0% found this document useful (0 votes)
170 views5 pages

Project Preparation-Security Program Charter

This document outlines a security program charter for HIC, Inc. to comply with HIPAA regulations regarding protected health information. The scope includes procedures to protect electronic PHI transactions. The mission is to provide a sound security policy to protect all forms of PHI data according to HIPAA requirements. Ownership of the policies will be shared between executives, with final approval by the CEO and CISO. Junior executives will be responsible for ensuring their departments comply with the policies. Any exceptions must adhere to HIPAA regulations and receive board approval.

Uploaded by

api-480230170
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
170 views5 pages

Project Preparation-Security Program Charter

This document outlines a security program charter for HIC, Inc. to comply with HIPAA regulations regarding protected health information. The scope includes procedures to protect electronic PHI transactions. The mission is to provide a sound security policy to protect all forms of PHI data according to HIPAA requirements. Ownership of the policies will be shared between executives, with final approval by the CEO and CISO. Junior executives will be responsible for ensuring their departments comply with the policies. Any exceptions must adhere to HIPAA regulations and receive board approval.

Uploaded by

api-480230170
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Running Header: Project Preparation: Security Program Charter 1

Micah Geertson
CSOL 540
09/13/2019

Project Preparation:
Security Program Charter
Project Preparation: Security Program Charter 2

Table of Contents
Security Program Charter: HIC, Inc. ....................................................................................................... 2
Scope ............................................................................................................................................... 2
Mission ............................................................................................................................................ 2
Ownership....................................................................................................................................... 3
Policy Coverage .............................................................................................................................. 3
References .................................................................................................................................................... 4
Project Preparation: Security Program Charter 3

Security Program Charter: HIC, Inc.


Scope

The purpose of this document is to outline the Security Program Charter for HIC, Inc. in

order to comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA)

so as to preserve the confidentiality, integrity, and availability of protected health information

(PHI). In accordance with the Office for Civil Rights (OCR), this security coverage will apply to

all electronic PHI transactions (OCR, 2013). As such, the scope of this HIC, Inc. security policy

will include procedures and rules governing the protection of PHI as outlined in 45 CFR Part

160, Part 162, and Part 164. These rules include: Unique Identifiers Rule (National Provider

Identifier), HIPAA Privacy Rule, Transactions and Code Sets Rule, HIPAA Security Rule, and

the Enforcement Rule (HIPAA Survival Guide, 2013).

Mission

Based on the aforementioned HIPAA requirements, it is up to HIC, Inc. to provide a

sound security policy to protect all forms of data related to each protected heath information

record. This includes having plans for risk management should a data breach occur, backup and

recovery plans in case of system outages, plans for interoperability between local and federal law

enforcement to share data related to criminal activity as well as report all successful breaches to

the OCR. Plans for each of these will be created and modeled after the National Institute of

Standards and Technology’s Special Publication 800-66 Revision 1 - An Introductory Resource

Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA)

Security Rule.
Project Preparation: Security Program Charter 4

Ownership

The overall governing policies should be researched, defined and revised in partnership

between all HIC, Inc. Director and above executives. Final approval will be made by HIC, Inc.’s

Chief Executive Officer (CEO) with the Chief Information Security Officer’s (CISO)

endorsement. Post-approval phase will require the CISO to disseminate the policies amongst

junior executives for execution and implementation of the security policies. HIC, Inc. junior

executives will ensure employee compliance with the implemented policies and it is the job of

the CISO to ensure that the implemented policies retain their integrity and continue to meet the

standards outlined by HIPAA.

Policy Coverage

As previously mentioned, junior executives will be responsible for ensuring that their

departments are complying with HIC, Inc. security policy. Enforcement will begin with Tier 1

management to ensure that their direct reports are aware of and following the security policy.

All inappropriate conduct in relation to this security policy will be reported, at minimum, to the

Director of that department and result in suspension or termination depending upon the severity

of the misconduct. Should an exception to this policy be required, it must present proper

justification and adhere to HIPAA federal regulations to begin its flow upward to receive Board

of Director approval prior to being signed off as an exception.


Project Preparation: Security Program Charter 5

References
A Brief Background on the HIPAA Rules and the HITECH Act . (n.d.). Retrieved from HIPPA
Rules: http://www.hipaasurvivalguide.com/hipaa-rules.php

NIST. (2008, October). National Institute of Standards and Technology’s Special Publication
800-66 Revision 1 - An Introductory Resource Guide for Implementing the Health Insurance
Portability and Accountability Act (HIPAA) Security Rule. Retrieved from
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-66r1.pdf

Office for Civil Rights. (2013, July 26). Summary of the HIPAA Privacy Rule. Retrieved from
Health Information Privacy: https://www.hhs.gov/hipaa/for-professionals/privacy/laws-
regulations/index.html

You might also like