Orange County NC Website
Policy 1: Policy on HIPAA Risk Analysis <br /> North State Medical Transport <br /> Policy on HIPAA Risk Analysis <br /> Purpose <br /> North State Medical Transport is responsible, under the Health Insurance Portability and <br /> Accountability Act of 1996 ("HIPAA"),to ensure the privacy and security of all protected health <br /> information ("PHI") that we use or disclose. The foundation of compliance with the HIPAA is <br /> the completion of a "Risk Analysis"to identify existing risks and vulnerabilities in the way we <br /> create, receive, maintain or transmit our PHI. This policy describes our general approach to our <br /> HIPAA Risk Analysis. <br /> Scope <br /> North State Medical Transport's HIPAA Risk Analysis includes an assessment of potential <br /> risks and vulnerabilities to the confidentiality, availability and integrity of all PHI that North <br /> State Medical Transport creates, receives, maintains or transmits. This includes assessing any <br /> risks and vulnerabilities to the confidentiality, integrity and availability of non-electronic PHI <br /> (such as papers and documents) and electronic protected health information (e-PHI). At a <br /> minimum, the risk analysis will include a review of North State Medical Transport's: <br /> + General security hardware and procedures to protect our facility, vehicles, and <br /> electronic assets; <br /> + Computer servers (on or off-site) that store PHI; <br /> ❖ Computer network (including any local and wide area networks, communications <br /> servers and bandwidth connections, and storage devices and hardware); <br /> •• Databases where patient information is created, stored, and accessed by North State <br /> Medical Transport, whether on or off-site; <br /> • Electronic media that store e-PHI such as hard drives, disks, CDs, DVDs, USB drives or <br /> other storage devices,transmission media, or portable electronic media; <br /> + Electronic devices used for processing patient information (such as laptops and field <br /> data collection devices); <br /> + Workstations and access points where PHI is created, accessed and used; <br />