HIPAA Physical Security May Be Ripe for Audit Despite Fewer Cases

Ransomware may grab the headlines in the HIPAA security world, but covered entities also should be sensitive to physical security vulnerabilities and relevant requirements in the HIPAA Security Rule.

“Physical safeguards are part of the three-legged stool—physical, technical and administrative safeguards,” said Robert Trusiak, an attorney in Buffalo, New York. Technical safeguards get the most attention because they relate to the “electronic security that you’re wrapping your cybersecurity infrastructure around,” he said. “Everyone talks about technical and to a lesser extent administrative safeguards, and often people don’t spend any time on physical safeguards. But you need to be mindful of it.” If the HHS Office for Civil Rights (OCR) investigates a breach sparked by malware, for example, “it will focus on all three safeguards.”

The HIPAA Security Rule requires covered entities to have physical safeguards. They’re defined as “physical measures, policies, and procedures to protect a covered entity’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion,” according to HHS.[1] They cover facility access controls, workstation use, workstation security and device and media controls. “This may extend outside of an actual office, and could include workforce members’ homes or other physical locations where they access EPHI [electronic protected health information].”

This document is only available to subscribers. Please log in or purchase access
 


    Would you like to read this entire article?

    If you already subscribe to this publication, just log in. If not, let us send you an email with a link that will allow you to read the entire article for free. Just complete the following form.

    * required field