Systems Activity Review: Key to an Effective Security Program

August 5, 2020

11:00am – 12:00pm CT

Reserve your seat

An important step in protecting electronic protected health information (ePHI) is to implement reasonable and appropriate procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.

Overview

An important step in protecting electronic protected health information (ePHI) is to implement reasonable and appropriate procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Information system activity reviews serve as the primary mechanism for determining if any ePHI is used or disclosed in an inappropriate manner. As such, they are a key element of an effective security program as well as a key HIPAA requirement.

This webinar will cover how to develop and implement a strong system activity review program to better prepare and equip an organization to and respond rapidly in the event of an incident or breach.

Webinar attendees will be able to:

  • Define an information system activity review and how to identify the systems that create, receive, maintain, or transmit ePHI.
  • Identify and document what data is generated, recorded, or stored within each information system’s infrastructure.
  • Identify and document what systems do not generate actionable logs or reports and how to enforce additional access control measures.
  • Develop information system activity review policies and procedures that are comprehensive, customized, feasible, and agile.
Dawn Morgenstern
Dawn Morgenstern

Senior Principal Consultant, Clearwater

Trapper Brown
Trapper Brown

Consultant, Clearwater

Contact us today to speak to one of our experts about how we can help your organization.