分享
ASTM_E_2147_-_01_2013.pdf
下载文档

ID:170125

大小:96.92KB

页数:6页

格式:PDF

时间:2023-03-04

收藏 分享赚钱
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,汇文网负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
网站客服:3074922707
TM_E_2147_ _01_2013
Designation:E214701(Reapproved 2013)An American National StandardStandard Specification forAudit and Disclosure Logs for Use in Health InformationSystems1This standard is issued under the fixed designation E2147;the number immediately following the designation indicates the year oforiginal adoption or,in the case of revision,the year of last revision.A number in parentheses indicates the year of last reapproval.Asuperscript epsilon()indicates an editorial change since the last revision or reapproval.1.Scope1.1 This specification is for the development and implemen-tation of security audit/disclosure logs for health information.It specifies how to design an access audit log to record allaccess to patient identifiable information maintained in com-puter systems and includes principles for developing policies,procedures,and functions of health information logs to docu-ment all disclosure of health information to external users foruse in manual and computer systems.The process of informa-tion disclosure and auditing should conform,where relevant,with the Privacy Act of 1974(1).21.2 The first purpose of this specification is to define thenature,role,and function of system access audit logs and theiruse in health information systems as a technical and proceduraltool to help provide security oversight.In concert with orga-nizational confidentiality and security policies and procedures,permanent audit logs can clearly identify all system applicationusers who access patient identifiable information,record thenature of the patient information accessed,and maintain apermanent record of actions taken by the user.By providing aprecise method for an organization to monitor and review whohas accessed patient data,audit logs have the potential for moreeffective security oversight than traditional paper record envi-ronments.This specification will identify functionality neededfor audit log management,the data to be recorded,and the useof audit logs as security and management tools by organiza-tional managers.1.3 In the absence of computerized logs,audit log principlescan be implemented manually in the paper patient recordenvironment with respect to permanently monitoring paperpatient record access.Where the paper patient record and thecomputer-based patient record coexist in parallel,securityoversight and access management should address both envi-ronments.1.4 The second purpose of this specification is to identifyprinciples for establishing a permanent record of disclosure ofhealth information to external users and the data to be recordedin maintaining it.Security management of health informationrequires a comprehensive framework that incorporates man-dates and criteria for disclosing patient health informationfound in federal and state laws,rules and regulations andethical statements of professional conduct.Accountability forsuch a framework should be established through a set ofstandard principles that are applicable to all health care settingsand health information systems.1.5 Logs used to audit and oversee health informationaccess and disclosure are the responsibility of each health careorganization,data intermediary,data warehouse,clinical datarepository,third party payer,agency,organization or corpora-tion that maintains or provides,or has access to individually-identifiable data.Such logs are specified in and support policyon information access monitoring and are tied to disciplinarysanctions that satisfy legal,regulatory,accreditation and insti-tutional mandates.1.6 Organizations need to prescribe access requirements foraggregate data and to approve query tools that allow auditingcapability,or design data repositories that limit inclusion ofdata that provide potential keys to identifiable data.Inferencingpatient identifiable data through analysis of aggregate data thatcontains limited identifying data elements such as birth date,birth location,and family name,is possible using software thatmatches data elements across data bases.This allows aconsistent approach to linking records into longitudinal casesfor research purposes.Audit trails can be designed to workwith applications which use these techniques if the queryfunctions are part of a defined retrieval application but oftenstandard query tools are not easily audited.This specificationapplies to the disclosure or transfer of health information(records)individually or in batches.1This specification is under the jurisdiction of ASTM Committee E31 onHealthcare Informatics and is the direct responsibility of Subcommittee E31.25 onHealthcare Data Management,Security,Confidentiality,and Privacy.Current edition approved March 1,2013.Published March 2013.Originallyapproved in 2001.Last previous edition approved in 2009 as E2147 01(2009).DOI:10.1520/E2147-01R13.2The boldface numbers in parentheses refer to the list of references at the end ofthis standard.Copyright ASTM International,100 Barr Harbor Drive,PO Box C700,West Conshohocken,PA 19428-2959.United States1 1.7 Thi

此文档下载收益归作者所有

下载文档
猜你喜欢
你可能关注的文档
收起
展开