Orange County NC Website
k if we owned the space. Specifically, we will protect that area from access by others in <br /> the building who are not part of North State Medical Transport. <br /> 5. Disabling or circumventing any of the physical security protections is strictly prohibited. <br /> Any problems with physical security measures must be reported to the HIPAA <br /> Compliance Officer immediately. <br /> Facility Security Plan <br /> 1. The HIPAA Compliance Officer will be responsible for developing a facility security plan <br /> that protects our buildings from unauthorized physical access,tampering, and theft. <br /> 2. The plan will incorporate hardware to limit access to our buildings to only those persons <br /> with proper keys and/or access codes. <br /> 3. North State Medical Transport will maintain a current list of all staff members who have <br /> authorization to access our facilities with PHI. Where appropriate, North State Medical <br /> Transport will install security systems including video surveillance to protect PHI and to <br /> ensure the security of our information systems. <br /> Access Control and Validation Procedures <br /> 1. North State Medical Transport has established procedures for controlling and validating <br /> a staff member's access to our facilities. Access to various areas of the facilities will be <br /> based on the role of the staff person and their need to access a particular area. <br /> 2. Access to locations that house our systems, networks or applications with PHI that we <br /> create, receive, maintain or transmit will have the greatest limitations on access, and <br /> access to these critical areas will be reviewed frequently by management and the HIPAA <br /> Compliance Officer. <br /> Maintenance Records <br /> 1. To help ensure that our physical security systems are in continuous operation, North <br /> State Medical Transport has developed a maintenance program for all security devices, <br /> including locks, keypads, and other access devices. <br /> 2. Any repairs or change outs of any security devices will be recorded. <br /> Workstation Security and Use <br /> 1. A"workstation" is defined as any electronic computing device, such as a desktop <br /> computer, laptop computer, mobile electronic device or any other device that is used to <br /> create, receive, maintain or transmit PHI. <br />