The purpose of the Access Control policy is:
- Establish written procedures for granting and revoking access to protected health information and computer systems.
- Develop levels of access to each Individuals and required changes based on employee’s responsibilities (promotions, termination, changes in duties, etc.).
Baseline: Access to Information systems and Electronic Patient Health Information (EPHI) shall be based on actions to be completed by the team member’s supervisor/manager as follows:
- Only the team member’s supervisor or manager can grant access to the Organizations Information Systems.
- Access to the information system or application may be revoked or suspended, consistent with the current policies, if there is evidence that an individual is misusing information or resources.
- Any individual whose access is revoked or suspended may be subject to disciplinary action or other appropriate corrective measures.
- Each supervisor/manager shall ensure that only team members who require access to Information Systems are granted access. Furthermore, each supervisor/manager shall confirm that the access to the Information Systems and EPHI granted is the minimum necessary access required.
- If the team member no longer requires access, it is the supervisor or manager’s responsibility to complete the necessary process to terminate access.
Procedures: Prior to granting access the supervisor/manager shall confirm that the following tasks have been completed:
- Background checks as described in the Workforce Clearance Policy have been completed.
- Position Description has been completed and identifies the access to be given to the team member. Business Associates must have the access for each position identified in their Business Associates Agreement or an attachment to the same.
- Security training has been completed.
- Team member has been assigned his/her own personal login and password to the relevant systems.