Monday, November 29, 2004

Information Access Management III

The last task under Information Access Management is to implement policies and procedures that, based on access authorization policies, establish, document, review, and modify a users right of access to a workstation, transaction, program or process. This task is addressable.

This is kind of an overview of the Information Access management requirement. Basically you have to have a method of determining who has rights, how to assign the rights, review and modify rights as needed, and document these policies and procedures. Note that granting access to a workstation may or may not be sufficient. A person may have access to a workstation but may not have access to certain applications that contain EPHI. Also a person may have access to an EPHI application but may not have access to certain EPHI components within the application.

0 Comments:

Post a Comment

<< Home