Sindecuse Health Center Security Policies

  1. Security Management Process
  2. Risk Analysis
  3. Risk Management
  4. Sanction Policy
  5. Information System Activity Review
  6. Assigned Security Responsibility
  7. Workforce Security
  8. Authorization And/Or Supervision
  9. Workforce Clearance Procedure
  10. Termination Procedures
  11. Information Access Management
  12. Access Authorization
  13. Access Establishment And Modification
  14. Security Awareness And Training
  15. Security Reminders
  16. Protection From Malicious Software
  17. Log-In Monitoring
  18. Password Management
  19. Security Incident Procedures
  20. Response And Reporting
  21. Contingency Plan
  22. Data Backup Plan
  23. Disaster Recovery Plan
  24. Emergency Mode Operation Plan
  25. Testing And Revision Procedures
  26. Applications And Data Criticality Analysis
  27. Evaluation
  28. Business Associate Contracts And Other Arrangements
  29. Facility Access Controls
  30. Contingency Operations
  31. Facility Security Plan
  32. Access Control And Validation Procedures
  33. Maintenance Records
  34. Workstation Use
  35. Workstaion Security
  36. Device And Media Controls
  37. Disposal
  38. Media Re-Use
  39. Accountability
  40. Data Backup And Storage
  41. Access Control
  42. Unique User Identification
  43. Emergency Access Procedure
  44. Automatic Log-Off
  45. Encryption And Decryption
  46. Audit Controls
  47. Integrity
  48. Mechanism To Authenticate Ephi
  49. Person Or Entity Authentication
  50. Transmission Security
  51. Integrity Controls
  52. Encryption
  53. Policies And Procedures For Security
  54. Documentation