HIPAA/Hi-Tech Act Server, Data and Access Security Policy

1.0 Purpose

The purpose of this policy is to establish standards for the base configuration of internal server equipment, protected health information and user access to servers and data that are owned and/or operated by FidelityEHR on behalf of their commercializable software subscription product, FidelityEHR Behavioral and Integrated Health Record software. Effective implementation of this policy will minimize unauthorized access to FidelityEHR proprietary and/or confidential information and technology.

2.0 Policy

2.1 Ownership and Responsibilities

All internal servers used by the FidelityEHR system must be owned by an operational group that is responsible for system administration. Approved server configuration guides must be established and maintained by each operational group, based on business needs and approved by the FidelityEHR Administration Group. Operational groups should monitor configuration compliance and implement an exception policy tailored to their environment. Each operational group must establish a process for changing the configuration guides, which includes review and approval by the FidelityEHR Administration Group.
Servers must be registered within the corporate enterprise management system. At a minimum, the following information is required to positively identify the point of contact:
Server contact(s) and location, and a backup contact.
Hardware and Operating System/Version.
Main functions and applications, if applicable.
Information in the FidelityEHR Administration Group must be kept up-to-date.
Configuration changes for production servers must follow the appropriate change management procedures.

2.2 General Configuration Guidelines

Operating System configuration should be in accordance with these guidelines.
Services and applications that will not be used must be disabled where practical.
Access to services should be logged and/or protected through access-control methods such as TCP Wrappers, if possible.
The most recent security patches must be installed on the system as soon as practical, the only exception being when immediate application would interfere with business requirements.
Trust relationships between systems are a security risk, and their use should be avoided. Do not use a trust relationship when some other method of communication will do.
Always use standard security principles of least required access to perform a function.
Do not use root when a non-privileged account will do.
If a methodology for secure channel connection is available (i.e., technically feasible), privileged access must be performed over secure channels, (e.g., encrypted network connections using SSH or IPSec).
Servers should be physically located in an access-controlled environment.
Servers are specifically prohibited from operating from uncontrolled cubicle areas.

2.3 Password Controls

System enforced: specified minimum length password.
System enforced: user passwords automatically changed or revoked after a user defined period has passed.
System enforced: users required to change their passwords following the initial set up or resetting of the password.
History of previously used passwords is maintained by the system to prevent reuse.
Users are provided the capability to change their own passwords at their discretion.
User id’s are disabled after a specified number of consecutive invalid login attempts.
System automatically logs users off after a specified period of inactivity.
Passwords entered in a non-display field.
Passwords encrypted when routed over a network.
Passwords are encrypted in storage.

2.4 Security Administration

System logs unauthorized access attempts by date, time, user id, device and location.
System maintains an audit trail of all security maintenance performed by date, time, user id, device and location and information is easily accessible.
System provides security reports of users and access levels.
System provides a field(s) for personal information to be used for verification of users’ identities for password resets and other maintenance (i.e. SSN, Mother’s Maiden Name, DOB, etc). Fields used would not be a requirement.
System provides varying levels of access within the security application (i.e. Access to only password reset functions or Access to password reset function + Access to add & update users).
System provides varying levels of access within the application.
System uses groups and unique user ids to define levels of access.
System provides the capability to place security controls on each system module and on confidential and critical levels within each module.
System provides capability to restrict access to particular records within the system, based on user id.
System provides encryption of sensitive information transmitted over the network.
Security features comply with Federal (HIPAA) health information standards for data integrity, confidentiality, auditing, and availability.

2.5 Activity Logging

System logs unauthorized access attempts by date, time, user id, device and location.
System maintains an audit trail of all security maintenance performed by date, time, user id, device and location and information is easily accessible.
System logs all accesses (including inquiry, which is required by HIPAA) to client information.
System has auditing capabilities for both online or batch reporting. Can also be exported into Word, Excel, or other leading industry tools.
Logs are archived and can be recalled as needed.

2.6 Monitoring

All security-related events on critical or sensitive systems must be logged and audit trails saved as follows:
All security related logs will be kept online for a minimum of 1 week.
Daily incremental tape backups will be retained for at least 1 month.
Weekly full tape backups of logs will be retained for at least 1 month.
Monthly full backups will be retained for a minimum of 2 years.
Security-related events will be reported to the FidelityEHR Administration Group, who will review logs and report incidents to IT management. Corrective measures will be prescribed as needed. Security-related events include, but are not limited to:
Port-scan attacks.
Evidence of unauthorized access to privileged accounts.
Anomalous occurrences that are not related to specific applications on the host.

3.0 Compliance

Audits will be performed on a regular basis by authorized representatives.
Audits will be managed by the internal audit group or the FidelityEHR Administration Group. The FidelityEHR Administration Group will filter findings not related to a specific operational group and then present the findings to the appropriate support staff for remediation or justification.
Every effort will be made to prevent audits from causing operational failures or disruptions.

4.0 Enforcement

Any employee or contractor found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.