Looking for a Business Associate Agreement? Download our FREE starter template.
Total HIPAA Logo

COVID-19 HIPAA Compliance Checklist

How do companies who do not usually allow working from home adapt to the COVID-19 crisis? COVID-19 is changing the way we do business and remote work comes with all kinds of administrative and technical challenges. Both employers and employees have questions.

This isn’t going away any time soon. Many cities, counties, and states all over the U.S. have issued Stay at Home orders for the foreseeable future.

Implementing the items on this checklist can help ensure employee safety and productivity, as well as continuity of operations and business plans. Remember, you must maintain HIPAA compliance even while working from home.

Tips for Employees

  • Know your organization’s remote work policies. These include when and where you are allowed to work and any security measures or best practices.
  • Only use devices approved by your organization. Refrain from using personal computers, tablets, or smartphones that have not been approved or configured by IT. 
  • If possible, use your organization’s VPN (virtual private network). These provide a direct, secure connection to your organization’s network from any location. They are an important safeguard that helps protect client PHI and other confidential information.
  • Disconnect from your organization’s network when you finish working. In some cases, IT may configure timeouts.
  • Encrypt and password protect all devices that access PHI. This is your baseline defense against breaches.
  • Install firewalls and anti-malware software on your devices.
  • Store all hard copy PHI in a locked filing cabinet or safe when you are not using it. 
  • Secure your router. Router traffic should be encrypted, software should be updated to its most current form, and passwords should be unique. Do not use the WiFi password that comes with your router.
  • Lookout for malware. Avoid opening suspicious emails or attachments. In general, it’s best to stay on the safe side and either delete these or forward them to IT for review.
  • Never leave devices unattended. Guard all laptops, tablets, cellphones, and USB or external storage devices. Your work devices and accounts should not be shared with family, friends, or others. 
  • Create strong passwords. These should include a mix of upper and lowercase letters, numbers and symbols. Avoid using obvious key words, and never enter passwords while others can view your screen. Use a password manager if possible. 
  • Don’t share passwords with coworkers. If absolutely necessary, call the person or send it in an encrypted format. Many password manager services have a secure sharing option.
  • Use two-factor authentication. This provides an extra layer of security against hackers trying to access your systems or accounts. 
  • Never copy PHI to any media or devices not approved by your organization. This includes flash drives and hard drives.

Advice for Organizations

  • Create remote work policies. These should be documented in your Security Policies and Procedures.
  • Keep track of who is working remotely and regulate their access levels. These should be designated according to the employee’s role.
  • Keep logs of remote access activity. These should be reviewed periodically. IT should disable any accounts that are inactive for more than 30 days.
  • IT should configure all devices before allowing them access to the network. Specify what brands or versions of personal devices that are allowed to access company data.
  • Have each employee sign a Confidentiality Agreement.  
  • Create a BYOD (Bring Your Own Device) Agreement. This should have clear usage rules regarding when, where, and which devices may be used.
  • Have a Media Sanitization Policy that indicates how employees should dispose of PHI. This may include rules regarding how to shred or destroy hard copy PHI and how to delete electronic PHI.
  • Train staff on how to recognize social engineering attacks. This may come in the form of a phishing scam or other malware discharged by a hacker.
  • Ensure that your systems are secure. Your VPN and other remote access systems should be fully patched.
  • Enhance system monitoring. Configure your network so that you receive early detection or alerts for abnormal activity. It might be the result of hackers and/or malware.
  • Require multi-factor authentication on all staff members’ accounts that access PHI. 
  • Test the capacity of remote access solutions. If found to be necessary, increase the capacity.
  • Brief employees on IT support mechanisms. It’s better to be overprepared than underprepared. Instruct employees to double-check with IT before opening any suspicious messages or attachments.
  • Update or review your Disaster Recovery Plan. Your mindset should be: not if, but when. Be prepared to handle breaches and other incidents that may arise from changes in the locations and circumstances in which employees will be working.
  • In cases of disaster, redundancy is key. Cross-train staff and IT personnel. Have multiple backups of data, in multiple locations. Always overprepare, so that nothing takes you by surprise.

Our HIPAA compliance services help ensure that your business follows the basic HIPAA rules and guidelines to protect sensitive patient information. Our team of experts is dedicated to providing affordable rates and personalized solutions to help you become HIPAA compliant. We understand that navigating the complex requirements of HIPAA can be challenging, which is why we offer a comprehensive range of services to meet your unique needs. From risk assessments to employee training, we have the tools and expertise necessary to help your business achieve and maintain HIPAA compliance. Contact us today to learn more about how we can help you protect your patients, your employees, and your business.

Sharing is caring!

Documents

Looking for a Business Associate Agreement?

Download our free template to get started on your path toward HIPAA compliance.

Download Now

Let's keep in touch

Stay up to date on the latest HIPAA news, plus receive tons of free tools and info.

Navigating HIPAA Compliance in 2023

Watch the recording of this webinar to learn more about how you can become and stay HIPAA compliant!

Document

Related Posts

What is Access Control in terms of HIPAA?

What is Access Control in terms of HIPAA?

Access control, in terms of cybersecurity, refers to the practice of managing and regulating who can access specific resources, systems, or data within an organization's network or information...

Comparing HIPAA and NIST

Comparing HIPAA and NIST

In the ever-evolving landscape of data security and privacy, two key frameworks have emerged as significant players: HIPAA and NIST. Both emphasize the importance of safeguarding sensitive...

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)