Access Control
Implement technical policies and procedures for electronic information systems that maintain ePHI to allow access only to those persons or software programs that have been granted access rights.
Implementation Guidance
Required Documentation
Best Practices
Common Violations
Testing Procedures
Implementation Resources
Download expert-developed templates and checklists to implement this control:
Quick Facts
Related Controls
Explore other controls in the Technical Safeguards category.
Integrity
Implement policies and procedures to protect ePHI from improper alteration or destruction....
Audit Controls
Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI....
Person or Entity Authentication
Implement procedures to verify that a person or entity seeking access to ePHI is the one claimed....
Need Help Implementing This Control?
Our certified HIPAA experts can help you implement this control correctly and efficiently.