This policy is listed for reference only and should be reviewed with your lawyer before implementing them into daily practice. We are not lawyers and are not providing any legal advice. View our legal disclaimer.

Contingency Plan Policy

Reference: 45 CFR ยง 160.308(a)
Last Updated: October 25, 2024

Purpose

Goal: Establish (and implement as needed) policies and procedures to respond to an emergency or other occurrence (i.e. hurricanes, floods, earthquakes, fires, etc.) that may potentially damage systems containing or handling ePHI.

The purpose of this policy is to mitigate the damaging consequences of unexpected and undesirable events to key business systems and operations. This contingency plans will consider the possibility of catastrophically destructive occurrences and accounts for less-than- cataclysmic events that may also seriously impede data processing functions.

Policy

Procedure: These Contingency policies shall ensure that Information Systems Security controls function reliably and, if not, that adequate backup functions are in place to ensure that security functions are maintained continuously during interrupted service. If data is modified or destroyed, procedures must be in place for recovery.

The contingency plan at large (subsequent policies) addresses the areas of:

  • Data Backup Plan
  • Disaster Recovery Plan
  • Emergency Mode Operation Plan
  • Testing and Revision Procedure
  • Applications and Date Criticality Analysis

This policy in particular addresses:

  • Preliminary Planning. The Security Manager shall organize the appropriate parties to describe the purpose, scope, assumptions, responsibilities and overall strategy relative to the plan.
    • All team members understand that this plan is a dynamic, on-going activity which includes not just things which are done in anticipation of a problem; but also what is to be done when problems occur.
    • This policy shall encompass only those systems/information that has been designated as critical by the Security Manager.
    • A risk analysis shall be conducted on an Annual basis to ascertain the criticality of available systems. Modification of categories may be accomplished after the risk analysis has been discussed with Management.
  • Preparatory Actions. Before an event occurs which impacts the data processing operations, the Security Manager or its designated representative shall identify the processing requirements and criticality of people, hardware, communications, supplies, transportation, space, environmental controls, and documentation.
    • Testing of the plan and training of recovery team personnel shall be performed at random intervals (not to exceed one year between tests).
    • Maintenance support agreements have been developed, as needed, to ensure timely responses to processing stoppages due to hardware/software failures.
      • Response times and expectations have been stated in the Agreements.
      • Spare equipment parts and operational systems may be used whenever possible to expedite recovery.
    • Configurations of all systems have been documented for daily support and recovery purposes.
  • Action Plans. The Security Manager shall coordinate the development of actions plans based on the threats identified on the risk analysis.
    • Each plan consists of the "what to" actions to be performed.
    • Plans shall consist of concise, short instructions of the specific actions to take in response to each of the problem scenarios that were identified.
    • Action plans shall be reviewed and modify on an as needed basis.
  • Testing the Contingency Plan. As indicated previously, the contingency plan shall be tested at random intervals not to exceed one year between intervals.
Simplify Your Compliance with
Software and Guided Coaching
Let your patients and clients know that you take HIPAA seriously with the HIPAA Seal of Compliance for your website, storefront, and marketing materials.

Get instant access to HIPAA Compliance News and Updates

You'll get your first checklist as soon as you sign up!
overlapping hands

Our Mission

To safeguard medical data by providing secure, reliable, and fully HIPAA-compliant hosting solutions, enabling healthcare professionals to focus on their primary mission of providing care.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram