Transporting Protected Health Information: Difference between revisions

Line 49: Line 49:
## If PHI is being accessed from or taken home to work during off-hours, employees' manager/director should be notified and approve such work at home off-hours.
## If PHI is being accessed from or taken home to work during off-hours, employees' manager/director should be notified and approve such work at home off-hours.
## PHI in the home must be secured from access or view by family members and others. Workforce members shall log out of information systems immediately after use and shall secure their login and password so that others cannot use it.
## PHI in the home must be secured from access or view by family members and others. Workforce members shall log out of information systems immediately after use and shall secure their login and password so that others cannot use it.
# Mobile devices must be password protected and encrypted. For additional information, refer to the [http://www.unmc.edu/its/security/procedures/enduser.html End User Device Procedure] for security of mobile devices such as laptops, USB/thumb drives, etc.
# Mobile devices must be password protected and encrypted. For additional information, refer to the [https://info.unmc.edu/its-security/policies/procedures/enduser.html End User Device Procedure] for security of mobile devices such as laptops, USB/thumb drives, etc.
# If PHI is lost, stolen or improperly accessed by others, immediately notify the ITS Help Desk, Privacy Officer or Information Security Officer. Immediately notify UNMC Security and file a police report if PHI is stolen.
# If PHI is lost, stolen or improperly accessed by others, immediately notify the ITS Help Desk, Privacy Officer or Information Security Officer. Immediately notify UNMC Security and file a police report if PHI is stolen.
# Contact the HIPAA Privacy Office for additional guidance.
# Contact the HIPAA Privacy Office for additional guidance.