Access to Visible Health systems and application is limited for all users, including but not limited to workforce members, volunteers, business associates, contracted providers, consultants, and any other entity, is allowable only on a minimum necessary basis. All users are responsible for reporting an incident of unauthorized user or access of the organization’s information systems. These safeguards have been established to address the HIPAA Security regulations including the following:
Applicable Standards from the HIPAA Security Rule
- 164.308a4iiC Access Establishment and Modification
- 164.308a3iiB Workforce Clearance Procedures
- 164.308a4iiB Access Authorization
- 164.312d Person or Entity Authentication
- 164.312a2i Unique User Identification
- 164.308a5iiD Password Management
- 164.312a2iii Automatic Logoff
- 164.310b Workstation Use
- 164.310c Workstation Security
- 164.308a3iiC Termination Procedures
Access Establishment and Modification
- Requests for access to Visible Health platform systems and applications is made formally to the VP of Engineering, Privacy Officer, or Security Officer.
- Access is not granted until receipt, review, and approval by the Visible Health Security Officer;
- The request for access is retained for future reference.
- All access to Visible Health systems and services are reviewed and updated on an bi-annual basis to assure proper authorizations are in place commiserate with job functions. The form used to conduct account review is stored in Box.
- Any Visible Health workforce member can request change of access using Visible Health JIRA IT OPS ticket form
- Access to systems is controlled using centralized user management and authentication. All authentication requests utilize two factor authentication using mobile devices as the second factor.
- Temporary accounts are not used unless absolutely necessary for business purposes.
- Accounts are reviewed every 90 days to assure temporary accounts are not left unnecessarily.
- Accounts that are inactive for over 90 days are removed.
- Privileged users must first access systems using standard, unique user accounts before switching to privileged users and performing privileged tasks.
- All application to application communication using service accounts is restricted and not permitted unless absolutely needed. Automated tools are used to limit account access across applications and systems.
- Generic accounts are not allowed on Visible Health systems.
- Access is granted through encrypted mechanisms only.
- All encryption utilizes AES 256 bit encryption.
- In cases of increased risk or known attempted unauthorized access, immediate steps are taken by the Security and Privacy Officer to limit access and reduce risk of unauthorized access.
- Direct system to system, system to application, and application to application authentication and authorization are limited and controlled to restrict access.
Workforce Clearance Procedures
- The level of security assigned to a user to the organization’s information systems is based on the minimum necessary amount of data access required to carry out legitimate job responsibilities assigned to a user’s job classification and/or to a user needing access to carry out treatment, payment, or healthcare operations.
- All access requests are treated on a ‘least-access principle”.
- Visible Health maintains a minimum necessary approach to access to Customer data. As such, Visible Health, including all workforce members, does not readily have access to any ePHI.
- Role based access categories for each system in the Visible Health platform are pre-approved by the Security Officer. This includes regular product review meetings to approve changes to access control within the platform.
- Visible Health utilizes hardware and software firewalls to segment data, and prevent unauthorized access.
Person or Entity Authentication
- Each workforce member has and uses a unique user ID and password that identifies him/her as the user of the information system.
- Each Customer and Partner has and uses a unique user ID and password that identifies him/her as the user of the information system.
Unique User Identification
- Access to the Visible Health Platform systems and applications is controlled by requiring unique User Login ID’s and passwords for each individual user and developer.
- Passwords requirements mandate strong password controls (see below).
- Passwords are not displayed at any time and are not transmitted or stored in plain text.
- Default accounts on all production systems, including root, are disabled.
- Shared accounts are not allowed within Visible Health systems or networks.
- Users are required to make information systems inaccessible by any other individual when unattended by the users (ex. by using a password protected screen saver or logging off the system).
- Information systems automatically log users off the systems after a maximum of 10 minutes of inactivity.
- The Security Officer pre-approves exceptions to automatic log off requirements.
Employee Workstation Use
All workstations at Visible Health are company owned, and all are laptop Apple products running Mac operating system.
- Workstations may not be used to engage in any activity that is illegal or is in violation of organization’s policies per the Visible Health Employee Handbook.
- Users may not misrepresent, obscure, suppress, or replace another user’s identity in transmitted or stored messages.
- Workstation hard drives will be encrypted using FileVault 2.0, or Mac encyrpted partitions, or Apple keychain.
- All workstations have firewalls enabled to prevent unauthorized access unless explicitly granted.
- All workstations are to have the following messages added to the lock screen and login screen: This computer is owned by Visible Health, Inc. By logging in, unlocking, and/or using this computer you acknowledge you have seen, and follow, these policies (https://www.visiblehealth.com/compliance/) and have completed training as instructed by HR. Please contact us if you have problems with this - email@example.com.
Wireless Access Use
- Visible Health production systems are not accessible directly over wireless channels.
- Wireless access disabled on all production systems.
- When access production systems via remote wireless connections, the same system access policies and procedures apply to wireless as all other connections, including wired.
- Wireless networks managed within Visible Health non-production facilities (offices, etc) are secured with the following configurations:
- All data in transit over wireless is encrypted using WPA2 encryption;
- Passwords are not shared. Changing and setting passwords is a process managed by the Visible Health Security Officer.
Employee Termination Procedures
- The Human Resources Department (or other designated department), users, and their supervisors are required to notify the Security Officer upon completion and/or termination of access needs and facilitating completion of the “Termination Checklist” which is stored in the personnel file.
- The Human Resources Department, users, and supervisors are required to notify IT Operations to terminate a user’s access rights if there is evidence or reason to believe the following (these incidents are also reported on an incident report and is filed with the Privacy Officer):
- The user has been using their access rights inappropriately;
- A user’s password has been compromised (a new password may be provided to the user if the user is not identified as the individual compromising the original password);
- An unauthorized individual is utilizing a user’s User Login ID and password (a new password may be provided to the user if the user is not identified as providing the unauthorized individual with the User Login ID and password).
- The Security Officer will terminate users’ access rights immediately upon notification.
- The Security Officer audits and may terminate access of users that have not logged into organization’s information systems/applications for an extended period of time.
Visible Health does not use paper records for any PHI information. Use of paper for recording and storing PHI data is against Visible Health policies.
- User IDs and passwords are used to control access to Visible Health systems and may not be disclosed to anyone for any reason.
- Users may not allow anyone, for any reason, to have access to any information system using another user’s unique user ID and password.
- On all production systems and application in the Visible Health environment, password configurations are set to require that passwords are a minimum of 8 character length, account lockout after 7 invalid attempts, and account lockout after a minimum of 10 minutes of inactivity.
- System-level access requires two-factor to gain the highest privileges and only cryptographics keys are allowed for authentication with an additional strong password to gain system-level privileges.
- All system and application passwords are hashed by concatenating the user’s password and a random salt value, generated on a per-user basis, and then applying SHA-256 to the value to create a password hash. The password hash and the salt are then stored in the backend database and are used for password validation on future user authentication attempts.*
- Passwords are inactivated immediately upon an employee’s termination (refer to the termination procedures in this policy).
- All passwords used in configuration scripts are secured and encrypted.
- If a user believes their user ID has been compromised, they are required to immediately report the incident to the Security Office.
Customer Access to Systems
Visible Health does not grant customer secure system access at all to their platform.