Okay, let's clarify:
 
An accounting of disclosures is *not* the same thing as an "audit log." An accounting of disclosures is a type of document a CE is required to provide an individual upon request, which includes information specified in the privacy rule. See 164.528. Since this accounting is required to be made for all disclosures up to six years before the request, it implies that a CE better maintain documentation to support the accounting for at least six years. (Also, the accounting document itself will have to be retained for at least six years after it is provided.) 
 
The security rule says nothing about "audit logs."  It does include a standard (no additional specification) for "audit controls," which are "hardware, software and/or procedural mechanisms that record and examine activity in information systems."  The draft (1998) security rule proposed to require "audit trails," which also does not transparently translate into "audit logs." Personally, I'm familiar with the terms "log file," generally meaning a file recording host access activities, and "audit trails," meaning an application which makes a chronological record of system events. (My suspicion is that HHS moved from "audit trails" to "audit controls" to allow for more flexibility in the mix of administrative and technical safeguards which could be used to provide a record of system events.) So I guess I would say a "log file" might be a part of a set of audit controls; a really good "audit trail" application might be most of a set of audit controls; and I don't know how "audit logs" fit in, because neither the rules nor any of the documentation published with them uses the term.
 
[DIGRESSION: Why is this guy being such a pain about language? Jeez, can't he lighten up?  RESPONSE: Words used in regulations are terms of art; they have specifiable legal meanings. Those who would advise CEs about their legal obligations - and we won't get into the interesting questions around the difference, or possible lack of difference, between "regulatory compliance consulting" and "the practice of law" just now - owe it to their clients to use such words correctly. If, in five years, your client is defending the adequacy of its "audit controls" by showing the HHS and/or CMS auditor and/or the plaintiffs' class action litigator your memo talking about the adequacy of the "audit logs" you recommended, at the very least the credibility of the recommendation is undermined. I can put together any number of scenarios in which incorrect "HIPAA language" in memos, letters, etc. may come back to haunt CEs on big white boards in court. ("How can it have been an appropriate decision *when you didn't even use the right terms?*  Did you even *read the regulations, Mr. Jones?*") So yes, I'm a stickler for language; in my profession "bad language" all too quickly slides down the slope into malpractice. END OF DIGRESSION]
 
To the extent a CEs "audit controls" include policies and documentation procedures as an administrative component, I think 164.316(b)(1)(i) would require such polices and documentation to be in writing subject to the 6 year rule of 164.316(b)(2)(i). For example, a database system may not be set up to record activity with respect to any specific data set. One way to manage this problem might be to use electronic sign-on documentation - e.g. a click-through representation that the user will only access data sets for patients who are under his care, only for purposes of TPO; I've used this approach before and in the right environment it can be a reasonable security control - and if that were to be done, I would consider it a "procedure implemented to comply with the security rule," so that a record of each click-through would be required to be documented subject to the six year rule.

John R. Christiansen
Preston | Gates | Ellis LLP
(Direct: 206.370.8118
(Cell: 206.683.9125
Reader Advisory Notice: Internet email is inherently insecure. Message content may be subject to alteration, and email addresses may incorrectly identify the sender. If you wish to confirm the content of this message and/or the identity of the sender please contact me at one of the phone numbers given above. Secure messaging is available upon request and recommended for confidential or other sensitive communications.

---
The WEDI SNIP listserv to which you are subscribed is not moderated. The discussions on this listserv therefore represent the views of the individual participants, and do not necessarily represent the views of the WEDI Board of Directors nor WEDI SNIP. If you wish to receive an official opinion, post your question to the WEDI SNIP Issues Database at http://snip.wedi.org/tracking/. These listservs should not be used for commercial marketing purposes or discussion of specific vendor products and services. They also are not intended to be used as a forum for personal disagreements or unprofessional communication at any time.

You are currently subscribed to wedi-security as: [EMAIL PROTECTED]
To unsubscribe from this list, go to the Subscribe/Unsubscribe form at http://subscribe.wedi.org or send a blank email to [EMAIL PROTECTED]
If you need to unsubscribe but your current email address is not the same as the address subscribed to the list, please use the Subscribe/Unsubscribe form at http://subscribe.wedi.org

Reply via email to