
176
|
+
1.4 Subcontractors. Business Associate shall require any subcontractors that
|
|
177
|
+
create, receive, maintain, or transmit PHI on behalf of Business Associate
|
|
178
|
+
to execute a written agreement imposing the same conditions as this Agreement.
|
|
179
|
+
// 45 CFR §164.308(b)(2)
|
|
180
|
+
|
|
181
|
+
1.5 Reporting. Business Associate shall report to Covered Entity:
|
|
182
|
+
(a) Any Breach of Unsecured PHI without unreasonable delay and within 60 days
|
|
183
|
+
of discovery; // 45 CFR §164.410
|
|
184
|
+
(b) Any Security Incident of which it becomes aware, including unsuccessful
|
|
185
|
+
attempts; // 45 CFR §164.314(a)(2)(i)(C)
|
|
186
|
+
(c) Any use or disclosure not provided for by this Agreement.
|
|
187
|
+
|
|
188
|
+
1.6 Access. Business Associate shall make available PHI to Covered Entity
|
|
189
|
+
as necessary to satisfy Covered Entity's obligations under 45 CFR §164.524.
|
|
190
|
+
|
|
191
|
+
1.7 Accounting. Business Associate shall document disclosures to enable
|
|
192
|
+
Covered Entity to respond to requests under 45 CFR §164.528.
|
|
193
|
+
|
|
194
|
+
1.8 HHS Access. Business Associate shall make internal practices, books, and
|
|
195
|
+
records relating to PHI available to HHS for determining compliance.
|
|
196
|
+
|
|
197
|
+
1.9 Return or Destruction. Upon termination, Business Associate shall return
|
|
198
|
+
or destroy all PHI, if feasible. If not feasible, protections must extend
|
|
199
|
+
beyond termination.
|
|
200
|
+
|
|
201
|
+
2. OBLIGATIONS OF COVERED ENTITY
|
|
202
|
+
|
|
203
|
+
2.1 Covered Entity shall notify Business Associate of:
|
|
204
|
+
(a) Limitations on uses/disclosures in the Notice of Privacy Practices;
|
|
205
|
+
(b) Changes in, or revocation of, authorization;
|
|
206
|
+
(c) Restrictions on uses/disclosures agreed to with individuals.
|
|
207
|
+
|
|
208
|
+
3. TERM AND TERMINATION
|
|
209
|
+
|
|
210
|
+
3.1 Term. This Agreement is effective as of [DATE] and terminates when the
|
|
211
|
+
underlying Services Agreement terminates, or as provided herein.
|
|
212
|
+
|
|
213
|
+
3.2 Termination for Cause. Either party may terminate this Agreement if the
|
|
214
|
+
other party has materially violated a provision and has not cured within 30
|
|
215
|
+
days of written notice.
|
|
216
|
+
|
|
217
|
+
3.3 Effect of Termination. Obligations survive termination with respect to
|
|
218
|
+
PHI retained by Business Associate.
|
|
219
|
+
|
|
220
|
+
4. MISCELLANEOUS
|
|
221
|
+
|
|
222
|
+
4.1 Regulatory References. Regulatory references include any amendments.
|
|
223
|
+
|
|
224
|
+
4.2 Interpretation. Any ambiguity shall be resolved to permit compliance
|
|
225
|
+
with HIPAA Rules.
|
|
226
|
+
|
|
227
|
+
4.3 Amendment. The parties agree to amend this Agreement as necessary to
|
|
228
|
+
comply with changes in law.
|
|
229
|
+
|
|
230
|
+
IN WITNESS WHEREOF, the parties have executed this Agreement as of the date
|
|
231
|
+
first written above.
|
|
232
|
+
|
|
233
|
+
[COVERED ENTITY NAME] [BUSINESS ASSOCIATE NAME]
|
|
234
|
+
By: ___________________________ By: ___________________________
|
|
235
|
+
Name: _________________________ Name: _________________________
|
|
236
|
+
Title: ________________________ Title: ________________________
|
|
237
|
+
Date: _________________________ Date: _________________________
|
|
238
|
+
```
|
|
239
|
+
|
|
240
|
+
---
|
|
241
|
+
|
|
242
|
+
## 3. HIPAA Privacy Policy (Internal)
|
|
243
|
+
|
|
244
|
+
```
|
|
245
|
+
HIPAA PRIVACY POLICY
|
|
246
|
+
[ORGANIZATION NAME]
|
|
247
|
+
Policy Number: [NUMBER] Effective Date: [DATE] Review Date: [DATE]
|
|
248
|
+
Approved By: [NAME/TITLE]
|
|
249
|
+
|
|
250
|
+
PURPOSE
|
|
251
|
+
This policy establishes [ORGANIZATION NAME]'s commitment to protecting the
|
|
252
|
+
privacy of Protected Health Information (PHI) in accordance with HIPAA.
|
|
253
|
+
|
|
254
|
+
SCOPE
|
|
255
|
+
Applies to all workforce members, volunteers, trainees, contractors, and
|
|
256
|
+
business associates who access, use, or disclose PHI.
|
|
257
|
+
|
|
258
|
+
POLICY STATEMENTS
|
|
259
|
+
|
|
260
|
+
1. MINIMUM NECESSARY // 45 CFR §164.502(b)
|
|
261
|
+
Workforce members shall access only the minimum PHI necessary to perform
|
|
262
|
+
their job functions. Accessing PHI out of curiosity or for personal
|
|
263
|
+
reasons is strictly prohibited.
|
|
264
|
+
|
|
265
|
+
2. PERMISSIBLE USES AND DISCLOSURES // 45 CFR §164.502
|
|
266
|
+
PHI may be used or disclosed for Treatment, Payment, and Operations (TPO)
|
|
267
|
+
without individual authorization. All other uses require authorization
|
|
268
|
+
except as outlined in this policy and applicable law.
|
|
269
|
+
|
|
270
|
+
3. SAFEGUARDS // 45 CFR §164.530(c)
|
|
271
|
+
All workforce members must:
|
|
272
|
+
• Log out of or lock workstations when leaving them unattended
|
|
273
|
+
• Use only assigned credentials; never share passwords
|
|
274
|
+
• Report lost or stolen devices immediately to [CONTACT]
|
|
275
|
+
• Dispose of PHI (paper and electronic) using approved methods only
|
|
276
|
+
• Not access PHI from unsecured public networks without VPN
|
|
277
|
+
|
|
278
|
+
4. PRIVACY COMPLAINTS // 45 CFR §164.530(d)
|
|
279
|
+
Individuals may submit privacy complaints to [PRIVACY OFFICIAL, CONTACT].
|
|
280
|
+
All complaints will be documented and investigated. No retaliation.
|
|
281
|
+
|
|
282
|
+
5. WORKFORCE SANCTIONS // 45 CFR §164.530(e)
|
|
283
|
+
Violations of this policy may result in disciplinary action up to and
|
|
284
|
+
including termination, and may be reported to appropriate authorities.
|
|
285
|
+
|
|
286
|
+
6. TRAINING // 45 CFR §164.530(b)
|
|
287
|
+
All workforce members must complete HIPAA Privacy training:
|
|
288
|
+
• Upon hire (within [X] days)
|
|
289
|
+
• Annually thereafter
|
|
290
|
+
• When material policy changes occur
|
|
291
|
+
Completion must be documented.
|
|
292
|
+
|
|
293
|
+
RELATED POLICIES
|
|
294
|
+
- HIPAA Security Policy
|
|
295
|
+
- Breach Notification Policy
|
|
296
|
+
- Acceptable Use Policy
|
|
297
|
+
|
|
298
|
+
REVISION HISTORY
|
|
299
|
+
[DATE] | [VERSION] | [CHANGE DESCRIPTION] | [AUTHOR]
|
|
300
|
+
```
|
|
301
|
+
|
|
302
|
+
---
|
|
303
|
+
|
|
304
|
+
## 4. HIPAA Authorization Form
|
|
305
|
+
|
|
306
|
+
```
|
|
307
|
+
AUTHORIZATION FOR USE OR DISCLOSURE OF HEALTH INFORMATION
|
|
308
|
+
// 45 CFR §164.508
|
|
309
|
+
|
|
310
|
+
Patient Name: _________________________ Date of Birth: _____________
|
|
311
|
+
Medical Record #: _____________________ SSN (last 4): ______________
|
|
312
|
+
|
|
313
|
+
1. INFORMATION TO BE DISCLOSED
|
|
314
|
+
Description of information: ____________________________________
|
|
315
|
+
Date range: From _____________ To _____________
|
|
316
|
+
□ All records □ Specific records: ___________________________
|
|
317
|
+
|
|
318
|
+
2. AUTHORIZED BY (person authorizing disclosure):
|
|
319
|
+
□ Patient □ Personal Representative
|
|
320
|
+
Name: _________________________ Relationship: _________________
|
|
321
|
+
Address: _____________________________________________________
|
|
322
|
+
|
|
323
|
+
3. DISCLOSED TO (recipient):
|
|
324
|
+
Name/Organization: ___________________________________________
|
|
325
|
+
Address: _____________________________________________________
|
|
326
|
+
Phone: _______________________________________________________
|
|
327
|
+
|
|
328
|
+
4. PURPOSE OF DISCLOSURE:
|
|
329
|
+
□ Continuing care □ Personal use □ Legal matter
|
|
330
|
+
□ Insurance □ Other: ______________________________
|
|
331
|
+
|
|
332
|
+
5. EXPIRATION
|
|
333
|
+
□ Specific date: _____________
|
|
334
|
+
□ Upon occurrence of: ________________________________________
|
|
335
|
+
|
|
336
|
+
6. YOUR RIGHTS
|
|
337
|
+
• You may refuse to sign this authorization. Refusal will not affect
|
|
338
|
+
your ability to receive treatment EXCEPT: [describe any conditioning].
|
|
339
|
+
• You may revoke this authorization at any time by writing to
|
|
340
|
+
[CONTACT]. Revocation does not affect prior disclosures.
|
|
341
|
+
• Information disclosed may be re-disclosed by the recipient and
|
|
342
|
+
may no longer be protected by HIPAA.
|
|
343
|
+
|
|
344
|
+
Signature: _____________________________ Date: __________________
|
|
345
|
+
|
|
346
|
+
If Personal Representative:
|
|
347
|
+
Description of authority: ________________________________________
|
|
348
|
+
```
|
|
349
|
+
|
|
350
|
+
---
|
|
351
|
+
|
|
352
|
+
## 5. Workforce Training Acknowledgment
|
|
353
|
+
|
|
354
|
+
```
|
|
355
|
+
HIPAA WORKFORCE TRAINING ACKNOWLEDGMENT
|
|
356
|
+
|
|
357
|
+
I, _________________________, acknowledge that I have:
|
|
358
|
+
|
|
359
|
+
□ Received and read [ORGANIZATION NAME]'s HIPAA Privacy and Security Policies
|
|
360
|
+
□ Completed HIPAA Privacy and Security training on [DATE]
|
|
361
|
+
□ Training covered by: □ In-person □ Online module □ Video □ Other: ____
|
|
362
|
+
|
|
363
|
+
I understand that:
|
|
364
|
+
• I must protect the privacy and security of all PHI I access in my work
|
|
365
|
+
• I may only access PHI that is necessary for my job duties
|
|
366
|
+
• I must report potential privacy/security violations to [CONTACT]
|
|
367
|
+
• Violations may result in disciplinary action up to termination
|
|
368
|
+
|
|
369
|
+
Employee Name (print): _________________________________________
|
|
370
|
+
Employee Signature: ___________________________________________
|
|
371
|
+
Date: ________________
|
|
372
|
+
Job Title: __________________________________________________
|
|
373
|
+
Department: ________________________________________________
|
|
374
|
+
|
|
375
|
+
Manager/Trainer Signature: ___________________________________
|
|
376
|
+
Date: ________________
|
|
377
|
+
```
|
|
378
|
+
|
|
379
|
+
---
|
|
380
|
+
|
|
381
|
+
## 6. Security Incident Report Form
|
|
382
|
+
|
|
383
|
+
```
|
|
384
|
+
SECURITY INCIDENT REPORT // 45 CFR §164.308(a)(6)
|
|
385
|
+
[ORGANIZATION NAME] — CONFIDENTIAL
|
|
386
|
+
|
|
387
|
+
Report Date: _________________ Incident #: ___________________
|
|
388
|
+
Reported By: _________________ Department: __________________
|
|
389
|
+
Date/Time Discovered: ___________________________________________
|
|
390
|
+
|
|
391
|
+
INCIDENT DESCRIPTION
|
|
392
|
+
Type: □ Unauthorized access □ Theft/Loss □ Malware □ Misdirected
|
|
393
|
+
□ Phishing □ Unauthorized disclosure □ Other: ____________
|
|
394
|
+
|
|
395
|
+
Systems/Media Involved: _________________________________________
|
|
396
|
+
PHI Involved: □ Yes □ No □ Unknown
|
|
397
|
+
If yes, describe PHI types: ____________________________________
|
|
398
|
+
Estimated # individuals affected: ______________________________
|
|
399
|
+
|
|
400
|
+
IMMEDIATE ACTIONS TAKEN
|
|
401
|
+
□ Systems isolated □ Passwords changed □ Law enforcement notified
|
|
402
|
+
□ IT Security notified □ Privacy Officer notified
|
|
403
|
+
Actions description: ___________________________________________
|
|
404
|
+
|
|
405
|
+
BREACH RISK ASSESSMENT (see Breach Risk Assessment Template)
|
|
406
|
+
Outcome: □ Reportable Breach □ Not a Reportable Breach
|
|
407
|
+
Rationale: ____________________________________________________
|
|
408
|
+
|
|
409
|
+
IF REPORTABLE BREACH — NOTIFICATION STATUS
|
|
410
|
+
Individual notification date: __________________________________
|
|
411
|
+
HHS notification date: ________________________________________
|
|
412
|
+
Media notification (if 500+): _________________________________
|
|
413
|
+
|
|
414
|
+
ROOT CAUSE ANALYSIS
|
|
415
|
+
Root cause: ___________________________________________________
|
|
416
|
+
Corrective actions: ___________________________________________
|
|
417
|
+
|
|
418
|
+
Privacy/Security Officer Signature: ____________________________
|
|
419
|
+
Date: _________________
|
|
420
|
+
```
|
|
421
|
+
|
|
422
|
+
---
|
|
423
|
+
|
|
424
|
+
## 7. Breach Risk Assessment Template
|
|
425
|
+
|
|
426
|
+
```
|
|
427
|
+
BREACH RISK ASSESSMENT // 45 CFR §164.402
|
|
428
|
+
[ORGANIZATION NAME] — CONFIDENTIAL — ATTORNEY-CLIENT PRIVILEGED
|
|
429
|
+
|
|
430
|
+
Incident #: ___________________ Date of Assessment: ____________
|
|
431
|
+
Assessor(s): __________________________________________________
|
|
432
|
+
|
|
433
|
+
FACTOR 1: Nature and Extent of PHI Involved
|
|
434
|
+
PHI types involved: ____________________________________________
|
|
435
|
+
Identifiers included: □ Name □ DOB □ SSN □ MRN □ Diagnosis
|
|
436
|
+
□ Treatment □ Financial □ Other: _________
|
|
437
|
+
Quantity of records: ________________
|
|
438
|
+
Risk assessment: □ High □ Medium □ Low
|
|
439
|
+
Rationale: ____________________________________________________
|
|
440
|
+
|
|
441
|
+
FACTOR 2: Unauthorized Person(s)
|
|
442
|
+
Recipient(s): _________________________________________________
|
|
443
|
+
Type: □ CE/BA employee □ Other CE/BA □ Member of public □ Unknown
|
|
444
|
+
□ Known malicious actor
|
|
445
|
+
Risk assessment: □ High □ Medium □ Low
|
|
446
|
+
Rationale: ____________________________________________________
|
|
447
|
+
|
|
448
|
+
FACTOR 3: PHI Actually Acquired or Viewed
|
|
449
|
+
Evidence of access: ____________________________________________
|
|
450
|
+
Recipient response (if obtained): ______________________________
|
|
451
|
+
Technical evidence: ____________________________________________
|
|
452
|
+
Risk assessment: □ High □ Medium □ Low
|
|
453
|
+
Rationale: ____________________________________________________
|
|
454
|
+
|
|
455
|
+
FACTOR 4: Mitigation
|
|
456
|
+
Steps taken: □ PHI retrieved/destroyed □ Credible assurance obtained
|
|
457
|
+
□ Confidentiality agreement signed □ Other: ________
|
|
458
|
+
Documentation of mitigation: ___________________________________
|
|
459
|
+
Risk assessment: □ High □ Medium □ Low
|
|
460
|
+
Rationale: ____________________________________________________
|
|
461
|
+
|
|
462
|
+
OVERALL DETERMINATION
|
|
463
|
+
□ LOW probability of compromise → Not a reportable breach
|
|
464
|
+
□ Cannot demonstrate low probability → REPORTABLE BREACH
|
|
465
|
+
|
|
466
|
+
Overall rationale: ____________________________________________
|
|
467
|
+
|
|
468
|
+
Signatures:
|
|
469
|
+
Privacy Officer: _________________________ Date: ______________
|
|
470
|
+
Legal Counsel: __________________________ Date: ______________ (recommended)
|
|
471
|
+
```
|
|
472
|
+
|
|
473
|
+
---
|
|
474
|
+
|
|
475
|
+
## 8. Risk Analysis Template
|
|
476
|
+
|
|
477
|
+
```
|
|
478
|
+
SECURITY RISK ANALYSIS // 45 CFR §164.308(a)(1)(ii)(A)
|
|
479
|
+
[ORGANIZATION NAME]
|
|
480
|
+
Date: _______________ Version: ____________ Conducted by: ______________
|
|
481
|
+
Review Date: _______________
|
|
482
|
+
|
|
483
|
+
SCOPE
|
|
484
|
+
ePHI Systems and Assets Covered:
|
|
485
|
+
□ EHR/EMR System: _______________________________________________
|
|
486
|
+
□ Practice Management System: __________________________________
|
|
487
|
+
□ Billing Systems: _____________________________________________
|
|
488
|
+
□ Email Systems: _______________________________________________
|
|
489
|
+
□ Portable Devices (laptops, tablets, mobile): _________________
|
|
490
|
+
□ Backup/Disaster Recovery Systems: ___________________________
|
|
491
|
+
□ Cloud Storage/Services: _____________________________________
|
|
492
|
+
□ Physical Servers: ____________________________________________
|
|
493
|
+
□ Other: ______________________________________________________
|
|
494
|
+
|
|
495
|
+
RISK ASSESSMENT TABLE
|
|
496
|
+
(Complete one row per identified threat/vulnerability pair)
|
|
497
|
+
|
|
498
|
+
| Threat | Vulnerability | Likelihood (H/M/L) | Impact (H/M/L) | Risk Level | Current Controls | Residual Risk | Action Required |
|
|
499
|
+
|--------|--------------|-------------------|----------------|------------|-----------------|---------------|----------------|
|
|
500
|
+
| Ransomware | No offsite backup | H | H | HIGH | Daily local backup | HIGH | Implement offsite/cloud backup |
|
|
501
|
+
| ... | ... | ... | ... | ... | ... | ... | ... |
|
|
502
|
+
|
|
503
|
+
RISK MANAGEMENT PLAN
|
|
504
|
+
Priority remediations based on HIGH risk items:
|
|
505
|
+
1. ____________________________________________________________
|
|
506
|
+
2. ____________________________________________________________
|
|
507
|
+
3. ____________________________________________________________
|
|
508
|
+
|
|
509
|
+
Authorization:
|
|
510
|
+
Security Official: ______________________ Date: ______________
|
|
511
|
+
Executive Sponsor: ______________________ Date: ______________
|
|
512
|
+
```
|
|
513
|
+
|
|
514
|
+
---
|
|
515
|
+
|
|
516
|
+
## 9. HIPAA Compliance Checklist
|
|
517
|
+
|
|
518
|
+
```
|
|
519
|
+
HIPAA COMPLIANCE QUICK CHECKLIST
|
|
520
|
+
[ORGANIZATION NAME] | Date: _______________ | Assessor: _______________
|
|
521
|
+
|
|
522
|
+
PRIVACY RULE
|
|
523
|
+
□ Privacy Official designated and active
|
|
524
|
+
□ Notice of Privacy Practices current and distributed
|
|
525
|
+
□ Patients receive NPP at first service; acknowledgment documented
|
|
526
|
+
□ Written authorization obtained where required
|
|
527
|
+
□ Minimum necessary standard enforced (role-based access)
|
|
528
|
+
□ Patient rights process in place (access, amendment, accounting, restrictions)
|
|
529
|
+
□ BAAs in place with all vendors who handle PHI
|
|
530
|
+
□ Privacy complaint process documented
|
|
531
|
+
□ Workforce training current and documented
|
|
532
|
+
□ Sanction policy implemented
|
|
533
|
+
|
|
534
|
+
SECURITY RULE
|
|
535
|
+
□ Security Official designated
|
|
536
|
+
□ Risk Analysis completed and current
|
|
537
|
+
□ Risk Management Plan in place
|
|
538
|
+
□ Unique user IDs (no shared logins)
|
|
539
|
+
□ MFA implemented for ePHI access
|
|
540
|
+
□ Encryption at rest (AES-256)
|
|
541
|
+
□ Encryption in transit (TLS 1.2+)
|
|
542
|
+
□ Audit logging enabled and reviewed regularly
|
|
543
|
+
□ Automatic session timeout configured
|
|
544
|
+
□ Anti-malware protection current
|
|
545
|
+
□ Media disposal procedures in place
|
|
546
|
+
□ Contingency / disaster recovery plan tested
|
|
547
|
+
□ Workforce security training current
|
|
548
|
+
□ BAAs include security requirements
|
|
549
|
+
|
|
550
|
+
BREACH NOTIFICATION
|
|
551
|
+
□ Breach response plan documented
|
|
552
|
+
□ Workforce knows how to report incidents
|
|
553
|
+
□ Incident log maintained
|
|
554
|
+
□ Risk assessment process in place
|
|
555
|
+
□ HHS annual log maintained (< 500 breaches)
|
|
556
|
+
□ Individual notification templates ready
|
|
557
|
+
|
|
558
|
+
DOCUMENTATION
|
|
559
|
+
□ All policies/procedures current and accessible
|
|
560
|
+
□ Training records maintained (6 years)
|
|
561
|
+
□ Risk analyses retained (6 years)
|
|
562
|
+
□ BAAs retained (6 years)
|
|
563
|
+
□ Incident/breach records retained (6 years)
|
|
564
|
+
|
|
565
|
+
NOTES / GAPS IDENTIFIED:
|
|
566
|
+
__________________________________________________________________
|
|
567
|
+
__________________________________________________________________
|
|
568
|
+
```
|