Difference between revisions of "MU Stage1 Final Rule - Access Control"
Anthracite (talk | contribs) |
(Added a glossary link to Action~) |
||
(One intermediate revision by one other user not shown) | |||
Line 20: | Line 20: | ||
'''TEST CRITERIA #''' | '''TEST CRITERIA #''' | ||
§170.302(o) | §170.302(o) | ||
− | http://healthcare.nist.gov/docs/170.302.o_AccessControl_v1. | + | http://healthcare.nist.gov/docs/170.302.o_AccessControl_v1.1.pdf |
{| class="grey" border="1" cellpadding="2" | {| class="grey" border="1" cellpadding="2" | ||
! USERS | ! USERS | ||
Line 51: | Line 51: | ||
We believe that VistA has this capability already. All of the various security methods and how they are used and access needs some documentation. | We believe that VistA has this capability already. All of the various security methods and how they are used and access needs some documentation. | ||
− | '''ACTION ITEMS / NEXT STEPS''' | + | '''[[ACTION~|Action]] ITEMS / NEXT STEPS''' |
(Add details here) | (Add details here) | ||
'''OPEN ISSUES / QUESTIONS''' | '''OPEN ISSUES / QUESTIONS''' | ||
(Add details here) | (Add details here) |
Latest revision as of 20:17, 29 July 2012
SECTION # Section 170.302(o)—Access Control
MU OBJECTIVE Protect electronic health information created or maintained by the certified EHR technology through the implementation of appropriate technical capabilities.
MU STAGE 1 MEASURE Conduct or review a security risk analysis per 45 CFR 164.308 (a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process.
CERTIFICATION CRITERION Interim Final Rule Text: Access control. Assign a unique name and/or number for identifying and tracking user identity and establish controls that permit only authorized users to access electronic health information. Final Rule Text: §170.302(o). Unchanged.
STANDARDS 45 CFR 164.308 http://edocket.access.gpo.gov/cfr_2003/octqtr/pdf/45cfr164.308.pdf
TEST CRITERIA # §170.302(o) http://healthcare.nist.gov/docs/170.302.o_AccessControl_v1.1.pdf
USERS | CORE / MENU | SOLUTION DEVELOPERS | STATUS |
---|---|---|---|
All | CORE | TBD | TBD |
SOLUTION DESIGN / TECHNOLOGY (Add details here)
SOLUTION COMPONENTS (Add details here - Ex. KIDS patch, Delphi code, User guide, Web resources, Manual test script, etc)
DEPENDENCIES (Add details here)
COMMENTS / NOTES (Add details here)
PREVIOUS NOTES (none)
DEVELOPMENT STATUS We believe that VistA has this capability already. All of the various security methods and how they are used and access needs some documentation.
Action ITEMS / NEXT STEPS (Add details here)
OPEN ISSUES / QUESTIONS (Add details here)