Orange County NC Website
. . . � <br /> 1. Any staff member or authorized user that requires access to any network, system, or <br /> application that creates, receives, maintains or transmits e-PHI at North State Medical <br /> Transport must be provided with a Unique User Identification Number. <br /> 2. When requesting access to any network, system, or application that creates, receives, <br /> maintains or transmits e-PHI at North State Medical Transport, a staff member or <br /> authorized user must supply their assigned Unique User Identification in conjunction <br /> with a secure password. <br /> 3. If a staff member or authorized user believes their User Identification has been <br /> comprised,they must report that incident to the appropriate supervisor or the HIPAA <br /> Compliance Officer immediately. <br /> Security Password Management <br /> 1. All staff members must create a password in conjunction with their Unique User <br /> Identification to gain access to any network, system or application used to create, <br /> receive, maintain or transmit e-PHI at North State Medical Transport. <br /> Z. A generic User Identification and password may be utilized for access to shared or <br /> common area workstations so long as the login provides no access to e-PHI. An <br /> additional Unique User Identification and password must be supplied to access <br /> networks, systems applications and database systems containing e-PHI at North State <br /> Medical Transport. <br /> 3. Managers of networks, systems, or applications used to create, receive, maintain or <br /> transmit e-PHI at North State Medical Transport must ensure that passwords set by staff <br /> members meet the minimum level of complexity described in this policy. <br /> 4. Managers of networks, systems, or applications used to create, receive, maintain or e- <br /> PH| are responsible for educating staff members about all password related policies and <br /> procedures, and any changes to those policies and procedures. <br /> 5. Password "aging times" (i.e.,the period of time a password may be used before it must <br /> be changed) must be implemented in a manner commensurate with the criticality and <br /> sensitivityofthee-PH| containedvvithineachnetxvorksyotonn, app|icationnrdatabase. <br /> 6. Staff members are responsible for the proper use and protection of their passwords and <br /> must adhere to the following guidelines: <br /> a. Passwords are only to be used for legitimate access to networks, systems, or <br /> applications. <br /> b. Passwords must not be disclosed to other staff members or individuals. <br />