HIPAA Section G – Person or Entity Authentication§ 164.312(d)
(Required)
Access and Management: Pro, Central
- Access to the host computer is protected by the use of separate, unique passwords for the website and the host computer.
- Set up a Personal Password to access the host computer to verify that access is authorized.
Tip: Open the and follow this path: .
- Configure an IP address lockout to prevent unauthorized remote access from a specific client computer. With IP address filtering, users can grant or prevent access for multiple IP addresses.
Tip: Open the and follow this path: .
Support and Collaboration: Rescue
- The technician’s identity is defined by a unique email address, or via an SSO ID, and the technician must be authenticated.
- Excessive number of unsuccessful login attempts (five unsuccessful attempts) will lock the account.
- Use IP address restrictions to limit access to the Technician Console.
Tip: Open the Administration Center, select a group, and follow this path: .
Parent article:
HIPAA Considerations - Introduction
Previous article:
HIPAA Section F – Integrity mechanism, § 164.312(c)(2)