Orange County NC Website
Policy 27: Policy on Physical Security of PHI and e-PHI <br /> North State Medical Transport <br /> Policy on Physical Security of PHI and e-PHI <br /> Purpose <br /> North State Medical Transport is obligated under the Health Insurance Portability and <br /> Accountability Act of 1996 ("HIPAA")to establish physical safeguards to protect electronic <br /> protected health information ("e-PHI") and other PHI. This policy establishes our security <br /> measures to protect our electronic information systems, networks and applications and as well <br /> as buildings and equipment from natural and environmental hazards, and unauthorized <br /> intrusion. <br /> Scope <br /> This policy applies to all North State Medical Transport staff members. All staff <br /> members should be on the lookout for any potential problems that could jeopardize the <br /> security of electronically stored information, especially e-PHI. This policy describes our general <br /> approach to facility security and the steps necessary to prevent a breach in the physical security <br /> system in place. It also describes our general procedures to limit physical access to electronic <br /> information systems and the buildings and rooms in which they are housed, and our general <br /> procedures on disposal or reissuance of equipment containing e-PHI. <br /> Procedure <br /> Facility Access Controls <br /> 1. Access to areas of our facility that contain our information system with e-PHI will be <br /> granted only to those with a verifiable and approved business need to have access. <br /> Z. All North State Medical Transport staff members will be issued identification cards or <br /> badges for security purposes. These badges and identification must be displayed at all <br /> times while on the premises. <br /> 3. Access control will be established with physical hardware that prevents improper or <br /> inadvertent entry into a secure area. This hardware may include combination locks, <br /> swipe cards, smart cards and other devices on all doors housing our information system <br /> equipment. <br /> 4. Any space in a building that we share with another entity that contains PHI that we <br /> create, receive, maintain or transmit will be maintained at the same level of security as <br />