98-21601. Security and Electronic Signature Standards  

  • [Federal Register Volume 63, Number 155 (Wednesday, August 12, 1998)]
    [Proposed Rules]
    [Pages 43242-43280]
    From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
    [FR Doc No: 98-21601]
    
    
    
    [[Page 43241]]
    
    _______________________________________________________________________
    
    Part III
    
    
    
    
    
    Department of Health and Human Services
    
    
    
    
    
    _______________________________________________________________________
    
    
    
    Office of the Secretary
    
    
    
    _______________________________________________________________________
    
    
    
    45 CFR Part 142
    
    
    
    Security and Electronic Signature Standards; Proposed Rule
    
    Federal Register / Vol. 63, No. 155 / Wednesday, August 12, 1998 / 
    Proposed Rules
    
    [[Page 43242]]
    
    
    -----------------------------------------------------------------------
    
    DEPARTMENT OF HEALTH AND HUMAN SERVICES
    
    Office of the Secretary
    
    45 CFR Part 142
    
    [HCFA-0049-P]
    RIN 0938-AI57
    
    
    Security and Electronic Signature Standards
    
    AGENCY: Health Care Financing Administration (HCFA), HHS.
    
    ACTION: Proposed rule.
    
    -----------------------------------------------------------------------
    
    SUMMARY: This rule proposes standards for the security of individual 
    health information and electronic signature use by health plans, health 
    care clearinghouses, and health care providers. The health plans, 
    health care clearinghouses, and health care providers would use the 
    security standards to develop and maintain the security of all 
    electronic individual health information. The electronic signature 
    standard is applicable only with respect to use with the specific 
    transactions defined in the Health Insurance Portability and 
    Accountability Act of 1996, and when it has been determined that an 
    electronic signature must be used.
        The use of these standards would improve the Medicare and Medicaid 
    programs, and other Federal health programs and private health 
    programs, and the effectiveness and efficiency of the health care 
    industry in general. This rule would implement some of the requirements 
    of the Administrative Simplification subtitle of the Health Insurance 
    Portability and Accountability Act of 1996.
    
    DATES: Comments will be considered if we receive them at the 
    appropriate address, as provided below, no later than 5 p.m. on October 
    13, 1998.
    
    ADDRESSES: Mail written comments (1 original and 3 copies) to the 
    following address: Health Care Financing Administration, Department of 
    Health and Human Services, Attention: HCFA-0049-P, P.O. Box 26585, 
    Baltimore, MD 21207-0519.
        If you prefer, you may deliver your written comments (1 original 
    and 3 copies) to one of the following addresses:
    
    Room 309-G, Hubert H. Humphrey Building, 200 Independence Avenue, SW., 
    Washington, DC 20201, or
    Room C5-09-26, 7500 Security Boulevard, Baltimore, MD 21244-1850.
    
        Comments may also be submitted electronically to the following e-
    mail address: security@osaspe.dhhs.gov. For e-mail comment procedures, 
    see the beginning of SUPPLEMENTARY INFORMATION. For further information 
    on ordering copies of the Federal Register containing this document and 
    on electronic access, see the beginning of
    SUPPLEMENTARY information.
    
    FOR FURTHER INFORMATION CONTACT: John Parmigiani, (410) 786-2976.
    
    SUPPLEMENTARY INFORMATION:
    
    E-Mail, Comments, Procedures, Availability of Copies, and Electronic 
    Access
    
        E-mail comments should include the full name, postal address, and 
    affiliation (if applicable) of the sender and must be submitted to the 
    referenced address to be considered. All comments should be 
    incorporated in the e-mail message because we may not be able to access 
    attachments.
        Because of staffing and resource limitations, we cannot accept 
    comments by facsimile (FAX) transmission. In commenting, please refer 
    to file code HCFA-0049-P and the specific section or sections of the 
    proposed rule. Both electronic and written comments received by the 
    time and date indicated above will be available for public inspection 
    as they are received, generally beginning approximately 3 weeks after 
    publication of a document, in Room 309-G of the Department's offices at 
    200 Independence Avenue, SW., Washington, DC, on Monday through Friday 
    of each week from 8:30 a.m. to 5 p.m. (phone: (202) 690-7890). 
    Electronic and legible written comments will also be posted, along with 
    this proposed rule, at the following web site: http://aspe.os.dhhs.gov/
    admnsimp/.
        Copies: To order copies of the Federal Register containing this 
    document, send your request to: New Orders, Superintendent of 
    Documents, P.O. Box 371954, Pittsburgh, PA 15250-7954. Specify the date 
    of the issue requested and enclose a check or money order payable to 
    the Superintendent of Documents, or enclose your Visa or Master Card 
    number and expiration date. Credit card orders can also be placed by 
    calling the order desk at (202) 512-1800 or by faxing to (202) 512-
    2250. The cost for each copy is $8. As an alternative, you can view and 
    photocopy the Federal Register document at most libraries designated as 
    Federal Depository Libraries and at many other public and academic 
    libraries throughout the country that receive the Federal Register.
        This Federal Register document is also available from the Federal 
    Register online database through GPO Access, a service of the U.S. 
    Government Printing Office. Free public access is available on a Wide 
    Area Information Server (WAIS) through the Internet and via 
    asynchronous dial-in. Internet users can access the database by using 
    the World Wide Web, http://www.access.gpo.gov/nara/, by using local 
    WAIS client software, or by telnet to swais.access.gpo.gov, then login 
    as guest (no password required). Dial-in users should use 
    communications software and modem to call (202) 512-1661; type swais, 
    then login as guest (no password required).
    
    I. Background
    
    [Please label written or e-mailed comments about this section with 
    the subject: Background]
    
        In order to administer their programs, the Department of Health and 
    Human Services, other Federal agencies, State Medicaid agencies, 
    private health plans, health care providers, and health care 
    clearinghouses must assure their customers (such as patients, insured, 
    providers, and health care plans) that the confidentiality and privacy 
    of health care information they electronically collect, maintain, use, 
    or transmit is secure. Security of health information is especially 
    important when health information can be directly linked to an 
    individual.
        Confidentiality is threatened not only by the risk of improper 
    access to electronically stored information, but also by the risk of 
    interception during electronic transmission of the information.
        In addition to the need to ensure electronic health care 
    information is secure and confidential, there is a potential need to 
    associate signature capability with information being electronically 
    stored or transmitted. Today, there are numerous forms of electronic 
    signatures, ranging from biometric devices to digital signature. To 
    satisfy the legal and time-tested characteristics of a written 
    signature, however, an electronic signature must do the following:
         Identify the signatory individual,
         Assure the integrity of a document's content, and
         Provide for nonrepudiation; that is, strong and 
    substantial evidence that will make it difficult for the signer to 
    claim that the electronic representation is not valid. Currently, the 
    only technically mature electronic signature meeting the above criteria 
    is the digital signature. There is no national standard for security or 
    electronic signatures. Of necessity, each health care provider, health 
    care plan, and health care entity
    
    [[Page 43243]]
    
    has defined its own security requirements.
    
    A. Legislation
    
        The Congress included provisions to address the need for security 
    and electronic signature standards and other administrative 
    simplification issues in the Health Insurance Portability and 
    Accountability Act of 1996 (HIPAA), Public Law 104-191, which was 
    enacted on August 21, 1996. Through subtitle F of title II of that law, 
    the Congress added to title XI of the Social Security Act a new part C, 
    entitled ``Administrative Simplification.'' (Public Law 104-191 affects 
    several titles in the United States Code. Hereafter, we refer to the 
    Social Security Act as the Act; we refer to the other laws cited in 
    this document by their names.) The purpose of this part C is to improve 
    the Medicare and Medicaid programs, in particular, and the efficiency 
    and effectiveness of the health care system, in general, by encouraging 
    the development of a health information system through the 
    establishment of standards and requirements to facilitate the 
    electronic maintenance and transmission of certain health information.
        Part C of title XI of the Act consists of sections 1171 through 
    1179. These sections define various terms and impose several 
    requirements on HHS, health plans, health care clearinghouses, and 
    certain health care providers concerning electronic transmission of 
    health information.
        The first section, section 1171 of the Act, establishes definitions 
    for purposes of part C of title XI for the following terms: code set, 
    health care clearinghouse, health care provider, health information, 
    health plan, individually identifiable health information, standard, 
    and standard setting organization.
        Section 1172 of the Act makes any standard adopted under part C 
    applicable to: (1) Health plans, (2) health care clearinghouses, and 
    (3) health care providers that transmit any health information in 
    electronic form in connection with the transactions referred to in 
    section 1173(a)(1) of the Act. The security standard to be adopted 
    under Part C is not restricted to the transactions referred to in 
    section 1173(a)(1) of the Act, but is applicable to any health 
    information pertaining to an individual that is electronically 
    maintained or transmitted. This section also contains the following 
    requirements concerning standard setting:
         The Secretary may adopt a standard developed, adopted, or 
    modified by a standard setting organization (that is, an organization 
    accredited by the American National Standards Institute (ANSI)) that 
    has consulted with the National Uniform Billing Committee (NUBC), the 
    National Uniform Claim Committee (NUCC), Workgroup for Electronic Data 
    Interchange (WEDI), and the American Dental Association (ADA).
         The Secretary may also adopt a standard other than one 
    established by a standard setting organization, if the different 
    standard will reduce costs for health care providers and health plans, 
    the different standard is promulgated through negotiated rulemaking 
    procedures, and the Secretary consults with each of the above-named 
    groups.
         If no standard has been adopted by any standard setting 
    organization, the Secretary must rely on the recommendations of the 
    National Committee on Vital and Health Statistics (NCVHS) and consult 
    with each of the above-named groups.
        In complying with the requirements of part C of title XI, the 
    Secretary must rely on the recommendations of the NCVHS, consult with 
    appropriate State, Federal, and private agencies or organizations, and 
    publish the NCVHS recommendations in the Federal Register.
        Paragraph (a) of section 1173 of the Act requires that the 
    Secretary adopt standards for financial and administrative 
    transactions, and data elements for those transactions, to enable 
    health information to be exchanged electronically. Standards are 
    required for the following transactions: health claims, health 
    encounter information, health claims attachments, health plan 
    enrollments and disenrollments, health plan eligibility, health care 
    payment and remittance advice, health plan premium payments, first 
    report of injury, health claim status, and referral certification and 
    authorization. In addition, the Secretary is required to adopt 
    standards for any other financial and administrative transactions that 
    are determined to be appropriate by the Secretary.
        Paragraph (b) of section 1173 of the Act requires the Secretary to 
    adopt standards for unique health identifiers for all individuals, 
    employers, health plans, and health care providers and requires further 
    that the adopted standards specify for what purposes unique health 
    identifiers may be used.
        Paragraphs (c) through (f) of section 1173 of the Act require the 
    Secretary to establish standards for code sets for each data element 
    for each health care transaction listed above, security standards for 
    health care information systems, standards for electronic signatures 
    (established together with the Secretary of Commerce), and standards 
    for the transmission of data elements needed for the coordination of 
    benefits and sequential processing of claims. Compliance with 
    electronic signature standards will be deemed to satisfy both State and 
    Federal requirements for written signatures with respect to the 
    transactions listed in paragraph (a) of section 1173 of the Act.
        In section 1174 of the Act, the Secretary is required to establish 
    standards for all of the above transactions, except claims attachments, 
    by February 21, 1998. The standards for claims attachments must be 
    established by February 21, 1999. Generally, after a standard is 
    established, it cannot be changed during the first year after adoption 
    except for changes that are necessary to permit compliance with the 
    standard. Modifications to any of these standards may be made after the 
    first year, but not more frequently than once every 12 months. The 
    Secretary must also ensure that procedures exist for the routine 
    maintenance, testing, enhancement, and expansion of code sets and that 
    there are crosswalks from prior versions.
        Section 1175 of the Act prohibits health plans from refusing to 
    process or delaying the processing of a transaction that is presented 
    in standard format. The Act's requirements are not limited to health 
    plans; however, each person to whom a standard or implementation 
    specification applies is required to comply with the standard within 24 
    months (or 36 months for small health plans) of its adoption. A health 
    plan or other entity may, of course, comply voluntarily before the 
    effective date. A person may comply by using a health care 
    clearinghouse to transmit or receive the standard transactions. 
    Compliance with modifications to standards or implementation 
    specifications must be accomplished by a date designated by the 
    Secretary. This date may not be earlier than 180 days from the notice 
    of change.
        Section 1176 of the Act establishes a civil monetary penalty for 
    violation of the provisions in part C of title XI of the Act, subject 
    to several limitations. Penalties may not be more than $100 per person 
    per violation and not more than $25,000 per person for violations of a 
    single standard for a calendar year. The procedural provisions in 
    section 1128A of the Act, ``Civil Monetary Penalties,'' are applicable.
        Section 1177 of the Act establishes penalties for a knowing misuse 
    of unique health identifiers and individually identifiable health 
    information: (1) A fine of not more than $50,000 and/or imprisonment of 
    not
    
    [[Page 43244]]
    
    more than 1 year; (2) if misuse is ``under false pretenses,'' a fine of 
    not more than $100,000 and/or imprisonment of not more than 5 years; 
    and (3) if misuse is with intent to sell, transfer, or use individually 
    identifiable health information for commercial advantage, personal 
    gain, or malicious harm, a fine of not more than $250,000 and/or 
    imprisonment of not more than 10 years. Note that these penalties do 
    not affect any other penalties which may be imposed by other Federal 
    programs, including ERISA.
        Under section 1178 of the Act, the provisions of part C of title XI 
    of the Act, as well as any standards established under them, supersede 
    any State law that is contrary to them. However, the Secretary may, for 
    statutorily-specified reasons, waive this provision.
        Finally, section 1179 of the Act makes the above provisions 
    inapplicable to financial institutions or anyone acting on behalf of a 
    financial institution when ``authorizing, processing, clearing, 
    settling, billing, transferring, reconciling, or collecting payments 
    for a financial institution.''
    
        (Concerning this last provision, the conference report, in its 
    discussion on section 1178, states:
        ``The conferees do not intend to exclude the activities of 
    financial institutions or their contractors from compliance with the 
    standards adopted under this part if such activities would be 
    subject to this part. However, conferees intend that this part does 
    not apply to use or disclosure of information when an individual 
    utilizes a payment system to make a payment for, or related to, 
    health plan premiums or health care. For example, the exchange of 
    information between participants in a credit card system in 
    connection with processing a credit card payment for health care 
    would not be covered by this part. Similarly sending a checking 
    account statement to an account holder who uses a credit or debit 
    card to pay for health care services, would not be covered by this 
    part. However, this part does apply if a company clears health care 
    claims, the health care claims activities remain subject to the 
    requirements of this part.'') (H.R. Rep. No. 736, 104th Cong., 2nd 
    Sess. 268-269 (1996))
    
    B. Process for Developing National Standards
    
        The Secretary has formulated a five-part strategy for developing 
    and implementing the standards mandated under part C of title XI of the 
    Act:
        1. To ensure necessary interagency coordination and required 
    interaction with other Federal departments and the private sector, 
    establish interdepartmental implementation teams to identify and assess 
    potential standards for adoption. The subject matter of the teams 
    includes claims/encounters, identifiers, enrollment/eligibility, 
    systems security and electronic signature, and medical coding 
    classification. Another team addresses cross-cutting issues and 
    coordinates the subject matter teams. The teams consult with external 
    groups such as the NCVHS' Workgroup on Data Standards, WEDI, the ANSI's 
    Healthcare Informatics Standards Board (HISB), the NUCC, the NUBC, and 
    the ADA. The teams are charged with developing regulations and other 
    necessary documents and making recommendations for the various 
    standards to the HHS Data Council through its Committee on Health Data 
    Standards. (The HHS Data Council is the focal point for consideration 
    of data policy issues. It reports directly to the Secretary and advises 
    the Secretary on data standards and privacy issues.)
        2. Develop recommendations for standards to be adopted.
        3. Publish proposed rules in the Federal Register describing the 
    standards. Each proposed rule provides the public with a 60-day comment 
    period.
        4. Analyze public comments and publish the final rules in the 
    Federal Register.
        5. Distribute standards and coordinate preparation and distribution 
    of implementation guides.
        This strategy affords many opportunities for involvement of 
    interested and affected parties in standards development and adoption 
    by enabling them to:
         Participate with standards setting organizations.
         Provide written input to the NCVHS.
         Provide written input to the Secretary of HHS.
         Provide testimony at NCVHS'' public meetings.
         Comment on the proposed rules for each of the proposed 
    standards.
         Invite HHS staff to meetings with public and private 
    sector organizations or meet directly with senior HHS staff involved in 
    the implementation process.
        The implementation teams charged with reviewing standards for 
    designation as required national standards under the statute have 
    defined, with significant input from the health care industry, a set of 
    principles for guiding choices for the standards to be adopted by the 
    Secretary. These principles are based on direct specifications in 
    HIPAA, the purpose of the law, and generally desirable principles. To 
    be designated as an HIPAA standard, each standard should:
        1. Improve the efficiency and effectiveness of the health care 
    system by leading to cost reductions for or improvements in benefits 
    from electronic health care transactions.
        2. Meet the needs of the health data standards user community, 
    particularly health care providers, health plans, and health care 
    clearinghouses.
        3. Be consistent and uniform with the other HIPAA standards--their 
    data element definitions and codes and their privacy and security 
    requirements--and, secondarily, with other private and public sector 
    health data standards.
        4. Have low additional development and implementation costs 
    relative to the benefits of using the standard.
        5. Be supported by an ANSI-accredited standards developing 
    organization or other private or public organization that will ensure 
    continuity and efficient updating of the standard over time.
        6. Have timely development, testing, implementation, and updating 
    procedures to achieve administrative simplification benefits faster.
        7. Be technologically independent of the computer platforms and 
    transmission protocols used in electronic health transactions, except 
    when they are explicitly part of the standard.
        8. Be precise and unambiguous, but as simple as possible.
        9. Keep data collection and paperwork burdens on users as low as is 
    feasible.
        10. Incorporate flexibility to adapt more easily to changes in the 
    health care infrastructure (such as new services, organizations, and 
    provider types) and information technology.
        A master data dictionary providing for common data definitions 
    across the standards selected for implementation under HIPAA will be 
    developed and maintained. We intend for the data element definitions to 
    be precise, unambiguous, and consistently applied. The transaction-
    specific reports and general reports from the master data dictionary 
    will be readily available to the public. At a minimum, the information 
    presented will include data element names, definitions, and appropriate 
    references to the transactions where they are used.
        This proposed rule would establish the security standard and 
    electronic signature standard for health care information and 
    individually identifiable health care information maintained or 
    transmitted electronically. The remaining standards are grouped, to the 
    extent possible, by subject matter and audience in other regulations. 
    We anticipate publishing
    
    [[Page 43245]]
    
    several separate regulation documents to promulgate the remaining 
    standards required under HIPAA.
    
    II. Provisions of this Proposed Rule
    
    [Please label written comments or e-mailed comments about this 
    section with the subject: Introduction/Applicability]
    
        We propose to add a new part to title 45 of the Code of Federal 
    Regulations for health plans, health care providers, and health care 
    clearinghouses in general. The new part would be part 142 of title 45 
    and would be titled ``Administrative Requirements.'' Subpart A would 
    contain the general provisions for this part, including the general 
    definitions and general requirements for health plans. Subpart C would 
    contain provisions specific to securing health information used in any 
    electronic transmission or stored format.
        In this proposed rule, we propose a standard for security of health 
    information. This rule would establish that health plans, health care 
    clearinghouses, and health care providers must have the security 
    standard in place to comply with the statutory requirement that health 
    care information and individually identifiable health care information 
    be protected to ensure privacy and confidentiality when health 
    information is electronically stored, maintained, or transmitted. The 
    Congress mandated a separate standard for electronic signature, 
    therefore, this proposed security standard also addresses the selected 
    standard for electronic signature. The proposed security standard does 
    not require the use of an electronic signature, but specifies the 
    standard for an electronic signature that must be followed if such a 
    signature is used. If an entity elects to use an electronic signature, 
    it must comply with the electronic signature standard.
    
    A. Applicability
    
        With the exception of the security provisions, section 262 of HIPAA 
    applies to any health plan, any health care clearinghouse, and any 
    health care provider that transmits any health information in 
    electronic form in connection with transactions referred to in section 
    1173(a)(1) of the Act. The security provisions of section 262 of HIPAA 
    apply to any health plan, any health care clearinghouse, and any health 
    care provider that electronically maintains or transmits any health 
    information relating to an individual.
        Our proposed rules (at 45 CFR 142.102) would apply to the health 
    plans and health care clearinghouses as well, but we would clarify the 
    statutory language in our regulations for health care providers. With 
    the exception of the security regulation, we would have the regulations 
    apply to any health care provider only when electronically transmitting 
    any of the transactions to which section 1173(a)(1) of the Act refers.
        Electronic transmissions would include transactions using all 
    media, even when the information is physically moved from one location 
    to another using magnetic tape, disk, or compact disc (cd) media. 
    Transmissions over the Internet (wide-open), Extranet (using Internet 
    technology to link a business with information only accessible to 
    collaborating parties), leased lines, dial-up lines, and private 
    networks are all included. Telephone voice response and ``faxback'' (a 
    request for information made via voice using a fax machine and 
    requested information returned via that same machine as a fax) systems 
    would not be included. We solicit comments concerning any adverse 
    impact the above statement concerning voice response or faxback may 
    have upon the security of the health information in the commenter's 
    care.
        With the exception of the security regulation, our regulations 
    would apply to health care clearinghouses when transmitting 
    transactions to, and receiving transactions from, a health care 
    provider or health plan that transmits and receives standard 
    transactions (as defined under ``transaction'') and at all times when 
    transmitting to or receiving electronic transactions from another 
    health care clearinghouse. The security regulation would apply to 
    health care clearing houses electronically maintaining or transmitting 
    any health information pertaining to an individual.
        Entities that offer on-line interactive transmission must comply 
    with the standards. The Hypertext Markup Language (HTML) interaction 
    between a server and a browser by which the data elements of a 
    transaction are solicited from a user would not have to use the 
    standards (with the exception of the security standard), although the 
    data content must be equal to that required for the standard. Once the 
    data elements are assembled into a transaction by the server, the 
    transmitted transaction would have to comply with the standards.
        With the exception of the security portion, the law would apply to 
    each health care provider when transmitting or receiving any of the 
    specified electronic transactions. The security regulation would apply 
    to each health care provider electronically maintaining or transmitting 
    any health information pertaining to an individual.
        The law applies to health plans for all transactions. Section 
    142.104 would contain the following provisions (from section 1175 of 
    the Act):
        If a person desires to conduct a transaction (as defined in 
    Sec. 142.103) with a health plan as a standard transaction, the 
    following apply:
        (1) The health plan may not refuse to conduct the transaction as a 
    standard transaction.
        (2) The health plan may not delay the transaction or otherwise 
    adversely affect, or attempt to adversely affect, the person or the 
    transaction on the basis that the transaction is a standard 
    transaction.
        (3) The information transmitted and received in connection with the 
    transaction must be in the form of standard data elements of health 
    information.
        As a further requirement, we would provide that a health plan that 
    conducts transactions through an agent assure that the agent meets all 
    the requirements of part 142 that apply to the health plan.
        Section 142.105 would state that a person or other entity may meet 
    the transaction requirements of Sec. 142.104 by either--
        (1) Transmitting and receiving standard data elements, or
        (2) Submitting nonstandard data elements to a health care 
    clearinghouse for processing into standard data elements and 
    transmission by the health care clearinghouse and receiving standard 
    data elements through the clearinghouse.
        Health care clearinghouses would be able to accept nonstandard 
    transactions for the sole purpose of translating them into standard 
    transactions for sending customers and would be able to accept standard 
    transactions and translate them into nonstandard formats for receiving 
    customers. We would state in Sec. 142.105 that the transmission of 
    nonstandard transactions, under contract, between a health plan or a 
    health care provider and a health care clearinghouse would not violate 
    the law.
        With the exception of the security standard, transmissions within a 
    corporate entity would not be required to comply with the standards. A 
    hospital that is wholly owned by a managed care company would not have 
    to use the transaction standards to pass encounter information back to 
    the home office, but it would have to use the standard claims 
    transaction to submit a claim to another payer. Another example might 
    be transactions within Federal agencies and their contractors and 
    between State agencies within the same State. For example, Medicare 
    enters into contracts with insurance
    
    [[Page 43246]]
    
    companies and common working file sites that process Medicare claims 
    using government furnished software. There is constant communication, 
    on a private network, between HCFA Central Office and the Medicare 
    carriers, intermediaries, and common working file sites. This 
    communication may continue in nonstandard mode. However, these 
    contractors would be required to comply with the transaction standards 
    when exchanging any of the transactions covered by HIPAA with an entity 
    outside these ``corporate'' boundaries.
        The security standard is applicable to all health care information 
    electronically maintained or used in an electronic transmission, 
    regardless of format (standard transaction or a proprietary format); no 
    distinction is made between internal corporate entity communication or 
    communication external to the corporate entity.
        Although there are situations in which the use of the standards is 
    not required (for example, health care providers may continue to submit 
    paper claims and employers are not required to use any of the standard 
    transactions), we stress that a standard may be used voluntarily in any 
    situation in which it is not required.
        This proposed regulation would not mandate the use of electronic 
    signatures with any specific transaction at this time. Instead, the 
    regulation proposes that whenever an electronic signature is required 
    for an electronic transaction by law, regulation, or contract, the 
    signature must meet the standard established in the regulation at 
    Sec. 142.310. Use of this standard would satisfy any Federal or State 
    requirement for a signature, either electronic or on paper.
        We note that the ANSI X12N standards for individual transactions 
    which have been proposed for adoption as national standards in a 
    separate proposed rule do not require the use of electronic signatures. 
    Standards for additional transactions that the Secretary may propose 
    for adoption in the future, including one for claims attachments, may 
    contain such requirements. We solicit comments on whether electronic 
    signatures should be required for any specific transactions or under 
    specific circumstances and what effect such requirements would have on 
    electronic health care transactions.
        We also note that the NCVHS is required by HIPAA to report to the 
    Secretary recommendations and legislative proposals for uniform data 
    standards for patient medical record information and the electronic 
    exchange of such information, with the implication that HHS should rely 
    on such recommendations to adopt such standards or propose the passage 
    of such legislation by the Congress. We solicit comments on whether the 
    standard proposed below for electronic signatures would be appropriate 
    for consideration as part of such standards.
    
    B. Definitions
    
    [Please label written or e-mailed comments about this section with 
    the subject: Definitions]
    
        Section 1171 of the Act defines several terms and our proposed 
    rules would, for the most part, simply restate the law. The terms that 
    we are defining in this proposed rule follow:
    1. Code Set
        We would define ``code set'' as section 1171(1) of the Act does: 
    ``code set'' means any set of codes used for encoding data elements, 
    such as tables of terms, medical concepts, medical diagnostic codes, or 
    medical procedure codes.
    2. Health Care Clearinghouse
        We would define ``health care clearinghouse'' as section 1171(2) of 
    the Act does, but we are adding a further, clarifying sentence. The 
    statute defines a ``health care clearinghouse'' as a public or private 
    entity that processes or facilitates the processing of nonstandard data 
    elements of health information into standard data elements. We would 
    further explain that such an entity is one that currently receives 
    health care transactions from health care providers or other entities, 
    translates the data from a given format into one acceptable to the 
    intended recipient and forwards the processed transaction to 
    appropriate payers and clearinghouses, as necessary, for further 
    action.
        There are currently a number of private clearinghouses that perform 
    this function for health care providers. For purposes of this rule, we 
    would consider billing services, repricing companies, community health 
    management information systems or community health information systems, 
    value-added networks, and switches that perform this function to be 
    health care clearinghouses.
    3. Health Care Provider
        As defined by section 1171(3) of the Act, a ``health care 
    provider'' is a provider of services as defined in section 1861(u) of 
    the Act, a provider of medical or other health services as defined in 
    section 1861(s) of the Act, and any other person who furnishes health 
    care services or supplies. Our regulations would define ``health care 
    provider'' as the statute does and clarify that the definition of a 
    health care provider is limited to those entities that furnish, or bill 
    and are paid for, health care services in the normal course of 
    business.
        For a more detailed discussion of the definition of health care 
    provider, we refer the reader to our proposed rule, HCFA-0045-P, 
    Standard Health Care Provider, 63 FR 25320, published May 7, 1998.
    4. Health Information
        ``Health information,'' as defined in section 1171 of the Act, 
    means any information, whether oral or recorded in any form or medium, 
    that--
         Is created or received by a health care provider, health 
    plan, public health authority, employer, life insurer, school or 
    university, or health care clearinghouse; and
         Relates to the past, present, or future physical or mental 
    health or condition of an individual; the provision of health care to 
    an individual; or the past, present, or future payment for the 
    provision of health care to an individual.
        We propose the same definition for our regulations.
    5. Health Plan
        We propose that a ``health plan'' be defined essentially as section 
    1171 of the Act defines it. Section 1171 of the Act cross refers to 
    definitions in section 2791 of the Public Health Service Act (as added 
    by Public Law 104-191, 42 U.S.C. 300gg-91); we would incorporate those 
    definitions as currently stated into our proposed definitions for the 
    convenience of the public. We note that the term ``health plan'' is 
    also defined in other statutes, such as the Employee Retirement Income 
    Security Act of 1974 (ERISA). Our definitions are based on the roles of 
    plans in conducting administrative transactions, and any differences 
    should not be construed to affect other statutes.
        For purposes of implementing the provisions of administrative 
    simplification, a ``health plan'' would be an individual or group 
    health plan that provides, or pays the cost of, medical care. This 
    definition includes, but is not limited to, the 13 types of plans 
    listed in the statute. On the other hand, plans such as property and 
    casualty insurance plans and workers compensation plans, which may pay 
    health care costs in the course of administering nonhealth care 
    benefits, are not considered to be health plans in the proposed 
    definition of health plan. Of course, these plans may voluntarily adopt 
    these standards for their own business needs. At some
    
    [[Page 43247]]
    
    future time, the Congress may choose to expressly include some or all 
    of these plans in the list of health plans that must comply with the 
    standards.
        Health plans often carry out their business functions through 
    agents, such as plan administrators (including third party 
    administrators), entities that are under ``administrative services 
    only'' (ASO) contracts, claims processors, and fiscal agents. These 
    agents may or may not be health plans in their own right; for example, 
    a health plan acting as another health plan's agent as another line of 
    business. As stated earlier, a health plan that conducts HIPAA 
    transactions through an agent is required to assure that the agent 
    meets all HIPAA requirements that apply to the plan itself.
        ``Health plan'' includes the following, singly or in combination:
        a. ``Group health plan'' (as currently defined by section 2791(a) 
    of the Public Health Service Act). A group health plan is a plan that 
    has 50 or more participants (as the term ``participant'' is currently 
    defined by section 3(7) of ERISA) or is administered by an entity other 
    than the employer that established and maintains the plan. This 
    definition includes both insured and self-insured plans. We define 
    ``participant'' separately below.
        Section 2791(a)(1) of the Public Health Service Act defines ``group 
    health plan'' as an employee welfare benefit plan (as defined in 
    current section 3(1) of ERISA) to the extent that the plan provides 
    medical care, including items and services paid for as medical care, to 
    employees or their dependents directly or through insurance, or 
    otherwise.
        b. ``Health insurance issuer'' (as currently defined by section 
    2791(b) of the Public Health Service Act).
        Section 2791(b) of the Public Health Service Act currently defines 
    a ``health insurance issuer'' as an insurance company, insurance 
    service, or insurance organization that is licensed to engage in the 
    business of insurance in a State and is subject to State law that 
    regulates insurance.
        c. ``Health maintenance organization'' (as currently defined by 
    section 2791(b) of the Public Health Service Act).
        Section 2791(b) of the Public Health Service Act currently defines 
    a ``health maintenance organization'' as a Federally qualified health 
    maintenance organization, an organization recognized as such under 
    State law, or a similar organization regulated for solvency under State 
    law in the same manner and to the same extent as such a health 
    maintenance organization. These organizations may include preferred 
    provider organizations, provider sponsored organizations, independent 
    practice associations, competitive medical plans, exclusive provider 
    organizations, and foundations for medical care.
        d. Part A or Part B of the Medicare program (title XVIII of the 
    Act).
        e. The Medicaid program (title XIX of the Act).
        f. A ``Medicare supplemental policy'' as defined under section 
    1882(g)(1) of the Act.
        Section 1882(g)(1) of the Act defines a ``Medicare supplemental 
    policy'' as a health insurance policy that a private entity offers a 
    Medicare beneficiary to provide payment for expenses incurred for 
    services and items that are not reimbursed by Medicare because of 
    deductible, coinsurance, or other limitations under Medicare. The 
    statutory definition of a Medicare supplemental policy excludes a 
    number of plans that are generally considered to be Medicare 
    supplemental plans, such as health plans for employees and former 
    employees and for members and former members of trade associations and 
    unions. A number of these health plans may be included under the 
    definitions of ``group health plan'' or ``health insurance issuer'', as 
    defined in paragraphs a. and b. above.
        g. A ``long-term care policy,'' including a nursing home fixed-
    indemnity policy. A ``long-term care policy'' is considered to be a 
    health plan regardless of how comprehensive it is. We recognize the 
    long-term care insurance segment of the industry is largely unautomated 
    and we welcome comments regarding the impact of HIPAA on the long-term 
    care segment.
        h. An employee welfare benefit plan or any other arrangement that 
    is established or maintained for the purpose of offering or providing 
    health benefits to the employees of two or more employers. This 
    includes plans that are referred to as multiple employer welfare 
    arrangements (``MEWAs'').
        i. The health care program for active military personnel under 
    title 10 of the United States Code.
        j. The veterans health care program under chapter 17 of title 38 of 
    the United States Code.
        This health plan primarily furnishes medical care through hospitals 
    and clinics administered by the Department of Veterans Affairs for 
    veterans with a service-connected disability that is compensable. 
    Veterans with nonservice-connected disabilities (and no other health 
    benefit plan) may receive health care under this health plan to the 
    extent resources and facilities are available.
        k. The Civilian Health and Medical Program of the Uniformed 
    Services (CHAMPUS), as defined in 10 U.S.C. 1072(4).
        CHAMPUS primarily covers services furnished by civilian medical 
    providers to dependents of active duty members of the uniformed 
    services and retirees and their dependents under age 65.
        l. The Indian Health Service program under the Indian Health Care 
    Improvement Act (25 U.S.C. 1601 et seq.).
        This program furnishes services, generally through its own health 
    care providers, primarily to persons who are eligible to receive 
    services because they are of American Indian or Alaskan Native descent.
        m. The Federal Employees Health Benefits Program under 5 U.S.C. 
    chapter 89.
        This program consists of health insurance plans offered to active 
    and retired Federal employees and their dependents. Depending on the 
    health plan, the services may be furnished on a fee-for-service basis 
    or through a health maintenance organization.
    
        (Note: Although section 1171(5)(M) of the Act refers to the 
    ``Federal Employees Health Benefit Plan,'' this and any other rules 
    adopting administrative simplification standards will use the 
    correct name, the Federal Employees Health Benefits Program. One 
    health plan does not cover all Federal employees; there are over 350 
    health plans that provide health benefits coverage to Federal 
    employees, retirees, and their eligible family members. Therefore, 
    we will use the correct name, the Federal Employees Health Benefits 
    Program, to make clear that the administrative simplification 
    standards apply to all health plans that participate in the 
    Program.)
    
        n. Any other individual or group health plan, or combination 
    thereof, that provides or pays for the cost of medical care.
        We would include a fourteenth category of health plan in addition 
    to those specifically named in HIPAA, as there are health plans that do 
    not readily fit into the other categories but whose major purpose is 
    providing health benefits. The Secretary would determine which of these 
    plans are health plans for purposes of title II of HIPAA. This category 
    would include the Medicare Plus Choice plans that will become available 
    as a result of section 1855 of the Act as amended by section 4001 of 
    the Balanced Budget Act of 1997 (Public Law 105-33) to the extent that 
    these health plans do not fall under any other category.
    
    [[Page 43248]]
    
    6. Small Health Plan
        We would define a ``small health plan'' as a group health plan with 
    fewer than 50 participants.
        The HIPAA does not define a ``small health plan'' but instead 
    leaves the definition to be determined by the Secretary. The Conference 
    Report suggests that the appropriate definition of a ``small health 
    plan'' is found in current section 2791(a) of the Public Health Service 
    Act, which is a group health plan with fewer than 50 participants. We 
    would also define small individual health plans as those with fewer 
    than 50 participants.
    7. Individually Identifiable Health Information
        Section 1171(6) states the term ``individually identifiable health 
    information'' means any information, including demographic information 
    collected from an individual, that--
        a. Is created or received by a health care provider, health plan, 
    employer, or health care clearinghouse; and
        b. Relates to the past, present or future physical or mental health 
    or condition of an individual, the provision of health care to an 
    individual, or the past, present, or future payment for the provision 
    of health care to an individual, and
        (i) Identifies the individual, or
        (ii) With respect to which there is a reasonable basis to believe 
    that the information can be used to identify the individual.
    8. Standard
        Section 1171 of the Act defines ``standard,'' when used with 
    reference to a data element of health information or a transaction 
    referred to in section 1173(a)(1) of the Act, as any such data element 
    or transaction that meets each of the standards and implementation 
    specifications adopted or established by the Secretary with respect to 
    the data element or transaction under sections 1172 through 1174 of the 
    Act.
        Under our definition, the security standard would be a set of 
    requirements adopted or established to preserve and maintain the 
    confidentiality and privacy of electronically stored, maintained, or 
    transmitted health information promulgated either by an organization 
    accredited by the ANSI or HHS.
    9. Transaction
        ``Transaction'' would mean the exchange of information between two 
    parties to carry out financial and administrative activities related to 
    health care. A transaction would be (a) any of the transactions listed 
    in section 1173(a)(2) of the Act, and (b) any determined appropriate by 
    the Secretary in accordance with section 1173(a)(1)(B) of the Act. We 
    present them below in the order in which we propose to list them in the 
    regulations text.
        A ``transaction'' would mean any of the following:
        a. Health claims or equivalent encounter information. This 
    transaction may be used to submit health care claim billing 
    information, encounter information, or both, from health care providers 
    to payers, either directly or via intermediary billers and claims 
    clearinghouses.
        b. Health care payment and remittance advice. This transaction may 
    be used by a health plan to make a payment to a financial institution 
    for a health care provider (sending payment only), to send an 
    explanation of benefits remittance advice directly to a health care 
    provider (sending data only), or to make payment and send an 
    explanation of benefits remittance advice to a health care provider via 
    a financial institution (sending both payment and data).
        c. Coordination of benefits. This transaction set can be used to 
    transmit health care claims and billing payment information between 
    payers with different payment responsibilities where coordination of 
    benefits is required or between payers and regulatory agencies to 
    monitor the furnishing, billing, and/or payment of health care services 
    within a specific health care/insurance industry segment.
        In addition to the nine electronic transactions specified in 
    section 1173(a)(2) of the Act, section 1173(f) directs the Secretary to 
    adopt standards for transferring standard data elements among health 
    plans for coordination of benefits. This particular provision does not 
    state that these should be standards for electronic transfer of 
    standard data elements among health plans. However, we believe that the 
    Congress, when writing this provision, intended for these standards to 
    be an electronic form of transactions for coordination of benefits and 
    sequential processing of claims. The Congress expressed its intent on 
    these matters generally in section 1173(a)(1)(B) of the Act, where the 
    Secretary is directed to adopt ``other financial and administrative 
    transactions * * * consistent with the goals of improving the operation 
    of the health care system and reducing administrative costs.''
        d. Health claim status. This transaction may be used by health care 
    providers and recipients of health care products or services (or their 
    authorized agents) to request the status of a health care claim or 
    encounter from a health plan.
        e. Enrollment and disenrollment in a health plan. This transaction 
    may be used to establish communication between the sponsor of a health 
    benefit and the payer. It provides enrollment data, such as subscriber 
    and dependents, employer information, and primary care health care 
    provider information. A sponsor is the backer of the coverage, benefit, 
    or product. A sponsor can be an employer, union, government agency, 
    association, or insurance company. The health plan refers to an entity 
    that pays claims, administers the insurance product or benefit, or 
    both.
        f. Eligibility for a health plan. This transaction may be used to 
    inquire about the eligibility, coverage, or benefits associated with a 
    benefit plan, employer, plan sponsor, subscriber, or a dependent under 
    the subscriber's policy. It also can be used to communicate information 
    about or changes to eligibility, coverage, or benefits from information 
    sources (such as insurers, sponsors, and payers) to information 
    receivers (such as physicians, hospitals, third party administrators, 
    and government agencies).
        g. Health plan premium payments. This transaction may be used by, 
    for example, employers, employees, unions, and associations to make and 
    keep track of payments of health plan premiums to their health 
    insurers. This transaction may also be used by a health care provider, 
    acting as liaison for the beneficiary, to make payment to a health 
    insurer for coinsurance, copayments, and deductibles.
        h. Referral certification and authorization. This transaction may 
    be used to transmit health care service referral information between 
    health care providers, health care providers furnishing services, and 
    payers. It can also be used to obtain authorization for certain health 
    care services from a health plan.
        i. First report of injury. This transaction may be used to report 
    information pertaining to an injury, illness, or incident to entities 
    interested in the information for statistical, legal, claims, and risk 
    management processing requirements.
        j. Health claims attachments. This transaction may be used to 
    transmit health care service information, such as subscriber, patient, 
    demographic, diagnosis, or treatment data for the purpose of a request 
    for review, certification, notification, or reporting the outcome of a 
    health care services review.
        k. Other transactions as the Secretary may prescribe by regulation.
    
    [[Page 43249]]
    
        Under section 1173(a)(1)(B) of the Act, the Secretary may adopt 
    standards, and data elements for those standards, and for other 
    financial and administrative transactions deemed appropriate by the 
    Secretary. These transactions would be consistent with the goals of 
    improving the operation of the health care system and reducing 
    administrative costs.
    
    C. Effective Dates--General
    
    [Please label written comments or e-mailed comments about this 
    section with the subject: effective dates]
    
        In general, any given standard would be effective 24 months after 
    the effective date (36 months for small health plans) of the final rule 
    for that standard. Because there are other standards to be established 
    than those in this proposed rule, we specify the date for a given 
    standard under the subpart for that standard.
        Health plans would be required by part 142 to comply with our 
    requirements as follows:
        1. Each health plan that is not a small plan would have to comply 
    with the requirements of part 142 no later than 24 months after the 
    effective date of the final rule.
        2. Each small health plan would have to comply with the 
    requirements of part 142 no later than 36 months after the effective 
    date of the final rule.
        Health care providers and health care clearinghouses would be 
    required to begin using the standard by 24 months after the effective 
    date of the final rule.
    
    (The effective date of the final rule will be 60 days after the final 
    rule is published in the Federal Register.)
        Provisions of trading partner agreements that stipulate data 
    content, format definitions, or conditions that conflict with the 
    adopted standard would be invalid beginning 36 months from the 
    effective date of the final rule for small health plans, and 24 months 
    from the effective date of the final rule for all other health plans.
        If the HHS adopts a modification to an implementation specification 
    or a standard, the implementation date of the modification would be no 
    earlier than the 180th day following the adoption of the modification. 
    HHS would determine the actual date, taking into account the time 
    needed to comply due to the nature and extent of the modification. HHS 
    would be able to extend the time for compliance for small health plans. 
    This provision would be at Sec. 142.106.
        Any of the health plans, health care clearinghouses, and health 
    care providers may implement a given standard earlier than the date 
    specified in the subpart created for that standard. We realize that 
    this may create some problems temporarily, as early implementers would 
    have to be able to continue using old standards until the new one must, 
    by law, be in place.
    
    D. Security Standard
    
    [Please label written comments or e-mailed comments about this 
    section with the subject: Security Standard--General]
    
        Section 142.308 would set forth the security standard. There is no 
    recognized single standard that integrates all the components of 
    security (administrative procedures, physical safeguards, technical 
    security services, and technical mechanisms) that must be in place to 
    preserve health information confidentiality and privacy as defined in 
    the law. Therefore, we are designating a new, comprehensive standard, 
    which defines the security requirements to be fulfilled.
        In fact, there are numerous security guidelines and standards in 
    existence today, focusing on the different techniques available for 
    implementing the various aspects of security. We thoroughly researched 
    the existing guidelines and standards, and consulted extensively with 
    the organizations that developed them. A list of the organizations with 
    which we consulted can be found in section G. below. As a result of 
    these consultations and our research, we identified several high-level 
    concepts on which the standard is based:
         The standard must be comprehensive.
         Consultation with standards development organizations, 
    such as ANSI-accredited organizations, as well as business interest 
    organizations, revealed the need for a standard that addressed all 
    aspects of security in a concerted fashion. The HISB noted in its 
    report to the Secretary that:
        ``Comprehensive adoption of security standards in health care, not 
    piecemeal implementation, is advocated to provide security to data that 
    is exchanged between health care entities.
        By definition, if a system or communications between two systems, 
    were implemented with technology(s) meeting standards in a general 
    system security framework (Identification and Authentication; 
    Authorization and Access Control; Accountability; Integrity and 
    Availability; Security of Communication; and Security Administration.) 
    that system would be essentially secure.
        * * * no single standards development organization (SDO) is 
    addressing all aspects of health care information security and 
    confidentiality, and specifically, no single SDO is developing 
    standards that cover every category of the security framework.'' [Page 
    189]
         The standard must be technology-neutral.
        Our proposed standard does not reference or advocate specific 
    technology because security technology is changing quickly. We want to 
    give providers/plans/clearinghouses flexibility to choose their own 
    technical solutions. A standard that is dependent on a specific 
    technology or technologies would not be flexible enough to use future 
    advances.
         The standard must be scalable.
        The standard must be able to be implemented by all the affected 
    entities, from the smallest provider to the largest clearinghouse. A 
    single approach would be neither economically feasible nor effective in 
    safeguarding health data. For example, in a small physician practice, a 
    contingency plan for system emergencies might be only a few pages long, 
    and cover issues such as where backup diskettes must be stored, and the 
    location of a backup personal computer (PC). At a large health plan, 
    the contingency plan might consist of multiple volumes and cover issues 
    such as remote hot site operations and secure off-site storage of 
    electronic media. The physician office solution would not protect the 
    large plan's data, and the plan's solution would not be economically 
    feasible (or necessary) for the physician office. Moreover, the statute 
    specifically directed the Secretary to take into account the needs and 
    capabilities of small and rural health care providers, as those terms 
    are defined by the Secretary. The scalability of our approach addresses 
    this direction. We are not proposing specific definitions of ``small'' 
    and ``rural'' health care providers because the statute provides no 
    exemptions or special benefits for these two groups. However, we 
    solicit comments on the necessity to define these terms.
    General Approach
        We would define the security standard as a set of requirements with 
    implementation features that providers, plans, and clearinghouses must 
    include in their operations to assure that electronic health 
    information pertaining to an individual remains secure. The 
    implementation features address specific aspects of the requirements. 
    The standard does not reference or advocate specific technology. This 
    would allow the security standard to be stable, yet flexible enough to 
    take advantage of state-of-the-art technology.
    
    [[Page 43250]]
    
    The standard does not address the extent to which a particular entity 
    should implement the specific features. Instead, we would require that 
    each affected entity assess its own security needs and risks and 
    devise, implement, and maintain appropriate security to address its 
    business requirements. How individual security requirements would be 
    satisfied and which technology to use would be business decisions that 
    each organization would have to make.
        The recommendations contained in the National Research Council's 
    1997 report For The Record: Protecting Electronic Health Information 
    support our approach to the development of a security standard. This 
    report presents findings and recommendations related to health data 
    security, and is widely viewed as an authoritative and comprehensive 
    source on the subject. The report concludes that appropriate security 
    practices are highly dependent on individual circumstances, but goes on 
    to suggest that:
    
        ``It is therefore not possible to prescribe in detail specific 
    practices for all organizations; rather, each organization must 
    analyze its systems, vulnerabilities, risks, and resources to 
    determine optimal security measures. Nevertheless, the committee 
    believes that a set of practices can be articulated in a 
    sufficiently general way that they can be adopted by all health care 
    organizations in one form or another.'' (Page 168)
    
        The specific requirements and supporting implementation features 
    detailed in the next section represent this general set of practices. 
    Many health care entities have already implemented some or all of these 
    practices. We believe they represent those practices that are necessary 
    in order to conduct business electronically in the health care industry 
    today and, therefore, are normal business costs.
        Inherent in this approach is a balance between the need to secure 
    health data against risk and the economic cost of doing so. Health care 
    entities must consider both aspects in devising their security 
    solutions.
    Specific Requirements
        The proposed standard requires that each health care entity engaged 
    in electronic maintenance or transmission of health information assess 
    potential risks and vulnerabilities to the individual health data in 
    its possession in electronic form, and develop, implement, and maintain 
    appropriate security measures. Most importantly, these measures must be 
    documented and kept current.
        The proposed security standard consists of the requirements that a 
    health care entity must address in order to safeguard the integrity, 
    confidentiality, and availability of its electronic data. It also 
    describes the implementation features that must be present in order to 
    satisfy each requirement. The proposed requirements and implementation 
    features were developed by the implementation team based on knowledge 
    of security procedures and existing standards and guidelines described 
    above. This was an iterative process that involved extensive outreach 
    with a number of health care industry and Department of Commerce 
    security experts. We also drew upon Recommendations 1 and 3 in the 
    National Research Council's 1997 report, For The Record, that were 
    recommended for immediate implementation.
        ``Recommendation 1: All organizations that handle patient-
    identifiable health care information--regardless of size--should adopt 
    the set of technical and organizational policies, practices, and 
    procedures described below to protect such information.''
        The proposed security standard addresses the following policies, 
    practices, and procedures that were listed under Recommendation 1:
    
     Organizational Practices
        1. Security and confidentiality policies
        2. Information security officers
        3. Education and training programs, and
        4. Sanctions
     Technical Practices and Procedures
        1. Individual authentication of users
        2. Access controls
        3. Audit trails
        4. Physical security and disaster recovery
        5. Protection of remote access points
        6. Protection of external electronic communications
        7. Software discipline, and
        8. System assessment
    
        ``Recommendation 3: The federal government should work with 
    industry to promote and encourage an informed public debate to 
    determine an appropriate balance between the primary concerns of 
    patients and the information needs of various users of health care 
    information.''
        This proposed security standard was developed in the spirit of 
    Recommendation 3. The security standard development process has been an 
    open one with invitations to a number of organizations to participate 
    in the security discussions. Although implementation team membership 
    was limited to government employees, nongovernmental organizations; 
    business organizations; individuals knowledgeable in security; and 
    educational institutions have been encouraged to express their views.
        As a result of the collaborative security regulation development 
    process, the implementation team has chosen to divide the proposed 
    security requirements, for purposes of presentation only, into the 
    following four categories:
         Administrative procedures to guard data integrity, 
    confidentiality, and availability--these are documented, formal 
    practices to manage the selection and execution of security measures to 
    protect data and the conduct of personnel in relation to the protection 
    of data.
         Physical safeguards to guard data integrity, 
    confidentiality, and availability--these relate to the protection of 
    physical computer systems and related buildings and equipment from fire 
    and other natural and environmental hazards, as well as from intrusion. 
    Physical safeguards also cover the use of locks, keys, and 
    administrative measures used to control access to computer systems and 
    facilities.
         Technical security services to guard data integrity, 
    confidentiality, and availability--these include the processes that are 
    put in place to protect and to control and monitor information access, 
    and
         Technical security mechanisms--these include the processes 
    that are put in place to prevent unauthorized access to data that is 
    transmitted over a communications network.
        It should be noted that the only necessity is that the requirements 
    would be met, not that they be presented in these four categories. 
    Under this proposed rule, a business entity could choose to order the 
    requirements in any manner that suits its business.
        We then determined the requirements and implementation features 
    that health plans, providers, and clearinghouses would implement. The 
    implementation features describe the requirements in greater detail. 
    Some requirements do not require this additional level of detail. 
    Within the four categories, the requirements and implementation 
    features are presented in alphabetical order to ensure that no one item 
    is considered to be more important than another. The relative 
    importance of the requirements and implementation features would depend 
    on the characteristics of each organization.
        The four categories of the matrix are described in greater detail 
    in Sec. 142.308 and are depicted in tabular form along with the 
    electronic signature standard in
    
    [[Page 43251]]
    
    a combined matrix located at Addendum 1. We have not included the 
    matrix in the proposed regulation text. We invite your comments 
    concerning the appropriateness and usefulness of including the matrix 
    in the final regulation text. We also solicit comments as to the level 
    of detail expressed in requirement implementation features; i.e., do 
    any represent a level of detail that goes beyond what is necessary or 
    appropriate. We have also provided a glossary of terms to facilitate a 
    common understanding of the matrix entries. The glossary can be found 
    at Addendum 2. Finally, we have included currently existing standards 
    and guidelines mapped to the proposed security standard. This mapping 
    is not all inclusive and is located at Addendum 3.
    1. Administrative Procedures
    [Please label written comments or e-mailed comments about this 
    section with the subject: administrative procedures]
    
        In this proposed rule, the administrative requirements and 
    supporting implementation features are presented at Sec. 142.308(a). We 
    would require each to be documented. We would require the documentation 
    to be made available to those individuals responsible for implementing 
    the procedures and would require it to be reviewed and updated 
    periodically. The following matrix depicts the requirements and 
    supporting implementation features for the Administrative Procedures 
    category. Following the matrix is a discussion of each of the 
    requirements under that category.
    
     Administrative Procedures To Guard Data Integrity, Confidentiality, and
                                  Availability                              
    ------------------------------------------------------------------------
                  Requirement                         Implementation        
    ------------------------------------------------------------------------
    Certification                                                           
    Chain of trust partner agreement                                        
    Contingency plan (all listed             Applications and data          
     implementation features must be          criticality analysis.         
     implemented).                           Data backup plan.              
                                             Disaster recovery plan.        
                                             Emergency mode operation plan. 
                                             Testing and revision.          
    Formal mechanism for processing records                                 
    Information access control (all listed   Access authorization.          
     implementation features must be         Access establishment.          
     implemented).                           Access modification.           
    Internal audit                                                          
    Personnel security (all listed           Assure supervision of          
     implementation features must be          maintenance personnel by      
     implemented).                            authorized, knowledgeable     
                                              person.                       
                                             Maintenance of record of access
                                              authorizations.               
                                             Operating, and in some cases,  
                                              maintenance personnel have    
                                              proper access authorization.  
                                             Personnel clearance procedure. 
                                             Personnel security policy/     
                                              procedure.                    
                                             System users, including        
                                              maintenance personnel, trained
                                              in security.                  
    Security configuration mgmt. (all        Documentation.                 
     listed implementation features must be  Hardware/software installation 
     implemented).                            & maintenance review and      
                                              testing for security features.
                                             Inventory.                     
                                             Security Testing.              
                                             Virus checking.                
    Security incident procedures (all        Report procedures.             
     listed implementation features must be  Response procedures.           
     implemented).                                                          
    Security management process (all listed  Risk analysis.                 
     implementation features must be         Risk management.               
     implemented).                           Sanction policy.               
                                             Security policy.               
    Termination procedures (all listed       Combination locks changed.     
     implementation features must be         Removal from access lists.     
     implemented).                           Removal of user account(s).    
                                             Turn in keys, token or cards   
                                              that allow access.            
    Training (all listed implementation      Awareness training for all     
     features must be implemented).           personnel (including mgmt)    
                                             Periodic security reminders.   
                                             User education concerning virus
                                              protection.                   
                                             User education in importance of
                                              monitoring log in success/    
                                              failure, and how to report    
                                              discrepancies.                
                                             User education in password     
                                              management                    
    ------------------------------------------------------------------------
    
        a. Certification. Each organization would be required to evaluate 
    its computer system(s) or network design(s) to certify that the 
    appropriate security has been implemented. This evaluation could be 
    performed internally or by an external accrediting agency.
        We are, at this time, soliciting input on appropriate mechanisms to 
    permit independent assessment of compliance. We would be particularly 
    interested in input from those engaging in health care electronic data 
    interchange (EDI), as well as independent certification and auditing 
    organizations addressing issues of documentary evidence of steps taken 
    for compliance; need for, or desirability of, independent verification, 
    validation, and testing of system changes; and certifications required 
    for off-the-shelf products used to meet the requirements of this 
    regulation.
    
    [[Page 43252]]
    
        We also solicit comments on the extent to which obtaining external 
    certification would create an undue burden on small or rural providers.
        b. Chain of Trust Partner Agreement. If data are processed through 
    a third party, the parties would be required to enter into a chain of 
    trust partner agreement. This is a contract in which the parties agree 
    to electronically exchange data and to protect the transmitted data. 
    The sender and receiver are required and depend upon each other to 
    maintain the integrity and confidentiality of the transmitted 
    information. Multiple two-party contracts may be involved in moving 
    information from the originating party to the ultimate receiving party. 
    For example, a provider may contract with a clearinghouse to transmit 
    claims to the clearinghouse; the clearinghouse, in turn, may contract 
    with another clearinghouse or with a payer for the further transmittal 
    of those claims. These agreements are important so that the same level 
    of security will be maintained at all links in the chain when 
    information moves from one organization to another.
        c. Contingency Plan. We would require a contingency plan to be in 
    effect for responding to system emergencies. The organization would be 
    required to perform periodic backups of data, have available critical 
    facilities for continuing operations in the event of an emergency, and 
    have disaster recovery procedures in place. To satisfy the requirement, 
    the plan would include the following:
         Applications and data criticality analysis,
         A data backup plan,
         A disaster recovery plan,
         An emergency mode operation plan, and
         Testing and revision procedures.
        d. Formal Mechanism for Processing Records There would be a formal 
    mechanism for processing records, that is, documented policies and 
    procedures for the routine and nonroutine receipt, manipulation, 
    storage, dissemination, transmission, and/or disposal of health 
    information. This is important to limit the inadvertent loss or 
    disclosure of secure information because of process issues.
        e. Information Access Control. An entity would be required to 
    establish and maintain formal, documented policies and procedures for 
    granting different levels of access to health care information. To 
    satisfy this requirement, the following features would be provided:
         Access authorization policies and procedures.
         Access establishment policies and procedures.
         Access modification policies and procedures.
        Access control is also discussed later in this document in the 
    personnel security requirement and under the physical safeguards, 
    technical security services, and technical security mechanisms 
    categories.
        f. Internal Audit. There would be a requirement for an ongoing 
    internal audit process, which is the in-house review of the records of 
    system activity (for example, logins, file accesses, security 
    incidents) maintained by an entity. This is important to enable the 
    organization to identify potential security violations.
        g. Personnel Security. There would be a requirement that all 
    personnel with access to health information must be authorized to do so 
    after receiving appropriate clearances. This is important to prevent 
    unnecessary or inadvertent access to secure information. The personnel 
    security requirement would require entities to meet the following 
    conditions:
         Assure supervision of personnel performing technical 
    systems maintenance activities by authorized, knowledgeable persons.
         Maintain access authorization records.
         Insure that operating, and in some cases, maintenance 
    personnel have proper access.
         Employ personnel clearance procedures
         Employ personnel security policy/procedures.
         Ensure that system users, including technical maintenance 
    personnel are trained in system security.
        h. Security Configuration Management. The organization would be 
    required to implement measures, practices, and procedures for the 
    security of information systems. These would be coordinated and 
    integrated with other system configuration management practices in 
    order to create and manage system integrity. This integration process 
    is important to ensure that routine changes to system hardware and/or 
    software do not contribute to or create security weaknesses. This 
    requirement would include the following:
         Documentation.
         Hardware/software installation and maintenance review and 
    testing for security features.
         Inventory procedures.
         Security testing.
         Virus checking.
        i. Security Incident Procedures. There would be a requirement to 
    implement accurate and current security incident procedures. These are 
    formal, documented instructions for reporting security breaches, so 
    that security violations are reported and handled promptly. These 
    instructions would include the following:
         Report procedures.
         Response procedures.
        j. Security Management Process. A process for security management 
    would be required. This involves creating, administering, and 
    overseeing policies to ensure the prevention, detection, containment, 
    and correction of security breaches. We would require the organization 
    to have a formal security management process in place to address the 
    full range of security issues. Security management includes the 
    following mandatory implementation features:
         Risk analysis.
         Risk management.
         A sanction policy.
         A security policy.
        k. Termination Procedures. There would be a requirement to 
    implement termination procedures, which are formal, documented 
    instructions, including appropriate security measures, for the ending 
    of an employee's employment or an internal/external user's access. 
    These procedures are important to prevent the possibility of 
    unauthorized access to secure data by those who are no longer 
    authorized to access the data. Termination procedures would include the 
    following mandatory implementation features:
         Changing combination locks.
         Removal from access lists.
         Removal of user account(s).
         Turn in of keys, tokens, or cards that allow access.
        1. Training. This proposed rule would require security training for 
    all staff regarding the vulnerabilities of the health information in an 
    entity's possession and procedures which must be followed to ensure the 
    protection of that information. This is important because employees 
    need to understand their security responsibilities and make security a 
    part of their day-to-day activities. The implementation features that 
    would be required to be incorporated follow:
         Awareness training for all personnel, including 
    management, (this is also included as a requirement under physical 
    safeguards).
         Periodic security reminders.
         User education concerning virus protection.
         User education in importance of monitoring login success/
    failure, and how to report discrepancies.
         User education in password management.
    
    [[Page 43253]]
    
    2. Physical Safeguards To Guard Data Integrity, Confidentiality, and 
    Availability
    [Please label written comments or e-mailed comments about this 
    section with the subject: Physical Safeguards]
    
        The requirements and implementation features for physical 
    safeguards are presented at Sec. 142.308(b) of this proposed rule. We 
    would require each of these safeguards to be documented. We would 
    require this documentation to be made available to those individuals 
    responsible for implementing the safeguards and to be reviewed and 
    updated periodically. The following matrix depicts the requirements and 
    implementation features for the Physical Safeguards category. Following 
    the matrix is a discussion of each of the requirements under that 
    category.
    
        Physical Safeguards To Guard Data Integrity, Confidentiality, and   
                                  Availability                              
    ------------------------------------------------------------------------
                  Requirement                         Implementation        
    ------------------------------------------------------------------------
    Assigned security responsibility                                        
    Media controls (all listed               Access control.                
     implementation features must be         Accountability (tracking       
     implemented).                            mechanism).                   
                                             Data backup.                   
                                             Data storage.                  
                                             Disposal.                      
    Physical access controls (limited        Disaster recovery.             
     access) (all listed implementation      Emergency mode operation.      
     features must be implemented).          Equipment control (into and out
                                              of site).                     
                                             Facility security plan.        
                                             Procedures for verifying access
                                              authorizations prior to       
                                              physical access.              
                                             Maintenance records.           
                                             Need-to-know procedures for    
                                              personnel access.             
                                             Sign-in for visitors and       
                                              escort, if appropriate.       
                                             Testing and revision.          
    Policy/guideline on work station use                                    
    Secure work station location                                            
    Security awareness training.                                            
    ------------------------------------------------------------------------
    
        a. Assigned Security Responsibility. We would require the security 
    responsibility to be assigned to a specific individual or organization, 
    and the assignment be documented. These responsibilities would include 
    the management and supervision of (1) the use of security measures to 
    protect data, and (2) the conduct of personnel in relation to the 
    protection of data. This assignment is important to provide an 
    organizational focus and importance to security and to pinpoint 
    responsibility.
        b. Media Controls. Media controls would be required in the form of 
    formal, documented policies and procedures that govern the receipt and 
    removal of hardware/software (for example, diskettes, tapes) into and 
    out of a facility. They are important to ensure total control of media 
    containing health information. These controls would include the 
    following mandatory implementation features:
         Controlled access to media.
         Accountability (tracking mechanism).
         Data backup.
         Data storage.
         Disposal.
        c. Physical Access Controls. Physical access controls (limited 
    access) would be required. These would be formal, documented policies 
    and procedures for limiting physical access to an entity while ensuring 
    that properly authorized access is allowed. These controls would be 
    extremely important to the security of health information by preventing 
    unauthorized physical access to information and ensuring that 
    authorized personnel have proper access. These controls would include 
    the following mandatory implementation features:
         Disaster recovery.
         Emergency mode operation.
         Equipment control (into and out of site).
         A facility security plan.
         Procedures for verifying access authorizations prior to 
    physical access.
         Maintenance records.
         Need-to-know procedures for personnel access.
         Sign-in for visitors and escort, if appropriate.
         Testing and revision.
        d. Policy/Guideline on Workstation Use. Each organization would be 
    required to have a policy/guideline on workstation use. These 
    documented instructions/procedures would delineate the proper functions 
    to be performed and the manner in which those functions are to be 
    performed (for example, logging off before leaving a terminal 
    unattended). This would be important so that employees will understand 
    the manner in which workstations must be used to maximize the security 
    of health information.
        e. Secure Workstation Location. Each organization would be required 
    to put in place physical safeguards to eliminate or minimize the 
    possibility of unauthorized access to information. This would be 
    important especially in public buildings, provider locations, and in 
    areas where there is heavy pedestrian traffic.
        f. Security Awareness Training. Security awareness training would 
    be required for all employees, agents, and contractors. This would be 
    important because employees would need to understand their security 
    responsibilities based on their job responsibilities in the 
    organization and make security a part of their daily activities.
    3. Technical Security Services To Guard Data Integrity, 
    Confidentiality, and Availability
    [Please label written comments or e-mailed comments about this 
    section with the subject: Technical Security Services]
    
        The proposed requirements and implementation features for technical 
    security services are presented at Sec. 142.308(c). We would require 
    each of these services to be implemented and documented. The 
    documentation would be made available to those individuals responsible 
    for implementing the services and would be reviewed and updated 
    periodically. The following matrix depicts the requirements and 
    implementation features for the Technical Security Services category. 
    Following the matrix is a discussion of
    
    [[Page 43254]]
    
    each of the requirements under that category.
    
      Technical Security Services To Guard Data Integrity, Confidentiality, 
                                and Availability                            
    ------------------------------------------------------------------------
                  Requirement                         Implementation        
    ------------------------------------------------------------------------
    Access control (The following            Context-based access.          
     implementation feature must be          Encryption.                    
     implemented: Procedure for emergency    Procedure for emergency access.
     access. In addition, at least one of    Role-based access.             
     the following three implementation      User-based access.             
     features must be implemented: Context-                                 
     based access, Role-based access, User-                                 
     based access. The use of Encryption is                                 
     optional).                                                             
    Audit controls                                                          
    Authorization control (At least one of   Role-based access.             
     the listed implementation features      User-based access.             
     must be implemented).                                                  
    Data Authentication                                                     
    Entity authentication (The following     Automatic logoff.              
     implementation features must be         Biometric.                     
     implemented: Automatic logoff, Unique   Password.                      
     user identification. In addition, at    PIN.                           
     least one of the other listed           Telephone callback.            
     implementation features must be         Token.                         
     implemented).                           Unique user identification.    
    ------------------------------------------------------------------------
    
        a. Access Control. There would be a requirement for access control 
    which would restrict access to resources and allow access only by 
    privileged entities. It would be important to limit access to health 
    information to those employees who have a business need to access it. 
    Types of access control include, among others, mandatory access 
    control, discretionary access control, time-of-day, classification, and 
    subject-object separation. The following implementation feature would 
    be used:
         Procedure for emergency access.
        In addition, at least one of the following three implementation 
    features would be used:
         Context-based access.
         Role-based access.
         User-based access.
        The use of the encryption implementation feature would be optional.
        b. Audit Controls. Each organization would be required to put in 
    place audit control mechanisms to record and examine system activity. 
    They would be important so that the organization can identify suspect 
    data access activities, assess its security program, and respond to 
    potential weaknesses.
        c. Authorization Control. There would be a requirement to put in 
    place a mechanism for obtaining consent for the use and disclosure of 
    health information. These controls would be necessary to ensure that 
    health information is used only by properly authorized individuals. 
    Either of the following implementation features may be used:
         Role-based access.
         User-based access (see access control, above.).
        d. Data Authentication. Each organization would be required to be 
    able to provide corroboration that data in its possession has not been 
    altered or destroyed in an unauthorized manner. Examples of how data 
    corroboration may be assured include the use of a check sum, double 
    keying, a message authentication code, or digital signature.
        e. Entity Authentication. Each organization would be required to 
    implement entity authentication, which is the corroboration that an 
    entity is who it claims to be. Authentication would be important to 
    prevent the improper identification of an entity who is accessing 
    secure data. The following implementation features would be used:
         Automatic log off.
         Unique user identification.
        In addition, at least one of the following implementation features 
    would be used:
         A biometric identification system.
         A password system.
         A personal identification number (PIN).
         Telephone callback.
         A token system which uses a physical device for user 
    identification.
    4. Technical Security Mechanisms To Guard Against Unauthorized Access 
    to Data That Is Transmitted Over a Communications Network
    [Please label written comments or e-mailed comments about this 
    section with the subject: Technical Security Mechanisms]
    
        In this proposed rule, the requirements and implementation features 
    for technical security mechanisms are presented at Sec. 142.308(d). 
    Each of these mechanisms would need to be documented. The documentation 
    would be made available to those individuals responsible for 
    implementing the mechanisms and would be reviewed and updated 
    periodically. The following matrix depicts the requirement and 
    implementation features for the Technical Security Mechanisms category. 
    Following the matrix is a discussion of the requirement under that 
    category.
    
    [[Page 43255]]
    
    
    
      Technical Security Mechanisms To Guard Against Unauthorized Access to 
             Data That Is Transmitted Over a Communications Network         
    ------------------------------------------------------------------------
                  Requirement                         Implementation        
    ------------------------------------------------------------------------
    Communications/network controls (If      Access controls.               
     communications or networking is         Alarm.                         
     employed, the following implementation  Audit trail.                   
     features must be implemented:           Encryption.                    
     Integrity controls, Message             Entity authentication.         
     authentication. In addition, one of     Event reporting.               
     the following implementation features   Integrity controls.            
     must be implemented: Access controls,   Message authentication.        
     Encryption. In addition, if using a                                    
     network, the following four                                            
     implementation features must be                                        
     implemented: Alarm, Audit trail,                                       
     Entity authentication, Event                                           
     reporting).                                                            
    ------------------------------------------------------------------------
    
        Each organization that uses communications or networks would be 
    required to protect communications containing health information that 
    are transmitted electronically over open networks so that they cannot 
    be easily intercepted and interpreted by parties other than the 
    intended recipient, and to protect their information systems from 
    intruders trying to access systems through external communication 
    points. When using open networks, some form of encryption should be 
    employed. The utilization of less open systems/networks such as those 
    provided by a value-added network (VAN) or private-wire arrangement 
    provides sufficient access controls to allow encryption to be an 
    optional feature. These controls would be important because of the 
    potential for compromise of information over open systems such as the 
    Internet or dial-in lines.
        The following implementation features would be in place:
         Integrity controls.
         Message authentication.
        One of the following implementation features would be in place:
         Access controls.
         Encryption.
        In addition, if using a network for communications, the following 
    implementation features would be in place:
         Alarm.
         Audit trail.
         Entity authentication.
         Event reporting.
        Small or Rural Provider Example. The size and organizational 
    structure of the entities that would be required to implement this 
    standard vary tremendously. Therefore, it would be impossible to 
    provide examples that would cover every possible implementation of 
    security in the health care industry. Nevertheless, we have included an 
    example describing the manner in which a small or rural provider might 
    choose to implement the requirements of the standard. (For purposes of 
    this example, we would describe a small or rural provider as a one to 
    four physician office, with two to five additional employees. The 
    office uses a PC-based practice management system, which is used to 
    communicate intermittently with a clearinghouse for submission of 
    electronic claims. The number of providers is of less importance for 
    this example than the relatively simple technology in use and the fact 
    that there is insufficient volume or revenue to justify employment of a 
    computer system administrator.) We want to emphasize that there are 
    numerous ways in which an entity could implement these requirements and 
    features. This example does not necessarily represent the best way or 
    the only way in which an entity could choose to implement security.
        We anticipate that the small or rural provider office, as described 
    above, would normally evaluate and self-certify that the appropriate 
    security is in place for its computer system and office procedures. 
    This evaluation could be done by a knowledgeable person on the staff, 
    or more likely, by a consultant or by the vendor of the practice 
    management system as a service to its customers. First, the office 
    might assess actual and potential risks to its information assets. 
    Then, to establish appropriate security, the office would develop 
    policies and procedures to mitigate and manage those risks. These would 
    include an overall framework outlining information security activities 
    and responsibilities, and repercussions for failure to meet those 
    responsibilities.
        Next, this office might develop contingency plans to reduce or 
    negate the damage resulting from processing anomalies; for example, 
    establish a routine process for maintaining back up floppy disks at a 
    second location, obtain a PC maintenance contract, and arrange for use 
    of a backup PC should the need arise. This office would need to 
    periodically review its plan to determine whether it still met the 
    office's needs.
        The office would need to create and document a personnel security 
    policy and procedures to be followed. A key individual on the office 
    staff should be charged with the responsibility for assuring the 
    Personnel Security requirement is met. This responsibility would 
    include seeing that the access authorization levels granted are 
    documented and kept current (for example, records are kept of everyone 
    who is permitted to use the PC and what files they may access), and 
    training all personnel in security. Again, we emphasize that these 
    requirements are scalable. The requirement for Personnel Clearance 
    Procedures could be met in a small office with standard personal and 
    professional reference checks, while a large organization may employ 
    more formal, rigorous background investigations.
        This same individual could also be charged with the responsibility 
    for Security Configuration Management and Termination Procedures. For 
    our small provider, the Security Configuration Management requirement 
    would be relatively easy to satisfy; the necessary features could be 
    part of a purchased hardware/software package (for example, a new PC 
    might be equipped with virus checking software), or included as part of 
    the support supplied with the purchase of equipment and software. 
    Termination procedures would incorporate specific security actions to 
    be taken as a result of an employee's termination, such as obtaining 
    all keys and changing combinations or passwords. A ``position 
    description'' document describing this person's duties could specify 
    the level of detail necessary.
        The small or rural provider office would also need to ensure that 
    they have activated the internal auditing capability of the software 
    used to manage health data files so that it tracks who has accessed the 
    data. (We expect that the capability of keeping audit trails will 
    become standard in all health care software in the near future, spurred 
    on by the health information privacy debates in the Congress and 
    elsewhere.)
        A small or rural provider may document compliance with many of the
    
    [[Page 43256]]
    
    foregoing administrative security requirements by including them in an 
    ``office procedures'' type of document that should be required reading 
    by new employees and always available for reference. Requirements that 
    would lend themselves to inclusion in an ``office procedures'' document 
    include: contingency plans, formal records processing procedures, 
    information access controls (rules for granting access, actual 
    establishment of access, and procedures for modifying such access), 
    security incident procedures (for example, who is to be notified if it 
    appears that medical information has been accessed by an unauthorized 
    party), and training. Periodic security reminders could include visual 
    aids, such as posters and screen savers, and oral reminders in 
    recurring meetings.
        Physical Access controls would be relatively straightforward for 
    this small or rural office, using locked rooms and/or closets to secure 
    equipment and media from unauthorized access. The ``office procedures/
    policies'' manual should include directions for authorizing access and 
    keeping records of authorized accesses. Media Controls and Workstation 
    Use policy instructions would be developed by the office and would 
    include additional instructions on such items as where to store backed-
    up data, how to dispose of data no longer needed, or logging off when 
    leaving terminals unattended.
        Safeguards for the security of workstation location(s) would depend 
    upon the physical surroundings in the small or rural office. Our small 
    or rural provider may meet the requirements by locating equipment in 
    areas that are generally populated by office staff and have some degree 
    of physical separation from the public. Security Awareness Training 
    would be part of the new employee orientation process and would be a 
    periodic recurring discussion item in staff meetings.
        The Technical Security Services requirements for Access Control, 
    Entity Authentication, and Authorization Control may be achieved simply 
    by implementing a user-based data access model (assigning a user-name 
    and password combination to each authorized employee). Other access 
    models could be employed if desired, but would prove unwieldy for the 
    small office. For example, the role-based access process groups users 
    with similar data access needs, and context-based access is based upon 
    the context of a transaction--not on the attributes of the initiator. 
    By assigning full access rights to a minimum of two key individuals in 
    the office, implementation of the Emergency Access feature could be 
    satisfied. Audit control mechanisms, by necessity, would be provided by 
    software featuring that capability. By establishing and using a message 
    authentication code, Data Authentication would be achieved. Use of the 
    password system mentioned above could also satisfy the Unique User 
    Identification requirement.
        As our example provider contracts with a third party to handle 
    claims processing, the claims processing contract would be the vehicle 
    to provide for a chain of trust (requiring the contractor to implement 
    the same security requirements and take responsibility for protecting 
    the data it receives).
        If this provider chooses to use the Internet to transmit or receive 
    health information, some form of encryption must be used. For example, 
    the provider could procure and use commercial software to provide 
    protection against unauthorized access to the data transmitted or 
    received. (This decision must take into account what encryption system 
    the message recipient uses.) On the other hand, health information when 
    transmitted via other means such as VANs, private wires, or even dial-
    up connections may not require such absolute protection as is provided 
    by encryption. This small or rural provider would likely not be part of 
    a network configuration, therefore, only integrity controls and message 
    authentication would be required and could be provided by currently 
    available software products, most likely provided as part of their 
    contract with their health care clearinghouse.
        Small providers may need guidance regarding the content of the 
    documents required by this rule (for example, specifics of a chain of 
    trust partner agreement). We would expect models of the documentation 
    discussed in this example to be developed by industry associations and 
    vendors. If this model documentation is not developed, DHHS would work 
    with the industry to develop them.
    
    E. Electronic Signature Standard
    
    [Please label written comments or e-mailed comments about this 
    section with the subject: Electronic Signature Standard]
    
        HIPAA directs the Secretary of the Department of Health and Human 
    Services to coordinate with the Secretary of the Department of Commerce 
    in adopting standards for the electronic transmission and 
    authentication of signatures with respect to the transactions referred 
    to in the law. This rule was developed in coordination with the 
    Department of Commerce's National Institute of Standards and 
    Technology. We propose to adopt a cryptographically based digital 
    signature as the standard.
        Whenever a HIPAA specified transaction requires the use of an 
    electronic signature, the standard must be used. It should be noted 
    that an electronic signature is not required for any of the currently 
    proposed standard transactions.
        In the electronic environment, the same legal weight associated 
    with an original signature on a paper document may be needed for 
    electronic data. Use of an electronic signature refers to the act of 
    attaching a signature by electronic means. The electronic signature 
    process involves authentication of the signer's identity, a signature 
    process according to system design and software instructions, binding 
    of the signature to the document and non-alterability after the 
    signature has been affixed to the document. The generation of 
    electronic signatures requires the successful identification and 
    authentication of the signer at the time of the signature.
        The proposed standard for electronic signature is presented at 
    Sec. 142.310 and would be digital.
        The following matrix depicts the requirement and implementation 
    features for electronic signatures. Following the matrix is a 
    discussion of the electronic signature requirement.
    
    [[Page 43257]]
    
    
    
                              Electronic Signature                          
    ------------------------------------------------------------------------
                  Requirement                         Implementation        
    ------------------------------------------------------------------------
    Digital signature (If digital signature  Ability to add attributes.     
     is employed, the following three        Continuity of signature        
     implementation features must be          capability.                   
     implemented: Message integrity,         Countersignatures.             
     Nonrepudiation, User authentication.    Independent verifiability.     
     Other implementation features are       Interoperability.              
     optional).                              Message integrity.             
                                             Multiple Signatures.           
                                             Nonrepudiation.                
                                             Transportability.              
                                             User authentication.           
    ------------------------------------------------------------------------
    
        Various technologies may fulfill one or more of the requirements 
    specified in the matrix. Authentication systems (passwords, biometrics, 
    physical feature authentication, behavioral actions and token-based 
    authentication) can be combined with cryptographic techniques to form 
    an electronic signature. However, a complete electronic signature 
    system may require more than one of the technologies mentioned above. 
    If electronic signatures would be used, certain implementation features 
    must be included, specifically:
         Message integrity.
         Nonrepudiation.
         User authentication.
        Currently there are no technically mature techniques that provide 
    the security service of nonrepudiation in an open network environment, 
    in the absence of trusted third parties, other than digital signature-
    based techniques. Therefore, if electronic signatures are employed, we 
    would require that digital signature technology be used. A digital 
    signature is formed by applying a mathematical function to the 
    electronic document. This process yields a unique bit string, referred 
    to as a message digest. The digest (only) is encrypted using the 
    originator's private key and the resulting bit stream is appended to 
    the electronic document. The recipient of the transmitted document 
    decrypts the message digest with the originator's public key, applies 
    the same message hash function to the document, then compares the 
    resulting digest with the transmitted version. If they are identical, 
    then the recipient is assured that the message is unaltered and the 
    identity of the signer is proven. Since only the signatory authority 
    can hold the Private Key used to digitally sign the document, the 
    critical feature of nonrepudiation is enforced. Other electronic 
    signature implementation features that may be used follow:
         Ability to add attributes.
         Continuity of signature capability.
         Countersignatures capability.
         Independent verifiability.
         Interoperability.
         Multiple signatures.
         Transportability.
        This standard is described in greater detail in Sec. 142.310 of the 
    regulation text and is depicted in tabular form along with the security 
    standard in a combined matrix located at Addendum 1. We have not 
    included the matrix in the proposed regulation text. We invite your 
    comments concerning the appropriateness and usefulness of including the 
    matrix in the final regulation text. We have also provided a glossary 
    of terms to facilitate a common understanding of the matrix entries. 
    The glossary can be found at Addendum 2. Finally, we have included 
    currently existing standards and guidelines mapped to the proposed 
    electronic signature standard. This mapping is not all inclusive and is 
    located at Addendum 3.
    
    F. Selection Criteria
    
        Each individual implementation team weighted the criteria described 
    in section I.B. above, Process for Developing National Standards, in 
    terms of the standard it was addressing. As we assessed security and 
    electronic signatures, it became apparent that while the security 
    standard set forth in Sec. 142.308 and the electronic signature 
    standard set forth in Sec. 142.310 satisfy all the criteria described 
    above, they most strongly address criteria 1, 3, 7, 9, and 10. These 
    criteria are described below in the specific context of these 
    standards.
        1. Improve the efficiency and effectiveness of the health care 
    system.
        The security and electronic signature standards would be integrated 
    with the electronic transmission of health care information to improve 
    the overall effectiveness of the health care system. This integration 
    would assure that electronic health care information would not be 
    accessible to any unauthorized person or organization, but would be 
    both accurate and available to those who are authorized to receive it.
        3. Be consistent and uniform with the other HIPAA standards and, 
    secondly, with other private and public sector health data standards.
        The security and electronic signature standards were developed 
    after a comprehensive review of existing standards and guidelines, with 
    significant input by a wide range of industry experts. As indicated in 
    Addendum 3, the standards map well to existing standards and 
    guidelines.
        7. Be technologically independent of computer platforms and 
    transmission protocols.
        We have defined the security and electronic signature standards in 
    terms of requirements that would allow businesses in the health care 
    industry to select the technology that best meets their business 
    requirements while still allowing them to comply with the standards.
        9. Keep data collection and paperwork burdens on users as low as is 
    feasible.
        The security and electronic signature standards would allow 
    individual health care industry businesses to ascertain the level of 
    security information that would be needed. The confidentiality level 
    associated with individual data elements concerning health care 
    information would determine the appropriate security application to be 
    used. The security standard would define the requirements to be met to 
    achieve the privacy and confidentiality goal, but each business entity, 
    driven by its business requirements, would decide what techniques and 
    controls would provide appropriate and adequate electronic data 
    protection. This would allow data collection and the paperwork burden 
    to be as low as is feasible.
        10. Incorporate flexibility to adapt more easily to changes in the 
    health care infrastructure and information technology.
        A technologically neutral security standard would be more adaptable 
    to changes in infrastructure and information technology.
    
    [[Page 43258]]
    
    G. Consultations
    
        In the development of the security and electronic signature 
    standards, we consulted with many organizations, including those the 
    legislation requires (section 1172(c)(3)(B) of the Act):
        1. The NCVHS held two days of public hearings on security issues in 
    August 1997, and made a recommendation to the Secretary of HHS, as 
    required by the legislation. The NCVHS recommendation to the Secretary 
    of HHS, as required by the legislation, was for a technologically 
    neutral standard. It identified certain criteria to be established for 
    a health information system to be secure. The proposed security 
    standard complies with the NCVHS security recommendation.
        2. The ANSI Accredited Standards Committee (ASC) X12 subcommittees 
    on communication and control, insurance and government were contacted. 
    Their current standards development effort is focused on messaging 
    rather than on security requirements.
        3. American Society for Testing and Materials (ASTM), Committee E31 
    on Computerized Systems participated in the security discussions.
        4. Association for Electronic Health Care Transactions (AFEHCT), 
    the clearinghouse organization, provided information on its health care 
    transaction process requirements and emphasized that the security 
    standard must be adaptable to different business needs.
        5. Computer-based Patient Record Institute (CPRI) was consulted 
    because the Work Group on Confidentiality, Privacy and Security is 
    working on the establishment of guidelines, confidentiality agreements, 
    security requirements, and frameworks. CPRI works closely with 
    accredited standards development organizations.
        6. Health Level Seven (HL-7) has been contacted through its 
    participation at the HISB meetings.
        7. NUCC and the NUBC were apprised of the different implementation 
    teams' efforts. NUBC has not addressed security issues at any of the 
    public meetings. NUCC identified a number of issues at its November 18-
    19 meeting and provided written comments to us.
    
    H. Rules for Security Standards and Electronic Signature Standard
    
        1. Health Plans
        a. In Sec. 142.306(a), we would require health plans to accept and 
    apply the security standard to all health care information pertaining 
    to an individual that is electronically maintained or electronically 
    transmitted. Federal agencies and States may place additional 
    requirements on their health plans. In addition, trading partners may 
    mutually agree to implement additional security measures.
        b. In Sec. 142.310(a), entities would not be required to use an 
    electronic signature. However, if a plan elects to use an electronic 
    signature in one of the transactions named in the law, it would be 
    required to apply the electronic signature standard described in 
    Sec. 142.310(b) to that transaction. In the future, we anticipate that 
    the standards for other transactions may include requirements for 
    signatures. In particular, the proposed standard for claims 
    attachments, which will be issued in a separate regulations package 
    later, may include signature requirements on some or all of the 
    attachments. If the proposed attachments standard includes such 
    signature requirements, we will address the issue of how to reconcile 
    such requirements with existing State and Federal requirements for 
    written signatures as part of the proposed rule.
    2. Health Care Clearinghouses
        a. We would require in Sec. 142.306(b) that each health care 
    clearinghouse comply with the security standard to ensure all health 
    care information and activities are protected from unauthorized access. 
    If the clearinghouse is part of a larger organization, then security 
    must be imposed to prevent unauthorized access by the larger 
    organization. The security standards apply to all health information 
    pertaining to an individual that is electronically maintained or 
    electronically transmitted.
        b. In Sec. 142.310(a), entities would not be required to use an 
    electronic signature. However, if a plan elects to use an electronic 
    signature in one of the transactions named in the law, it would be 
    required to apply the electronic signature standard described in 
    Sec. 142.310(b) to that transaction. In the future, we anticipate that 
    the standards for other transactions may include requirements for 
    signatures. In particular, the proposed standard for claims 
    attachments, which will be issued in a separate regulations package 
    later, may include signature requirements on some or all of the 
    attachments. If the proposed attachments standard includes such 
    signature requirements, we will address the issue of how to reconcile 
    such requirements with existing State and Federal requirements for 
    written signatures as part of the proposed rule.
    3. Health Care Providers
        a. In Sec. 142.306(a), we would require each health care provider 
    to apply the security standard to all health information pertaining to 
    an individual that is electronically maintained or electronically 
    transmitted.
        b. In Sec. 142.310(a), entities would not be required to use an 
    electronic signature. However, if a plan elects to use an electronic 
    signature in one of the transactions named in the law, it would be 
    required to apply the electronic signature standard described in 
    Sec. 142.310(b) to that transaction. In the future, we anticipate that 
    the standards for other transactions may include requirements for 
    signatures. In particular, the proposed standard for claims 
    attachments, which will be issued in a separate regulations package 
    later, may include signature requirements on some or all of the 
    attachments. If the proposed attachments standard includes such 
    signature requirements, we will address the issue of how to reconcile 
    such requirements with existing State and Federal requirements for 
    written signatures as part of the proposed rule.
    
    I. Effective Dates
    
        Health plans would be required to comply with the security and 
    electronic signature standards as follows:
        1. Each health plan that is not a small health plan would have to 
    comply with the requirements of Secs. 142.306, 142.308, and 142.310 no 
    later than 24 months after publication of the final rule.
        2. Each small health plan would have to comply with the 
    requirements of Secs. 142.306, 142.308, and 142.310 no later than 36 
    months after the date of publication of the final rule.
        3. If the effective date for the electronic transaction standards 
    is later than the effective date for the security standard, 
    implementation of the security standard would not be delayed until the 
    standard transactions are in use. The security standard would still be 
    effective with respect to electronically stored or maintained data. 
    Security of health information would not be solely tied to the standard 
    transactions but would apply to all individual health information 
    electronically stored, maintained, or transmitted.
        4. Under this proposed rule, in some cases, a health plan could 
    choose to convert from paper to standard EDI transactions prior to the 
    effective date of the security standard. We would recommend that the 
    security standard be implemented at that time in order to safeguard the 
    data in those transactions. We invite comments on this issue.
    
    [[Page 43259]]
    
        Failure to comply with standards may result in monetary penalties. 
    The Secretary is required by statute to impose penalties of not more 
    than $100 per violation on any person who fails to comply with a 
    standard, except that the total amount imposed on any one person in 
    each calendar year may not exceed $25,000 for violations of one 
    requirement.
        We are not proposing any enforcement procedures at this time, but 
    we plan to do so in a future Federal Register document once the 
    industry has some experience with using the standards. These procedures 
    will be in place by the time the standards are implemented by industry. 
    We envision the monitoring and enforcement process as a partnership 
    between the Federal government and the private sector. Some private 
    accreditation bodies have already exhibited interest in certifying 
    compliance with the security requirements as part of their 
    accreditation reviews. Small providers may be able to self-certify 
    through industry-developed checklists. HHS would likely retain the 
    final responsibility for determining violations and imposing the 
    penalties specified by the statute. We welcome comments on this 
    approach.
    
    III. Implementation
    
        If an entity elects to use an electronic signature in a 
    transaction, or if an electronic signature is required by a transaction 
    standard adopted by the Secretary, the entity must apply the electronic 
    signature standard described in Sec. 142.310(b).
        How the security standard would be implemented is dependent upon 
    industry trading partner agreements for electronic transmissions. The 
    health care industry would be able to adapt the security matrix to meet 
    its business needs. We propose that the requirements of the security 
    standard be implemented over time. However, we would require 
    implementation to be complete by the applicable effective date. We 
    would encourage, but not require that entities comply with the security 
    standard as soon as practicable, preferably before implementing the 
    transactions standards.
        The security standard would supersede contrary provisions of State 
    law including State law requiring medical or health plan records to be 
    maintained or transmitted in other electronic formats. There are 
    certain exceptions when the standards would not supersede contrary 
    provisions of State law; section 1178 identifies those conditions and 
    directs the Secretary to determine whether a particular State provision 
    falls within one or more of the exceptions.
        The electronic signature standard (digital signature) would be 
    deemed to satisfy Federal and State statutory requirements for written 
    signatures with respect to the named transactions referred to in the 
    legislation.
        Several accreditation organizations such as the Electronic 
    Healthcare Network Accreditation Commission (EHNAC), the Joint 
    Commission on Accreditation of Healthcare Organizations (JCAHO), and 
    the National Committee for Quality Assurance (NCQA), indicate that one 
    of their accreditation requirements will be compliance with the HIPAA 
    security and electronic signature (if applicable) standards.
    
    IV. New and Revised Standards
    
        To encourage innovation and promote development, we plan to 
    establish a process to allow an organization to request a revision or 
    replacement to any adopted standard or standards. An organization could 
    request a revision or replacement to an adopted standard by requesting 
    a waiver from the Secretary of Health and Human Services to test a 
    revised or new standard. The organization would be required, at a 
    minimum, to demonstrate that the revised or new standard offers a clear 
    improvement over the adopted standard. If the organization presents 
    sufficient documentation that supports testing of a revised or new 
    standard, we want to be able to grant the organization a temporary 
    waiver to test while remaining in compliance with the law. We do not 
    intend to establish a process that would allow an organization to avoid 
    using any adopted standard.
        We would welcome comments on the following: (1) How we should 
    establish this process, (2) the length of time a proposed standard 
    should be tested before we decide whether to adopt it, (3) whether we 
    should solicit public comments before implementing a change in a 
    standard, and (4) other issues and recommendations we should consider. 
    Comments should be submitted to the addresses presented in the 
    ADDRESSES section of this document.
        The following is one possible process:
         Any organization that wishes to revise or replace an 
    adopted standard would submit its waiver request to an HHS evaluation 
    committee (to be established or defined). The organization would do the 
    following for each standard it wishes to revise or replace:
        + Provide a detailed explanation, no more than 10 pages, of how the 
    revision or replacement would be a clear improvement over the current 
    standard.
        + Provide specifications and technical capabilities on the revised 
    or new standard, including any additional system requirements.
        + Provide an explanation, no more than five pages, of how the 
    organization intends to test the standard.
         The committee's evaluation would, at a minimum, be based 
    on the following:
        + A cost-benefit analysis.
        + An assessment of whether the proposed revision or replacement 
    demonstrates a clear improvement to an existing standard.
        + The extent and length of time of the waiver.
         The evaluation committee would inform the organization 
    requesting the waiver within 30 working days of the committee's 
    decision on the waiver request. If the committee decides to grant a 
    waiver, the notification may include the following:
        + Committee comments such as the following:
    
    --The length of time for which the waiver applies if it differs from 
    the waiver request.
    --The sites the committee believes are appropriate for testing if they 
    differ from the waiver request.
    --Any pertinent information regarding the conditions of an approved 
    waiver.
         Any organization that receives a waiver would be required 
    to submit a report containing the results of the study, no later than 3 
    months after the study is completed.
         The committee would evaluate the report and determine 
    whether the benefits of the proposed revision or new standard 
    significantly outweigh the disadvantages of implementing it and make a 
    recommendation to the Secretary.
    
    V. Response to Comments
    
        Because of the large number of items of correspondence we normally 
    receive on Federal Register documents published for comment, we are not 
    able to acknowledge or respond to them individually. We will consider 
    all comments we receive by the date and time specified in the DATES 
    section of this preamble, and, if we proceed with a subsequent 
    document, we will respond to the major comments in the preamble of that 
    document.
    
    VI. Impact Analysis
    
        As the effect of any one standard is affected by the implementation 
    of other standards, it can be misleading to discuss the impact of one 
    standard by itself. Therefore, we did an impact
    
    [[Page 43260]]
    
    analysis on the total effect of all the standards in the proposed rule 
    concerning the national provider identifier (HCFA-0045-P), which was 
    published on May 7, 1998 (63 FR 25320).
        We intend to publish in each proposed rule an impact analysis that 
    is specific to the standard or standards proposed in that rule, but the 
    impact analysis will assess only the relative cost impact of 
    implementing a given standard. Thus, the following discussion contains 
    the impact analysis for the security standard and the electronic 
    signature standard proposed in this rule. As stated in the general 
    impact analysis in HCFA-0045-P, we do not intend to associate costs and 
    savings to specific standards.
        Although we cannot determine the specific economic impact of the 
    standards being proposed in this rule (and individually each standard 
    may not have a significant impact), the overall impact analysis makes 
    clear that, collectively, all the standards will have a significant 
    impact of over $100 million on the economy. Also, while each standard 
    may not have a significant impact on a substantial number of small 
    entities, the combined effects of all the proposed standards may have a 
    significant effect on a substantial number of small entities. 
    Therefore, the following impact analysis should be read in conjunction 
    with the overall impact analysis.
        The following describes the specific impacts that relate to the 
    security and electronic signature standards. Security protection for 
    health care information is not a ``stand-alone'' type requirement. 
    Appropriate security protections will be a business enabler, 
    encouraging the growth and use of electronic data interchange. The 
    synergistic effect of the employment of the recommended security 
    practices, procedures and technologies will enhance all aspects of 
    HIPAA's Administrative Simplification requirements. In addition, it is 
    important to recognize that security is not a product, but is an on-
    going, dynamic process.
        In accordance with the provisions of Executive Order 12866, this 
    proposed rule was reviewed by the Office of Management and Budget.
    
    A. Security Standard
    
        HIPAA requires that all health plans, health care providers, and 
    health care clearinghouses that maintain or transmit health information 
    electronically establish and maintain reasonable and appropriate 
    administrative, technical, and physical safeguards to ensure integrity, 
    confidentiality, and availability of the information. The safeguards 
    also protect the information against any reasonably anticipated threats 
    or hazards to the security or integrity of the information and protect 
    it against unauthorized use or disclosure. Recommendation 1 from the 
    National Research Council's (NRC) report For the Record: Protecting 
    Electronic Health Information (``All organizations that handle patient-
    identifiable health care information-- regardless of size--should adopt 
    the set of technical and organization policies, practices, and 
    procedures described * * * to protect such information.'') would apply 
    to all health care providers regardless of size, health care 
    clearinghouses, and health plans. We agree with the NRC's belief that 
    implementation of the practices and technologies delineated in 
    Recommendation 1 would be possible today, and at a reasonable cost.
        Health care providers that conduct electronic transactions with 
    health plans would have to comply with the recommendation(s) for 
    security protection. There is, however, no requirement to maintain 
    health records electronically or transmit health care information by 
    electronic means. There may also be health care providers that 
    currently submit health care information on paper but archive records 
    electronically. These entities will need to ensure that their existing 
    electronic systems conform to security requirements for maintaining 
    health information. Once they have done so, however, they may also take 
    advantage of all the other benefits of electronic recordkeeping and 
    transmittal. Therefore, no individual small entity is expected to 
    experience direct costs that exceed benefits as a result of this rule. 
    Furthermore, because almost all of the NRC recommendations reflect 
    contemporary security measures and controls, most organizations that 
    currently have security measures should have to make few, if any, 
    modifications to their systems to meet the requirements proposed in the 
    security standard.
        The singular exception to the above lies in the area of providing 
    security for the electronic transmission of health care information 
    over insecure, public media. Here, the choice of a method to use is 
    driven by economic factors. If an organization wishes to use an 
    insecure transmission media such as the Internet, and take advantage of 
    the low costs involved, off-setting costs may need to be incurred to 
    provide for an acceptable form of encryption so that health information 
    will be protected from intercept and possible misuse.
        One alternative course of action to encrypting the information 
    would be to use the services of a VAN. VANs do not manipulate data, but 
    rather transmit data in its native form over telecommunication lines. 
    We anticipate that VANs would be positively affected by administrative 
    simplification, because use of the proposed transactions standards 
    would eliminate the need for data to be reformatted. This would allow 
    providers to purchase the services of a VAN directly, rather than as a 
    service bundled with the functions of other clearinghouses. Another 
    course of action might be to use private lines which would provide an 
    appropriate level of protection for data in transmission.
    
    B. Electronic Signature Standard
    
        HIPAA does not require the use of electronic signatures. This 
    particular capability, however, would be necessary for a completely 
    paperless environment. Certain features of the digital signature type 
    of electronic signature make this particular system the most desirable. 
    Only digital signatures, using current technology, provide the 
    combination of authenticity, message integrity, and nonrepudiation 
    which is viewed as a desirable complement to the security standards 
    required by the law.
        The use of digital signatures requires a certain infrastructure 
    (Public Key Infrastructure) that may necessitate the expenditure of 
    initial and recurring costs for users. We do not know what these costs 
    are presently, due to the lack of maturity of digital signature 
    technology, and minimal use in the marketplace today. It is noted that 
    public key certificate management systems and services do exist today, 
    and it is presumed more quantifiable information will be forthcoming, 
    as to potential costs and savings that can be associated with the use 
    of digital signature systems. Other forms of electronic signature were 
    considered, such as biometric and digitized signatures. While they 
    provide a useful capability in certain circumstances, we believe that 
    digital signature technology is most appropriate for this particular 
    application.
    
    C. Guiding Principles for Standard Selection
    
        The implementation teams charged with designating standards under 
    the statute have defined, with significant input from the health care 
    industry, a set of common criteria for evaluating potential standards. 
    These criteria are based on direct specifications in the HIPAA, the 
    purpose of the law, and principles that support the regulatory
    
    [[Page 43261]]
    
    philosophy set forth in EO 12866 of September 30, 1993. In order to be 
    designated as a standard, EO 12866 requires that a proposed standard:
         Improve the efficiency and effectiveness of the health 
    care system by leading to cost reductions for or improvements in 
    benefits from electronic HIPAA health care transactions. This principle 
    supports the regulatory goals of cost-effectiveness and avoidance of 
    burden.
         Meet the needs of the health data standards user 
    community, particularly health care providers, health plans, and health 
    care clearinghouses. This principle supports the regulatory goal of 
    cost-effectiveness.
         Be consistent and uniform with the other HIPAA standards 
    (that is, their data element definitions and codes and their privacy 
    and security requirements) and, secondarily, with other private and 
    public sector health data standards. This principle supports the 
    regulatory goals of consistency and avoidance of incompatibility, and 
    it establishes a performance objective for the standard.
         Have low additional development and implementation costs 
    relative to the benefits of using the standard. This principle supports 
    the regulatory goals of cost-effectiveness and avoidance of burden.
         Be supported by an ANSI-accredited standards developing 
    organization or other private or public organization that would ensure 
    continuity and efficient updating of the standard over time. This 
    principle supports the regulatory goal of predictability.
         Have timely development, testing, implementation, and 
    updating procedures to achieve administrative simplification benefits 
    faster. This principle establishes a performance objective for the 
    standard.
         Be technologically independent of the computer platforms 
    and transmission protocols used in HIPAA health transactions, except 
    when they are explicitly part of the standard. This principle 
    establishes a performance objective for the standard and supports the 
    regulatory goal of flexibility.
         Be precise and unambiguous but as simple as possible. This 
    principle supports the regulatory goals of predictability and 
    simplicity.
         Keep data collection and paperwork burdens on users as low 
    as is feasible. This principle supports the regulatory goals of cost-
    effectiveness and avoidance of duplication and burden.
         Incorporate flexibility to adapt more easily to changes in 
    the health care infrastructure (such as new services, organizations, 
    and provider types) and information technology. This principle supports 
    the regulatory goals of flexibility and encouragement of innovation.
        We assessed a wide variety of security standards, guidelines and 
    electronic signature standards against the principles listed above, 
    with the overall goal of achieving the maximum benefit for the least 
    cost. We found that there exists no single standard for security or 
    electronic signature that encompasses all the requirements that have 
    been deemed necessary. However, in this particular area, technology is 
    rapidly developing enhancements and better means for accomplishing the 
    stated goals.
    
    D. Affected Entities
    
    1. Health Care Providers
        Health care providers that conduct business using electronic 
    transactions with other health care participants (such as other health 
    care providers, health plans, and employers) or maintain electronic 
    health information are encouraged, but are not required to 
    simultaneously implement the proposed security standard. However, if 
    the effective date for the electronic transaction standards is later 
    than the effective date for the security standard, the implementation 
    of the security standard will not be delayed until the standard 
    transactions are in use.
        Health care providers that transmit, receive, or maintain health 
    information would incur implementation costs for establishing or 
    updating their security systems. Any negative impact on these health 
    care providers caused by implementing the proposed security standard 
    would generally be related to the initial implementation period for the 
    specific requirements of the security standard. Health care providers 
    that are indirectly involved in electronic transactions (for example, 
    those who submit a paper claim that the health plan transmits 
    electronically to a secondary payer) and do not maintain electronic 
    health information would not be affected.
    2. Health Plans
        Health plans that engage in electronic health care transactions 
    would have to modify their systems to use the security standard and the 
    electronic signature standard, if used. Health plans that maintain 
    electronic health information would also have to modify their systems 
    to use the security standard. This conversion would have a one-time 
    cost impact on Federal, State and private plans alike.
        We recognize that this conversion process has the potential to 
    cause business disruption of some health plans. However, health plans 
    would be able to schedule their implementation of the security standard 
    and other standards in a way that best fits their needs, as long as 
    they meet the deadlines specified in the law.
        Implementation of the security standard and the electronic 
    signature standard, if used by the entities, would enhance payment 
    safeguard activities and protect the integrity of the Medicare trust 
    fund by reducing fraud and abuse that occurs when health care 
    information is used by those who are not authorized to receive it. In 
    addition these standards would assist the plans, providers, and 
    clearinghouses to more effectively maintain the security of all health 
    information in their databases.
    3. Clearinghouses
        Health care clearinghouses would face impacts similar to those 
    experienced by health care providers and health plans. Systems vendors, 
    that provide computer software applications to health care providers 
    and other billers of health care services, would likely be positively 
    affected. These vendors would have to develop software solutions that 
    would allow health care providers and other billers of health care 
    transactions to protect the information in their databases from 
    unwanted access to their systems.
    4. Unfunded Mandates
        This proposed rule has been reviewed in accordance with the 
    Unfunded Mandates Reform Act of 1995 (UMRA) (U.S.C. 1501 et seq.) and 
    Executive Order 12875. As discussed in the combined impact analysis 
    referenced above (see Federal Register, Volume 63, No. 88), DHHS 
    estimates that implementation of the standards will require the 
    expenditure of more than $100 million by the private sector. Therefore, 
    the rule establishes a Federal private sector mandate and is a 
    significant regulatory action within the meaning of section 202 of UMRA 
    (2 U.S.C. 1532). DHHS has included this statement to address the 
    anticipated effects of the proposed rules pursuant to section 202.
        These standards also apply to State and local governments in their 
    roles as health plans or health care providers. Thus, the proposed 
    rules impose unfunded mandates on these entities. While we do not have 
    sufficient information to provide estimates of these impacts, several 
    State Medicaid agencies have estimated that it would cost $1 million 
    per State to implement
    
    [[Page 43262]]
    
    all of the HIPAA standards. However, the Congressional Budget Office 
    analysis stated that ``States are already in the forefront in 
    administering the Medicaid program electronically; the only costs--
    which should not be significant--would involve bringing the software 
    and computer systems for the Medicaid programs into compliance with the 
    new standards.''
        The anticipated benefits and costs of this proposed standard, and 
    other issues raised in section 202 of the UMRA, are addressed in the 
    analysis below, and in the combined impact analysis. In addition, under 
    section 205 of the UMRA (2 U.S.C. 1535), having considered a reasonable 
    number of alternatives as outlined in the preamble to this rule and in 
    the following analysis, the Department has concluded that the rule is 
    the most cost-effective alternative for implementation of DHHS'' 
    statutory objective of administrative simplification.
    5. Regulatory Flexibility Act
        The Regulatory Flexibility Act (RFA) of 1980, Public Law 96-354, 
    requires us to prepare a regulatory flexibility analysis if the 
    Secretary certifies that a proposed regulation would have a significant 
    economic impact on a substantial number of small entities. The security 
    and electronic signature standards will affect small entities, such as 
    providers. A more detailed analysis of the impact on small entities is 
    part of the impact analysis we published on May 7, 1998 (63 FR 25320) 
    for all the HIPAA standards. A detailed illustration of the potential 
    impact of the security standard on a small health care provider can be 
    found in the preamble in section D.
    
    E. Factors in Establishing the Security Standard
    
    1. Selection of Security Systems and Procedures
        Because there is no national security standard in widespread use 
    throughout the industry, adopting any of the candidate standards would 
    require most health care providers, health plans and health care 
    clearinghouses to conform to the new standard. Implementation of the 
    security standard would require all health plans, health care 
    providers, and health care clearinghouses to establish or revise their 
    security precautions because the proposed standard is not currently in 
    use. The selection of the security standard does not impose a greater 
    burden on the industry than the nonselected options, and presents 
    significant advantages in terms of universality, uniqueness and 
    flexibility.
        Only those plans, providers, and clearinghouses that decide to use 
    the digital signature would be affected by the electronic signature 
    standard. Some large health plans, health care providers, and health 
    care clearinghouses that currently exchange health information among 
    trading partners may have security systems and procedures in place to 
    protect the information from unauthorized access. These entities may 
    not incur significant costs to meet the proposed security standard and 
    if they opt not to use the digital signature they would not incur costs 
    to meet the electronic signature requirements. Also, some entities that 
    currently use electronic signatures as an added security measure may 
    also be using digital signature technology. At most, large entities 
    that may have sophisticated security systems in place may only need to 
    revise or update their systems to meet the proposed security standard 
    and electronic signature standard.
    2. Complexity of Conversion
        The complexity of the conversion would be significantly affected by 
    the volume of claims health plans process electronically and the desire 
    to transmit the claims themselves or to use the services of a VAN or a 
    clearinghouse. If they chose to transmit themselves, they would need to 
    convert to the proposed transaction standards. Specific technology 
    limitations of existing systems could affect the complexity of the 
    conversion. For example, some entities may only have a minimum level of 
    security and procedures in place and therefore may require a full 
    upgrade, while others may already have a very sophisticated system and 
    procedures and require very little enhancement.
    3. Cost of Conversion
        We expect that most providers, health plans, and clearinghouses 
    that transmit or store data electronically have already implemented 
    some security measures and will primarily need to assess existing 
    security, identify areas of risk, and implement additional measures. We 
    cannot estimate the per-entity cost of implementation because there is 
    no information available regarding the extent to which providers', 
    plans', and clearinghouses' current security practices are deficient. 
    Moreover, some security solutions are almost cost-free to implement 
    (e.g., reminding employees not to post passwords on their monitors) 
    while others are not.
        Affected entities will have many choices regarding how they will 
    implement security. Some may choose to assess security using in-house 
    staff, while others will utilize consultants. Practice management 
    software vendors may also provide security consultation services to 
    their customers. Entities may also choose to implement security 
    measures that require hardware or software purchases at the time they 
    do routine equipment upgrades.
        The security requirements we are proposing were developed with 
    considerable input from the health care industry, including providers, 
    health plans, clearinghouses, vendors, and standards organizations. 
    Industry members strongly advocated this flexible approach, which 
    permits each affected entity to develop cost-effective security 
    measures. We believe that this approach will yield the lowest 
    implementation cost to industry while assuring that health information 
    is safeguarded. We solicit input regarding implementation costs.
        We are unable to estimate, of the nation's 4 million-plus health 
    plans and 1.2 million-plus providers, the number of entities that would 
    require security systems and procedures because they conduct electronic 
    transactions or maintain electronic health information. Nor are we able 
    to estimate the number of entities that neither conduct electronic 
    transactions nor maintain electronic health information but may choose 
    to do so at some future time. (These would be entities that send and 
    receive paper transactions and maintain paper records and thus would 
    not be affected because they would have no need to implement security 
    standards.) However, we are aware of the possibility that those small 
    entities that currently process claims electronically or maintain 
    electronic health information may not be able to continue to do so due 
    to the cost of establishing security systems to meet the requirements 
    of the proposed security standard. Those entities that are not able to 
    bill and exchange health information electronically may use 
    clearinghouses. We believe that the proposed security standard 
    represents the minimum necessary for adequate protection of health 
    information in an electronic format. As discussed earlier in this 
    preamble, the security requirements are both scalable and technically 
    flexible; and while the law requires each health plan that is not a 
    small plan to comply with the security and electronic signature 
    requirements no later than 24 months after the effective date of the 
    final rule, small plans will be allowed an additional 12 months to 
    comply.
        Since we are unable to estimate the number of entities, we are also 
    unable to estimate the cost to the entities that will process 
    electronic transactions.
    
    [[Page 43263]]
    
    However, we believe that the cost of establishing security systems and 
    procedures is a portion of the costs associated with converting to the 
    transaction standards that are required under HIPAA.
        This discussion on conversion costs relates only to health plans, 
    health care providers, and health care clearinghouses that are required 
    to follow the security standard to maintain, transmit or receive 
    electronic health information. Other entities would not be required to 
    follow the security standard and procedures until they choose to 
    maintain, transmit, or receive electronic health information. The cost 
    of establishing security systems and procedures for entities that do 
    not transmit, receive or maintain health information electronically is 
    not included in our estimates.
    
    VII. Collection of Information Requirements
    
        Under the Paperwork Reduction Act of 1995, we are required to 
    provide 60-day notice in the Federal Register and solicit public 
    comment before a collection of information requirement is submitted to 
    the Office of Management and Budget (OMB) for review and approval. In 
    order to fairly evaluate whether an information collection should be 
    approved by OMB, section 3506(c)(2)(A) of the Paperwork Reduction Act 
    of 1995 requires that we solicit comment on the following issues:
         The need for the information collection and its usefulness 
    in carrying out the proper functions of our agency.
         The accuracy of our estimate of the information collection 
    burden.
         The quality, utility, and clarity of the information to be 
    collected.
         Recommendations to minimize the information collection 
    burden on the affected public, including automated collection 
    techniques.
        As discussed below, we are soliciting comment on the recordkeeping 
    requirements, as referenced in Sec. 142.308 of this document. In 
    addition, we are soliciting comment on the applicability of the PRA as 
    it may relate to the requirement to use the standard adopted in 
    Sec. 142.310 of this regulation.
    
    Section 142.308  Security Standard
    
        In summary, each entity designated in Sec. 142.302 must maintain 
    documentation demonstrating the development, implementation, and 
    maintenance of appropriate security measures that include, at a 
    minimum, the requirements and implementation features set forth in this 
    section. In addition, entities must maintain necessary documentation to 
    demonstrate that these measures have been periodically reviewed, 
    validated, updated, and kept current.
        While we solicit comment on these recordkeeping requirements we 
    explicitly solicit comment on the burden associated with maintaining 
    documentation related to the implementation the requirements set forth 
    in Sec. 142.308. Since the level of documentation necessary to 
    demonstrate compliance with these requirements is dependent upon 
    individual business needs and the fact that we do not prescribe the 
    form, format, or degree of documentation necessary to demonstrate 
    compliance, we are currently unable to accurately estimate the degree 
    of recordkeeping burden that will be experienced by the varying 
    entities. Therefore, commentors should provide an estimate of: (1) the 
    initial recordkeeping burden associated with meeting these requirements 
    and (2) the recordkeeping burden associated with maintaining 
    documentation to demonstrate that the measures have been periodically 
    reviewed, validated, updated, and kept current.
        Below is a discussion of the applicability of the PRA as it may 
    relate to the adoption of the standard referenced in Sec. 142.310 of 
    this regulation.
    
    Section 142.310  Electronic Signature Standard
    
        In summary, any entity electing to use an electronic signature in a 
    transaction as defined in Sec. 142.103, or if an electronic signature 
    is required by a transaction standard adopted by the Secretary, the 
    entity must apply the electronic signature standard described in 
    paragraph (b) of this section to that transaction.
    Discussion
        The emerging and increasing use of health care EDI standards and 
    transactions raises the issue of the applicability of the PRA. The 
    question arises whether a regulation that adopts an EDI standard used 
    to exchange certain information constitutes an information collection 
    subject to the PRA.
        In particular, we are still considering whether the use of any EDI 
    transaction standard, such as the electronic signature described in 
    this regulation, should be viewed or regarded as a standardized 
    electronic collection of information. If it is a standardized 
    electronic information collection, then the requirement by the Federal 
    government on the industry to accept and transmit the information may 
    be subject to OMB review and approval under the PRA.
        We invite public comment on the issues discussed above. If the 
    requirements, as set forth in Sec. 142.310 are determined to be subject 
    to the PRA, we will submit these requirements to OMB for PRA approval. 
    If you comment on these information collection and recordkeeping 
    requirements, please e-mail comments to JBurke1@hcfa.gov (Attn: HCFA-
    0049) or mail copies directly to the following:
    
    Health Care Financing Administration, Office of Information Services, 
    Security and Standards Group, Division of HCFA Enterprise Standards, 
    Room N2-14-26, 7500 Security Boulevard, Baltimore, MD 21244-1850. Attn: 
    John Burke HCFA-0049, HCFA Reports Clearance Officer
    And
    Office of Information and Regulatory Affairs, Office of Management and 
    Budget, Room 10235, New Executive Office Building, Washington, DC 
    20503, Attn: Allison Herron Eydt, HCFA Desk Officer
    
    List of Subjects in 45 CFR Part 142
    
        Administrative practice and procedure, Health facilities, Health 
    insurance, Hospitals, Medicaid, Medicare, Report and recordkeeping 
    requirement.
    
        45 CFR subtitle A, subchapter B, would be amended by adding part 42 
    to read as follows:
    
        Note to Reader: This proposed rule is one of several proposed 
    rules that are being published to implement the administrative 
    simplification provisions of the Health Insurance Portability and 
    Accountability Act of 1996. We propose to establish a new 45 CFR 
    Part 142. Proposed Subpart A--General Provisions is exactly the same 
    in each rule unless we have added new sections or definitions to 
    incorporate additional general information. The subparts that follow 
    relate to the specific provisions announced separately in each 
    proposed rule. When we publish the first final rule, each subsequent 
    final rule will revise or add to the text that is set out in the 
    first final rule.
    
    PART 142--ADMINISTRATIVE REQUIREMENTS
    
    Subpart A--General Provisions
    
    Sec.
    142.101  Statutory basis and purpose.
    142.102  Applicability.
    142.103  Definitions.
    142.104  General requirements for health plans.
    142.105  Compliance using a health care clearinghouse.
    142.106  Effective dates of a modification to a standard or 
    implementation specification.
    
    [[Page 43264]]
    
    Subpart B--Reserved
    
    Subpart C--Security and Electronic Signature Standards
    
    Sec.
    142.302  Applicability and scope.
    142.304  Definitions.
    142.306  Rules for the security standard.
    142.308  Security standard.
    142.310  Electronic signature standard.
    142.312  Effective date of the initial implementation of the 
    security and electronic standards.
    
        Authority: Sections 1173 and 1175 of the Social Security Act (42 
    U.S.C. 1320d-2 and 1320d-4).
    
    Subpart A--General Provisions
    
    
    Sec. 142.101  Statutory basis and purpose.
    
        Sections 1171 through 1179 of the Social Security Act, 42 U.S.C. 
    1320d, as added by section 262 of the Health Insurance Portability and 
    Accountability Act of 1996, require HHS to adopt national standards for 
    the electronic exchange of health information in the health care 
    system. The purpose of the sections of this part is to promote 
    administrative simplification.
    
    
    Sec. 142.102  Applicability.
    
        (a) The standards adopted or designated under this part apply, in 
    whole or in part, to the following:
        (1) A health plan.
        (2) A health care clearinghouse when doing the following:
        (i) Transmitting a standard transaction (as defined in 
    Sec. 142.103) to a health care provider or health plan.
        (ii) Receiving a standard transaction from a health care provider 
    or health plan.
        (iii) Transmitting and receiving the standard transactions when 
    interacting with another health care clearinghouse.
        (3) A health care provider when transmitting an electronic 
    transaction as defined in Sec. 142.103.
        (b) Means of compliance are stated in greater detail in 
    Sec. 142.105.
    
    
    Sec. 142.103  Definitions.
    
        For purposes of this part, the following definitions apply:
        Code set means any set of codes used for encoding data elements, 
    such as tables of terms, medical concepts, medical diagnostic codes, or 
    medical procedure codes.
        Health care clearinghouse means a public or private entity that 
    processes or facilitates the processing of nonstandard data elements of 
    health information into standard data elements. The entity receives 
    health care transactions from health care providers or other entities, 
    translates the data from a given format into one acceptable to the 
    intended payer or payers, and forwards the processed transaction to 
    appropriate payers and clearinghouses. Billing services, repricing 
    companies, community health management information systems, community 
    health information systems, and ``value-added'' networks and switches 
    are considered to be health care clearinghouses for purposes of this 
    part.
        Health care provider means a provider of services as defined in 
    section 1861(u) of the Social Security Act, 42 U.S.C. 1395x, a provider 
    of medical or other health services as defined in section 1861(s) of 
    the Social Security Act, and any other person who furnishes or bills 
    and is paid for health care services or supplies in the normal course 
    of business.
        Health information means any information, whether oral or recorded 
    in any form or medium, that--
        (1) Is created or received by a health care provider, health plan, 
    public health authority, employer, life insurer, school or university, 
    or health care clearinghouse; and
        (2) Relates to the past, present, or future physical or mental 
    health or condition of an individual, the provision of health care to 
    an individual, or the past, present, or future payment for the 
    provision of health care to an individual.
        Health plan means an individual or group plan that provides, or 
    pays the cost of, medical care. Health plan includes the following, 
    singly or in combination:
        (1) Group health plan. A group health plan is an employee welfare 
    benefit plan (as currently defined in section 3(1) of the Employee 
    Retirement Income and Security Act of 1974, 29 U.S.C. 1002(1)), 
    including insured and self-insured plans, to the extent that the plan 
    provides medical care, including items and services paid for as medical 
    care, to employees or their dependents directly or through insurance, 
    or otherwise, and--
        (i) Has 50 or more participants; or
        (ii) Is administered by an entity other than the employer that 
    established and maintains the plan.
        (2) Health insurance issuer. A health insurance issuer is an 
    insurance company, insurance service, or insurance organization that is 
    licensed to engage in the business of insurance in a State and is 
    subject to State law that regulates insurance.
        (3) Health maintenance organization. A health maintenance 
    organization is a Federally qualified health maintenance organization, 
    an organization recognized as a health maintenance organization under 
    State law, or a similar organization regulated for solvency under State 
    law in the same manner and to the same extent as such a health 
    maintenance organization.
        (4) Part A or Part B of the Medicare program under title XVIII of 
    the Social Security Act.
        (5) The Medicaid program under title XIX of the Social Security 
    Act.
        (6) A Medicare supplemental policy (as defined in section 
    1882(g)(1) of the Social Security Act, 42 U.S.C. 1395ss).
        (7) A long-term care policy, including a nursing home fixed-
    indemnity policy.
        (8) An employee welfare benefit plan or any other arrangement that 
    is established or maintained for the purpose of offering or providing 
    health benefits to the employees of two or more employers.
        (9) The health care program for active military personnel under 
    title 10 of the United States Code.
        (10) The veterans health care program under 38 U.S.C. chapter 17.
        (11) The Civilian Health and Medical Program of the Uniformed 
    Services (CHAMPUS), as defined in 10 U.S.C. 1072(4).
        (12) The Indian Health Service program under the Indian Health Care 
    Improvement Act (25 U.S.C. 1601 et seq.).
        (13) The Federal Employees Health Benefits Program under 5 U.S.C. 
    chapter 89.
        (14) Any other individual or group health plan, or combination 
    thereof, that provides or pays for the cost of medical care.
        Medical care means the diagnosis, cure, mitigation, treatment, or 
    prevention of disease, or amounts paid for the purpose of affecting any 
    body structure or function of the body; amounts paid for transportation 
    primarily for and essential to these items; and amounts paid for 
    insurance covering the items and the transportation specified in this 
    definition.
        Participant means any employee or former employee of an employer, 
    or any member or former member of an employee organization, who is or 
    may become eligible to receive a benefit of any type from an employee 
    benefit plan that covers employees of that employer or members of such 
    an organization, or whose beneficiaries may be eligible to receive any 
    of these benefits. ``Employee'' includes an individual who is treated 
    as an employee under section 401(c)(1) of the Internal Revenue Code of 
    1986 (26 U.S.C. 401(c)(1)).
        Small health plan means a group health plan or individual health 
    plan with fewer than 50 participants.
    
    [[Page 43265]]
    
        Standard means a set of rules for a set of codes, data elements, 
    transactions, or identifiers promulgated either by an organization 
    accredited by the American National Standards Institute or HHS for the 
    electronic transmission of health information.
        Transaction means the exchange of information between two parties 
    to carry out financial and administrative activities related to health 
    care. It includes the following:
        (1) Health claims or equivalent encounter information.
        (2) Health care payment and remittance advice.
        (3) Coordination of benefits.
        (4) Health claims status.
        (5) Enrollment and disenrollment in a health plan.
        (6) Eligibility for a health plan.
        (7) Health plan premium payments.
        (8) Referral certification and authorization.
        (9) First report of injury.
        (10) Health claims attachments.
        (11) Other transactions as the Secretary may prescribe by 
    regulation.
    
    
    Sec. 142.104  General requirements for health plans.
    
        If a person conducts a transaction (as defined in Sec. 142.103) 
    with a health plan as a standard transaction, the following apply:
        (a) The health plan may not refuse to conduct the transaction as a 
    standard transaction.
        (b) The health plan may not delay the transaction or otherwise 
    adversely affect, or attempt to adversely affect, the person or the 
    transaction on the ground that the transaction is a standard 
    transaction.
        (c) The health information transmitted and received in connection 
    with the transaction must be in the form of standard data elements of 
    health information.
        (d) A health plan that conducts transactions through an agent must 
    assure that the agent meets all the requirements of this part that 
    apply to the health plan.
    
    
    Sec. 142.105  Compliance using a health care clearinghouse.
    
        (a) Any person or other entity subject to the requirements of this 
    part may meet the requirements to accept and transmit standard 
    transactions by either--
        (1) Transmitting and receiving standard data elements; or
        (2) Submitting nonstandard data elements to a health care 
    clearinghouse for processing into standard data elements and 
    transmission by the health care clearinghouse and receiving standard 
    data elements through the health care clearinghouse.
        (b) The transmission, under contract, of nonstandard data elements 
    between a health plan or a health care provider and its agent health 
    care clearinghouse is not a violation of the requirements of this part.
    
    
    Sec. 142.106  Effective dates of a modification to a standard or 
    implementation specification.
    
        HHS may modify a standard or implementation specification after the 
    first year in which HHS requires the standard or implementation 
    specification to be used, but not more frequently than once every 12 
    months. If HHS adopts a modification to a standard or implementation 
    specification, the implementation date of the modified standard or 
    implementation specification may be no earlier than 180 days following 
    the adoption of the modification. HHS determines the actual date, 
    taking into account the time needed to comply due to the nature and 
    extent of the modification. HHS may extend the time for compliance for 
    small health plans.
    
    Subpart B--[Reserved]
    
    Subpart C--Security and Electronic Signature Standards
    
    
    Sec. 142.302  Applicability and scope.
    
        The standards adopted or designated under this subpart apply, in 
    whole or in part, to the following:
        (a) A health plan.
        (b) A health care clearinghouse or health care provider that takes 
    one of the following actions:
        (1) Processes any electronic transmission between any combination 
    of health care entities listed in this section.
        (2) Electronically maintains any health information used in an 
    electronic transmission that has been sent or received between any 
    combination of health care entities listed in this section.
    
    
    Sec. 142.304  Definitions.
    
        For purposes of this subpart, the following definitions apply:
        Access refers to the ability or the means necessary to read, write, 
    modify, or communicate data/information or otherwise make use of any 
    system resource.
        Access control refers to a method of restricting access to 
    resources, allowing only privileged entities access. Types of access 
    control include, among others, mandatory access control, discretionary 
    access control, time-of-day, and classification.
        Authentication refers to the corroboration that an entity is the 
    one claimed.
        Contingency plan refers to a plan for responding to a system 
    emergency. The plan includes performing backups, preparing critical 
    facilities that can be used to facilitate continuity of operations in 
    the event of an emergency, and recovering from a disaster.
        Encryption (or encipherment) refers to transforming confidential 
    plaintext into ciphertext to protect it. An encryption algorithm 
    combines plaintext with other values called keys, or ciphers, so the 
    data becomes unintelligible. Once encrypted, data can be stored or 
    transmitted over unsecured lines. Decrypting data reverses the 
    encryption algorithm process and makes the plaintext available for 
    further processing.
        Password refers to confidential authentication information composed 
    of a string of characters.
        Role-based access control (RBAC) is an alternative to traditional 
    access control models (e.g., discretionary or non-discretionary access 
    control policies) that permits the specification and enforcement of 
    enterprise-specific security policies in a way that maps more naturally 
    to an organization's structure and business activities. With RBAC, 
    rather than attempting to map an organization's security policy to a 
    relatively low-level set of technical controls (typically, access 
    control lists), each user is assigned to one or more predefined roles, 
    each of which has been assigned the various privileges needed to 
    perform that role.
        Token refers to a physical item necessary for user identification 
    when used in the context of authentication. For example, an electronic 
    device that can be inserted in a door or a computer system to obtain 
    access.
        User-based access refers to a security mechanism used to grant 
    users of a system access based upon the identity of the user.
    
    
    Sec. 142.306  Rules for the security standard.
    
        (a) An entity must apply the security standard described in 
    Sec. 142.308 to all health information pertaining to an individual that 
    is electronically maintained or electronically transmitted.
        (b) If a health care clearinghouse is part of a larger 
    organization, it must assure that all health information pertaining to 
    an individual is protected from unauthorized access by the larger 
    organization.
    
    [[Page 43266]]
    
    Sec. 142.308  Security standard.
    
        Each entity designated in Sec. 142.302 must assess potential risks 
    and vulnerabilities to the individual health data in its possession and 
    develop, implement, and maintain appropriate security measures. These 
    measures must be documented and kept current, and must include, at a 
    minimum, the following requirements and implementation features:
        (a) Administrative procedures to guard data integrity, 
    confidentiality, and availability (documented, formal practices to 
    manage the selection and execution of security measures to protect 
    data, and to manage the conduct of personnel in relation to the 
    protection of data). These procedures include the following 
    requirements:
        (1) Certification. (The technical evaluation performed as part of, 
    and in support of, the accreditation process that establishes the 
    extent to which a particular computer system or network design and 
    implementation meet a pre-specified set of security requirements. This 
    evaluation may be performed internally or by an external accrediting 
    agency.)
        (2) A chain of trust partner agreement (a contract entered into by 
    two business partners in which the partners agree to electronically 
    exchange data and protect the integrity and confidentiality of the data 
    exchanged).
        (3) A contingency plan, a routinely updated plan for responding to 
    a system emergency, that includes performing backups, preparing 
    critical facilities that can be used to facilitate continuity of 
    operations in the event of an emergency, and recovering from a 
    disaster. The plan must include all of the following implementation 
    features:
        (i) An applications and data criticality analysis (an entity's 
    formal assessment of the sensitivity, vulnerabilities, and security of 
    its programs and information it receives, manipulates, stores, and/or 
    transmits).
        (ii) Data backup plan (a documented and routinely updated plan to 
    create and maintain, for a specific period of time, retrievable exact 
    copies of information).
        (iii) A disaster recovery plan (the part of an overall contingency 
    plan that contains a process enabling an enterprise to restore any loss 
    of data in the event of fire, vandalism, natural disaster, or system 
    failure).
        (iv) Emergency mode operation plan (the part of an overall 
    contingency plan that contains a process enabling an enterprise to 
    continue to operate in the event of fire, vandalism, natural disaster, 
    or system failure).
        (v) Testing and revision procedures (the documented process of 
    periodic testing of written contingency plans to discover weaknesses 
    and the subsequent process of revising the documentation, if 
    necessary).
        (4) Formal mechanism for processing records (documented policies 
    and procedures for the routine, and nonroutine, receipt, manipulation, 
    storage, dissemination, transmission, and/or disposal of health 
    information).
        (5) Information access control (formal, documented policies and 
    procedures for granting different levels of access to health care 
    information) that includes all of the following implementation 
    features:
        (i) Access authorization (information-use policies and procedures 
    that establish the rules for granting access, (for example, to a 
    terminal, transaction, program, process, or some other user.)
        (ii) Access establishment (security policies and rules that 
    determine an entity's initial right of access to a terminal, 
    transaction, program, process or some other user).
        (iii) Access modification (security policies and rules that 
    determine the types of, and reasons for, modification to an entity's 
    established right of access, to a terminal, transaction, program, 
    process, or some other user.)
        (6) Internal audit (in-house review of the records of system 
    activity (such as logins, file accesses, and security incidents) 
    maintained by an organization).
        (7) Personnel security (all personnel who have access to any 
    sensitive information have the required authorities as well as all 
    appropriate clearances) that includes all of the following 
    implementation features:
        (i) Assuring supervision of maintenance personnel by an authorized, 
    knowledgeable person. These procedures are documented formal procedures 
    and instructions for the oversight of maintenance personnel when the 
    personnel are near health information pertaining to an individual.
        (ii) Maintaining a record of access authorizations (ongoing 
    documentation and review of the levels of access granted to a user, 
    program, or procedure accessing health information).
        (iii) Assuring that operating and maintenance personnel have proper 
    access authorization (formal documented policies and procedures for 
    determining the access level to be granted to individuals working on, 
    or near, health information).
        (iv) Establishing personnel clearance procedures (a protective 
    measure applied to determine that an individual's access to sensitive 
    unclassified automated information is admissible).
        (v) Establishing and maintaining personnel security policies and 
    procedures (formal, documentation of procedures to ensure that all 
    personnel who have access to sensitive information have the required 
    authority as well as appropriate clearances).
        (vi) Assuring that system users, including maintenance personnel, 
    receive security awareness training.
        (8) Security configuration management (measures, practices, and 
    procedures for the security of information systems that must be 
    coordinated and integrated with each other and other measures, 
    practices, and procedures of the organization established in order to 
    create a coherent system of security) that includes all of the 
    following implementation features:
        (i) Documentation (written security plans, rules, procedures, and 
    instructions concerning all components of an entity's security).
        (ii) Hardware and software installation and maintenance review and 
    testing for security features (formal, documented procedures for 
    connecting and loading new equipment and programs, periodic review of 
    the maintenance occurring on that equipment and programs, and periodic 
    security testing of the security attributes of that hardware/software).
        (iii) Inventory (the formal, documented identification of hardware 
    and software assets).
        (iv) Security testing (process used to determine that the security 
    features of a system are implemented as designed and that they are 
    adequate for a proposed applications environment; this process includes 
    hands-on functional testing, penetration testing, and verification).
        (v) Virus checking. (The act of running a computer program that 
    identifies and disables:
        (A) Another ``virus'' computer program, typically hidden, that 
    attaches itself to other programs and has the ability to replicate.
        (B) A code fragment (not an independent program) that reproduces by 
    attaching to another program.
        (C) A code embedded within a program that causes a copy of itself 
    to be inserted in one or more other programs.)
        (9) Security incident procedures (formal documented instructions 
    for reporting security breaches) that include all of the following 
    implementation features:
        (i) Report procedures (documented formal mechanism employed to 
    document security incidents).
    
    [[Page 43267]]
    
        (ii) Response procedures (documented formal rules or instructions 
    for actions to be taken as a result of the receipt of a security 
    incident report).
        (10) Security management process (creation, administration, and 
    oversight of policies to ensure the prevention, detection, containment, 
    and correction of security breaches involving risk analysis and risk 
    management). It includes the establishment of accountability, 
    management controls (policies and education), electronic controls, 
    physical security, and penalties for the abuse and misuse of its assets 
    (both physical and electronic) that includes all of the following 
    implementation features:
        (i) Risk analysis, a process whereby cost-effective security/
    control measures may be selected by balancing the costs of various 
    security/control measures against the losses that would be expected if 
    these measures were not in place.
        (ii) Risk management (process of assessing risk, taking steps to 
    reduce risk to an acceptable level, and maintaining that level of 
    risk).
        (iii) Sanction policies and procedures (statements regarding 
    disciplinary actions that are communicated to all employees, agents, 
    and contractors; for example, verbal warning, notice of disciplinary 
    action placed in personnel files, removal of system privileges, 
    termination of employment, and contract penalties). They must include 
    employee, agent, and contractor notice of civil or criminal penalties 
    for misuse or misappropriation of health information and must make 
    employees, agents, and contractors aware that violations may result in 
    notification to law enforcement officials and regulatory, 
    accreditation, and licensure organizations.
        (iv) Security policy (statement(s) of information values, 
    protection responsibilities, and organization commitment for a system). 
    This is the framework within which an entity establishes needed levels 
    of information security to achieve the desired confidentiality goals.
        (11) Termination procedures (formal documented instructions, which 
    include appropriate security measures, for the ending of an employee's 
    employment or an internal/external user's access) that include 
    procedures for all of the following implementation features:
        (i) Changing locks (a documented procedure for changing 
    combinations of locking mechanisms, both on a recurring basis and when 
    personnel knowledgeable of combinations no longer have a need to know 
    or require access to the protected facility or system).
        (ii) Removal from access lists (physical eradication of an entity's 
    access privileges).
        (iii) Removal of user account(s) (termination or deletion of an 
    individual's access privileges to the information, services, and 
    resources for which they currently have clearance, authorization, and 
    need-to-know when such clearance, authorization and need-to-know no 
    longer exists).
        (iv) Turning in of keys, tokens, or cards that allow access 
    (formal, documented procedure to ensure all physical items that allow a 
    terminated employee to access a property, building, or equipment are 
    retrieved from that employee, preferably before termination).
        (12) Training (education concerning the vulnerabilities of the 
    health information in an entity's possession and ways to ensure the 
    protection of that information) that includes all of the following 
    implementation features:
        (i) Awareness training for all personnel, including management 
    personnel (in security awareness, including, but not limited to, 
    password maintenance, incident reporting, and viruses and other forms 
    of malicious software).
        (ii) Periodic security reminders (employees, agents, and 
    contractors are made aware of security concerns on an ongoing basis).
        (iii) User education concerning virus protection (training relative 
    to user awareness of the potential harm that can be caused by a virus, 
    how to prevent the introduction of a virus to a computer system, and 
    what to do if a virus is detected).
        (iv) User education in importance of monitoring log-in success or 
    failure and how to report discrepancies (training in the user's 
    responsibility to ensure the security of health care information).
        (v) User education in password management (type of user training in 
    the rules to be followed in creating and changing passwords and the 
    need to keep them confidential).
        (b) Physical safeguards to guard data integrity, confidentiality, 
    and availability. Protection of physical computer systems and related 
    buildings and equipment from fire and other natural and environmental 
    hazards, as well as from intrusion. It covers the use of locks, keys, 
    and administrative measures used to control access to computer systems 
    and facilities. Physical safeguards must include all of the following 
    requirements and implementation features:
        (1) Assigned security responsibility (practices established by 
    management to manage and supervise the execution and use of security 
    measures to protect data and to manage and supervise the conduct of 
    personnel in relation to the protection of data).
        (2) Media controls (formal, documented policies and procedures that 
    govern the receipt and removal of hardware/software (such as diskettes 
    and tapes) into and out of a facility) that include all of the 
    following implementation features:
        (i) Access control.
        (ii) Accountability (the property that ensures that the actions of 
    an entity can be traced uniquely to that entity).
        (iii) Data backup (a retrievable, exact copy of information).
        (iv) Data storage (the retention of health care information 
    pertaining to an individual in an electronic format).
        (v) Disposal (final disposition of electronic data, and/or the 
    hardware on which electronic data is stored).
        (3) Physical access controls (limited access) (formal, documented 
    policies and procedures to be followed to limit physical access to an 
    entity while ensuring that properly authorized access is allowed) that 
    include all of the following implementation features:
        (i) Disaster recovery (the process enabling an entity to restore 
    any loss of data in the event of fire, vandalism, natural disaster, or 
    system failure).
        (ii) An emergency mode operation (access controls in place that 
    enable an entity to continue to operate in the event of fire, 
    vandalism, natural disaster, or system failure).
        (iii) Equipment control (into and out of site) (documented security 
    procedures for bringing hardware and software into and out of a 
    facility and for maintaining a record of that equipment. This includes, 
    but is not limited to, the marking, handling, and disposal of hardware 
    and storage media.)
        (iv) A facility security plan (a plan to safeguard the premises and 
    building (exterior and interior) from unauthorized physical access and 
    to safeguard the equipment therein from unauthorized physical access, 
    tampering, and theft).
        (v) Procedures for verifying access authorizations before granting 
    physical access (formal, documented policies and instructions for 
    validating the access privileges of an entity before granting those 
    privileges).
        (vi) Maintenance records (documentation of repairs and 
    modifications to the physical components of a facility, such as
    
    [[Page 43268]]
    
    hardware, software, walls, doors, and locks).
        (vii) Need-to-know procedures for personnel access (a security 
    principle stating that a user should have access only to the data he or 
    she needs to perform a particular function).
        (viii) Procedures to sign in visitors and provide escorts, if 
    appropriate (formal documented procedure governing the reception and 
    hosting of visitors).
        (ix) Testing and revision (the restriction of program testing and 
    revision to formally authorized personnel).
        (4) Policy and guidelines on work station use (documented 
    instructions/procedures delineating the proper functions to be 
    performed, the manner in which those functions are to be performed, and 
    the physical attributes of the surroundings of a specific computer 
    terminal site or type of site, dependent upon the sensitivity of the 
    information accessed from that site).
        (5) A secure work station location (physical safeguards to 
    eliminate or minimize the possibility of unauthorized access to 
    information; for example, locating a terminal used to access sensitive 
    information in a locked room and restricting access to that room to 
    authorized personnel, not placing a terminal used to access patient 
    information in any area of a doctor's office where the screen contents 
    can be viewed from the reception area).
        (6) Security awareness training (information security awareness 
    training programs in which all employees, agents, and contractors must 
    participate, including, based on job responsibilities, customized 
    education programs that focus on issues regarding use of health 
    information and responsibilities regarding confidentiality and 
    security).
        (c) Technical security services to guard data integrity, 
    confidentiality, and availability (the processes that are put in place 
    to protect information and to control individual access to 
    information). These services include the following requirements and 
    implementation features:
        (1) The technical security services must include all of the 
    following requirements and the specified implementation features:
        (i) Access control that includes:
        (A) A procedure for emergency access (documented instructions for 
    obtaining necessary information during a crisis), and
        (B) At least one of the following implementation features:
        (1) Context-based access (an access control procedure based on the 
    context of a transaction (as opposed to being based on attributes of 
    the initiator or target)).
        (2) Role-based access.
        (3) User-based access.
        (C) The optional use of encryption.
        (ii) Audit controls (mechanisms employed to record and examine 
    system activity).
        (iii) Authorization control (the mechanism for obtaining consent 
    for the use and disclosure of health information) that includes at 
    least one of the following implementation features:
        (A) Role-based access.
        (B) User-based access.
        (iv) Data authentication. (The corroboration that data has not been 
    altered or destroyed in an unauthorized manner. Examples of how data 
    corroboration may be assured include the use of a check sum, double 
    keying, a message authentication code, or digital signature.)
        (v) Entity authentication (the corroboration that an entity is the 
    one claimed) that includes:
        (A) Automatic logoff (a security procedure that causes an 
    electronic session to terminate after a predetermined time of 
    inactivity, such as 15 minutes), and
        (B) Unique user identifier (a combination name/number assigned and 
    maintained in security procedures for identifying and tracking 
    individual user identity).
        (C) At least one of the following implementation features:
        (1) Biometric identification (an identification system that 
    identifies a human from a measurement of a physical feature or 
    repeatable action of the individual (for example, hand geometry, 
    retinal scan, iris scan, fingerprint patterns, facial characteristics, 
    DNA sequence characteristics, voice prints, and hand written 
    signature)).
        (2) Password.
        (3) Personal identification number (PIN) (a number or code assigned 
    to an individual and used to provide verification of identity).
        (4) A telephone callback procedure (method of authenticating the 
    identity of the receiver and sender of information through a series of 
    ``questions'' and ``answers'' sent back and forth establishing the 
    identity of each). For example, when the communicating systems exchange 
    a series of identification codes as part of the initiation of a session 
    to exchange information, or when a host computer disconnects the 
    initial session before the authentication is complete, and the host 
    calls the user back to establish a session at a predetermined telephone 
    number.
        (5) Token.
        (2) [Reserved]
        (d) Technical security mechanisms (processes that are put in place 
    to guard against unauthorized access to data that is transmitted over a 
    communications network).
        (1) If an entity uses communications or network controls, its 
    security standards for technical security mechanisms must include the 
    following:
        (i) The following implementation features:
        (A) Integrity controls (a security mechanism employed to ensure the 
    validity of the information being electronically transmitted or 
    stored).
        (B) Message authentication (ensuring, typically with a message 
    authentication code, that a message received (usually via a network) 
    matches the message sent).
        (ii) One of the following implementation features:
        (A) Access controls (protection of sensitive communications 
    transmissions over open or private networks so that they cannot be 
    easily intercepted and interpreted by parties other than the intended 
    recipient).
        (B) Encryption.
        (2) If an entity uses network controls (to protect sensitive 
    communication that is transmitted electronically over open networks so 
    that it cannot be easily intercepted and interpreted by parties other 
    than the intended recipient), its technical security mechanisms must 
    include all of the following implementation features:
        (i) Alarm. (In communication systems, any device that can sense an 
    abnormal condition within the system and provide, either locally or 
    remotely, a signal indicating the presence of the abnormality. The 
    signal may be in any desired form ranging from a simple contact closure 
    (or opening) to a time-phased automatic shutdown and restart cycle.)
        (ii) Audit trail (the data collected and potentially used to 
    facilitate a security audit).
        (iii) Entity authentication (a communications or network mechanism 
    to irrefutably identify authorized users, programs, and processes and 
    to deny access to unauthorized users, programs, and processes).
        (iv) Event reporting (a network message indicating operational 
    irregularities in physical elements of a network or a response to the 
    occurrence of a significant task, typically the completion of a request 
    for information).
    
    
    Sec. 142.310  Electronic signature standard.
    
        (a) General rule. If an entity elects to use an electronic 
    signature in a
    
    [[Page 43269]]
    
    transaction as defined in Sec. 142.103, or if an electronic signature 
    is required by a transaction standard adopted by the Secretary, the 
    entity must apply the electronic signature standard described in 
    paragraph (b) of this section to that transaction.
        (b) Standard.
        (1) An electronic signature is the attribute affixed to an 
    electronic document to bind it to a particular entity. An electronic 
    signature secures the user authentication (proof of claimed identity) 
    at the time the signature is generated; creates the logical 
    manifestation of signature (including the possibility for multiple 
    parties to sign a document and have the order of application recognized 
    and proven); supplies additional information such as time stamp and 
    signature purpose specific to that user; and ensures the integrity of 
    the signed document to enable transportability of data, 
    interoperability, independent verifiability, and continuity of 
    signature capability. Verifying a signature on a document verifies the 
    integrity of the document and associated attributes and verifies the 
    identity of the signer.
        (2) The standard for electronic signature is a digital signature. A 
    ``digital signature'' is an electronic signature based upon 
    cryptographic methods of originator authentication, computed by using a 
    set of rules and a set of parameters so that the identity of the signer 
    and the integrity of the data can be verified.
        (c) Required implementation features. If an entity uses electronic 
    signatures, the signature method must assure all of the following 
    features:
        (1) Message integrity (the assurance of unaltered transmission and 
    receipt of a message from the sender to the intended recipient).
        (2) Nonrepudiation (strong and substantial evidence of the identity 
    of the signer of a message, and of message integrity, sufficient to 
    prevent a party from successfully denying the origin, submission, or 
    delivery of the message and the integrity of its contents).
        (3) User authentication (the provision of assurance of the claimed 
    identity of an entity).
        (d) Optional implementation features. If an entity uses electronic 
    signatures, the entity may also use, among others, any of the following 
    implementation features:
        (1) Ability to add attributes (one possible capability of a digital 
    signature technology; for example, the ability to add a time stamp as 
    part of a digital signature).
        (2) Continuity of signature capability (the concept that the public 
    verification of a signature must not compromise the ability of the 
    signer to apply additional secure signatures at a later date).
        (3) Countersignatures. (The capability to prove the order of 
    application of signatures. This is analogous to the normal business 
    practice of countersignatures, where a party signs a document that has 
    already been signed by another party.)
        (4) Independent verifiability (the capability to verify the 
    signature without the cooperation of the signer).
        (5) Interoperability (the applications used on either side of a 
    communication, between trading partners and/or between internal 
    components of an entity, are able to read and correctly interpret the 
    information communicated from one to the other).
        (6) Multiple signatures. (With this feature, multiple parties are 
    able to sign a document. Conceptually, multiple signatures are simply 
    appended to the document.)
        (7) Transportability of data (the ability of a signed document to 
    be transported over an insecure network to another system, while 
    maintaining the integrity of the document, including content, 
    signatures, signature attributes, and (if present) document 
    attributes).
    
    
    Sec. 142.312  Effective date of the initial implementation of the 
    security and electronic signature standards.
    
        (a) General rules.
        (1) Except for a small health plan (defined at Sec. 142.103), each 
    entity designated in Sec. 142.302 must comply with the requirements of 
    this subpart by [24 months after the effective date of the final rule 
    in the Federal Register].
        (2) A delay in an effective date for using a standard transaction 
    described in this part does not delay the effective dates described in 
    paragraphs (a)(1) and (b) of this section.
        (3) The requirements of the security standard may be implemented 
    over time. Implementation must be completed by the applicable effective 
    date.
        (b) Small health plans. A small health plan must comply with the 
    requirements of this subpart by [36 months after the effective date of 
    the final rule in the Federal Register].
    
        Authority: Sections 1173 and 1175 of the Social Security Act (42 
    U.S.C. 1320d-2 and 1320d-4).
    
        Dated: July 15, 1998.
    Donna E. Shalala,
    Secretary.
        Note: The following appendix will not appear in the Code of 
    Federal Regulations.
    
    Addendum 1
    
    HIPAA Security Matrix
    
        Please Note: (1) While we have attempted to categorize security 
    requirements for ease of understanding and reading clarity, there 
    are overlapping areas on the matrix in which the same requirements 
    are restated in a slightly different context. (2) To ensure that no 
    Requirement or Implementation feature is considered more important 
    than another, this matrix has been presented, within each subject 
    area, in alphabetical order.
    
     Administrative Procedures To Guard Data Integrity, Confidentiality, and
                                  Availability                              
    ------------------------------------------------------------------------
                  Requirement                         Implementation        
    ------------------------------------------------------------------------
    Certification                                                           
    Chain of trust partner agreement                                        
    Contingency plan (all listed             Applications and data          
     implementation features must be          criticality analysis.         
     implemented).                           Data backup plan.              
                                             Disaster recovery plan.        
                                             Emergency mode operation plan. 
                                             Testing and revision.          
    Formal mechanism for processing                                         
     records.                                                               
    Information access control (all listed   Access authorization.          
     implementation features must be         Access establishment.          
     implemented).                           Access modification.           
    Internal audit                                                          
    
    [[Page 43270]]
    
                                                                            
    Personnel security (all listed           Assure supervision of          
     implementation features must be          maintenance personnel by      
     implemented).                            authorized, knowledgeable     
                                              person.                       
                                             Maintainance of record of      
                                              access authorizations.        
                                             Operating, and in some cases,  
                                              maintenance personnel have    
                                              proper access authorization.  
                                             Personnel clearance procedure. 
                                             Personnel security policy/     
                                              procedure.                    
                                             System users, including        
                                              maintenance personnel, trained
                                              in security.                  
    Security configuration mgmt. (all        Documentation.                 
     listed implementation features must be  Hardware/software installation 
     implemented).                            & maintenance review and      
                                              testing for security features.
                                             Inventory.                     
                                             Security Testing.              
                                             Virus checking.                
    Security incident procedures (all        Report procedures.             
     listed implementation features must be  Response procedures.           
     implemented).                                                          
    Security management process (all listed  Risk analysis.                 
     implementation features must be         Risk management.               
     implemented).                           Sanction policy.               
                                             Security policy.               
    Termination procedures (all listed       Combination locks changed.     
     implementation features must be         Removal from access lists.     
     implemented).                           Removal of user account(s).    
                                             Turn in keys, token or cards   
                                              that allow access.            
    Training (all listed implementation      Awareness training for all     
     features must be implemented).           personnel (including mgmt).   
                                             Periodic security reminders.   
                                             User education concerning virus
                                              protection.                   
                                             User education in importance of
                                              monitoring log in success/    
                                              failure, and how to report    
                                              discrepancies.                
                                             User education in password     
                                              management.                   
    ------------------------------------------------------------------------
    
    
        Physical Safeguards To Guard Data Integrity, Confidentiality, and   
                                  Availability                              
    ------------------------------------------------------------------------
                  Requirement                         Implementation        
    ------------------------------------------------------------------------
    Assigned security responsibility                                        
    Media controls (all listed               Access control.                
     implementation features must be         Accountability (tracking       
     implemented).                            mechanism).                   
                                             Data backup.                   
                                             Data storage.                  
                                             Disposal.                      
    Physical access controls (limited        Disaster recovery.             
     access) (all listed implementation      Emergency mode operation.      
     features must be implemented).          Equipment control (into and out
                                              of site).                     
                                             Facility security plan.        
                                             Procedures for verifying access
                                              authorizations prior to       
                                              physical access.              
                                             Maintenance records.           
                                             Need-to-know procedures for    
                                              personnel access.             
                                             Sign-in for visitors and       
                                              escort, if appropriate.       
                                             Testing and revision.          
    Policy/guideline on work station use                                    
    Secure work station location                                            
    Security awareness training                                             
    ------------------------------------------------------------------------
    
    
      Technical Security Services To Guard Data Integrity, Confidentiality, 
                                and Availability                            
    ------------------------------------------------------------------------
                  Requirement                         Implementation        
    ------------------------------------------------------------------------
    Access control (The following            Context-based access.          
     implementation feature must be          Encryption.                    
     implemented: Procedure for emergency    Procedure for emergency access.
     access. In addition, at least one of    Role-based access.             
     the following three implementation      User-based access.             
     features must be implemented: Context-                                 
     based access, Roll-based access, User-                                 
     based access. The use of Encryption is                                 
     optional).                                                             
    Audit controls                                                          
    Authorization Control (At least one of   Role-based access.             
     the listed implementation features      User-based access              
     must be implemented).                                                  
    Data Authentication                                                     
    
    [[Page 43271]]
    
                                                                            
    Entity Authentication (The following     Automatic logoff.              
     implementation features must be         Biometric.                     
     implemented: Automatic logoff, Unique   Password.                      
     user identification. In addition, at    PIN.                           
     least one of the other listed           Telephone callback.            
     implementation features must be         Token.                         
     implemented).                           Unique user identification.    
    ------------------------------------------------------------------------
    
    
      Technical Security Mechanisms To Guard Against Unauthorized Access to 
             Data That Is Transmitted Over a Communications Network         
    ------------------------------------------------------------------------
                     Requirement                         Implementation     
    ------------------------------------------------------------------------
    Communications/network controls (The           Access controls.         
     following implementation features must be     Alarm.                   
     implemented: Integrity controls, Message      Audit trail.             
     authentication. If communications or          Encryption.              
     networking is employed, one of the following  Entity authentication.   
     implementation features must be implemented:  Event reporting.         
     Access controls, Encryption. In addition, if  Integrity controls.      
     using a network, the following four           Message authentication.  
     implementation features must be implemented:                           
     Alarm, Audit trail, Entity authentication,                             
     Event reporting).                                                      
    ------------------------------------------------------------------------
    
    
                              Electronic Signature                          
    ------------------------------------------------------------------------
                  Requirement                         Implementation        
    ------------------------------------------------------------------------
    Digital signature (If digital signature  Ability to add attributes.     
     is employed, the following three        Continuity of signature        
     implementation features must be          capability.                   
     implemented: Message integrity, Non-    Counter signatures.            
     repudiation, User authentication.       Independent verifiability.     
     Other implementation features are       Interoperability.              
     optional).                              Message integrity.             
                                             Multiple Signatures.           
                                             Non-repudiation.               
                                             Transportability.              
                                             User authentication.           
    ------------------------------------------------------------------------
    
    Addendum 2--HIPAA Security and Electronic Signature Standards Glossary 
    of Terms
    
        Please Note:
        (1) While we have attempted to categorize security requirements 
    for ease of understanding and reading clarity, there are overlapping 
    areas on the matrix in which the same requirements are restated in a 
    slightly different context.
        (2) While not appearing on the matrix, a number of terms listed 
    below do appear in the glossary descriptions and have been supplied 
    for additional clarity:
        (3) The definitions provided in this document have been obtained 
    from multiple sources.
    
    Ability to add attributes:
        One possible capability of a digital signature technology, for 
    example, the ability to add a time stamp as part of a digital 
    signature.
        Part of digital signature on the matrix.
    Access:
        The ability or the means necessary to read, write, modify, or 
    communicate data/information or otherwise make use of any system 
    resource.
    Access authorization:
        Information-use policies/procedures that establish the rules for 
    granting and/or restricting access to a user, terminal, transaction, 
    program, or process.
        Part of information access control on the matrix.
    Access control:
        A method of restricting access to resources, allowing only 
    privileged entities access. (PGP, Inc.)
        Types of access control include, among others, mandatory access 
    control, discretionary access control, time-of-day, classification, 
    and subject-object separation.
        Part of Media Controls on the matrix.
        Part of technical security services to control and monitor 
    access to information on the matrix.
    Access controls:
        The protection of sensitive communications transmissions over 
    open or private networks so that it cannot be easily intercepted and 
    interpreted by parties other than the intended recipient.
        Part of mechanisms to prevent unauthorized access to data that 
    is transmitted over a communications network on the matrix.
    Access establishment:
        The security policies, and the rules established therein, that 
    determine an entity's initial right of access to a terminal, 
    transaction, program, or process.
        Part of information access control on the matrix.
    Access Level:
        A level associated with an individual who may be accessing 
    information (for example, a clearance level) or with the information 
    which may be accessed (for example, a classification level). (NRC, 
    1991, as cited in HISB, DRAFT GLOSSARY OF TERMS RELATED TO 
    INFORMATION SECURITY IN HEALTH CARE INFORMATION SYSTEMS draft 
    Glossary of Terms Related to Information Security in Health Care 
    Information Systems)
    Access modification:
        The security policies, and the rules established therein, that 
    determine types of, and reasons for, modification to an entity's 
    established right of access to a terminal, transaction, program, or 
    process.
        Part of information access control on the matrix.
    Accountability:
        The property that ensures that the actions of an entity can be 
    traced uniquely to that entity. (ASTM E1762--95)
    
    [[Page 43272]]
    
        Part of media controls on the matrix.
    Administrative procedures to guard data integrity, confidentiality 
    and availability:
        Documented, formal practices to manage (1) the selection and 
    execution of security measures to protect data, and (2) the conduct 
    of personnel in relation to the protection of data.
        A section of the matrix.
    Alarm, event reporting, and audit trail:
        (1) Alarm: In communication systems, any device that can sense 
    an abnormal condition within the system and provide, either locally 
    or remotely, a signal indicating the presence of the abnormality. 
    (188) NOTE: The signal may be in any desired form ranging from a 
    simple contact closure (or opening) to a time-phased automatic 
    shutdown and restart cycle. (Glossary of INFOSEC and INFOSEC Related 
    Terms--Idaho State University)
        (2) Event reporting: Network message indicating operational 
    irregularities in physical elements of a network or a response to 
    the occurrence of a significant task, typically the completion of a 
    request for information. (Glossary of INFOSEC and INFOSEC Related 
    Terms--Idaho State University)
        (3) Audit trail: Data collected and potentially used to 
    facilitate a security audit. (ISO 7498-2, as cited in HISB, DRAFT 
    GLOSSARY OF TERMS RELATED TO INFORMATION SECURITY IN HEALTH CARE 
    INFORMATION SYSTEMS draft Glossary of Terms Related to Information 
    Security in Health Care Information Systems)
        Part of mechanisms to prevent unauthorized access to data that 
    is transmitted over a communications network on the matrix.
    Applications and data criticality analysis:
        An entity's formal assessment of the sensitivity, 
    vulnerabilities, and security of its programs and information it 
    receives, manipulates, stores, and/or transmits.
        Part of contingency plan on the matrix.
    Assigned security responsibility:
        Practices put in place by management to manage and supervise (1) 
    the execution and use of security measures to protect data, and (2) 
    the conduct of personnel in relation to the protection of data.
        Part of Physical safeguards to guard data integrity, 
    confidentiality, and availability on the matrix.
    Assure supervision of maintenance personnel by authorized, 
    knowledgeable person:
        Documented formal procedures/instruction for the oversight of 
    maintenance personnel when such personnel are in the vicinity of 
    health information pertaining to an individual.
        Part of personnel security on the matrix.
    Asymmetric encryption:
        Encryption and decryption performed using two different keys, 
    one of which is referred to as the public key and one of which is 
    referred to as the private key.
        Also known as public-key encryption. (Stallings)
    Asymmetric key:
        One half of a key pair used in an asymmetric (``public-key'') 
    encryption system. Asymmetric encryption systems have two important 
    properties: (1) the key used for encryption is different from the 
    one used for decryption (2) neither key can feasibly be derived from 
    the other. (CORBA Security Services, 1997)
    Audit controls:
        The mechanisms employed to record and examine system activity.
        Part of technical security services to control and monitor 
    access to information on the matrix.
    Authorization control:
        The mechanism for obtaining consent for the use and disclosure 
    of health information.
        Part of technical security services to control and monitor 
    access to information on the matrix.
    Automatic logoff:
        After a pre-determined time of inactivity (for example, 15 
    minutes), an electronic session is terminated.
        Part of entity authentication on the matrix.
    Availability:
        The property of being accessible and useable upon demand by an 
    authorized entity. (ISO 7498-2, as cited in the HISB draft Glossary 
    of Terms Related to Information Security In Health care Information 
    Systems)
    Awareness training for all personnel (including management):
        All personnel in an organization should undergo security 
    awareness training, including, but not limited to, password 
    maintenance, incident reporting, and an education concerning viruses 
    and other forms of malicious software.
        Part of Training on the matrix.
    Biometric:.
        A biometric identification system identifies a human from a 
    measurement of a physical feature or repeatable action of the 
    individual (for example, hand geometry, retinal scan, iris scan, 
    fingerprint patterns, facial characteristics, DNA sequence 
    characteristics, voice prints, and hand written signature). (ASTM 
    E1762--95, as cited in the HISB draft Glossary of Terms Related to 
    Information Security In Health care Information Systems)
        Part of entity authentication on the matrix.
    Certification:
        The technical evaluation performed as part of, and in support 
    of, the accreditation process that establishes the extent to which a 
    particular computer system or network design and implementation meet 
    a pre-specified set of security requirements. This evaluation may be 
    performed internally or by an external accrediting agency.
        Part of administrative procedures to guard data integrity, 
    confidentiality, and availability.
    Chain of Trust Partner Agreement:
        Contract entered into by two business partners in which it is 
    agreed to exchange data and that the first party will transmit 
    information to the second party, where the data transmitted is 
    agreed to be protected between the partners. The sender and receiver 
    depend upon each other to maintain the integrity and confidentiality 
    of the transmitted information. Multiple such two-party contracts 
    may be involved in moving information from the originator to the 
    ultimate recipient, for example, a provider may contract with a 
    clearing house to transmit claims to the clearing house; the 
    clearing house, in turn, may contract with another clearing house or 
    with a payer for the further transmittal of those same claims.
        Part of administrative procedures to guard data integrity, 
    confidentiality and availability on the matrix..
    Classification:
        Protection of data from unauthorized access by the designation 
    of multiple levels of access authorization clearances to be required 
    for access, dependent upon the sensitivity of the information.
        A type of access control on the matrix.
    Clearing House:
        * * * a public or private entity that processes or facilitates 
    the processing of nonstandard data elements of health information 
    into standard data elements. (HIPAA, Subtitle F, Section 262(a) 
    Section 1171(2))
    Combination locks changed:
        Documented procedure for changing combinations of locking 
    mechanisms, both on a recurring basis and when personnel 
    knowledgeable of combinations no longer have a need to know or a 
    requirement for access to the protected facility/system.
        Part of termination procedures on the matrix.
    Confidentiality:
        The property that information is not made available or disclosed 
    to unauthorized individuals, entities or processes. (ISO 7498-2, as 
    cited in the HISB draft Glossary of Terms Related to Information 
    Security In Health care Information Systems) .
    Context-based access:
        An access control based on the context of a transaction (as 
    opposed to being based on attributes of the initiator or target). 
    The ``external'' factors might include time of day, location of the 
    user, strength of user authentication, etc.
        Part of access control on the matrix.
    Contingency Plan:
        A plan for responding to a system emergency. The plan includes 
    performing backups, preparing critical facilities that can be used 
    to facilitate continuity of operations in the event of an emergency, 
    and recovering from a disaster. (O'Reilly, 1992, as cited in the 
    HISB draft Glossary of Terms Related to Information Security In 
    Health care Information Systems) Contingency plans should be updated 
    routinely.
        Part of Administrative procedures to guard data integrity, 
    confidentiality and availability on the matrix.
    Continuity of signature capability:
        The public verification of a signature shall not compromise the 
    ability of the signer to apply additional secure signatures at a 
    later date. (ASTM E 1762--95)
    
    [[Page 43273]]
    
        Part of digital signature on the matrix.
    Counter signatures:
        It shall be possible to prove the order of application of 
    signatures. This is analogous to the normal business practice of 
    countersignatures, where some party signs a document which has 
    already been signed by another party. (ASTM E 1762 -95)
        Part of digital signature on the matrix.
    Data:
        A sequence of symbols to which meaning may be assigned. (NRC, 
    1991, as cited in the HISB draft Glossary of Terms Related to 
    Information Security In Health care Information Systems)
    Data authentication:
        The corroboration that data has not been altered or destroyed in 
    an unauthorized manner. Examples of how data corroboration may be 
    assured include the use of a check sum, double keying, a message 
    authentication code, or digital signature.
        Part of technical security services to control and monitor 
    access to information on the matrix
    Data backup:
        A retrievable, exact copy of information.
        Part of media controls on the matrix.
    Data backup plan:
        A documented and routinely updated plan to create and maintain, 
    for a specific period of time, retrievable exact copies of 
    information.
        Part of contingency plans on the matrix.
    Data Integrity:
        The property that dat has [sic] not been altered or destroyed in 
    an unauthorized manner. (ASTM E1762-95).
    Data storage:
        The retention of health care information pertaining to an 
    individual in an electronic format.
        Part of media controls on the matrix.
    Digital signature:
        An electronic signature based upon cryptographic methods of 
    originator authentication, computed by using a set of rules and a 
    set of parameters such that the identity of the signer and the 
    integrity of the data can be verified. (FDA Electronic Record; 
    Electronic Signatures; Final Rule)
        Part of electronic signature on the matrix.
    Disaster recovery:
        The process whereby an enterprise would restore any loss of data 
    in the event of fire, vandalism, natural disaster, or system 
    failure. (CPRI, 1996c, as cited in HISB, DRAFT GLOSSARY OF TERMS 
    RELATED TO INFORMATION SECURITY IN HEALTH CARE INFORMATION SYSTEMS 
    draft Glossary of Terms Related to Information Security in Health 
    Care Information Systems)
        Part of physical access controls (limited access) on the matrix.
    Disaster recovery plan:
        Part of an overall contingency plan. The plan for a process 
    whereby an enterprise would restore any loss of data in the event of 
    fire, vandalism, natural disaster, or system failure. (CPRI, 1996c, 
    as cited in HISB, DRAFT GLOSSARY OF TERMS RELATED TO INFORMATION 
    SECURITY IN HEALTH CARE INFORMATION SYSTEMS draft Glossary of Terms 
    Related to Information Security in Health Care Information Systems)
        Part of contingency plan on the matrix.
    Discretionary access control:
        Discretionary Access Control (DAC) is used to control access by 
    restricting a subject's access to an object. It is generally used to 
    limit a user's access to a file. In this type of access control it 
    is the owner of the file who controls other users' accesses to the 
    file.
        A type of access control on the matrix.
    Disposal:
        The final disposition of electronic data, and/or the hardware on 
    which electronic data is stored.
        Part of media controls on the matrix.
    Documentation:
        Written security plans, rules, procedures, and instructions 
    concerning all components of an entity's security.
        Part of security configuration mgmt on the matrix.
    Electronic data interchange (EDI):
        Intercompany, computer-to-computer transmission of business 
    information in a standard format. For EDI purists, ``computer-to-
    computer'' means direct transmission from the originating 
    application program to the receiving, or processing, application 
    program, and an EDI transmission consists only of business data, not 
    any accompanying verbiage or free-form messages. Purists might also 
    contend that a standard format is one that is approved by a national 
    or international standards organization, as opposed to formats 
    developed by industry groups or companies. (EDI Security, Control, 
    and Audit)
    Electronic signature:
        The attribute that is affixed to an electronic document to bind 
    it to a particular entity. An electronic signature process secures 
    the user authentication (proof of claimed identity, such as by 
    biometrics (fingerprints, retinal scans, hand written signature 
    verification, etc.), tokens or passwords) at the time the signature 
    is generated; creates the logical manifestation of signature 
    (including the possibility for multiple parties to sign a document 
    and have the order of application recognized and proven) and 
    supplies additional information such as time stamp and signature 
    purpose specific to that user; and ensures the integrity of the 
    signed document to enable transportability, interoperability, 
    independent verifiability, and continuity of signature capability. 
    Verifying a signature on a document verifies the integrity of the 
    document and associated attributes and verifies the identity of the 
    signer. There are several technologies available for user 
    authentication, including passwords, cryptography, and biometrics. 
    (ASTM 1762-95, as cited in the HISB draft Glossary of Terms Related 
    to Information Security In Health care Information Systems)
    Emergency mode operation:
        Access controls in place that enable an enterprise to continue 
    to operate in the event of fire, vandalism, natural disaster, or 
    system failure.
        Part of physical access controls (limited access) on the matrix.
    Emergency mode operation plan:
        Part of an overall contingency plan. The plan for a process 
    whereby an enterprise would be able to continue to operate in the 
    event of fire, vandalism, natural disaster, or system failure.
        Part of contingency plan on the matrix.
    Encryption:
        Transforming confidential plaintext into ciphertext to protect 
    it. Also called encipherment. An encryption algorithm combines 
    plaintext with other values called keys, or ciphers, so the data 
    becomes unintelligible. Once encrypted, data can be stored or 
    transmitted over unsecured lines. (EDI Security, Control, and Audit)
        Decrypting data reverses the encryption algorithm process and 
    makes the plaintext available for further processing.
        Part of access control on the matrix.
    Entity authentication:
        1. The corroboration that an entity is the one claimed. (ISO 
    7498-2, as cited in the HISB draft Glossary of Terms Related to 
    Information Security In Health care Information Systems)
        Part of technical security services to control and monitor 
    access to information on the matrix.
        2. A communications/network mechanism to irrefutably identify 
    authorized users, programs, and processes, and to deny access to 
    unauthorized users, programs and processes.
        Part of mechanisms to prevent unauthorized access to data that 
    is transmitted over a communications network on the matrix.
    Equipment control (into and out of site):
        Documented security procedures for bringing hardware and 
    software into and out of a facility and for maintaining a record of 
    that equipment. This includes, but is not limited to, the marking, 
    handling, and disposal of hardware and storage media.
        Part of physical access controls (limited access) on the matrix.
    Facility security plan:
        A plan to safeguard the premises and building(s) (exterior and 
    interior) from unauthorized physical access, and to safeguard the 
    equipment therein from unauthorized physical access, tampering, and 
    theft.
        Part of physical access controls (limited access) on the matrix.
    Formal mechanism for processing records:
        Documented policies and procedures for the routine, and non-
    routine, receipt, manipulation, storage, dissemination, 
    transmission, and/or disposal of health information.
    
    [[Page 43274]]
    
        Part of administrative procedures to guard data integrity, 
    confidentiality, and availability on the matrix.
    Hardware/software installation & maintenance review and testing for 
    security features:
        Formal, documented procedures for (1) connecting and loading new 
    equipment and programs, (2) periodic review of the maintenance 
    occurring on that equipment and programs, and (3) periodic security 
    testing of the security attributes of that hardware/software.
        Part of security configuration mgmt on the matrix.
    Independent verifiability:
        The capability to verify the signature without the cooperation 
    of the signer. Technically, it is accomplished using the public key 
    of the signatory, and it is a property of all digital signatures 
    performed with asymmetric key encryption
        Part of digital signature on the matrix.
    Information:
        Data to which meaning is assigned, according to context and 
    assumed conventions. (National Security Council, 1991, as cited in 
    the HISB draft Glossary of Terms Related to Information Security In 
    Health care Information Systems)
    Information access control:
        Formal, documented policies and procedures for granting 
    different levels of access to health care information.
        Part of administrative procedures to ensure integrity and 
    confidentiality on the matrix.
    Integrity controls:
        Security mechanism employed to ensure the validity of the 
    information being electronically transmitted or stored.
        Part of mechanisms to prevent unauthorized access to data that 
    is transmitted over a communications network on the matrix.
    Internal audit:
        The in-house review of the records of system activity (for 
    example, logins, file accesses, security incidents) maintained by an 
    organization.
        Part of administrative procedures to guard data integrity, 
    confidentiality, and availability on the matrix.
    Interoperability:
        The applications used on either side of a communication, between 
    trading partners and/or between internal components of an entity, 
    being able to read and correctly interpret the information 
    communicated from one to the other.
        Part of digital signature on the matrix.
    Inventory:
        Formal, documented identification of hardware and software 
    assets.
        Part of security configuration mgmt on the matrix.
    Key:
        An input that controls the transformation of data by an 
    encryption algorithm (NRC, 1991, as cited in the HISB draft Glossary 
    of Terms Related to Information Security In Health care Information 
    Systems)
    Maintenance of record of access authorizations:
        Ongoing documentation and review of the levels of access granted 
    to a user, program, or procedure accessing health information.
        Part of personnel security on the matrix.
    Maintenance records:
        Documentation of repairs and modifications to the physical 
    components of a facility, for example, hardware, software, walls, 
    doors, locks.
        Part of physical access controls (limited access) on the matrix.
    Mandatory Access Control (MAC):
        A means of restricting access to objects that is based on fixed 
    security attributes assigned to users and to files and other 
    objects. The controls are mandatory in the sense that they cannot be 
    modified by users or their programs. (Stallings, 1995) (as cited in 
    the HISB draft Glossary of Terms Related to Information Security In 
    Health care Information Systems)
        A type of access control on the matrix.
    Media controls:
        Formal, documented policies and procedures that govern the 
    receipt and removal of hardware/software (for example, diskettes, 
    tapes) into and out of a facility.
        Part of physical safeguards to guard data integrity, 
    confidentiality, and availability on the matrix.
    Message:
        A digital representation of information. (ABA Digital Signatures 
    Guidelines)
    Message authentication:
        Ensuring, typically with a message authentication code, that a 
    message received (usually via a network) matches the message sent. 
    (O'Reilly, 1992, as cited in the HISB draft Glossary of Terms 
    Related to Information Security In Health care Information Systems)
        Part of mechanisms to prevent unauthorized access to data that 
    is transmitted over a communications network on the matrix
    Message authentication code:
        Data associated with an authenticated message that allows a 
    receiver to verify the integrity of the message. (Glossary of 
    INFOSEC and INFOSEC Related Terms--Idaho State University)
    Message integrity:
        The assurance of unaltered transmission and receipt of a message 
    from the sender to the intended recipient. (ABA Digital Signature 
    Guidelines)
        Part of digital signature on the matrix.
    Multiple signatures:
        It shall be possible for multiple parties to sign a document. 
    Multiple signatures are conceptually, simply appended to the 
    document. (ASTM E 1762-95)
        Part of digital signature on the matrix.
    Need-to-know procedures for personnel access:
        A security principle stating that a user should have access only 
    to the data he or she needs to perform a particular function. 
    (O'Reilly, 1992, as cited in the HISB draft Glossary of Terms 
    Related to Information Security In Health care Information Systems)
        Part of physical access controls (limited access) on the matrix.
    Nonrepudiation:
        Strong and substantial evidence of the identity of the signer of 
    a message and of message integrity, sufficient to prevent a party 
    from successfully denying the origin, submission or delivery of the 
    message and the integrity of its contents. (ABA Digital Signature 
    Guidelines)
        Part of digital signature on the matrix.
    Operating, and in some cases, maintenance personnel have proper 
    access authorizations:
        Formal, documented policies and procedures to be followed in 
    determining the access level to be granted to individuals working 
    on, or in the vicinity of, health information.
        Part of personnel security on the matrix.
    Password:
        Confidential authentication information composed of a string of 
    characters. (ISO 7498--2, as cited in the HISB draft Glossary of 
    Terms Related to Information Security In Health care Information 
    Systems)
        Part of entity authentication on the matrix.
    Periodic security reminders:
        Employees, agents and contractors should be made aware of 
    security concerns on an ongoing basis.
        Part of training on the matrix.
    Personnel clearance procedure:
        A protective measure applied to determine that an individual's 
    access to sensitive unclassified automated information is 
    admissible. The need for and extent of a screening process is 
    normally based on an assessment of risk, cost, benefit, and 
    feasibility as well as other protective measures in place. Effective 
    screening processes are applied in such a way as to allow a range of 
    implementation, from minimal procedures to more stringent procedures 
    commensurate with the sensitivity of the data to be accessed and the 
    magnitude of harm or loss that could be caused by the individual 
    (DOE 1360.2A, as cited in Glossary of INFOSEC and INFOSEC Related 
    Terms--Idaho State University)
        Part of personnel security on the matrix.
    Personnel security:
        The procedures established to ensure that all personnel who have 
    access to sensitive information have the required authority as well 
    as appropriate clearances. (NCSC Glossary of Computer Security 
    Terms, October 21, 1988)
        Part of administrative procedures to guard data integrity, 
    confidentiality and availability on the matrix.
    Personnel security policy/procedure:
        Formal, documentation of policies and procedures established to 
    ensure that all personnel who have access to sensitive information 
    have the required authority as well as appropriate clearances. 
    (Glossary of INFOSEC and INFOSEC Related Terms--Idaho State 
    University)
        Part of personnel security on the matrix.
    Physical access controls (limited access):
        Those formal, documented policies and procedures to be followed 
    to limit
    
    [[Page 43275]]
    
    physical access to an entity while ensuring that properly authorized 
    access is allowed.
        Part of Physical safeguards to guard data integrity, 
    confidentiality, and availability on the matrix.
    Physical safeguards:
        Protection of physical computer systems and related buildings 
    and equipment from fire and other natural and environmental hazards, 
    as well as from intrusion. Also covers the use of locks, keys, and 
    administrative measures used to control access to computer systems 
    and facilities. (O'Reilly, 1992, as cited in HISB, draft Glossary of 
    Terms Related to Information Security in Health Care Information 
    Systems)
        A section of the matrix covering physical security requirements.
    PIN (Personal Identification Number):
        A number or code assigned to an individual and used to provide 
    verification of identity.
        Part of entity authentication on the matrix.
    Policy/guideline on work station use:
        Documented instructions/procedures delineating the proper 
    functions to be performed, the manner in which those functions are 
    to be performed, and the physical attributes of the surroundings, of 
    a specific computer terminal site or type of site, dependant upon 
    the sensitivity of the information accessed from that site.
        Part of Physical safeguards to guard data integrity, 
    confidentiality, and availability on the matrix.
    Procedure for emergency access:
        Documented instructions for obtaining necessary information 
    during a crisis.
        Part of access control on the matrix.
    Procedures for verifying access authorizations prior to physical 
    access:
        Formal, documented policies and instructions for validating the 
    access privileges of an entity prior to granting those privileges.
        Part of physical access controls (limited access) on the matrix.
    Provider:
        A supplier of services as defined in section 1861(u) of the 
    HIPAA.
        A supplier of medical or other services as defined in section 
    1861(s) of the HIPAA.
    Public key:
        One of the two keys used in an asymmetric encryption system. The 
    public key is made public, to be used in conjunction with a 
    corresponding private key. [Stallings, 1995]
    Removal from access lists:
        The physical eradication of an entity's access privileges.
        Part of termination procedures on the matrix.
    Removal of user account(s):
        The termination or deletion of an individual's access privileges 
    to the information, services, and resources for which they currently 
    have clearance, authorization, and need-to-know when such clearance, 
    authorization and need-to-know no longer exists.
        Part of termination procedures on the matrix.
    Report procedures:
        The documented formal mechanism employed to document security 
    incidents.
        Part of security incident procedures on the matrix.
    Response procedures:
        The documented formal rules/instructions for actions to be taken 
    as a result of the receipt of a security incident report.
        Part of security incident procedures on the matrix.
    Risk analysis:
        Risk analysis, a process whereby cost-effective security/control 
    measures may be selected by balancing the costs of various security/
    control measures against the losses that would be expected if these 
    measures were not in place.
        Part of the security management process on the matrix.
    Risk management:
        Risk is the possibility of something adverse happening. Risk 
    management is the process of assessing risk, taking steps to reduce 
    risk to an acceptable level and maintaining that level of risk. 
    (NIST Pub. 800-14)
        Part of the security management process on the matrix.
    Role-based access control:
        Role-based access control (RBAC) is an alternative to 
    traditional access control models (e.g., discretionary or non-
    discretionary access control policies) that permits the 
    specification and enforcement of enterprise-specific security 
    policies in a way that maps more naturally to an organization's 
    structure and business activities. With RBAC, rather than attempting 
    to map an organization's security policy to a relatively low-level 
    set of technical controls (typically, access control lists), each 
    user is assigned to one or more predefined roles, each of which has 
    been assigned the various privileges needed to perform that role.
        Part of access control on the matrix.
        Part of authorization control on the matrix.
    Sanction policy:
        Organizations must have policies and procedures regarding 
    disciplinary actions which are communicated to all employees, agents 
    and contractors, for example, verbal warning, notice of disciplinary 
    action placed in personnel files, removal of system privileges, 
    termination of employment and contract penalties (ASTM E 1869)
        In addition to enterprise sanctions, employees, agents, and 
    contractors must be advised of civil or criminal penalties for 
    misuse or misappropriation of health information. Employees, agents 
    and contractors, must be made aware that violations may result in 
    notification to law enforcement officials and regulatory, 
    accreditation and licensure organizations. (ASTM)
        Part of the security management process on the matrix.
    Secure work station location:
        Physical safeguards to eliminate or minimize the possibility of 
    unauthorized access to information, for example, locating a terminal 
    used to access sensitive information in a locked room and 
    restricting access to that room to authorized personnel, not placing 
    a terminal used to access patient information in any area of a 
    doctor's office where the screen contents can be viewed from the 
    reception area.
        Part of physical safeguards to guard data integrity, 
    confidentiality, and availability on the matrix.
    Security:
        Security encompasses all of the safeguards in an information 
    system, including hardware, software, personnel policies, 
    information practice policies, disaster preparedness, and the 
    oversight of all these areas. The purpose of security is to protect 
    both the system and the information it contains from unauthorized 
    access from without and from misuse from within.
        Through various security measures, a health information system 
    can shield confidential information from unauthorized access, 
    disclosure and misuse, thus protecting privacy of the individuals 
    who are the subjects of the stored data. (Privacy and Health 
    Information Systems: A Guide to Protecting Patient Confidentiality)
    Security awareness training:
        All employees, agents, and contractors must participate in 
    information security awareness training programs. Based on job 
    responsibilities, individuals may be required to attend customized 
    education programs that focus on issues regarding use of health 
    information and responsibilities regarding confidentiality and 
    security. (ASTM)
        Part of Physical safeguards to guard data integrity, 
    confidentiality, and availability on the matrix.
    Security configuration management:
        Measures, practices and procedures for the security of 
    information systems should be coordinated and integrated with each 
    other and other measures, practices and procedures of the 
    organization so as to create a coherent system of security. (OECD 
    Guidelines, as cited in NIST Pub 800-14)
        Part of administrative procedures to guard data integrity, 
    confidentiality, and availability on the matrix.
    Security incident procedures:
        Formal, documented instructions for reporting security breaches.
        Part of administrative procedures to guard data integrity, 
    confidentiality and availability on the matrix.
    Security management process:
        A security management process encompasses the creation, 
    administration and oversight of policies to ensure the prevention, 
    detection, containment, and correction of security breaches. It 
    involves risk analysis and risk management, including the 
    establishment of accountability, management controls (policies and 
    education), electronic controls, physical security, and penalties 
    for the abuse and misuse of its assets, both physical and 
    electronic.
    
    [[Page 43276]]
    
        Part of administrative procedures to guard data integrity, 
    confidentiality and availability on the matrix.
    Security policy:
        The framework within which an organization establishes needed 
    levels of information security to achieve the desired 
    confidentiality goals. A policy is a statement of information 
    values, protection responsibilities, and organization commitment for 
    a system. (OTA, 1993) The American Health Information Management 
    Association recommends that security policies apply to all 
    employees, medical staff members, volunteers, students, faculty, 
    independent contractors, and agents. (AHIMA, 1996c) (as cited in 
    HISB, DRAFT GLOSSARY OF TERMS RELATED TO INFORMATION SECURITY IN 
    HEALTH CARE INFORMATION SYSTEMS draft Glossary of Terms Related to 
    Information Security in Health Care Information Systems )
        Part of the security management process on the matrix
    Security testing:
        A process used to determine that the security features of a 
    system are implemented as designed and that they are adequate for a 
    proposed applications environment. This process includes hands-on 
    functional testing, penetration testing, and verification. (Glossary 
    of INFOSEC and INFOSEC Related Terms--Idaho State University)
        Part of security configuration mgmt on the matrix.
    Sign-in for visitors and escort, if appropriate:
        Formal, documented procedure governing the reception and hosting 
    of visitors.
        Part of physical access controls (limited access) on the matrix.
    Subject/object separation:
        Access to a subject does not guarantee access to the objects 
    associated with that subject.
        Subject is defined as an active entity, generally in the form of 
    a person, process, or device that causes information to flow among 
    objects or changes the system state. Technically, a process/domain 
    pair. (Glossary of INFOSEC and INFOSEC Related Terms--Idaho State 
    University)
        Object is defined as a passive entity that contains or receives 
    information. Access to an object potentially implies access to the 
    information it contains. Examples of objects are: records blocks, 
    pages, segments, files, directories, directory trees, and programs, 
    as well as bits, bytes, words, fields, processors, video displays, 
    keyboards, clocks, printers, network nodes, etc. (Glossary of 
    INFOSEC and INFOSEC Related Terms--Idaho State University)
        A type of access control.
    System users, including maintenance personnel, trained in security:
        See Awareness training (including management).
        Part of personnel security on the matrix.
    Technical security mechanisms:
        The processes that are put in place to guard against 
    unauthorized access to data that is transmitted over a 
    communications network,
        A section of the matrix.
    Technical security services:
        The processes that are put in place (1) to protect information 
    and (2) to control and monitor individual access to information.
        A section of the matrix.
    Telephone callback:
        A method of authenticating the identity of the receiver and 
    sender of information through a series of ``questions'' and 
    ``answers'' sent back and forth establishing the identity of each. 
    For example, when the communicating systems exchange a series of 
    identification codes as part of the initiation of a session to 
    exchange information, or when a host computer disconnects the 
    initial session before the authentication is complete, and the host 
    calls the user back to establish a session at a predetermined 
    telephone number.
        Part of Entity authentication on the matrix.
    Termination procedures:
        Formal, documented instructions, which include appropriate 
    security measures, for the ending of an employee's employment, or an 
    internal/external user's access.
        Part of administrative procedures to guard data integrity, 
    confidentiality and availability on the matrix.
    Testing and revision:
        (1) Testing and revision of contingency plans refers to the 
    documented process of periodic testing to discover weaknesses in 
    such plans and the subsequent process of revising the documentation 
    if necessary.
        Part of contingency plan on the matrix.
        (2) Testing and revision of programs should be restricted to 
    formally authorized personnel.
        Part of physical access controls (limited access) on the matrix.
    Time-of-day:
        Access to data is restricted to certain time frames, e.g., 
    Monday through Friday, 8:00 a.m. to 6:00 p.m.
        A type of access control on the matrix.
    Time-stamp:
        To create a notation that indicates, at least, the correct date 
    and time of an action, and the identity of the person that created 
    the notation.
    Token:
        A physical item that's used to provide identity. Typically an 
    electronic device that can be inserted in a door or a computer 
    system to obtain access. (O'Reilly, 1992) (as cited in HISB, DRAFT 
    GLOSSARY OF TERMS RELATED TO INFORMATION SECURITY IN HEALTH CARE 
    INFORMATION SYSTEMS draft Glossary of Terms Related to Information 
    Security in Health Care Information Systems)
        Part of entity authentication on the matrix
    Training:
        Education concerning the vulnerabilities of the health 
    information in an entity's possession and ways to ensure the 
    protection of that information.
        Part of administrative procedures to guard data integrity, 
    confidentiality and availability on the matrix.
    Transportability:
        A signed document can be transported (over an insecure network) 
    to another system, while maintaining the integrity of the document.
        Part of digital signature on the matrix.
    Turn in keys, token or cards that allow access:
        Formal, documented procedure to ensure all physical items that 
    allow a terminated employee to access a property, building, or 
    equipment are retrieved from that employee, preferably prior to 
    termination.
        Part of termination procedures on the matrix.
    Unique user identification:
        The combination name/number assigned and maintained in security 
    procedures for identifying and tracking individual user identity. 
    (ASTM)
        Part of Entity authentication on the matrix.
    User authentication:
        The provision of assurance of the claimed identity of an entity. 
    (ASTM E1762-5)
        Part of digital signature on the matrix.
    User-based access:
        A security mechanism used to grant users of a system access 
    based upon the identity of the user.
        Part of access control on the matrix.
        Part of authorization control on the matrix.
    User education in importance of monitoring log in success/failure, 
    and how to report discrepancies:
        Training in the user's responsibility to ensure the security of 
    health care information.
        Part of training on the matrix.
    User education concerning virus protection:
        Training relative to user awareness of the potential harm that 
    can be caused by a virus, how to prevent the introduction of a virus 
    to a computer system, and what to do if a virus is detected.
        Part of training on the matrix.
    User education in password management:
        A type of user training in the rules to be followed in creating 
    and changing passwords and the need to keep them confidential.
        Part of training on the matrix.
    Virus checking:
        A computer program that identifies and disables:
        (1) another ``virus'' computer program, typically hidden, that 
    attaches itself to other programs and has the ability to replicate. 
    (Unchecked virus programs result in undesired side effects generally 
    unanticipated by the user.)
        (2) A type of programmed threat. A code fragment (not an 
    independent program) that reproduces by attaching to another 
    program. It may damage data directly, or it may degrade system 
    performance by taking over system resources which are then not 
    available to authorized users. (O'Reilly, 1992, as cited in HISB, 
    DRAFT GLOSSARY OF TERMS RELATED TO INFORMATION SECURITY IN HEALTH 
    CARE INFORMATION SYSTEMS draft Glossary of Terms Related to 
    Information
    
    [[Page 43277]]
    
    Security in Health Care Information Systems)
        (3) Code embedded within a program that causes a copy of itself 
    to be inserted in one or more other programs. In addition to 
    propagation, the virus usually performs some unwanted function. 
    (Stallings, 1995, as cited in HISB, DRAFT GLOSSARY OF TERMS RELATED 
    TO INFORMATION SECURITY IN HEALTH CARE INFORMATION SYSTEMS draft 
    Glossary of Terms Related to Information Security in Health Care 
    Information Systems)
        Part of security configuration mgmt on the matrix.
    
    Acronyms
    
    ABA  American Bar Association
    ADA  American Dental Association
    ANSI  American National Standards Institute
    AHIMA  American Health Information Management Association
    ASTM  American Society for Testing and Materials
    CDT  Center for Democracy & Technology
    CEN  Central European Nations
    CORBA  Common Object Request Broker
    CPRI  Computer-based Patient Record Institute
    DAC  Discretionary Access Control
    DEA  Data Encryption Algorithm
    EDI  Electronic Data Interchange
    EHNAC  Electronic Healthcare Network Accreditation Commission
    FDA  Food and Drug Administration
    HISB  Health Care Informatics Standards Board
    ISO  International Organization for Standardization
    MAC  Mandatory Access Control
    NCSC  National Computer Security Center
    NCQA  National Council for Quality Assurance
    NCVHS  National Committee on Vital and Health Statistics
    NUBC  National Uniform Billing Committee
    NUCC  National Uniform Claim Committee
    PGP  Pretty Good Privacy
    PIN  Personal Identification Number
    NIST  National Institutes of Standards and Technology
    SDO  Standards Development Organization
    WEDI  Workgroup for Electronic Data Interchange
    
    Bibliography
    
    ABA, Digital Signature Guidelines.
    ANSI, ASC X12.58, Security Structures, June, 1997.
    ASTM, E1762-95, Standard Guide for Electronic Authentication of 
    Health Care Information. ASTM Committee E-31 on Computerized 
    Systems, Subcommittee E31.20 on Authentication. West Conshohocken, 
    PA, October 10, 1995.
    ASTM, A Security Framework for Healthcare Information. ASTM 
    Committee E-31 on Computerized Systems, Subcommittee E31.20 on 
    Authentication. West Conshohocken, PA, February 11, 1997.
    EDI Security, Control, and Audit, Marcells, Albert J. & Chan, Sally. 
    Artech House, 685 Canton Street, Norwood, MA 01602, 1993.
    FDA, Electronic Record; Electronic Signatures; Final Rule.
    For the Record--Protecting Electronic Health Information, Computer 
    Science and Telecommunications Board, NRC, National Academy Press, 
    2102 Constitution Avenue, NW, Box 285, Washington, DC, 20055, 1997.
    Glossary of INFOSEC and INFOSEC Related Terms, Version 6. Schou, 
    Corey D., Center for Decision Support, Idaho State University. 
    August, 1996
    HISB, DRAFT GLOSSARY OF TERMS RELATED TO INFORMATION SECURITY IN 
    HEALTH CARE INFORMATION SYSTEMS Glossary of Terms Related to 
    Information Security in Health Care Information Systems draft, 1997
    NCSC, Glossary of Computer Security Terms, October 21, 1988.
    NIST Pub 800-14, ``Generally Accepted Principles and Practices for 
    Securing Information Technology Systems'', Swanson, Marianne, & 
    Guttman, Barbara, September, 1996. PGP, Inc., Cryptology Reference 
    Chart, August, 1997
    Privacy and Health Information Systems: A Guide to Protecting 
    Patient Confidentiality, Goldman, Janlori & Mulligan, Deirdre, CDT, 
    1996.
    
    Addendum 3
    
    HIPAA SECURITY MATRIX--mapping
    
        Please Note: While we have attempted to categorize security 
    requirements for ease of understanding and reading clarity, there 
    are overlapping areas on the matrix in which the same requirements 
    are restated in a slightly different context.
    
     Administrative Procedures To Guard Data Integrity, Confidentiality, and
                                  Availability                              
    ------------------------------------------------------------------------
             Requirement             Implementation       Mapped  standards 
    ------------------------------------------------------------------------
    Certification...............  ....................  47.                 
    Chain of trust partner        ....................  12, 47.             
     agreement.                                                             
    Contingency plan (all listed  Applications and      17, 47, 53.         
     implementation features       data criticality     12, 17, 47.         
     must be implemented).         analysis.            12, 17, 47, 53.     
                                  Data backup plan....  47, 53.             
                                  Disaster recovery     12, 17, 47.         
                                   plan.                                    
                                  Emergency mode                            
                                   operation plan.                          
                                  Testing and revision                      
    Formal mechanism for          ....................  12, 17.             
     processing records.                                                    
    Information access control    Access authorization  12, 17, 47, 53.     
     (all listed implementation   Access establishment  17, 47, 53.         
     features must be             Access modification.  12, 17, 47, 53.     
     implemented).                                                          
    Internal audit..............  ....................  12, 17, 43, 44, 47. 
       Personnel security (all    Assure supervision    17, 47.             
        listed implementation      of maintenance                           
          features must be         personnel by                             
            implemented)           authorized,                              
                                   knowledgeable                            
                                   person.                                  
                                  Maintainance of       12, 17, 47.         
                                   record of access                         
                                   authorizations.                          
                                  Operating, and in     17, 47.             
                                   some cases,                              
                                   maintenance                              
                                   personnel have                           
                                   proper access                            
                                   authorization.                           
                                  Personnel clearance   17, 47.             
                                   procedure.                               
                                  Personnel security    17, 47, 53.         
                                   policy/procedure.                        
                                  System users,         12, 17, 47, 53.     
                                   including                                
                                   maintenance                              
                                   personnel, trained                       
                                   in security.                             
    Security configuration mgmt.  Documentation.......  12, 17, 47, 53.     
     (all listed implementation                                             
     features must be                                                       
     implemented).                                                          
                                  Hardware/software     12, 17, 47.         
                                   installation &                           
                                   maintenance review                       
                                   and testing for                          
                                   security features.                       
                                  Inventory...........  12, 17.             
                                  Security testing....  12, 17, 47.         
                                  Virus checking......  12, 17, 47, 53.     
    Security incident procedures  Report procedures...  12, 17, 47.         
     (all listed implementation   Response procedures.  17, 47.             
     features must be                                                       
     implemented).                                                          
    
    [[Page 43278]]
    
                                                                            
    Security management process   Risk analysis.......  12, 17, 47, 53.     
     (all listed implementation   Risk management.....  17, 47.             
     features must be             Sanction policy.....  12, 17, 47, 53.     
     implemented).                Security policy.....  17, 47, 53.         
    Termination procedures (all   Combination locks     12, 17.             
     listed implementation         changed.             12, 17, 47, 53.     
     features must be             Removal from access   12, 17, 47.         
     implemented).                 lists.               12, 17, 47.         
                                  Removal of user                           
                                   account(s).                              
                                  Turn in keys, token                       
                                   or cards that allow                      
                                   access.                                  
    Training (all listed          Awareness training    12, 17, 18, 47, 53. 
     implementation features       for all personnel                        
     must be implemented).         (including mgmt).                        
                                  Periodic security     12, 18.             
                                   reminders.                               
                                  User education        ....................
                                   concerning virus                         
                                   protection.                              
                                  User education in     12, 17, 18.         
                                   importance of                            
                                   monitoring log in                        
                                   success/failure,                         
                                   and how to report                        
                                   discrepancies.                           
                                  User education in     12, 18, 47          
                                   password management.                     
    ------------------------------------------------------------------------
    
    
        Physical Safeguards To Guard Data Integrity, Confidentiality, and   
                                  Availability                              
    ------------------------------------------------------------------------
             Requirement             Implementation       Mapped standards  
    ------------------------------------------------------------------------
    Assigned security             ....................  47.                 
     responsibility.                                                        
    Media controls (all listed    Access control......  17, 47, 53.         
     implementation features      Accountability        17, 18, 47.         
     must be implemented).         (tracking            12, 17, 47, 53.     
                                   mechanism).          12, 17, 47.         
                                  Data backup.........  17, 47, 53.         
                                  Data storage........                      
                                  Disposal............                      
    Physical access controls      Disaster recovery...  17.                 
     (limited access) (all        Emergency mode        17.                 
     listed implementation         operation.           17, 47.             
     features must be             Equipment control     12, 17, 47.         
     implemented).                 (into and out of                         
                                   site).                                   
                                  Facility security                         
                                   plan.                                    
                                  Procedures for        17, 18, 47.         
                                   verifying access                         
                                   authorizations                           
                                   prior to physical                        
                                   access.                                  
                                  Maintenance records.  17                  
                                  Need-to-know          12, 17, 47, 53      
                                   procedures for                           
                                   personnel access.                        
                                  Sign-in for visitors  17                  
                                   and escort, if                           
                                   appropriate.                             
                                  Testing and revision  17, 47              
    Policy/guideline on work      ....................  18.                 
     station use.                                                           
    Secure work station location  ....................  17, 53.             
    Security awareness training.  ....................  12, 17, 47.         
    ------------------------------------------------------------------------
    
    
      Technical Security Services To Guard Data Integrity, Confidentiality, 
                                and Availability                            
    ------------------------------------------------------------------------
             Requirement             Implementation       Mapped standards  
    ------------------------------------------------------------------------
    Access control (The           Context-based         5, 12, 14, 16, 17,  
     following implementation      access,.              40, 47.            
     feature must be              Encryption..........  1, 6, 12, 14, 17,   
     implemented: Procedure for                          21, 22, 23, 24, 26,
     emergency access, In         Procedure for          36, 28, 29, 30, 31,
     addition, at least one of     emergency access.     47, 49, 53, 54, 55.
     the following three          Roll-based access,..  14, 17, 53.         
     implementation features      User-based access...  14, 16, 17, 40, 41, 
     must be implemented:                                47, 53.            
     Context-based access, Roll-                        11, 12, 14, 16, 17, 
     based access, User-based                            40, 41, 47, 53.    
     access. The use of                                                     
     Encryption is optional).                                               
    Audit controls..............  ....................  12, 14, 18, 47, 53. 
    Authorization control (At     Role-based access...  5, 14, 16, 17, 47,  
     least one of the listed      User-based access...   53.                
     implementation features                            14, 16, 47, 53.     
     must be implemented).                                                  
    Data authentication.........  ....................  11, 53.             
    Entity Authentication (The    Automatic logoff....  14, 16, 17, 18, 40, 
     following implementation     Biometric...........   53                 
     features must be             Password............  14, 16, 18, 40, 47, 
     implemented: Automatic       PIN.................   53.                
     logoff, Unique user          Telephone callback..  14, 16, 17, 18, 19, 
     identification. In           Token...............   40, 47, 53.        
     addition, at least one of    Unique user           14, 16, 18, 19, 40, 
     the other listed              identification.       47.                
     implementation features                            14, 17, 18, 47, 53. 
     must be implemented).                              14, 17, 47, 50, 53. 
                                                        14, 47, 53.         
    ------------------------------------------------------------------------
    
    
    [[Page 43279]]
    
    
     Technical Security Mechanisms To Guard Data Integrity, Confidentiality,
                                and Availability                            
    ------------------------------------------------------------------------
             Requirement             Implementation       Mapped standards  
    ------------------------------------------------------------------------
    Communications/network        Access controls.....  14, 17, 22, 23, 39, 
     controls (If communications  Alarm, event           47, 48, 53.        
     or networking is employed,    reporting, and       14, 17, 18, 35, 36, 
     the following                 audit trail.          37, 38, 44.        
     implementation features      Audit trail                               
     must be implemented:         Encryption..........  1, 6, 12, 14, 17,   
     Integrity controls, Message                         21, 22, 23, 24, 26,
     authentication. In           Entity                 27, 28, 29, 30, 31,
     addition, one of the          authentication.       47, 49, 52, 53.    
     following implementation                           12, 14, 17, 18, 20, 
     features must be             Event reporting        22, 23, 31, 32, 33,
     implemented: Access          Integrity controls..   34, 51, 53.        
     controls, Encryption. In     Message                                   
     addition, if using a          authentication.      14, 15, 17, 18, 22, 
     network, the following four                         23, 45, 46.        
     implementation features                            14, 15, 17, 18, 22, 
     must be implemented: Alarm,                         23, 25, 45, 46, 52.
     Audit trail, Entity                                                    
     authentication, Event                                                  
     reporting).                                                            
    ------------------------------------------------------------------------
    
    
                              Electronic Signature                          
    ------------------------------------------------------------------------
             Requirement             Implementation       Mapped standards  
    ------------------------------------------------------------------------
    Digital signature (If         Ability to add        3, 4, 10, 11, 13, 20
     digital signature is          attributes.          3, 4, 11, 13, 14, 18
     employed, the following      Continuity of         3, 4, 10, 11, 13,   
     three implementation          signature             14, 18             
     features must be              capability.          3, 4, 11, 13, 20    
     implemented: Message         Counter signatures..  3, 4, 7, 8, 9, 13,  
     integrity, Non-repudiation,  Independent            14, 48             
     User authentication. Other    verifiability.       3, 4, 10, 11, 13,   
     implementation features are  Interoperability....   14, 18             
     optional).                   Message integrity...  3, 4, 10, 11, 13, 20
                                  Multiple signatures.  2, 3, 4, 10, 11, 13,
                                  Non-repudiation.....   14, 42             
                                  Transportability....  3, 4, 11, 13, 14, 18
                                  User authentication.  3, 4, 10, 11, 13, 20
    ------------------------------------------------------------------------
    
    Mapped Standards
    
    1. ANSI X3.92--Data Encryption Standard
    2. ANSI X9.30--Part 1: Public Key Cryptography Using Irreversible 
    Algorithms: Digital Signature Algorithm
    3. ANSI X9.30--Part 2: Public Key Cryptography Using Irreversible 
    Algorithms: Secure Hash Algorithm (SHA-1)
    4. ANSI X9.31--Reversible Digital Signature Algorithms
    5. ANSI X9.45--Enhanced Management Controls Using Digital Signatures 
    and Attribute Certificates
    6. ANSI X9.52--Triple DES Modes of Operation
    7. ANSI X9.55--Extensions to Public Key Certificates and CRLs
    8. ANSI X9.57--Certificate Management
    9. ANSI X9.62--Elliptic Curve Digital Signature Algorithm (draft)
    10. ANSI X12.58--Security Structures (version 2)
    11. ASTM E 1762--Standard Guide for Authentication of Healthcare 
    Information
    12. ASTM E 1869--Draft Standard for Confidentiality, Privacy, Access 
    and Data Security Principles
    13. ASTM PS 100-97--Standard Specification for Authentication of 
    Healthcare Information Using Digital Signatures
    14. ASTM PS 101-97--Security Framework for Healthcare Information
    15. ASTM PS 102-97--Standard Guide for Internet and Intranet 
    Security
    16. ASTM PS 103-97 Authentication & Authorization Guideline
    17. CEN--European Pre-Standard
    18. FDA--Electronic Records--Electronic Signatures--Final Rule
    19. FIPS PUB 112--Password Usage
    20. FIPS PUB 196--Entity Authentication Using Public Key 
    Cryptography
    21. FIPS PUB 46-2--Data Encryption Standard
    22. IEEE 802.10: Interoperable LAN/MAN Security (SILS), 1992-1996 
    (multiple parts)
    23. IEEE 802.10c--LAN/WAN Security--Key Management
    24. IETF ID--Combined SSL/PCT Transport Layer Security Protocol
    25. IETF ID--FTP Authentication Using DSA
    26. IETF ID--Secure HyperText TP Protocol (S-HTTP)
    27. IETF ID--SMIME Cert Handling
    28. IETF ID--SMIME Message Specification
    29. IETF RFC 1422--Privacy Enhanced Mail: Part 1: Message Encryption 
    and Authentication Procedures
    30. IETF RFC 1424--Privacy Enhanced Mail: Part 2: Certificate-Based 
    Key Management
    31. IETF RFC 1423--Privacy Enhanced Mail: Part 3: Algorithms, Modes, 
    and Identifiers
    32. ISO/IEC 9798-1: Information Technology--Security Techniques--
    Entity Authentication Mechanisms--Part 1: General Model
    33. ISO/IEC 9798-2: Information Technology--Security Techniques--
    Entity Authentication Mechanisms--Part 2: Entity Authentication 
    Using Asymmetric Techniques
    34. ISO/IEC 9798-2: Information Technology--Security Techniques--
    Entity Authentication Mechanisms--Part 2: Entity Authentication 
    Using Symmetric Techniques
    35. ISO/IEC 10164-4--Information Technology--Open Systems 
    Connection--System Management: Alarm Reporting Function
    36. ISO/IEC 10164-5--Information Technology--Open Systems 
    Connection--System Management: Event Report Management Function
    37. ISO/IEC 10164-7--Information Technology--Open Systems 
    Connection--System Management: Security Alarm Reporting Function
    38. ISO/IEC 10164-8--Information Technology--Open Systems 
    Connection--System Management: Security Audit Trail Function
    39. ISO/IEC 10164-9--Information Technology--Open Systems 
    Connection--System Management: Objects and Attributes for Access 
    Control
    40. ISO/IEC 10181-2--Information Technology--Security Frameworks in 
    Open Systems--Authentication Framework
    41. ISO/IEC 10181-3--Information Technology--Security Frameworks in 
    Open Systems--Access Control Framework
    42. ISO/IEC 10181-4--Information Technology--Security Frameworks in 
    Open Systems--Non-repudiation Framework
    43. ISO/IEC 10181-5--Information Technology--Security Frameworks in 
    Open Systems--Confidentiality Framework
    44. ISO/IEC 10181-7--Information Technology--Security Frameworks in 
    Open Systems--Security Audit Framework
    45. ISO/IEC 10736--Information Technology--Telecommunications and 
    Information Exchange Between Systems--Transport Layer Security 
    Protocol (TLSP)
    
    [[Page 43280]]
    
    46. ISO/IEC 11577--Information Technology--Telecommunications and 
    Information Exchange Between Systems--Network Layer Security 
    Protocol (NLSP)
    47. NIST--Generally Accepted Principles and Practices for Secure 
    Information Technology Systems
    48. NIST MISPC--Minimum Interoperability Specification for PKI 
    Components Version 1
    49. PKCS #7--Cryptographic Message Syntax Standard Version 1.5 or 
    later
    50. PKCS #11--Cryptoki B A Cryptographic Token Interface
    51. RFC 1510--Kerberos Authentication Service
    52. RFC 2104--HMAC:Keyed-Hashing for Message Authentication
    53. For the Record--Protecting Electronic Health Information
    54. ANSI X9.42--Management of Symmetric Keys Using Diffie-Hellman
    55. ANSI X9.44--Key Transport Using RSA
    
    [FR Doc. 98-21601 Filed 8-7-98; 1:23 pm]
    BILLING CODE 4120-01-P
    
    
    

Document Information

Published:
08/12/1998
Department:
Health and Human Services Department
Entry Type:
Proposed Rule
Action:
Proposed rule.
Document Number:
98-21601
Dates:
Comments will be considered if we receive them at the
Pages:
43242-43280 (39 pages)
Docket Numbers:
HCFA-0049-P
RINs:
0938-AI57: Security Standards (CMS-0049-F)
RIN Links:
https://www.federalregister.gov/regulations/0938-AI57/security-standards-cms-0049-f-
PDF File:
98-21601.pdf
CFR: (13)
45 CFR 142.103)
45 CFR 142.101
45 CFR 142.102
45 CFR 142.103
45 CFR 142.104
More ...