This policy is listed for reference only and should be reviewed with your lawyer before implementing them into daily practice. We are not lawyers and are not providing any legal advice. View our legal disclaimer.

Workstation Use: Electronic Communication

Reference: 45 CFR § 164.310
Last Updated: May 19, 2024


Goal: Ensure efficient use of resources by all individuals.

The purpose of this policy is to identify the proper uses of available resources. While this policy may not mention all systems available at any specific point in time the policy shall apply to any resource provided or paid by us.


Procedure: While working for us, most employees will use or have access to resources including but not limited to telephones, computers, computer software, an electronic mail system, a telephone message recording system, and fax machines. These devices and systems, and the information contained in them, are our property. Except for the telephones, these items are to be used for business purposes only. Telephones may be used for personal reasons in case of emergencies.

Please remember that we reserve the right to access and dispose of any information on these devices as we may see fit at the time. Furthermore, as part of your supervisor and the HIPAA Security manager responsibilities they will be required to access these devices and review and obtain information contained therein on a regular basis.

While access of a device by more that one user is expected, employees shall not assume, nor provide access to these devices or systems, or the information contained therein, to individuals who do not have a business need to know the information. In addition, our policies on equal employment, confidentiality and anti-harassment apply to the use of these devices or systems and the release and access of information on them.

Whenever possible we will use a combination of authentication systems to ensure that only the authorized individuals have access to the proper systems and information needed to accomplish their jobs. If a particular individual needs access to a system or information he/she must contact his/her supervisor and the Security Officer to ensure he/she will be added to the proper authentication systems.

Any violation of this policy may result in disciplinary action, up to and including, termination.

Simplify Your Compliance with
Software and Guided Coaching
Let your patients and clients know that you take HIPAA seriously with the HIPAA Seal of Compliance for your website, storefront, and marketing materials.

Get instant access to HIPAA Compliance News and Updates

You'll get your first checklist as soon as you sign up!

overlapping hands

Our Mission

To safeguard medical data by providing secure, reliable, and fully HIPAA-compliant hosting solutions, enabling healthcare professionals to focus on their primary mission of providing care.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram