[Federal Register Volume 63, Number 155 (Wednesday, August 12, 1998)]
[Proposed Rules]
[Pages 43242-43280]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 98-21601]



[[Page 43241]]

_______________________________________________________________________

Part III





Department of Health and Human Services





_______________________________________________________________________



Office of the Secretary



_______________________________________________________________________



45 CFR Part 142



Security and Electronic Signature Standards; Proposed Rule

Federal Register / Vol. 63, No. 155 / Wednesday, August 12, 1998 / 
Proposed Rules

[[Page 43242]]


-----------------------------------------------------------------------

DEPARTMENT OF HEALTH AND HUMAN SERVICES

Office of the Secretary

45 CFR Part 142

[HCFA-0049-P]
RIN 0938-AI57


Security and Electronic Signature Standards

AGENCY: Health Care Financing Administration (HCFA), HHS.

ACTION: Proposed rule.

-----------------------------------------------------------------------

SUMMARY: This rule proposes standards for the security of individual 
health information and electronic signature use by health plans, health 
care clearinghouses, and health care providers. The health plans, 
health care clearinghouses, and health care providers would use the 
security standards to develop and maintain the security of all 
electronic individual health information. The electronic signature 
standard is applicable only with respect to use with the specific 
transactions defined in the Health Insurance Portability and 
Accountability Act of 1996, and when it has been determined that an 
electronic signature must be used.
    The use of these standards would improve the Medicare and Medicaid 
programs, and other Federal health programs and private health 
programs, and the effectiveness and efficiency of the health care 
industry in general. This rule would implement some of the requirements 
of the Administrative Simplification subtitle of the Health Insurance 
Portability and Accountability Act of 1996.

DATES: Comments will be considered if we receive them at the 
appropriate address, as provided below, no later than 5 p.m. on October 
13, 1998.

ADDRESSES: Mail written comments (1 original and 3 copies) to the 
following address: Health Care Financing Administration, Department of 
Health and Human Services, Attention: HCFA-0049-P, P.O. Box 26585, 
Baltimore, MD 21207-0519.
    If you prefer, you may deliver your written comments (1 original 
and 3 copies) to one of the following addresses:

Room 309-G, Hubert H. Humphrey Building, 200 Independence Avenue, SW., 
Washington, DC 20201, or
Room C5-09-26, 7500 Security Boulevard, Baltimore, MD 21244-1850.

    Comments may also be submitted electronically to the following e-
mail address: [email protected]. For e-mail comment procedures, 
see the beginning of SUPPLEMENTARY INFORMATION. For further information 
on ordering copies of the Federal Register containing this document and 
on electronic access, see the beginning of
SUPPLEMENTARY information.

FOR FURTHER INFORMATION CONTACT: John Parmigiani, (410) 786-2976.

SUPPLEMENTARY INFORMATION:

E-Mail, Comments, Procedures, Availability of Copies, and Electronic 
Access

    E-mail comments should include the full name, postal address, and 
affiliation (if applicable) of the sender and must be submitted to the 
referenced address to be considered. All comments should be 
incorporated in the e-mail message because we may not be able to access 
attachments.
    Because of staffing and resource limitations, we cannot accept 
comments by facsimile (FAX) transmission. In commenting, please refer 
to file code HCFA-0049-P and the specific section or sections of the 
proposed rule. Both electronic and written comments received by the 
time and date indicated above will be available for public inspection 
as they are received, generally beginning approximately 3 weeks after 
publication of a document, in Room 309-G of the Department's offices at 
200 Independence Avenue, SW., Washington, DC, on Monday through Friday 
of each week from 8:30 a.m. to 5 p.m. (phone: (202) 690-7890). 
Electronic and legible written comments will also be posted, along with 
this proposed rule, at the following web site: http://aspe.os.dhhs.gov/
admnsimp/.
    Copies: To order copies of the Federal Register containing this 
document, send your request to: New Orders, Superintendent of 
Documents, P.O. Box 371954, Pittsburgh, PA 15250-7954. Specify the date 
of the issue requested and enclose a check or money order payable to 
the Superintendent of Documents, or enclose your Visa or Master Card 
number and expiration date. Credit card orders can also be placed by 
calling the order desk at (202) 512-1800 or by faxing to (202) 512-
2250. The cost for each copy is $8. As an alternative, you can view and 
photocopy the Federal Register document at most libraries designated as 
Federal Depository Libraries and at many other public and academic 
libraries throughout the country that receive the Federal Register.
    This Federal Register document is also available from the Federal 
Register online database through GPO Access, a service of the U.S. 
Government Printing Office. Free public access is available on a Wide 
Area Information Server (WAIS) through the Internet and via 
asynchronous dial-in. Internet users can access the database by using 
the World Wide Web, http://www.access.gpo.gov/nara/, by using local 
WAIS client software, or by telnet to swais.access.gpo.gov, then login 
as guest (no password required). Dial-in users should use 
communications software and modem to call (202) 512-1661; type swais, 
then login as guest (no password required).

I. Background

[Please label written or e-mailed comments about this section with 
the subject: Background]

    In order to administer their programs, the Department of Health and 
Human Services, other Federal agencies, State Medicaid agencies, 
private health plans, health care providers, and health care 
clearinghouses must assure their customers (such as patients, insured, 
providers, and health care plans) that the confidentiality and privacy 
of health care information they electronically collect, maintain, use, 
or transmit is secure. Security of health information is especially 
important when health information can be directly linked to an 
individual.
    Confidentiality is threatened not only by the risk of improper 
access to electronically stored information, but also by the risk of 
interception during electronic transmission of the information.
    In addition to the need to ensure electronic health care 
information is secure and confidential, there is a potential need to 
associate signature capability with information being electronically 
stored or transmitted. Today, there are numerous forms of electronic 
signatures, ranging from biometric devices to digital signature. To 
satisfy the legal and time-tested characteristics of a written 
signature, however, an electronic signature must do the following:
     Identify the signatory individual,
     Assure the integrity of a document's content, and
     Provide for nonrepudiation; that is, strong and 
substantial evidence that will make it difficult for the signer to 
claim that the electronic representation is not valid. Currently, the 
only technically mature electronic signature meeting the above criteria 
is the digital signature. There is no national standard for security or 
electronic signatures. Of necessity, each health care provider, health 
care plan, and health care entity

[[Page 43243]]

has defined its own security requirements.

A. Legislation

    The Congress included provisions to address the need for security 
and electronic signature standards and other administrative 
simplification issues in the Health Insurance Portability and 
Accountability Act of 1996 (HIPAA), Public Law 104-191, which was 
enacted on August 21, 1996. Through subtitle F of title II of that law, 
the Congress added to title XI of the Social Security Act a new part C, 
entitled ``Administrative Simplification.'' (Public Law 104-191 affects 
several titles in the United States Code. Hereafter, we refer to the 
Social Security Act as the Act; we refer to the other laws cited in 
this document by their names.) The purpose of this part C is to improve 
the Medicare and Medicaid programs, in particular, and the efficiency 
and effectiveness of the health care system, in general, by encouraging 
the development of a health information system through the 
establishment of standards and requirements to facilitate the 
electronic maintenance and transmission of certain health information.
    Part C of title XI of the Act consists of sections 1171 through 
1179. These sections define various terms and impose several 
requirements on HHS, health plans, health care clearinghouses, and 
certain health care providers concerning electronic transmission of 
health information.
    The first section, section 1171 of the Act, establishes definitions 
for purposes of part C of title XI for the following terms: code set, 
health care clearinghouse, health care provider, health information, 
health plan, individually identifiable health information, standard, 
and standard setting organization.
    Section 1172 of the Act makes any standard adopted under part C 
applicable to: (1) Health plans, (2) health care clearinghouses, and 
(3) health care providers that transmit any health information in 
electronic form in connection with the transactions referred to in 
section 1173(a)(1) of the Act. The security standard to be adopted 
under Part C is not restricted to the transactions referred to in 
section 1173(a)(1) of the Act, but is applicable to any health 
information pertaining to an individual that is electronically 
maintained or transmitted. This section also contains the following 
requirements concerning standard setting:
     The Secretary may adopt a standard developed, adopted, or 
modified by a standard setting organization (that is, an organization 
accredited by the American National Standards Institute (ANSI)) that 
has consulted with the National Uniform Billing Committee (NUBC), the 
National Uniform Claim Committee (NUCC), Workgroup for Electronic Data 
Interchange (WEDI), and the American Dental Association (ADA).
     The Secretary may also adopt a standard other than one 
established by a standard setting organization, if the different 
standard will reduce costs for health care providers and health plans, 
the different standard is promulgated through negotiated rulemaking 
procedures, and the Secretary consults with each of the above-named 
groups.
     If no standard has been adopted by any standard setting 
organization, the Secretary must rely on the recommendations of the 
National Committee on Vital and Health Statistics (NCVHS) and consult 
with each of the above-named groups.
    In complying with the requirements of part C of title XI, the 
Secretary must rely on the recommendations of the NCVHS, consult with 
appropriate State, Federal, and private agencies or organizations, and 
publish the NCVHS recommendations in the Federal Register.
    Paragraph (a) of section 1173 of the Act requires that the 
Secretary adopt standards for financial and administrative 
transactions, and data elements for those transactions, to enable 
health information to be exchanged electronically. Standards are 
required for the following transactions: health claims, health 
encounter information, health claims attachments, health plan 
enrollments and disenrollments, health plan eligibility, health care 
payment and remittance advice, health plan premium payments, first 
report of injury, health claim status, and referral certification and 
authorization. In addition, the Secretary is required to adopt 
standards for any other financial and administrative transactions that 
are determined to be appropriate by the Secretary.
    Paragraph (b) of section 1173 of the Act requires the Secretary to 
adopt standards for unique health identifiers for all individuals, 
employers, health plans, and health care providers and requires further 
that the adopted standards specify for what purposes unique health 
identifiers may be used.
    Paragraphs (c) through (f) of section 1173 of the Act require the 
Secretary to establish standards for code sets for each data element 
for each health care transaction listed above, security standards for 
health care information systems, standards for electronic signatures 
(established together with the Secretary of Commerce), and standards 
for the transmission of data elements needed for the coordination of 
benefits and sequential processing of claims. Compliance with 
electronic signature standards will be deemed to satisfy both State and 
Federal requirements for written signatures with respect to the 
transactions listed in paragraph (a) of section 1173 of the Act.
    In section 1174 of the Act, the Secretary is required to establish 
standards for all of the above transactions, except claims attachments, 
by February 21, 1998. The standards for claims attachments must be 
established by February 21, 1999. Generally, after a standard is 
established, it cannot be changed during the first year after adoption 
except for changes that are necessary to permit compliance with the 
standard. Modifications to any of these standards may be made after the 
first year, but not more frequently than once every 12 months. The 
Secretary must also ensure that procedures exist for the routine 
maintenance, testing, enhancement, and expansion of code sets and that 
there are crosswalks from prior versions.
    Section 1175 of the Act prohibits health plans from refusing to 
process or delaying the processing of a transaction that is presented 
in standard format. The Act's requirements are not limited to health 
plans; however, each person to whom a standard or implementation 
specification applies is required to comply with the standard within 24 
months (or 36 months for small health plans) of its adoption. A health 
plan or other entity may, of course, comply voluntarily before the 
effective date. A person may comply by using a health care 
clearinghouse to transmit or receive the standard transactions. 
Compliance with modifications to standards or implementation 
specifications must be accomplished by a date designated by the 
Secretary. This date may not be earlier than 180 days from the notice 
of change.
    Section 1176 of the Act establishes a civil monetary penalty for 
violation of the provisions in part C of title XI of the Act, subject 
to several limitations. Penalties may not be more than $100 per person 
per violation and not more than $25,000 per person for violations of a 
single standard for a calendar year. The procedural provisions in 
section 1128A of the Act, ``Civil Monetary Penalties,'' are applicable.
    Section 1177 of the Act establishes penalties for a knowing misuse 
of unique health identifiers and individually identifiable health 
information: (1) A fine of not more than $50,000 and/or imprisonment of 
not

[[Page 43244]]

more than 1 year; (2) if misuse is ``under false pretenses,'' a fine of 
not more than $100,000 and/or imprisonment of not more than 5 years; 
and (3) if misuse is with intent to sell, transfer, or use individually 
identifiable health information for commercial advantage, personal 
gain, or malicious harm, a fine of not more than $250,000 and/or 
imprisonment of not more than 10 years. Note that these penalties do 
not affect any other penalties which may be imposed by other Federal 
programs, including ERISA.
    Under section 1178 of the Act, the provisions of part C of title XI 
of the Act, as well as any standards established under them, supersede 
any State law that is contrary to them. However, the Secretary may, for 
statutorily-specified reasons, waive this provision.
    Finally, section 1179 of the Act makes the above provisions 
inapplicable to financial institutions or anyone acting on behalf of a 
financial institution when ``authorizing, processing, clearing, 
settling, billing, transferring, reconciling, or collecting payments 
for a financial institution.''

    (Concerning this last provision, the conference report, in its 
discussion on section 1178, states:
    ``The conferees do not intend to exclude the activities of 
financial institutions or their contractors from compliance with the 
standards adopted under this part if such activities would be 
subject to this part. However, conferees intend that this part does 
not apply to use or disclosure of information when an individual 
utilizes a payment system to make a payment for, or related to, 
health plan premiums or health care. For example, the exchange of 
information between participants in a credit card system in 
connection with processing a credit card payment for health care 
would not be covered by this part. Similarly sending a checking 
account statement to an account holder who uses a credit or debit 
card to pay for health care services, would not be covered by this 
part. However, this part does apply if a company clears health care 
claims, the health care claims activities remain subject to the 
requirements of this part.'') (H.R. Rep. No. 736, 104th Cong., 2nd 
Sess. 268-269 (1996))

B. Process for Developing National Standards

    The Secretary has formulated a five-part strategy for developing 
and implementing the standards mandated under part C of title XI of the 
Act:
    1. To ensure necessary interagency coordination and required 
interaction with other Federal departments and the private sector, 
establish interdepartmental implementation teams to identify and assess 
potential standards for adoption. The subject matter of the teams 
includes claims/encounters, identifiers, enrollment/eligibility, 
systems security and electronic signature, and medical coding 
classification. Another team addresses cross-cutting issues and 
coordinates the subject matter teams. The teams consult with external 
groups such as the NCVHS' Workgroup on Data Standards, WEDI, the ANSI's 
Healthcare Informatics Standards Board (HISB), the NUCC, the NUBC, and 
the ADA. The teams are charged with developing regulations and other 
necessary documents and making recommendations for the various 
standards to the HHS Data Council through its Committee on Health Data 
Standards. (The HHS Data Council is the focal point for consideration 
of data policy issues. It reports directly to the Secretary and advises 
the Secretary on data standards and privacy issues.)
    2. Develop recommendations for standards to be adopted.
    3. Publish proposed rules in the Federal Register describing the 
standards. Each proposed rule provides the public with a 60-day comment 
period.
    4. Analyze public comments and publish the final rules in the 
Federal Register.
    5. Distribute standards and coordinate preparation and distribution 
of implementation guides.
    This strategy affords many opportunities for involvement of 
interested and affected parties in standards development and adoption 
by enabling them to:
     Participate with standards setting organizations.
     Provide written input to the NCVHS.
     Provide written input to the Secretary of HHS.
     Provide testimony at NCVHS'' public meetings.
     Comment on the proposed rules for each of the proposed 
standards.
     Invite HHS staff to meetings with public and private 
sector organizations or meet directly with senior HHS staff involved in 
the implementation process.
    The implementation teams charged with reviewing standards for 
designation as required national standards under the statute have 
defined, with significant input from the health care industry, a set of 
principles for guiding choices for the standards to be adopted by the 
Secretary. These principles are based on direct specifications in 
HIPAA, the purpose of the law, and generally desirable principles. To 
be designated as an HIPAA standard, each standard should:
    1. Improve the efficiency and effectiveness of the health care 
system by leading to cost reductions for or improvements in benefits 
from electronic health care transactions.
    2. Meet the needs of the health data standards user community, 
particularly health care providers, health plans, and health care 
clearinghouses.
    3. Be consistent and uniform with the other HIPAA standards--their 
data element definitions and codes and their privacy and security 
requirements--and, secondarily, with other private and public sector 
health data standards.
    4. Have low additional development and implementation costs 
relative to the benefits of using the standard.
    5. Be supported by an ANSI-accredited standards developing 
organization or other private or public organization that will ensure 
continuity and efficient updating of the standard over time.
    6. Have timely development, testing, implementation, and updating 
procedures to achieve administrative simplification benefits faster.
    7. Be technologically independent of the computer platforms and 
transmission protocols used in electronic health transactions, except 
when they are explicitly part of the standard.
    8. Be precise and unambiguous, but as simple as possible.
    9. Keep data collection and paperwork burdens on users as low as is 
feasible.
    10. Incorporate flexibility to adapt more easily to changes in the 
health care infrastructure (such as new services, organizations, and 
provider types) and information technology.
    A master data dictionary providing for common data definitions 
across the standards selected for implementation under HIPAA will be 
developed and maintained. We intend for the data element definitions to 
be precise, unambiguous, and consistently applied. The transaction-
specific reports and general reports from the master data dictionary 
will be readily available to the public. At a minimum, the information 
presented will include data element names, definitions, and appropriate 
references to the transactions where they are used.
    This proposed rule would establish the security standard and 
electronic signature standard for health care information and 
individually identifiable health care information maintained or 
transmitted electronically. The remaining standards are grouped, to the 
extent possible, by subject matter and audience in other regulations. 
We anticipate publishing

[[Page 43245]]

several separate regulation documents to promulgate the remaining 
standards required under HIPAA.

II. Provisions of this Proposed Rule

[Please label written comments or e-mailed comments about this 
section with the subject: Introduction/Applicability]

    We propose to add a new part to title 45 of the Code of Federal 
Regulations for health plans, health care providers, and health care 
clearinghouses in general. The new part would be part 142 of title 45 
and would be titled ``Administrative Requirements.'' Subpart A would 
contain the general provisions for this part, including the general 
definitions and general requirements for health plans. Subpart C would 
contain provisions specific to securing health information used in any 
electronic transmission or stored format.
    In this proposed rule, we propose a standard for security of health 
information. This rule would establish that health plans, health care 
clearinghouses, and health care providers must have the security 
standard in place to comply with the statutory requirement that health 
care information and individually identifiable health care information 
be protected to ensure privacy and confidentiality when health 
information is electronically stored, maintained, or transmitted. The 
Congress mandated a separate standard for electronic signature, 
therefore, this proposed security standard also addresses the selected 
standard for electronic signature. The proposed security standard does 
not require the use of an electronic signature, but specifies the 
standard for an electronic signature that must be followed if such a 
signature is used. If an entity elects to use an electronic signature, 
it must comply with the electronic signature standard.

A. Applicability

    With the exception of the security provisions, section 262 of HIPAA 
applies to any health plan, any health care clearinghouse, and any 
health care provider that transmits any health information in 
electronic form in connection with transactions referred to in section 
1173(a)(1) of the Act. The security provisions of section 262 of HIPAA 
apply to any health plan, any health care clearinghouse, and any health 
care provider that electronically maintains or transmits any health 
information relating to an individual.
    Our proposed rules (at 45 CFR 142.102) would apply to the health 
plans and health care clearinghouses as well, but we would clarify the 
statutory language in our regulations for health care providers. With 
the exception of the security regulation, we would have the regulations 
apply to any health care provider only when electronically transmitting 
any of the transactions to which section 1173(a)(1) of the Act refers.
    Electronic transmissions would include transactions using all 
media, even when the information is physically moved from one location 
to another using magnetic tape, disk, or compact disc (cd) media. 
Transmissions over the Internet (wide-open), Extranet (using Internet 
technology to link a business with information only accessible to 
collaborating parties), leased lines, dial-up lines, and private 
networks are all included. Telephone voice response and ``faxback'' (a 
request for information made via voice using a fax machine and 
requested information returned via that same machine as a fax) systems 
would not be included. We solicit comments concerning any adverse 
impact the above statement concerning voice response or faxback may 
have upon the security of the health information in the commenter's 
care.
    With the exception of the security regulation, our regulations 
would apply to health care clearinghouses when transmitting 
transactions to, and receiving transactions from, a health care 
provider or health plan that transmits and receives standard 
transactions (as defined under ``transaction'') and at all times when 
transmitting to or receiving electronic transactions from another 
health care clearinghouse. The security regulation would apply to 
health care clearing houses electronically maintaining or transmitting 
any health information pertaining to an individual.
    Entities that offer on-line interactive transmission must comply 
with the standards. The Hypertext Markup Language (HTML) interaction 
between a server and a browser by which the data elements of a 
transaction are solicited from a user would not have to use the 
standards (with the exception of the security standard), although the 
data content must be equal to that required for the standard. Once the 
data elements are assembled into a transaction by the server, the 
transmitted transaction would have to comply with the standards.
    With the exception of the security portion, the law would apply to 
each health care provider when transmitting or receiving any of the 
specified electronic transactions. The security regulation would apply 
to each health care provider electronically maintaining or transmitting 
any health information pertaining to an individual.
    The law applies to health plans for all transactions. Section 
142.104 would contain the following provisions (from section 1175 of 
the Act):
    If a person desires to conduct a transaction (as defined in 
Sec. 142.103) with a health plan as a standard transaction, the 
following apply:
    (1) The health plan may not refuse to conduct the transaction as a 
standard transaction.
    (2) The health plan may not delay the transaction or otherwise 
adversely affect, or attempt to adversely affect, the person or the 
transaction on the basis that the transaction is a standard 
transaction.
    (3) The information transmitted and received in connection with the 
transaction must be in the form of standard data elements of health 
information.
    As a further requirement, we would provide that a health plan that 
conducts transactions through an agent assure that the agent meets all 
the requirements of part 142 that apply to the health plan.
    Section 142.105 would state that a person or other entity may meet 
the transaction requirements of Sec. 142.104 by either--
    (1) Transmitting and receiving standard data elements, or
    (2) Submitting nonstandard data elements to a health care 
clearinghouse for processing into standard data elements and 
transmission by the health care clearinghouse and receiving standard 
data elements through the clearinghouse.
    Health care clearinghouses would be able to accept nonstandard 
transactions for the sole purpose of translating them into standard 
transactions for sending customers and would be able to accept standard 
transactions and translate them into nonstandard formats for receiving 
customers. We would state in Sec. 142.105 that the transmission of 
nonstandard transactions, under contract, between a health plan or a 
health care provider and a health care clearinghouse would not violate 
the law.
    With the exception of the security standard, transmissions within a 
corporate entity would not be required to comply with the standards. A 
hospital that is wholly owned by a managed care company would not have 
to use the transaction standards to pass encounter information back to 
the home office, but it would have to use the standard claims 
transaction to submit a claim to another payer. Another example might 
be transactions within Federal agencies and their contractors and 
between State agencies within the same State. For example, Medicare 
enters into contracts with insurance

[[Page 43246]]

companies and common working file sites that process Medicare claims 
using government furnished software. There is constant communication, 
on a private network, between HCFA Central Office and the Medicare 
carriers, intermediaries, and common working file sites. This 
communication may continue in nonstandard mode. However, these 
contractors would be required to comply with the transaction standards 
when exchanging any of the transactions covered by HIPAA with an entity 
outside these ``corporate'' boundaries.
    The security standard is applicable to all health care information 
electronically maintained or used in an electronic transmission, 
regardless of format (standard transaction or a proprietary format); no 
distinction is made between internal corporate entity communication or 
communication external to the corporate entity.
    Although there are situations in which the use of the standards is 
not required (for example, health care providers may continue to submit 
paper claims and employers are not required to use any of the standard 
transactions), we stress that a standard may be used voluntarily in any 
situation in which it is not required.
    This proposed regulation would not mandate the use of electronic 
signatures with any specific transaction at this time. Instead, the 
regulation proposes that whenever an electronic signature is required 
for an electronic transaction by law, regulation, or contract, the 
signature must meet the standard established in the regulation at 
Sec. 142.310. Use of this standard would satisfy any Federal or State 
requirement for a signature, either electronic or on paper.
    We note that the ANSI X12N standards for individual transactions 
which have been proposed for adoption as national standards in a 
separate proposed rule do not require the use of electronic signatures. 
Standards for additional transactions that the Secretary may propose 
for adoption in the future, including one for claims attachments, may 
contain such requirements. We solicit comments on whether electronic 
signatures should be required for any specific transactions or under 
specific circumstances and what effect such requirements would have on 
electronic health care transactions.
    We also note that the NCVHS is required by HIPAA to report to the 
Secretary recommendations and legislative proposals for uniform data 
standards for patient medical record information and the electronic 
exchange of such information, with the implication that HHS should rely 
on such recommendations to adopt such standards or propose the passage 
of such legislation by the Congress. We solicit comments on whether the 
standard proposed below for electronic signatures would be appropriate 
for consideration as part of such standards.

B. Definitions

[Please label written or e-mailed comments about this section with 
the subject: Definitions]

    Section 1171 of the Act defines several terms and our proposed 
rules would, for the most part, simply restate the law. The terms that 
we are defining in this proposed rule follow:
1. Code Set
    We would define ``code set'' as section 1171(1) of the Act does: 
``code set'' means any set of codes used for encoding data elements, 
such as tables of terms, medical concepts, medical diagnostic codes, or 
medical procedure codes.
2. Health Care Clearinghouse
    We would define ``health care clearinghouse'' as section 1171(2) of 
the Act does, but we are adding a further, clarifying sentence. The 
statute defines a ``health care clearinghouse'' as a public or private 
entity that processes or facilitates the processing of nonstandard data 
elements of health information into standard data elements. We would 
further explain that such an entity is one that currently receives 
health care transactions from health care providers or other entities, 
translates the data from a given format into one acceptable to the 
intended recipient and forwards the processed transaction to 
appropriate payers and clearinghouses, as necessary, for further 
action.
    There are currently a number of private clearinghouses that perform 
this function for health care providers. For purposes of this rule, we 
would consider billing services, repricing companies, community health 
management information systems or community health information systems, 
value-added networks, and switches that perform this function to be 
health care clearinghouses.
3. Health Care Provider
    As defined by section 1171(3) of the Act, a ``health care 
provider'' is a provider of services as defined in section 1861(u) of 
the Act, a provider of medical or other health services as defined in 
section 1861(s) of the Act, and any other person who furnishes health 
care services or supplies. Our regulations would define ``health care 
provider'' as the statute does and clarify that the definition of a 
health care provider is limited to those entities that furnish, or bill 
and are paid for, health care services in the normal course of 
business.
    For a more detailed discussion of the definition of health care 
provider, we refer the reader to our proposed rule, HCFA-0045-P, 
Standard Health Care Provider, 63 FR 25320, published May 7, 1998.
4. Health Information
    ``Health information,'' as defined in section 1171 of the Act, 
means any information, whether oral or recorded in any form or medium, 
that--
     Is created or received by a health care provider, health 
plan, public health authority, employer, life insurer, school or 
university, or health care clearinghouse; and
     Relates to the past, present, or future physical or mental 
health or condition of an individual; the provision of health care to 
an individual; or the past, present, or future payment for the 
provision of health care to an individual.
    We propose the same definition for our regulations.
5. Health Plan
    We propose that a ``health plan'' be defined essentially as section 
1171 of the Act defines it. Section 1171 of the Act cross refers to 
definitions in section 2791 of the Public Health Service Act (as added 
by Public Law 104-191, 42 U.S.C. 300gg-91); we would incorporate those 
definitions as currently stated into our proposed definitions for the 
convenience of the public. We note that the term ``health plan'' is 
also defined in other statutes, such as the Employee Retirement Income 
Security Act of 1974 (ERISA). Our definitions are based on the roles of 
plans in conducting administrative transactions, and any differences 
should not be construed to affect other statutes.
    For purposes of implementing the provisions of administrative 
simplification, a ``health plan'' would be an individual or group 
health plan that provides, or pays the cost of, medical care. This 
definition includes, but is not limited to, the 13 types of plans 
listed in the statute. On the other hand, plans such as property and 
casualty insurance plans and workers compensation plans, which may pay 
health care costs in the course of administering nonhealth care 
benefits, are not considered to be health plans in the proposed 
definition of health plan. Of course, these plans may voluntarily adopt 
these standards for their own business needs. At some

[[Page 43247]]

future time, the Congress may choose to expressly include some or all 
of these plans in the list of health plans that must comply with the 
standards.
    Health plans often carry out their business functions through 
agents, such as plan administrators (including third party 
administrators), entities that are under ``administrative services 
only'' (ASO) contracts, claims processors, and fiscal agents. These 
agents may or may not be health plans in their own right; for example, 
a health plan acting as another health plan's agent as another line of 
business. As stated earlier, a health plan that conducts HIPAA 
transactions through an agent is required to assure that the agent 
meets all HIPAA requirements that apply to the plan itself.
    ``Health plan'' includes the following, singly or in combination:
    a. ``Group health plan'' (as currently defined by section 2791(a) 
of the Public Health Service Act). A group health plan is a plan that 
has 50 or more participants (as the term ``participant'' is currently 
defined by section 3(7) of ERISA) or is administered by an entity other 
than the employer that established and maintains the plan. This 
definition includes both insured and self-insured plans. We define 
``participant'' separately below.
    Section 2791(a)(1) of the Public Health Service Act defines ``group 
health plan'' as an employee welfare benefit plan (as defined in 
current section 3(1) of ERISA) to the extent that the plan provides 
medical care, including items and services paid for as medical care, to 
employees or their dependents directly or through insurance, or 
otherwise.
    b. ``Health insurance issuer'' (as currently defined by section 
2791(b) of the Public Health Service Act).
    Section 2791(b) of the Public Health Service Act currently defines 
a ``health insurance issuer'' as an insurance company, insurance 
service, or insurance organization that is licensed to engage in the 
business of insurance in a State and is subject to State law that 
regulates insurance.
    c. ``Health maintenance organization'' (as currently defined by 
section 2791(b) of the Public Health Service Act).
    Section 2791(b) of the Public Health Service Act currently defines 
a ``health maintenance organization'' as a Federally qualified health 
maintenance organization, an organization recognized as such under 
State law, or a similar organization regulated for solvency under State 
law in the same manner and to the same extent as such a health 
maintenance organization. These organizations may include preferred 
provider organizations, provider sponsored organizations, independent 
practice associations, competitive medical plans, exclusive provider 
organizations, and foundations for medical care.
    d. Part A or Part B of the Medicare program (title XVIII of the 
Act).
    e. The Medicaid program (title XIX of the Act).
    f. A ``Medicare supplemental policy'' as defined under section 
1882(g)(1) of the Act.
    Section 1882(g)(1) of the Act defines a ``Medicare supplemental 
policy'' as a health insurance policy that a private entity offers a 
Medicare beneficiary to provide payment for expenses incurred for 
services and items that are not reimbursed by Medicare because of 
deductible, coinsurance, or other limitations under Medicare. The 
statutory definition of a Medicare supplemental policy excludes a 
number of plans that are generally considered to be Medicare 
supplemental plans, such as health plans for employees and former 
employees and for members and former members of trade associations and 
unions. A number of these health plans may be included under the 
definitions of ``group health plan'' or ``health insurance issuer'', as 
defined in paragraphs a. and b. above.
    g. A ``long-term care policy,'' including a nursing home fixed-
indemnity policy. A ``long-term care policy'' is considered to be a 
health plan regardless of how comprehensive it is. We recognize the 
long-term care insurance segment of the industry is largely unautomated 
and we welcome comments regarding the impact of HIPAA on the long-term 
care segment.
    h. An employee welfare benefit plan or any other arrangement that 
is established or maintained for the purpose of offering or providing 
health benefits to the employees of two or more employers. This 
includes plans that are referred to as multiple employer welfare 
arrangements (``MEWAs'').
    i. The health care program for active military personnel under 
title 10 of the United States Code.
    j. The veterans health care program under chapter 17 of title 38 of 
the United States Code.
    This health plan primarily furnishes medical care through hospitals 
and clinics administered by the Department of Veterans Affairs for 
veterans with a service-connected disability that is compensable. 
Veterans with nonservice-connected disabilities (and no other health 
benefit plan) may receive health care under this health plan to the 
extent resources and facilities are available.
    k. The Civilian Health and Medical Program of the Uniformed 
Services (CHAMPUS), as defined in 10 U.S.C. 1072(4).
    CHAMPUS primarily covers services furnished by civilian medical 
providers to dependents of active duty members of the uniformed 
services and retirees and their dependents under age 65.
    l. The Indian Health Service program under the Indian Health Care 
Improvement Act (25 U.S.C. 1601 et seq.).
    This program furnishes services, generally through its own health 
care providers, primarily to persons who are eligible to receive 
services because they are of American Indian or Alaskan Native descent.
    m. The Federal Employees Health Benefits Program under 5 U.S.C. 
chapter 89.
    This program consists of health insurance plans offered to active 
and retired Federal employees and their dependents. Depending on the 
health plan, the services may be furnished on a fee-for-service basis 
or through a health maintenance organization.

    (Note: Although section 1171(5)(M) of the Act refers to the 
``Federal Employees Health Benefit Plan,'' this and any other rules 
adopting administrative simplification standards will use the 
correct name, the Federal Employees Health Benefits Program. One 
health plan does not cover all Federal employees; there are over 350 
health plans that provide health benefits coverage to Federal 
employees, retirees, and their eligible family members. Therefore, 
we will use the correct name, the Federal Employees Health Benefits 
Program, to make clear that the administrative simplification 
standards apply to all health plans that participate in the 
Program.)

    n. Any other individual or group health plan, or combination 
thereof, that provides or pays for the cost of medical care.
    We would include a fourteenth category of health plan in addition 
to those specifically named in HIPAA, as there are health plans that do 
not readily fit into the other categories but whose major purpose is 
providing health benefits. The Secretary would determine which of these 
plans are health plans for purposes of title II of HIPAA. This category 
would include the Medicare Plus Choice plans that will become available 
as a result of section 1855 of the Act as amended by section 4001 of 
the Balanced Budget Act of 1997 (Public Law 105-33) to the extent that 
these health plans do not fall under any other category.

[[Page 43248]]

6. Small Health Plan
    We would define a ``small health plan'' as a group health plan with 
fewer than 50 participants.
    The HIPAA does not define a ``small health plan'' but instead 
leaves the definition to be determined by the Secretary. The Conference 
Report suggests that the appropriate definition of a ``small health 
plan'' is found in current section 2791(a) of the Public Health Service 
Act, which is a group health plan with fewer than 50 participants. We 
would also define small individual health plans as those with fewer 
than 50 participants.
7. Individually Identifiable Health Information
    Section 1171(6) states the term ``individually identifiable health 
information'' means any information, including demographic information 
collected from an individual, that--
    a. Is created or received by a health care provider, health plan, 
employer, or health care clearinghouse; and
    b. Relates to the past, present or future physical or mental health 
or condition of an individual, the provision of health care to an 
individual, or the past, present, or future payment for the provision 
of health care to an individual, and
    (i) Identifies the individual, or
    (ii) With respect to which there is a reasonable basis to believe 
that the information can be used to identify the individual.
8. Standard
    Section 1171 of the Act defines ``standard,'' when used with 
reference to a data element of health information or a transaction 
referred to in section 1173(a)(1) of the Act, as any such data element 
or transaction that meets each of the standards and implementation 
specifications adopted or established by the Secretary with respect to 
the data element or transaction under sections 1172 through 1174 of the 
Act.
    Under our definition, the security standard would be a set of 
requirements adopted or established to preserve and maintain the 
confidentiality and privacy of electronically stored, maintained, or 
transmitted health information promulgated either by an organization 
accredited by the ANSI or HHS.
9. Transaction
    ``Transaction'' would mean the exchange of information between two 
parties to carry out financial and administrative activities related to 
health care. A transaction would be (a) any of the transactions listed 
in section 1173(a)(2) of the Act, and (b) any determined appropriate by 
the Secretary in accordance with section 1173(a)(1)(B) of the Act. We 
present them below in the order in which we propose to list them in the 
regulations text.
    A ``transaction'' would mean any of the following:
    a. Health claims or equivalent encounter information. This 
transaction may be used to submit health care claim billing 
information, encounter information, or both, from health care providers 
to payers, either directly or via intermediary billers and claims 
clearinghouses.
    b. Health care payment and remittance advice. This transaction may 
be used by a health plan to make a payment to a financial institution 
for a health care provider (sending payment only), to send an 
explanation of benefits remittance advice directly to a health care 
provider (sending data only), or to make payment and send an 
explanation of benefits remittance advice to a health care provider via 
a financial institution (sending both payment and data).
    c. Coordination of benefits. This transaction set can be used to 
transmit health care claims and billing payment information between 
payers with different payment responsibilities where coordination of 
benefits is required or between payers and regulatory agencies to 
monitor the furnishing, billing, and/or payment of health care services 
within a specific health care/insurance industry segment.
    In addition to the nine electronic transactions specified in 
section 1173(a)(2) of the Act, section 1173(f) directs the Secretary to 
adopt standards for transferring standard data elements among health 
plans for coordination of benefits. This particular provision does not 
state that these should be standards for electronic transfer of 
standard data elements among health plans. However, we believe that the 
Congress, when writing this provision, intended for these standards to 
be an electronic form of transactions for coordination of benefits and 
sequential processing of claims. The Congress expressed its intent on 
these matters generally in section 1173(a)(1)(B) of the Act, where the 
Secretary is directed to adopt ``other financial and administrative 
transactions * * * consistent with the goals of improving the operation 
of the health care system and reducing administrative costs.''
    d. Health claim status. This transaction may be used by health care 
providers and recipients of health care products or services (or their 
authorized agents) to request the status of a health care claim or 
encounter from a health plan.
    e. Enrollment and disenrollment in a health plan. This transaction 
may be used to establish communication between the sponsor of a health 
benefit and the payer. It provides enrollment data, such as subscriber 
and dependents, employer information, and primary care health care 
provider information. A sponsor is the backer of the coverage, benefit, 
or product. A sponsor can be an employer, union, government agency, 
association, or insurance company. The health plan refers to an entity 
that pays claims, administers the insurance product or benefit, or 
both.
    f. Eligibility for a health plan. This transaction may be used to 
inquire about the eligibility, coverage, or benefits associated with a 
benefit plan, employer, plan sponsor, subscriber, or a dependent under 
the subscriber's policy. It also can be used to communicate information 
about or changes to eligibility, coverage, or benefits from information 
sources (such as insurers, sponsors, and payers) to information 
receivers (such as physicians, hospitals, third party administrators, 
and government agencies).
    g. Health plan premium payments. This transaction may be used by, 
for example, employers, employees, unions, and associations to make and 
keep track of payments of health plan premiums to their health 
insurers. This transaction may also be used by a health care provider, 
acting as liaison for the beneficiary, to make payment to a health 
insurer for coinsurance, copayments, and deductibles.
    h. Referral certification and authorization. This transaction may 
be used to transmit health care service referral information between 
health care providers, health care providers furnishing services, and 
payers. It can also be used to obtain authorization for certain health 
care services from a health plan.
    i. First report of injury. This transaction may be used to report 
information pertaining to an injury, illness, or incident to entities 
interested in the information for statistical, legal, claims, and risk 
management processing requirements.
    j. Health claims attachments. This transaction may be used to 
transmit health care service information, such as subscriber, patient, 
demographic, diagnosis, or treatment data for the purpose of a request 
for review, certification, notification, or reporting the outcome of a 
health care services review.
    k. Other transactions as the Secretary may prescribe by regulation.

[[Page 43249]]

    Under section 1173(a)(1)(B) of the Act, the Secretary may adopt 
standards, and data elements for those standards, and for other 
financial and administrative transactions deemed appropriate by the 
Secretary. These transactions would be consistent with the goals of 
improving the operation of the health care system and reducing 
administrative costs.

C. Effective Dates--General

[Please label written comments or e-mailed comments about this 
section with the subject: effective dates]

    In general, any given standard would be effective 24 months after 
the effective date (36 months for small health plans) of the final rule 
for that standard. Because there are other standards to be established 
than those in this proposed rule, we specify the date for a given 
standard under the subpart for that standard.
    Health plans would be required by part 142 to comply with our 
requirements as follows:
    1. Each health plan that is not a small plan would have to comply 
with the requirements of part 142 no later than 24 months after the 
effective date of the final rule.
    2. Each small health plan would have to comply with the 
requirements of part 142 no later than 36 months after the effective 
date of the final rule.
    Health care providers and health care clearinghouses would be 
required to begin using the standard by 24 months after the effective 
date of the final rule.

(The effective date of the final rule will be 60 days after the final 
rule is published in the Federal Register.)
    Provisions of trading partner agreements that stipulate data 
content, format definitions, or conditions that conflict with the 
adopted standard would be invalid beginning 36 months from the 
effective date of the final rule for small health plans, and 24 months 
from the effective date of the final rule for all other health plans.
    If the HHS adopts a modification to an implementation specification 
or a standard, the implementation date of the modification would be no 
earlier than the 180th day following the adoption of the modification. 
HHS would determine the actual date, taking into account the time 
needed to comply due to the nature and extent of the modification. HHS 
would be able to extend the time for compliance for small health plans. 
This provision would be at Sec. 142.106.
    Any of the health plans, health care clearinghouses, and health 
care providers may implement a given standard earlier than the date 
specified in the subpart created for that standard. We realize that 
this may create some problems temporarily, as early implementers would 
have to be able to continue using old standards until the new one must, 
by law, be in place.

D. Security Standard

[Please label written comments or e-mailed comments about this 
section with the subject: Security Standard--General]

    Section 142.308 would set forth the security standard. There is no 
recognized single standard that integrates all the components of 
security (administrative procedures, physical safeguards, technical 
security services, and technical mechanisms) that must be in place to 
preserve health information confidentiality and privacy as defined in 
the law. Therefore, we are designating a new, comprehensive standard, 
which defines the security requirements to be fulfilled.
    In fact, there are numerous security guidelines and standards in 
existence today, focusing on the different techniques available for 
implementing the various aspects of security. We thoroughly researched 
the existing guidelines and standards, and consulted extensively with 
the organizations that developed them. A list of the organizations with 
which we consulted can be found in section G. below. As a result of 
these consultations and our research, we identified several high-level 
concepts on which the standard is based:
     The standard must be comprehensive.
     Consultation with standards development organizations, 
such as ANSI-accredited organizations, as well as business interest 
organizations, revealed the need for a standard that addressed all 
aspects of security in a concerted fashion. The HISB noted in its 
report to the Secretary that:
    ``Comprehensive adoption of security standards in health care, not 
piecemeal implementation, is advocated to provide security to data that 
is exchanged between health care entities.
    By definition, if a system or communications between two systems, 
were implemented with technology(s) meeting standards in a general 
system security framework (Identification and Authentication; 
Authorization and Access Control; Accountability; Integrity and 
Availability; Security of Communication; and Security Administration.) 
that system would be essentially secure.
    * * * no single standards development organization (SDO) is 
addressing all aspects of health care information security and 
confidentiality, and specifically, no single SDO is developing 
standards that cover every category of the security framework.'' [Page 
189]
     The standard must be technology-neutral.
    Our proposed standard does not reference or advocate specific 
technology because security technology is changing quickly. We want to 
give providers/plans/clearinghouses flexibility to choose their own 
technical solutions. A standard that is dependent on a specific 
technology or technologies would not be flexible enough to use future 
advances.
     The standard must be scalable.
    The standard must be able to be implemented by all the affected 
entities, from the smallest provider to the largest clearinghouse. A 
single approach would be neither economically feasible nor effective in 
safeguarding health data. For example, in a small physician practice, a 
contingency plan for system emergencies might be only a few pages long, 
and cover issues such as where backup diskettes must be stored, and the 
location of a backup personal computer (PC). At a large health plan, 
the contingency plan might consist of multiple volumes and cover issues 
such as remote hot site operations and secure off-site storage of 
electronic media. The physician office solution would not protect the 
large plan's data, and the plan's solution would not be economically 
feasible (or necessary) for the physician office. Moreover, the statute 
specifically directed the Secretary to take into account the needs and 
capabilities of small and rural health care providers, as those terms 
are defined by the Secretary. The scalability of our approach addresses 
this direction. We are not proposing specific definitions of ``small'' 
and ``rural'' health care providers because the statute provides no 
exemptions or special benefits for these two groups. However, we 
solicit comments on the necessity to define these terms.
General Approach
    We would define the security standard as a set of requirements with 
implementation features that providers, plans, and clearinghouses must 
include in their operations to assure that electronic health 
information pertaining to an individual remains secure. The 
implementation features address specific aspects of the requirements. 
The standard does not reference or advocate specific technology. This 
would allow the security standard to be stable, yet flexible enough to 
take advantage of state-of-the-art technology.

[[Page 43250]]

The standard does not address the extent to which a particular entity 
should implement the specific features. Instead, we would require that 
each affected entity assess its own security needs and risks and 
devise, implement, and maintain appropriate security to address its 
business requirements. How individual security requirements would be 
satisfied and which technology to use would be business decisions that 
each organization would have to make.
    The recommendations contained in the National Research Council's 
1997 report For The Record: Protecting Electronic Health Information 
support our approach to the development of a security standard. This 
report presents findings and recommendations related to health data 
security, and is widely viewed as an authoritative and comprehensive 
source on the subject. The report concludes that appropriate security 
practices are highly dependent on individual circumstances, but goes on 
to suggest that:

    ``It is therefore not possible to prescribe in detail specific 
practices for all organizations; rather, each organization must 
analyze its systems, vulnerabilities, risks, and resources to 
determine optimal security measures. Nevertheless, the committee 
believes that a set of practices can be articulated in a 
sufficiently general way that they can be adopted by all health care 
organizations in one form or another.'' (Page 168)

    The specific requirements and supporting implementation features 
detailed in the next section represent this general set of practices. 
Many health care entities have already implemented some or all of these 
practices. We believe they represent those practices that are necessary 
in order to conduct business electronically in the health care industry 
today and, therefore, are normal business costs.
    Inherent in this approach is a balance between the need to secure 
health data against risk and the economic cost of doing so. Health care 
entities must consider both aspects in devising their security 
solutions.
Specific Requirements
    The proposed standard requires that each health care entity engaged 
in electronic maintenance or transmission of health information assess 
potential risks and vulnerabilities to the individual health data in 
its possession in electronic form, and develop, implement, and maintain 
appropriate security measures. Most importantly, these measures must be 
documented and kept current.
    The proposed security standard consists of the requirements that a 
health care entity must address in order to safeguard the integrity, 
confidentiality, and availability of its electronic data. It also 
describes the implementation features that must be present in order to 
satisfy each requirement. The proposed requirements and implementation 
features were developed by the implementation team based on knowledge 
of security procedures and existing standards and guidelines described 
above. This was an iterative process that involved extensive outreach 
with a number of health care industry and Department of Commerce 
security experts. We also drew upon Recommendations 1 and 3 in the 
National Research Council's 1997 report, For The Record, that were 
recommended for immediate implementation.
    ``Recommendation 1: All organizations that handle patient-
identifiable health care information--regardless of size--should adopt 
the set of technical and organizational policies, practices, and 
procedures described below to protect such information.''
    The proposed security standard addresses the following policies, 
practices, and procedures that were listed under Recommendation 1:

 Organizational Practices
    1. Security and confidentiality policies
    2. Information security officers
    3. Education and training programs, and
    4. Sanctions
 Technical Practices and Procedures
    1. Individual authentication of users
    2. Access controls
    3. Audit trails
    4. Physical security and disaster recovery
    5. Protection of remote access points
    6. Protection of external electronic communications
    7. Software discipline, and
    8. System assessment

    ``Recommendation 3: The federal government should work with 
industry to promote and encourage an informed public debate to 
determine an appropriate balance between the primary concerns of 
patients and the information needs of various users of health care 
information.''
    This proposed security standard was developed in the spirit of 
Recommendation 3. The security standard development process has been an 
open one with invitations to a number of organizations to participate 
in the security discussions. Although implementation team membership 
was limited to government employees, nongovernmental organizations; 
business organizations; individuals knowledgeable in security; and 
educational institutions have been encouraged to express their views.
    As a result of the collaborative security regulation development 
process, the implementation team has chosen to divide the proposed 
security requirements, for purposes of presentation only, into the 
following four categories:
     Administrative procedures to guard data integrity, 
confidentiality, and availability--these are documented, formal 
practices to manage the selection and execution of security measures to 
protect data and the conduct of personnel in relation to the protection 
of data.
     Physical safeguards to guard data integrity, 
confidentiality, and availability--these relate to the protection of 
physical computer systems and related buildings and equipment from fire 
and other natural and environmental hazards, as well as from intrusion. 
Physical safeguards also cover the use of locks, keys, and 
administrative measures used to control access to computer systems and 
facilities.
     Technical security services to guard data integrity, 
confidentiality, and availability--these include the processes that are 
put in place to protect and to control and monitor information access, 
and
     Technical security mechanisms--these include the processes 
that are put in place to prevent unauthorized access to data that is 
transmitted over a communications network.
    It should be noted that the only necessity is that the requirements 
would be met, not that they be presented in these four categories. 
Under this proposed rule, a business entity could choose to order the 
requirements in any manner that suits its business.
    We then determined the requirements and implementation features 
that health plans, providers, and clearinghouses would implement. The 
implementation features describe the requirements in greater detail. 
Some requirements do not require this additional level of detail. 
Within the four categories, the requirements and implementation 
features are presented in alphabetical order to ensure that no one item 
is considered to be more important than another. The relative 
importance of the requirements and implementation features would depend 
on the characteristics of each organization.
    The four categories of the matrix are described in greater detail 
in Sec. 142.308 and are depicted in tabular form along with the 
electronic signature standard in

[[Page 43251]]

a combined matrix located at Addendum 1. We have not included the 
matrix in the proposed regulation text. We invite your comments 
concerning the appropriateness and usefulness of including the matrix 
in the final regulation text. We also solicit comments as to the level 
of detail expressed in requirement implementation features; i.e., do 
any represent a level of detail that goes beyond what is necessary or 
appropriate. We have also provided a glossary of terms to facilitate a 
common understanding of the matrix entries. The glossary can be found 
at Addendum 2. Finally, we have included currently existing standards 
and guidelines mapped to the proposed security standard. This mapping 
is not all inclusive and is located at Addendum 3.
1. Administrative Procedures
[Please label written comments or e-mailed comments about this 
section with the subject: administrative procedures]

    In this proposed rule, the administrative requirements and 
supporting implementation features are presented at Sec. 142.308(a). We 
would require each to be documented. We would require the documentation 
to be made available to those individuals responsible for implementing 
the procedures and would require it to be reviewed and updated 
periodically. The following matrix depicts the requirements and 
supporting implementation features for the Administrative Procedures 
category. Following the matrix is a discussion of each of the 
requirements under that category.

 Administrative Procedures To Guard Data Integrity, Confidentiality, and
                              Availability                              
------------------------------------------------------------------------
              Requirement                         Implementation        
------------------------------------------------------------------------
Certification                                                           
Chain of trust partner agreement                                        
Contingency plan (all listed             Applications and data          
 implementation features must be          criticality analysis.         
 implemented).                           Data backup plan.              
                                         Disaster recovery plan.        
                                         Emergency mode operation plan. 
                                         Testing and revision.          
Formal mechanism for processing records                                 
Information access control (all listed   Access authorization.          
 implementation features must be         Access establishment.          
 implemented).                           Access modification.           
Internal audit                                                          
Personnel security (all listed           Assure supervision of          
 implementation features must be          maintenance personnel by      
 implemented).                            authorized, knowledgeable     
                                          person.                       
                                         Maintenance of record of access
                                          authorizations.               
                                         Operating, and in some cases,  
                                          maintenance personnel have    
                                          proper access authorization.  
                                         Personnel clearance procedure. 
                                         Personnel security policy/     
                                          procedure.                    
                                         System users, including        
                                          maintenance personnel, trained
                                          in security.                  
Security configuration mgmt. (all        Documentation.                 
 listed implementation features must be  Hardware/software installation 
 implemented).                            & maintenance review and      
                                          testing for security features.
                                         Inventory.                     
                                         Security Testing.              
                                         Virus checking.                
Security incident procedures (all        Report procedures.             
 listed implementation features must be  Response procedures.           
 implemented).                                                          
Security management process (all listed  Risk analysis.                 
 implementation features must be         Risk management.               
 implemented).                           Sanction policy.               
                                         Security policy.               
Termination procedures (all listed       Combination locks changed.     
 implementation features must be         Removal from access lists.     
 implemented).                           Removal of user account(s).    
                                         Turn in keys, token or cards   
                                          that allow access.            
Training (all listed implementation      Awareness training for all     
 features must be implemented).           personnel (including mgmt)    
                                         Periodic security reminders.   
                                         User education concerning virus
                                          protection.                   
                                         User education in importance of
                                          monitoring log in success/    
                                          failure, and how to report    
                                          discrepancies.                
                                         User education in password     
                                          management                    
------------------------------------------------------------------------

    a. Certification. Each organization would be required to evaluate 
its computer system(s) or network design(s) to certify that the 
appropriate security has been implemented. This evaluation could be 
performed internally or by an external accrediting agency.
    We are, at this time, soliciting input on appropriate mechanisms to 
permit independent assessment of compliance. We would be particularly 
interested in input from those engaging in health care electronic data 
interchange (EDI), as well as independent certification and auditing 
organizations addressing issues of documentary evidence of steps taken 
for compliance; need for, or desirability of, independent verification, 
validation, and testing of system changes; and certifications required 
for off-the-shelf products used to meet the requirements of this 
regulation.

[[Page 43252]]

    We also solicit comments on the extent to which obtaining external 
certification would create an undue burden on small or rural providers.
    b. Chain of Trust Partner Agreement. If data are processed through 
a third party, the parties would be required to enter into a chain of 
trust partner agreement. This is a contract in which the parties agree 
to electronically exchange data and to protect the transmitted data. 
The sender and receiver are required and depend upon each other to 
maintain the integrity and confidentiality of the transmitted 
information. Multiple two-party contracts may be involved in moving 
information from the originating party to the ultimate receiving party. 
For example, a provider may contract with a clearinghouse to transmit 
claims to the clearinghouse; the clearinghouse, in turn, may contract 
with another clearinghouse or with a payer for the further transmittal 
of those claims. These agreements are important so that the same level 
of security will be maintained at all links in the chain when 
information moves from one organization to another.
    c. Contingency Plan. We would require a contingency plan to be in 
effect for responding to system emergencies. The organization would be 
required to perform periodic backups of data, have available critical 
facilities for continuing operations in the event of an emergency, and 
have disaster recovery procedures in place. To satisfy the requirement, 
the plan would include the following:
     Applications and data criticality analysis,
     A data backup plan,
     A disaster recovery plan,
     An emergency mode operation plan, and
     Testing and revision procedures.
    d. Formal Mechanism for Processing Records There would be a formal 
mechanism for processing records, that is, documented policies and 
procedures for the routine and nonroutine receipt, manipulation, 
storage, dissemination, transmission, and/or disposal of health 
information. This is important to limit the inadvertent loss or 
disclosure of secure information because of process issues.
    e. Information Access Control. An entity would be required to 
establish and maintain formal, documented policies and procedures for 
granting different levels of access to health care information. To 
satisfy this requirement, the following features would be provided:
     Access authorization policies and procedures.
     Access establishment policies and procedures.
     Access modification policies and procedures.
    Access control is also discussed later in this document in the 
personnel security requirement and under the physical safeguards, 
technical security services, and technical security mechanisms 
categories.
    f. Internal Audit. There would be a requirement for an ongoing 
internal audit process, which is the in-house review of the records of 
system activity (for example, logins, file accesses, security 
incidents) maintained by an entity. This is important to enable the 
organization to identify potential security violations.
    g. Personnel Security. There would be a requirement that all 
personnel with access to health information must be authorized to do so 
after receiving appropriate clearances. This is important to prevent 
unnecessary or inadvertent access to secure information. The personnel 
security requirement would require entities to meet the following 
conditions:
     Assure supervision of personnel performing technical 
systems maintenance activities by authorized, knowledgeable persons.
     Maintain access authorization records.
     Insure that operating, and in some cases, maintenance 
personnel have proper access.
     Employ personnel clearance procedures
     Employ personnel security policy/procedures.
     Ensure that system users, including technical maintenance 
personnel are trained in system security.
    h. Security Configuration Management. The organization would be 
required to implement measures, practices, and procedures for the 
security of information systems. These would be coordinated and 
integrated with other system configuration management practices in 
order to create and manage system integrity. This integration process 
is important to ensure that routine changes to system hardware and/or 
software do not contribute to or create security weaknesses. This 
requirement would include the following:
     Documentation.
     Hardware/software installation and maintenance review and 
testing for security features.
     Inventory procedures.
     Security testing.
     Virus checking.
    i. Security Incident Procedures. There would be a requirement to 
implement accurate and current security incident procedures. These are 
formal, documented instructions for reporting security breaches, so 
that security violations are reported and handled promptly. These 
instructions would include the following:
     Report procedures.
     Response procedures.
    j. Security Management Process. A process for security management 
would be required. This involves creating, administering, and 
overseeing policies to ensure the prevention, detection, containment, 
and correction of security breaches. We would require the organization 
to have a formal security management process in place to address the 
full range of security issues. Security management includes the 
following mandatory implementation features:
     Risk analysis.
     Risk management.
     A sanction policy.
     A security policy.
    k. Termination Procedures. There would be a requirement to 
implement termination procedures, which are formal, documented 
instructions, including appropriate security measures, for the ending 
of an employee's employment or an internal/external user's access. 
These procedures are important to prevent the possibility of 
unauthorized access to secure data by those who are no longer 
authorized to access the data. Termination procedures would include the 
following mandatory implementation features:
     Changing combination locks.
     Removal from access lists.
     Removal of user account(s).
     Turn in of keys, tokens, or cards that allow access.
    1. Training. This proposed rule would require security training for 
all staff regarding the vulnerabilities of the health information in an 
entity's possession and procedures which must be followed to ensure the 
protection of that information. This is important because employees 
need to understand their security responsibilities and make security a 
part of their day-to-day activities. The implementation features that 
would be required to be incorporated follow:
     Awareness training for all personnel, including 
management, (this is also included as a requirement under physical 
safeguards).
     Periodic security reminders.
     User education concerning virus protection.
     User education in importance of monitoring login success/
failure, and how to report discrepancies.
     User education in password management.

[[Page 43253]]

2. Physical Safeguards To Guard Data Integrity, Confidentiality, and 
Availability
[Please label written comments or e-mailed comments about this 
section with the subject: Physical Safeguards]

    The requirements and implementation features for physical 
safeguards are presented at Sec. 142.308(b) of this proposed rule. We 
would require each of these safeguards to be documented. We would 
require this documentation to be made available to those individuals 
responsible for implementing the safeguards and to be reviewed and 
updated periodically. The following matrix depicts the requirements and 
implementation features for the Physical Safeguards category. Following 
the matrix is a discussion of each of the requirements under that 
category.

    Physical Safeguards To Guard Data Integrity, Confidentiality, and   
                              Availability                              
------------------------------------------------------------------------
              Requirement                         Implementation        
------------------------------------------------------------------------
Assigned security responsibility                                        
Media controls (all listed               Access control.                
 implementation features must be         Accountability (tracking       
 implemented).                            mechanism).                   
                                         Data backup.                   
                                         Data storage.                  
                                         Disposal.                      
Physical access controls (limited        Disaster recovery.             
 access) (all listed implementation      Emergency mode operation.      
 features must be implemented).          Equipment control (into and out
                                          of site).                     
                                         Facility security plan.        
                                         Procedures for verifying access
                                          authorizations prior to       
                                          physical access.              
                                         Maintenance records.           
                                         Need-to-know procedures for    
                                          personnel access.             
                                         Sign-in for visitors and       
                                          escort, if appropriate.       
                                         Testing and revision.          
Policy/guideline on work station use                                    
Secure work station location                                            
Security awareness training.                                            
------------------------------------------------------------------------

    a. Assigned Security Responsibility. We would require the security 
responsibility to be assigned to a specific individual or organization, 
and the assignment be documented. These responsibilities would include 
the management and supervision of (1) the use of security measures to 
protect data, and (2) the conduct of personnel in relation to the 
protection of data. This assignment is important to provide an 
organizational focus and importance to security and to pinpoint 
responsibility.
    b. Media Controls. Media controls would be required in the form of 
formal, documented policies and procedures that govern the receipt and 
removal of hardware/software (for example, diskettes, tapes) into and 
out of a facility. They are important to ensure total control of media 
containing health information. These controls would include the 
following mandatory implementation features:
     Controlled access to media.
     Accountability (tracking mechanism).
     Data backup.
     Data storage.
     Disposal.
    c. Physical Access Controls. Physical access controls (limited 
access) would be required. These would be formal, documented policies 
and procedures for limiting physical access to an entity while ensuring 
that properly authorized access is allowed. These controls would be 
extremely important to the security of health information by preventing 
unauthorized physical access to information and ensuring that 
authorized personnel have proper access. These controls would include 
the following mandatory implementation features:
     Disaster recovery.
     Emergency mode operation.
     Equipment control (into and out of site).
     A facility security plan.
     Procedures for verifying access authorizations prior to 
physical access.
     Maintenance records.
     Need-to-know procedures for personnel access.
     Sign-in for visitors and escort, if appropriate.
     Testing and revision.
    d. Policy/Guideline on Workstation Use. Each organization would be 
required to have a policy/guideline on workstation use. These 
documented instructions/procedures would delineate the proper functions 
to be performed and the manner in which those functions are to be 
performed (for example, logging off before leaving a terminal 
unattended). This would be important so that employees will understand 
the manner in which workstations must be used to maximize the security 
of health information.
    e. Secure Workstation Location. Each organization would be required 
to put in place physical safeguards to eliminate or minimize the 
possibility of unauthorized access to information. This would be 
important especially in public buildings, provider locations, and in 
areas where there is heavy pedestrian traffic.
    f. Security Awareness Training. Security awareness training would 
be required for all employees, agents, and contractors. This would be 
important because employees would need to understand their security 
responsibilities based on their job responsibilities in the 
organization and make security a part of their daily activities.
3. Technical Security Services To Guard Data Integrity, 
Confidentiality, and Availability
[Please label written comments or e-mailed comments about this 
section with the subject: Technical Security Services]

    The proposed requirements and implementation features for technical 
security services are presented at Sec. 142.308(c). We would require 
each of these services to be implemented and documented. The 
documentation would be made available to those individuals responsible 
for implementing the services and would be reviewed and updated 
periodically. The following matrix depicts the requirements and 
implementation features for the Technical Security Services category. 
Following the matrix is a discussion of

[[Page 43254]]

each of the requirements under that category.

  Technical Security Services To Guard Data Integrity, Confidentiality, 
                            and Availability                            
------------------------------------------------------------------------
              Requirement                         Implementation        
------------------------------------------------------------------------
Access control (The following            Context-based access.          
 implementation feature must be          Encryption.                    
 implemented: Procedure for emergency    Procedure for emergency access.
 access. In addition, at least one of    Role-based access.             
 the following three implementation      User-based access.             
 features must be implemented: Context-                                 
 based access, Role-based access, User-                                 
 based access. The use of Encryption is                                 
 optional).                                                             
Audit controls                                                          
Authorization control (At least one of   Role-based access.             
 the listed implementation features      User-based access.             
 must be implemented).                                                  
Data Authentication                                                     
Entity authentication (The following     Automatic logoff.              
 implementation features must be         Biometric.                     
 implemented: Automatic logoff, Unique   Password.                      
 user identification. In addition, at    PIN.                           
 least one of the other listed           Telephone callback.            
 implementation features must be         Token.                         
 implemented).                           Unique user identification.    
------------------------------------------------------------------------

    a. Access Control. There would be a requirement for access control 
which would restrict access to resources and allow access only by 
privileged entities. It would be important to limit access to health 
information to those employees who have a business need to access it. 
Types of access control include, among others, mandatory access 
control, discretionary access control, time-of-day, classification, and 
subject-object separation. The following implementation feature would 
be used:
     Procedure for emergency access.
    In addition, at least one of the following three implementation 
features would be used:
     Context-based access.
     Role-based access.
     User-based access.
    The use of the encryption implementation feature would be optional.
    b. Audit Controls. Each organization would be required to put in 
place audit control mechanisms to record and examine system activity. 
They would be important so that the organization can identify suspect 
data access activities, assess its security program, and respond to 
potential weaknesses.
    c. Authorization Control. There would be a requirement to put in 
place a mechanism for obtaining consent for the use and disclosure of 
health information. These controls would be necessary to ensure that 
health information is used only by properly authorized individuals. 
Either of the following implementation features may be used:
     Role-based access.
     User-based access (see access control, above.).
    d. Data Authentication. Each organization would be required to be 
able to provide corroboration that data in its possession has not been 
altered or destroyed in an unauthorized manner. Examples of how data 
corroboration may be assured include the use of a check sum, double 
keying, a message authentication code, or digital signature.
    e. Entity Authentication. Each organization would be required to 
implement entity authentication, which is the corroboration that an 
entity is who it claims to be. Authentication would be important to 
prevent the improper identification of an entity who is accessing 
secure data. The following implementation features would be used:
     Automatic log off.
     Unique user identification.
    In addition, at least one of the following implementation features 
would be used:
     A biometric identification system.
     A password system.
     A personal identification number (PIN).
     Telephone callback.
     A token system which uses a physical device for user 
identification.
4. Technical Security Mechanisms To Guard Against Unauthorized Access 
to Data That Is Transmitted Over a Communications Network
[Please label written comments or e-mailed comments about this 
section with the subject: Technical Security Mechanisms]

    In this proposed rule, the requirements and implementation features 
for technical security mechanisms are presented at Sec. 142.308(d). 
Each of these mechanisms would need to be documented. The documentation 
would be made available to those individuals responsible for 
implementing the mechanisms and would be reviewed and updated 
periodically. The following matrix depicts the requirement and 
implementation features for the Technical Security Mechanisms category. 
Following the matrix is a discussion of the requirement under that 
category.

[[Page 43255]]



  Technical Security Mechanisms To Guard Against Unauthorized Access to 
         Data That Is Transmitted Over a Communications Network         
------------------------------------------------------------------------
              Requirement                         Implementation        
------------------------------------------------------------------------
Communications/network controls (If      Access controls.               
 communications or networking is         Alarm.                         
 employed, the following implementation  Audit trail.                   
 features must be implemented:           Encryption.                    
 Integrity controls, Message             Entity authentication.         
 authentication. In addition, one of     Event reporting.               
 the following implementation features   Integrity controls.            
 must be implemented: Access controls,   Message authentication.        
 Encryption. In addition, if using a                                    
 network, the following four                                            
 implementation features must be                                        
 implemented: Alarm, Audit trail,                                       
 Entity authentication, Event                                           
 reporting).                                                            
------------------------------------------------------------------------

    Each organization that uses communications or networks would be 
required to protect communications containing health information that 
are transmitted electronically over open networks so that they cannot 
be easily intercepted and interpreted by parties other than the 
intended recipient, and to protect their information systems from 
intruders trying to access systems through external communication 
points. When using open networks, some form of encryption should be 
employed. The utilization of less open systems/networks such as those 
provided by a value-added network (VAN) or private-wire arrangement 
provides sufficient access controls to allow encryption to be an 
optional feature. These controls would be important because of the 
potential for compromise of information over open systems such as the 
Internet or dial-in lines.
    The following implementation features would be in place:
     Integrity controls.
     Message authentication.
    One of the following implementation features would be in place:
     Access controls.
     Encryption.
    In addition, if using a network for communications, the following 
implementation features would be in place:
     Alarm.
     Audit trail.
     Entity authentication.
     Event reporting.
    Small or Rural Provider Example. The size and organizational 
structure of the entities that would be required to implement this 
standard vary tremendously. Therefore, it would be impossible to 
provide examples that would cover every possible implementation of 
security in the health care industry. Nevertheless, we have included an 
example describing the manner in which a small or rural provider might 
choose to implement the requirements of the standard. (For purposes of 
this example, we would describe a small or rural provider as a one to 
four physician office, with two to five additional employees. The 
office uses a PC-based practice management system, which is used to 
communicate intermittently with a clearinghouse for submission of 
electronic claims. The number of providers is of less importance for 
this example than the relatively simple technology in use and the fact 
that there is insufficient volume or revenue to justify employment of a 
computer system administrator.) We want to emphasize that there are 
numerous ways in which an entity could implement these requirements and 
features. This example does not necessarily represent the best way or 
the only way in which an entity could choose to implement security.
    We anticipate that the small or rural provider office, as described 
above, would normally evaluate and self-certify that the appropriate 
security is in place for its computer system and office procedures. 
This evaluation could be done by a knowledgeable person on the staff, 
or more likely, by a consultant or by the vendor of the practice 
management system as a service to its customers. First, the office 
might assess actual and potential risks to its information assets. 
Then, to establish appropriate security, the office would develop 
policies and procedures to mitigate and manage those risks. These would 
include an overall framework outlining information security activities 
and responsibilities, and repercussions for failure to meet those 
responsibilities.
    Next, this office might develop contingency plans to reduce or 
negate the damage resulting from processing anomalies; for example, 
establish a routine process for maintaining back up floppy disks at a 
second location, obtain a PC maintenance contract, and arrange for use 
of a backup PC should the need arise. This office would need to 
periodically review its plan to determine whether it still met the 
office's needs.
    The office would need to create and document a personnel security 
policy and procedures to be followed. A key individual on the office 
staff should be charged with the responsibility for assuring the 
Personnel Security requirement is met. This responsibility would 
include seeing that the access authorization levels granted are 
documented and kept current (for example, records are kept of everyone 
who is permitted to use the PC and what files they may access), and 
training all personnel in security. Again, we emphasize that these 
requirements are scalable. The requirement for Personnel Clearance 
Procedures could be met in a small office with standard personal and 
professional reference checks, while a large organization may employ 
more formal, rigorous background investigations.
    This same individual could also be charged with the responsibility 
for Security Configuration Management and Termination Procedures. For 
our small provider, the Security Configuration Management requirement 
would be relatively easy to satisfy; the necessary features could be 
part of a purchased hardware/software package (for example, a new PC 
might be equipped with virus checking software), or included as part of 
the support supplied with the purchase of equipment and software. 
Termination procedures would incorporate specific security actions to 
be taken as a result of an employee's termination, such as obtaining 
all keys and changing combinations or passwords. A ``position 
description'' document describing this person's duties could specify 
the level of detail necessary.
    The small or rural provider office would also need to ensure that 
they have activated the internal auditing capability of the software 
used to manage health data files so that it tracks who has accessed the 
data. (We expect that the capability of keeping audit trails will 
become standard in all health care software in the near future, spurred 
on by the health information privacy debates in the Congress and 
elsewhere.)
    A small or rural provider may document compliance with many of the

[[Page 43256]]

foregoing administrative security requirements by including them in an 
``office procedures'' type of document that should be required reading 
by new employees and always available for reference. Requirements that 
would lend themselves to inclusion in an ``office procedures'' document 
include: contingency plans, formal records processing procedures, 
information access controls (rules for granting access, actual 
establishment of access, and procedures for modifying such access), 
security incident procedures (for example, who is to be notified if it 
appears that medical information has been accessed by an unauthorized 
party), and training. Periodic security reminders could include visual 
aids, such as posters and screen savers, and oral reminders in 
recurring meetings.
    Physical Access controls would be relatively straightforward for 
this small or rural office, using locked rooms and/or closets to secure 
equipment and media from unauthorized access. The ``office procedures/
policies'' manual should include directions for authorizing access and 
keeping records of authorized accesses. Media Controls and Workstation 
Use policy instructions would be developed by the office and would 
include additional instructions on such items as where to store backed-
up data, how to dispose of data no longer needed, or logging off when 
leaving terminals unattended.
    Safeguards for the security of workstation location(s) would depend 
upon the physical surroundings in the small or rural office. Our small 
or rural provider may meet the requirements by locating equipment in 
areas that are generally populated by office staff and have some degree 
of physical separation from the public. Security Awareness Training 
would be part of the new employee orientation process and would be a 
periodic recurring discussion item in staff meetings.
    The Technical Security Services requirements for Access Control, 
Entity Authentication, and Authorization Control may be achieved simply 
by implementing a user-based data access model (assigning a user-name 
and password combination to each authorized employee). Other access 
models could be employed if desired, but would prove unwieldy for the 
small office. For example, the role-based access process groups users 
with similar data access needs, and context-based access is based upon 
the context of a transaction--not on the attributes of the initiator. 
By assigning full access rights to a minimum of two key individuals in 
the office, implementation of the Emergency Access feature could be 
satisfied. Audit control mechanisms, by necessity, would be provided by 
software featuring that capability. By establishing and using a message 
authentication code, Data Authentication would be achieved. Use of the 
password system mentioned above could also satisfy the Unique User 
Identification requirement.
    As our example provider contracts with a third party to handle 
claims processing, the claims processing contract would be the vehicle 
to provide for a chain of trust (requiring the contractor to implement 
the same security requirements and take responsibility for protecting 
the data it receives).
    If this provider chooses to use the Internet to transmit or receive 
health information, some form of encryption must be used. For example, 
the provider could procure and use commercial software to provide 
protection against unauthorized access to the data transmitted or 
received. (This decision must take into account what encryption system 
the message recipient uses.) On the other hand, health information when 
transmitted via other means such as VANs, private wires, or even dial-
up connections may not require such absolute protection as is provided 
by encryption. This small or rural provider would likely not be part of 
a network configuration, therefore, only integrity controls and message 
authentication would be required and could be provided by currently 
available software products, most likely provided as part of their 
contract with their health care clearinghouse.
    Small providers may need guidance regarding the content of the 
documents required by this rule (for example, specifics of a chain of 
trust partner agreement). We would expect models of the documentation 
discussed in this example to be developed by industry associations and 
vendors. If this model documentation is not developed, DHHS would work 
with the industry to develop them.

E. Electronic Signature Standard

[Please label written comments or e-mailed comments about this 
section with the subject: Electronic Signature Standard]

    HIPAA directs the Secretary of the Department of Health and Human 
Services to coordinate with the Secretary of the Department of Commerce 
in adopting standards for the electronic transmission and 
authentication of signatures with respect to the transactions referred 
to in the law. This rule was developed in coordination with the 
Department of Commerce's National Institute of Standards and 
Technology. We propose to adopt a cryptographically based digital 
signature as the standard.
    Whenever a HIPAA specified transaction requires the use of an 
electronic signature, the standard must be used. It should be noted 
that an electronic signature is not required for any of the currently 
proposed standard transactions.
    In the electronic environment, the same legal weight associated 
with an original signature on a paper document may be needed for 
electronic data. Use of an electronic signature refers to the act of 
attaching a signature by electronic means. The electronic signature 
process involves authentication of the signer's identity, a signature 
process according to system design and software instructions, binding 
of the signature to the document and non-alterability after the 
signature has been affixed to the document. The generation of 
electronic signatures requires the successful identification and 
authentication of the signer at the time of the signature.
    The proposed standard for electronic signature is presented at 
Sec. 142.310 and would be digital.
    The following matrix depicts the requirement and implementation 
features for electronic signatures. Following the matrix is a 
discussion of the electronic signature requirement.

[[Page 43257]]



                          Electronic Signature                          
------------------------------------------------------------------------
              Requirement                         Implementation        
------------------------------------------------------------------------
Digital signature (If digital signature  Ability to add attributes.     
 is employed, the following three        Continuity of signature        
 implementation features must be          capability.                   
 implemented: Message integrity,         Countersignatures.             
 Nonrepudiation, User authentication.    Independent verifiability.     
 Other implementation features are       Interoperability.              
 optional).                              Message integrity.             
                                         Multiple Signatures.           
                                         Nonrepudiation.                
                                         Transportability.              
                                         User authentication.           
------------------------------------------------------------------------

    Various technologies may fulfill one or more of the requirements 
specified in the matrix. Authentication systems (passwords, biometrics, 
physical feature authentication, behavioral actions and token-based 
authentication) can be combined with cryptographic techniques to form 
an electronic signature. However, a complete electronic signature 
system may require more than one of the technologies mentioned above. 
If electronic signatures would be used, certain implementation features 
must be included, specifically:
     Message integrity.
     Nonrepudiation.
     User authentication.
    Currently there are no technically mature techniques that provide 
the security service of nonrepudiation in an open network environment, 
in the absence of trusted third parties, other than digital signature-
based techniques. Therefore, if electronic signatures are employed, we 
would require that digital signature technology be used. A digital 
signature is formed by applying a mathematical function to the 
electronic document. This process yields a unique bit string, referred 
to as a message digest. The digest (only) is encrypted using the 
originator's private key and the resulting bit stream is appended to 
the electronic document. The recipient of the transmitted document 
decrypts the message digest with the originator's public key, applies 
the same message hash function to the document, then compares the 
resulting digest with the transmitted version. If they are identical, 
then the recipient is assured that the message is unaltered and the 
identity of the signer is proven. Since only the signatory authority 
can hold the Private Key used to digitally sign the document, the 
critical feature of nonrepudiation is enforced. Other electronic 
signature implementation features that may be used follow:
     Ability to add attributes.
     Continuity of signature capability.
     Countersignatures capability.
     Independent verifiability.
     Interoperability.
     Multiple signatures.
     Transportability.
    This standard is described in greater detail in Sec. 142.310 of the 
regulation text and is depicted in tabular form along with the security 
standard in a combined matrix located at Addendum 1. We have not 
included the matrix in the proposed regulation text. We invite your 
comments concerning the appropriateness and usefulness of including the 
matrix in the final regulation text. We have also provided a glossary 
of terms to facilitate a common understanding of the matrix entries. 
The glossary can be found at Addendum 2. Finally, we have included 
currently existing standards and guidelines mapped to the proposed 
electronic signature standard. This mapping is not all inclusive and is 
located at Addendum 3.

F. Selection Criteria

    Each individual implementation team weighted the criteria described 
in section I.B. above, Process for Developing National Standards, in 
terms of the standard it was addressing. As we assessed security and 
electronic signatures, it became apparent that while the security 
standard set forth in Sec. 142.308 and the electronic signature 
standard set forth in Sec. 142.310 satisfy all the criteria described 
above, they most strongly address criteria 1, 3, 7, 9, and 10. These 
criteria are described below in the specific context of these 
standards.
    1. Improve the efficiency and effectiveness of the health care 
system.
    The security and electronic signature standards would be integrated 
with the electronic transmission of health care information to improve 
the overall effectiveness of the health care system. This integration 
would assure that electronic health care information would not be 
accessible to any unauthorized person or organization, but would be 
both accurate and available to those who are authorized to receive it.
    3. Be consistent and uniform with the other HIPAA standards and, 
secondly, with other private and public sector health data standards.
    The security and electronic signature standards were developed 
after a comprehensive review of existing standards and guidelines, with 
significant input by a wide range of industry experts. As indicated in 
Addendum 3, the standards map well to existing standards and 
guidelines.
    7. Be technologically independent of computer platforms and 
transmission protocols.
    We have defined the security and electronic signature standards in 
terms of requirements that would allow businesses in the health care 
industry to select the technology that best meets their business 
requirements while still allowing them to comply with the standards.
    9. Keep data collection and paperwork burdens on users as low as is 
feasible.
    The security and electronic signature standards would allow 
individual health care industry businesses to ascertain the level of 
security information that would be needed. The confidentiality level 
associated with individual data elements concerning health care 
information would determine the appropriate security application to be 
used. The security standard would define the requirements to be met to 
achieve the privacy and confidentiality goal, but each business entity, 
driven by its business requirements, would decide what techniques and 
controls would provide appropriate and adequate electronic data 
protection. This would allow data collection and the paperwork burden 
to be as low as is feasible.
    10. Incorporate flexibility to adapt more easily to changes in the 
health care infrastructure and information technology.
    A technologically neutral security standard would be more adaptable 
to changes in infrastructure and information technology.

[[Page 43258]]

G. Consultations

    In the development of the security and electronic signature 
standards, we consulted with many organizations, including those the 
legislation requires (section 1172(c)(3)(B) of the Act):
    1. The NCVHS held two days of public hearings on security issues in 
August 1997, and made a recommendation to the Secretary of HHS, as 
required by the legislation. The NCVHS recommendation to the Secretary 
of HHS, as required by the legislation, was for a technologically 
neutral standard. It identified certain criteria to be established for 
a health information system to be secure. The proposed security 
standard complies with the NCVHS security recommendation.
    2. The ANSI Accredited Standards Committee (ASC) X12 subcommittees 
on communication and control, insurance and government were contacted. 
Their current standards development effort is focused on messaging 
rather than on security requirements.
    3. American Society for Testing and Materials (ASTM), Committee E31 
on Computerized Systems participated in the security discussions.
    4. Association for Electronic Health Care Transactions (AFEHCT), 
the clearinghouse organization, provided information on its health care 
transaction process requirements and emphasized that the security 
standard must be adaptable to different business needs.
    5. Computer-based Patient Record Institute (CPRI) was consulted 
because the Work Group on Confidentiality, Privacy and Security is 
working on the establishment of guidelines, confidentiality agreements, 
security requirements, and frameworks. CPRI works closely with 
accredited standards development organizations.
    6. Health Level Seven (HL-7) has been contacted through its 
participation at the HISB meetings.
    7. NUCC and the NUBC were apprised of the different implementation 
teams' efforts. NUBC has not addressed security issues at any of the 
public meetings. NUCC identified a number of issues at its November 18-
19 meeting and provided written comments to us.

H. Rules for Security Standards and Electronic Signature Standard

    1. Health Plans
    a. In Sec. 142.306(a), we would require health plans to accept and 
apply the security standard to all health care information pertaining 
to an individual that is electronically maintained or electronically 
transmitted. Federal agencies and States may place additional 
requirements on their health plans. In addition, trading partners may 
mutually agree to implement additional security measures.
    b. In Sec. 142.310(a), entities would not be required to use an 
electronic signature. However, if a plan elects to use an electronic 
signature in one of the transactions named in the law, it would be 
required to apply the electronic signature standard described in 
Sec. 142.310(b) to that transaction. In the future, we anticipate that 
the standards for other transactions may include requirements for 
signatures. In particular, the proposed standard for claims 
attachments, which will be issued in a separate regulations package 
later, may include signature requirements on some or all of the 
attachments. If the proposed attachments standard includes such 
signature requirements, we will address the issue of how to reconcile 
such requirements with existing State and Federal requirements for 
written signatures as part of the proposed rule.
2. Health Care Clearinghouses
    a. We would require in Sec. 142.306(b) that each health care 
clearinghouse comply with the security standard to ensure all health 
care information and activities are protected from unauthorized access. 
If the clearinghouse is part of a larger organization, then security 
must be imposed to prevent unauthorized access by the larger 
organization. The security standards apply to all health information 
pertaining to an individual that is electronically maintained or 
electronically transmitted.
    b. In Sec. 142.310(a), entities would not be required to use an 
electronic signature. However, if a plan elects to use an electronic 
signature in one of the transactions named in the law, it would be 
required to apply the electronic signature standard described in 
Sec. 142.310(b) to that transaction. In the future, we anticipate that 
the standards for other transactions may include requirements for 
signatures. In particular, the proposed standard for claims 
attachments, which will be issued in a separate regulations package 
later, may include signature requirements on some or all of the 
attachments. If the proposed attachments standard includes such 
signature requirements, we will address the issue of how to reconcile 
such requirements with existing State and Federal requirements for 
written signatures as part of the proposed rule.
3. Health Care Providers
    a. In Sec. 142.306(a), we would require each health care provider 
to apply the security standard to all health information pertaining to 
an individual that is electronically maintained or electronically 
transmitted.
    b. In Sec. 142.310(a), entities would not be required to use an 
electronic signature. However, if a plan elects to use an electronic 
signature in one of the transactions named in the law, it would be 
required to apply the electronic signature standard described in 
Sec. 142.310(b) to that transaction. In the future, we anticipate that 
the standards for other transactions may include requirements for 
signatures. In particular, the proposed standard for claims 
attachments, which will be issued in a separate regulations package 
later, may include signature requirements on some or all of the 
attachments. If the proposed attachments standard includes such 
signature requirements, we will address the issue of how to reconcile 
such requirements with existing State and Federal requirements for 
written signatures as part of the proposed rule.

I. Effective Dates

    Health plans would be required to comply with the security and 
electronic signature standards as follows:
    1. Each health plan that is not a small health plan would have to 
comply with the requirements of Secs. 142.306, 142.308, and 142.310 no 
later than 24 months after publication of the final rule.
    2. Each small health plan would have to comply with the 
requirements of Secs. 142.306, 142.308, and 142.310 no later than 36 
months after the date of publication of the final rule.
    3. If the effective date for the electronic transaction standards 
is later than the effective date for the security standard, 
implementation of the security standard would not be delayed until the 
standard transactions are in use. The security standard would still be 
effective with respect to electronically stored or maintained data. 
Security of health information would not be solely tied to the standard 
transactions but would apply to all individual health information 
electronically stored, maintained, or transmitted.
    4. Under this proposed rule, in some cases, a health plan could 
choose to convert from paper to standard EDI transactions prior to the 
effective date of the security standard. We would recommend that the 
security standard be implemented at that time in order to safeguard the 
data in those transactions. We invite comments on this issue.

[[Page 43259]]

    Failure to comply with standards may result in monetary penalties. 
The Secretary is required by statute to impose penalties of not more 
than $100 per violation on any person who fails to comply with a 
standard, except that the total amount imposed on any one person in 
each calendar year may not exceed $25,000 for violations of one 
requirement.
    We are not proposing any enforcement procedures at this time, but 
we plan to do so in a future Federal Register document once the 
industry has some experience with using the standards. These procedures 
will be in place by the time the standards are implemented by industry. 
We envision the monitoring and enforcement process as a partnership 
between the Federal government and the private sector. Some private 
accreditation bodies have already exhibited interest in certifying 
compliance with the security requirements as part of their 
accreditation reviews. Small providers may be able to self-certify 
through industry-developed checklists. HHS would likely retain the 
final responsibility for determining violations and imposing the 
penalties specified by the statute. We welcome comments on this 
approach.

III. Implementation

    If an entity elects to use an electronic signature in a 
transaction, or if an electronic signature is required by a transaction 
standard adopted by the Secretary, the entity must apply the electronic 
signature standard described in Sec. 142.310(b).
    How the security standard would be implemented is dependent upon 
industry trading partner agreements for electronic transmissions. The 
health care industry would be able to adapt the security matrix to meet 
its business needs. We propose that the requirements of the security 
standard be implemented over time. However, we would require 
implementation to be complete by the applicable effective date. We 
would encourage, but not require that entities comply with the security 
standard as soon as practicable, preferably before implementing the 
transactions standards.
    The security standard would supersede contrary provisions of State 
law including State law requiring medical or health plan records to be 
maintained or transmitted in other electronic formats. There are 
certain exceptions when the standards would not supersede contrary 
provisions of State law; section 1178 identifies those conditions and 
directs the Secretary to determine whether a particular State provision 
falls within one or more of the exceptions.
    The electronic signature standard (digital signature) would be 
deemed to satisfy Federal and State statutory requirements for written 
signatures with respect to the named transactions referred to in the 
legislation.
    Several accreditation organizations such as the Electronic 
Healthcare Network Accreditation Commission (EHNAC), the Joint 
Commission on Accreditation of Healthcare Organizations (JCAHO), and 
the National Committee for Quality Assurance (NCQA), indicate that one 
of their accreditation requirements will be compliance with the HIPAA 
security and electronic signature (if applicable) standards.

IV. New and Revised Standards

    To encourage innovation and promote development, we plan to 
establish a process to allow an organization to request a revision or 
replacement to any adopted standard or standards. An organization could 
request a revision or replacement to an adopted standard by requesting 
a waiver from the Secretary of Health and Human Services to test a 
revised or new standard. The organization would be required, at a 
minimum, to demonstrate that the revised or new standard offers a clear 
improvement over the adopted standard. If the organization presents 
sufficient documentation that supports testing of a revised or new 
standard, we want to be able to grant the organization a temporary 
waiver to test while remaining in compliance with the law. We do not 
intend to establish a process that would allow an organization to avoid 
using any adopted standard.
    We would welcome comments on the following: (1) How we should 
establish this process, (2) the length of time a proposed standard 
should be tested before we decide whether to adopt it, (3) whether we 
should solicit public comments before implementing a change in a 
standard, and (4) other issues and recommendations we should consider. 
Comments should be submitted to the addresses presented in the 
ADDRESSES section of this document.
    The following is one possible process:
     Any organization that wishes to revise or replace an 
adopted standard would submit its waiver request to an HHS evaluation 
committee (to be established or defined). The organization would do the 
following for each standard it wishes to revise or replace:
    + Provide a detailed explanation, no more than 10 pages, of how the 
revision or replacement would be a clear improvement over the current 
standard.
    + Provide specifications and technical capabilities on the revised 
or new standard, including any additional system requirements.
    + Provide an explanation, no more than five pages, of how the 
organization intends to test the standard.
     The committee's evaluation would, at a minimum, be based 
on the following:
    + A cost-benefit analysis.
    + An assessment of whether the proposed revision or replacement 
demonstrates a clear improvement to an existing standard.
    + The extent and length of time of the waiver.
     The evaluation committee would inform the organization 
requesting the waiver within 30 working days of the committee's 
decision on the waiver request. If the committee decides to grant a 
waiver, the notification may include the following:
    + Committee comments such as the following:

--The length of time for which the waiver applies if it differs from 
the waiver request.
--The sites the committee believes are appropriate for testing if they 
differ from the waiver request.
--Any pertinent information regarding the conditions of an approved 
waiver.
     Any organization that receives a waiver would be required 
to submit a report containing the results of the study, no later than 3 
months after the study is completed.
     The committee would evaluate the report and determine 
whether the benefits of the proposed revision or new standard 
significantly outweigh the disadvantages of implementing it and make a 
recommendation to the Secretary.

V. Response to Comments

    Because of the large number of items of correspondence we normally 
receive on Federal Register documents published for comment, we are not 
able to acknowledge or respond to them individually. We will consider 
all comments we receive by the date and time specified in the DATES 
section of this preamble, and, if we proceed with a subsequent 
document, we will respond to the major comments in the preamble of that 
document.

VI. Impact Analysis

    As the effect of any one standard is affected by the implementation 
of other standards, it can be misleading to discuss the impact of one 
standard by itself. Therefore, we did an impact

[[Page 43260]]

analysis on the total effect of all the standards in the proposed rule 
concerning the national provider identifier (HCFA-0045-P), which was 
published on May 7, 1998 (63 FR 25320).
    We intend to publish in each proposed rule an impact analysis that 
is specific to the standard or standards proposed in that rule, but the 
impact analysis will assess only the relative cost impact of 
implementing a given standard. Thus, the following discussion contains 
the impact analysis for the security standard and the electronic 
signature standard proposed in this rule. As stated in the general 
impact analysis in HCFA-0045-P, we do not intend to associate costs and 
savings to specific standards.
    Although we cannot determine the specific economic impact of the 
standards being proposed in this rule (and individually each standard 
may not have a significant impact), the overall impact analysis makes 
clear that, collectively, all the standards will have a significant 
impact of over $100 million on the economy. Also, while each standard 
may not have a significant impact on a substantial number of small 
entities, the combined effects of all the proposed standards may have a 
significant effect on a substantial number of small entities. 
Therefore, the following impact analysis should be read in conjunction 
with the overall impact analysis.
    The following describes the specific impacts that relate to the 
security and electronic signature standards. Security protection for 
health care information is not a ``stand-alone'' type requirement. 
Appropriate security protections will be a business enabler, 
encouraging the growth and use of electronic data interchange. The 
synergistic effect of the employment of the recommended security 
practices, procedures and technologies will enhance all aspects of 
HIPAA's Administrative Simplification requirements. In addition, it is 
important to recognize that security is not a product, but is an on-
going, dynamic process.
    In accordance with the provisions of Executive Order 12866, this 
proposed rule was reviewed by the Office of Management and Budget.

A. Security Standard

    HIPAA requires that all health plans, health care providers, and 
health care clearinghouses that maintain or transmit health information 
electronically establish and maintain reasonable and appropriate 
administrative, technical, and physical safeguards to ensure integrity, 
confidentiality, and availability of the information. The safeguards 
also protect the information against any reasonably anticipated threats 
or hazards to the security or integrity of the information and protect 
it against unauthorized use or disclosure. Recommendation 1 from the 
National Research Council's (NRC) report For the Record: Protecting 
Electronic Health Information (``All organizations that handle patient-
identifiable health care information-- regardless of size--should adopt 
the set of technical and organization policies, practices, and 
procedures described * * * to protect such information.'') would apply 
to all health care providers regardless of size, health care 
clearinghouses, and health plans. We agree with the NRC's belief that 
implementation of the practices and technologies delineated in 
Recommendation 1 would be possible today, and at a reasonable cost.
    Health care providers that conduct electronic transactions with 
health plans would have to comply with the recommendation(s) for 
security protection. There is, however, no requirement to maintain 
health records electronically or transmit health care information by 
electronic means. There may also be health care providers that 
currently submit health care information on paper but archive records 
electronically. These entities will need to ensure that their existing 
electronic systems conform to security requirements for maintaining 
health information. Once they have done so, however, they may also take 
advantage of all the other benefits of electronic recordkeeping and 
transmittal. Therefore, no individual small entity is expected to 
experience direct costs that exceed benefits as a result of this rule. 
Furthermore, because almost all of the NRC recommendations reflect 
contemporary security measures and controls, most organizations that 
currently have security measures should have to make few, if any, 
modifications to their systems to meet the requirements proposed in the 
security standard.
    The singular exception to the above lies in the area of providing 
security for the electronic transmission of health care information 
over insecure, public media. Here, the choice of a method to use is 
driven by economic factors. If an organization wishes to use an 
insecure transmission media such as the Internet, and take advantage of 
the low costs involved, off-setting costs may need to be incurred to 
provide for an acceptable form of encryption so that health information 
will be protected from intercept and possible misuse.
    One alternative course of action to encrypting the information 
would be to use the services of a VAN. VANs do not manipulate data, but 
rather transmit data in its native form over telecommunication lines. 
We anticipate that VANs would be positively affected by administrative 
simplification, because use of the proposed transactions standards 
would eliminate the need for data to be reformatted. This would allow 
providers to purchase the services of a VAN directly, rather than as a 
service bundled with the functions of other clearinghouses. Another 
course of action might be to use private lines which would provide an 
appropriate level of protection for data in transmission.

B. Electronic Signature Standard

    HIPAA does not require the use of electronic signatures. This 
particular capability, however, would be necessary for a completely 
paperless environment. Certain features of the digital signature type 
of electronic signature make this particular system the most desirable. 
Only digital signatures, using current technology, provide the 
combination of authenticity, message integrity, and nonrepudiation 
which is viewed as a desirable complement to the security standards 
required by the law.
    The use of digital signatures requires a certain infrastructure 
(Public Key Infrastructure) that may necessitate the expenditure of 
initial and recurring costs for users. We do not know what these costs 
are presently, due to the lack of maturity of digital signature 
technology, and minimal use in the marketplace today. It is noted that 
public key certificate management systems and services do exist today, 
and it is presumed more quantifiable information will be forthcoming, 
as to potential costs and savings that can be associated with the use 
of digital signature systems. Other forms of electronic signature were 
considered, such as biometric and digitized signatures. While they 
provide a useful capability in certain circumstances, we believe that 
digital signature technology is most appropriate for this particular 
application.

C. Guiding Principles for Standard Selection

    The implementation teams charged with designating standards under 
the statute have defined, with significant input from the health care 
industry, a set of common criteria for evaluating potential standards. 
These criteria are based on direct specifications in the HIPAA, the 
purpose of the law, and principles that support the regulatory

[[Page 43261]]

philosophy set forth in EO 12866 of September 30, 1993. In order to be 
designated as a standard, EO 12866 requires that a proposed standard:
     Improve the efficiency and effectiveness of the health 
care system by leading to cost reductions for or improvements in 
benefits from electronic HIPAA health care transactions. This principle 
supports the regulatory goals of cost-effectiveness and avoidance of 
burden.
     Meet the needs of the health data standards user 
community, particularly health care providers, health plans, and health 
care clearinghouses. This principle supports the regulatory goal of 
cost-effectiveness.
     Be consistent and uniform with the other HIPAA standards 
(that is, their data element definitions and codes and their privacy 
and security requirements) and, secondarily, with other private and 
public sector health data standards. This principle supports the 
regulatory goals of consistency and avoidance of incompatibility, and 
it establishes a performance objective for the standard.
     Have low additional development and implementation costs 
relative to the benefits of using the standard. This principle supports 
the regulatory goals of cost-effectiveness and avoidance of burden.
     Be supported by an ANSI-accredited standards developing 
organization or other private or public organization that would ensure 
continuity and efficient updating of the standard over time. This 
principle supports the regulatory goal of predictability.
     Have timely development, testing, implementation, and 
updating procedures to achieve administrative simplification benefits 
faster. This principle establishes a performance objective for the 
standard.
     Be technologically independent of the computer platforms 
and transmission protocols used in HIPAA health transactions, except 
when they are explicitly part of the standard. This principle 
establishes a performance objective for the standard and supports the 
regulatory goal of flexibility.
     Be precise and unambiguous but as simple as possible. This 
principle supports the regulatory goals of predictability and 
simplicity.
     Keep data collection and paperwork burdens on users as low 
as is feasible. This principle supports the regulatory goals of cost-
effectiveness and avoidance of duplication and burden.
     Incorporate flexibility to adapt more easily to changes in 
the health care infrastructure (such as new services, organizations, 
and provider types) and information technology. This principle supports 
the regulatory goals of flexibility and encouragement of innovation.
    We assessed a wide variety of security standards, guidelines and 
electronic signature standards against the principles listed above, 
with the overall goal of achieving the maximum benefit for the least 
cost. We found that there exists no single standard for security or 
electronic signature that encompasses all the requirements that have 
been deemed necessary. However, in this particular area, technology is 
rapidly developing enhancements and better means for accomplishing the 
stated goals.

D. Affected Entities

1. Health Care Providers
    Health care providers that conduct business using electronic 
transactions with other health care participants (such as other health 
care providers, health plans, and employers) or maintain electronic 
health information are encouraged, but are not required to 
simultaneously implement the proposed security standard. However, if 
the effective date for the electronic transaction standards is later 
than the effective date for the security standard, the implementation 
of the security standard will not be delayed until the standard 
transactions are in use.
    Health care providers that transmit, receive, or maintain health 
information would incur implementation costs for establishing or 
updating their security systems. Any negative impact on these health 
care providers caused by implementing the proposed security standard 
would generally be related to the initial implementation period for the 
specific requirements of the security standard. Health care providers 
that are indirectly involved in electronic transactions (for example, 
those who submit a paper claim that the health plan transmits 
electronically to a secondary payer) and do not maintain electronic 
health information would not be affected.
2. Health Plans
    Health plans that engage in electronic health care transactions 
would have to modify their systems to use the security standard and the 
electronic signature standard, if used. Health plans that maintain 
electronic health information would also have to modify their systems 
to use the security standard. This conversion would have a one-time 
cost impact on Federal, State and private plans alike.
    We recognize that this conversion process has the potential to 
cause business disruption of some health plans. However, health plans 
would be able to schedule their implementation of the security standard 
and other standards in a way that best fits their needs, as long as 
they meet the deadlines specified in the law.
    Implementation of the security standard and the electronic 
signature standard, if used by the entities, would enhance payment 
safeguard activities and protect the integrity of the Medicare trust 
fund by reducing fraud and abuse that occurs when health care 
information is used by those who are not authorized to receive it. In 
addition these standards would assist the plans, providers, and 
clearinghouses to more effectively maintain the security of all health 
information in their databases.
3. Clearinghouses
    Health care clearinghouses would face impacts similar to those 
experienced by health care providers and health plans. Systems vendors, 
that provide computer software applications to health care providers 
and other billers of health care services, would likely be positively 
affected. These vendors would have to develop software solutions that 
would allow health care providers and other billers of health care 
transactions to protect the information in their databases from 
unwanted access to their systems.
4. Unfunded Mandates
    This proposed rule has been reviewed in accordance with the 
Unfunded Mandates Reform Act of 1995 (UMRA) (U.S.C. 1501 et seq.) and 
Executive Order 12875. As discussed in the combined impact analysis 
referenced above (see Federal Register, Volume 63, No. 88), DHHS 
estimates that implementation of the standards will require the 
expenditure of more than $100 million by the private sector. Therefore, 
the rule establishes a Federal private sector mandate and is a 
significant regulatory action within the meaning of section 202 of UMRA 
(2 U.S.C. 1532). DHHS has included this statement to address the 
anticipated effects of the proposed rules pursuant to section 202.
    These standards also apply to State and local governments in their 
roles as health plans or health care providers. Thus, the proposed 
rules impose unfunded mandates on these entities. While we do not have 
sufficient information to provide estimates of these impacts, several 
State Medicaid agencies have estimated that it would cost $1 million 
per State to implement

[[Page 43262]]

all of the HIPAA standards. However, the Congressional Budget Office 
analysis stated that ``States are already in the forefront in 
administering the Medicaid program electronically; the only costs--
which should not be significant--would involve bringing the software 
and computer systems for the Medicaid programs into compliance with the 
new standards.''
    The anticipated benefits and costs of this proposed standard, and 
other issues raised in section 202 of the UMRA, are addressed in the 
analysis below, and in the combined impact analysis. In addition, under 
section 205 of the UMRA (2 U.S.C. 1535), having considered a reasonable 
number of alternatives as outlined in the preamble to this rule and in 
the following analysis, the Department has concluded that the rule is 
the most cost-effective alternative for implementation of DHHS'' 
statutory objective of administrative simplification.
5. Regulatory Flexibility Act
    The Regulatory Flexibility Act (RFA) of 1980, Public Law 96-354, 
requires us to prepare a regulatory flexibility analysis if the 
Secretary certifies that a proposed regulation would have a significant 
economic impact on a substantial number of small entities. The security 
and electronic signature standards will affect small entities, such as 
providers. A more detailed analysis of the impact on small entities is 
part of the impact analysis we published on May 7, 1998 (63 FR 25320) 
for all the HIPAA standards. A detailed illustration of the potential 
impact of the security standard on a small health care provider can be 
found in the preamble in section D.

E. Factors in Establishing the Security Standard

1. Selection of Security Systems and Procedures
    Because there is no national security standard in widespread use 
throughout the industry, adopting any of the candidate standards would 
require most health care providers, health plans and health care 
clearinghouses to conform to the new standard. Implementation of the 
security standard would require all health plans, health care 
providers, and health care clearinghouses to establish or revise their 
security precautions because the proposed standard is not currently in 
use. The selection of the security standard does not impose a greater 
burden on the industry than the nonselected options, and presents 
significant advantages in terms of universality, uniqueness and 
flexibility.
    Only those plans, providers, and clearinghouses that decide to use 
the digital signature would be affected by the electronic signature 
standard. Some large health plans, health care providers, and health 
care clearinghouses that currently exchange health information among 
trading partners may have security systems and procedures in place to 
protect the information from unauthorized access. These entities may 
not incur significant costs to meet the proposed security standard and 
if they opt not to use the digital signature they would not incur costs 
to meet the electronic signature requirements. Also, some entities that 
currently use electronic signatures as an added security measure may 
also be using digital signature technology. At most, large entities 
that may have sophisticated security systems in place may only need to 
revise or update their systems to meet the proposed security standard 
and electronic signature standard.
2. Complexity of Conversion
    The complexity of the conversion would be significantly affected by 
the volume of claims health plans process electronically and the desire 
to transmit the claims themselves or to use the services of a VAN or a 
clearinghouse. If they chose to transmit themselves, they would need to 
convert to the proposed transaction standards. Specific technology 
limitations of existing systems could affect the complexity of the 
conversion. For example, some entities may only have a minimum level of 
security and procedures in place and therefore may require a full 
upgrade, while others may already have a very sophisticated system and 
procedures and require very little enhancement.
3. Cost of Conversion
    We expect that most providers, health plans, and clearinghouses 
that transmit or store data electronically have already implemented 
some security measures and will primarily need to assess existing 
security, identify areas of risk, and implement additional measures. We 
cannot estimate the per-entity cost of implementation because there is 
no information available regarding the extent to which providers', 
plans', and clearinghouses' current security practices are deficient. 
Moreover, some security solutions are almost cost-free to implement 
(e.g., reminding employees not to post passwords on their monitors) 
while others are not.
    Affected entities will have many choices regarding how they will 
implement security. Some may choose to assess security using in-house 
staff, while others will utilize consultants. Practice management 
software vendors may also provide security consultation services to 
their customers. Entities may also choose to implement security 
measures that require hardware or software purchases at the time they 
do routine equipment upgrades.
    The security requirements we are proposing were developed with 
considerable input from the health care industry, including providers, 
health plans, clearinghouses, vendors, and standards organizations. 
Industry members strongly advocated this flexible approach, which 
permits each affected entity to develop cost-effective security 
measures. We believe that this approach will yield the lowest 
implementation cost to industry while assuring that health information 
is safeguarded. We solicit input regarding implementation costs.
    We are unable to estimate, of the nation's 4 million-plus health 
plans and 1.2 million-plus providers, the number of entities that would 
require security systems and procedures because they conduct electronic 
transactions or maintain electronic health information. Nor are we able 
to estimate the number of entities that neither conduct electronic 
transactions nor maintain electronic health information but may choose 
to do so at some future time. (These would be entities that send and 
receive paper transactions and maintain paper records and thus would 
not be affected because they would have no need to implement security 
standards.) However, we are aware of the possibility that those small 
entities that currently process claims electronically or maintain 
electronic health information may not be able to continue to do so due 
to the cost of establishing security systems to meet the requirements 
of the proposed security standard. Those entities that are not able to 
bill and exchange health information electronically may use 
clearinghouses. We believe that the proposed security standard 
represents the minimum necessary for adequate protection of health 
information in an electronic format. As discussed earlier in this 
preamble, the security requirements are both scalable and technically 
flexible; and while the law requires each health plan that is not a 
small plan to comply with the security and electronic signature 
requirements no later than 24 months after the effective date of the 
final rule, small plans will be allowed an additional 12 months to 
comply.
    Since we are unable to estimate the number of entities, we are also 
unable to estimate the cost to the entities that will process 
electronic transactions.

[[Page 43263]]

However, we believe that the cost of establishing security systems and 
procedures is a portion of the costs associated with converting to the 
transaction standards that are required under HIPAA.
    This discussion on conversion costs relates only to health plans, 
health care providers, and health care clearinghouses that are required 
to follow the security standard to maintain, transmit or receive 
electronic health information. Other entities would not be required to 
follow the security standard and procedures until they choose to 
maintain, transmit, or receive electronic health information. The cost 
of establishing security systems and procedures for entities that do 
not transmit, receive or maintain health information electronically is 
not included in our estimates.

VII. Collection of Information Requirements

    Under the Paperwork Reduction Act of 1995, we are required to 
provide 60-day notice in the Federal Register and solicit public 
comment before a collection of information requirement is submitted to 
the Office of Management and Budget (OMB) for review and approval. In 
order to fairly evaluate whether an information collection should be 
approved by OMB, section 3506(c)(2)(A) of the Paperwork Reduction Act 
of 1995 requires that we solicit comment on the following issues:
     The need for the information collection and its usefulness 
in carrying out the proper functions of our agency.
     The accuracy of our estimate of the information collection 
burden.
     The quality, utility, and clarity of the information to be 
collected.
     Recommendations to minimize the information collection 
burden on the affected public, including automated collection 
techniques.
    As discussed below, we are soliciting comment on the recordkeeping 
requirements, as referenced in Sec. 142.308 of this document. In 
addition, we are soliciting comment on the applicability of the PRA as 
it may relate to the requirement to use the standard adopted in 
Sec. 142.310 of this regulation.

Section 142.308  Security Standard

    In summary, each entity designated in Sec. 142.302 must maintain 
documentation demonstrating the development, implementation, and 
maintenance of appropriate security measures that include, at a 
minimum, the requirements and implementation features set forth in this 
section. In addition, entities must maintain necessary documentation to 
demonstrate that these measures have been periodically reviewed, 
validated, updated, and kept current.
    While we solicit comment on these recordkeeping requirements we 
explicitly solicit comment on the burden associated with maintaining 
documentation related to the implementation the requirements set forth 
in Sec. 142.308. Since the level of documentation necessary to 
demonstrate compliance with these requirements is dependent upon 
individual business needs and the fact that we do not prescribe the 
form, format, or degree of documentation necessary to demonstrate 
compliance, we are currently unable to accurately estimate the degree 
of recordkeeping burden that will be experienced by the varying 
entities. Therefore, commentors should provide an estimate of: (1) the 
initial recordkeeping burden associated with meeting these requirements 
and (2) the recordkeeping burden associated with maintaining 
documentation to demonstrate that the measures have been periodically 
reviewed, validated, updated, and kept current.
    Below is a discussion of the applicability of the PRA as it may 
relate to the adoption of the standard referenced in Sec. 142.310 of 
this regulation.

Section 142.310  Electronic Signature Standard

    In summary, any entity electing to use an electronic signature in a 
transaction as defined in Sec. 142.103, or if an electronic signature 
is required by a transaction standard adopted by the Secretary, the 
entity must apply the electronic signature standard described in 
paragraph (b) of this section to that transaction.
Discussion
    The emerging and increasing use of health care EDI standards and 
transactions raises the issue of the applicability of the PRA. The 
question arises whether a regulation that adopts an EDI standard used 
to exchange certain information constitutes an information collection 
subject to the PRA.
    In particular, we are still considering whether the use of any EDI 
transaction standard, such as the electronic signature described in 
this regulation, should be viewed or regarded as a standardized 
electronic collection of information. If it is a standardized 
electronic information collection, then the requirement by the Federal 
government on the industry to accept and transmit the information may 
be subject to OMB review and approval under the PRA.
    We invite public comment on the issues discussed above. If the 
requirements, as set forth in Sec. 142.310 are determined to be subject 
to the PRA, we will submit these requirements to OMB for PRA approval. 
If you comment on these information collection and recordkeeping 
requirements, please e-mail comments to JB[email protected] (Attn: HCFA-
0049) or mail copies directly to the following:

Health Care Financing Administration, Office of Information Services, 
Security and Standards Group, Division of HCFA Enterprise Standards, 
Room N2-14-26, 7500 Security Boulevard, Baltimore, MD 21244-1850. Attn: 
John Burke HCFA-0049, HCFA Reports Clearance Officer
And
Office of Information and Regulatory Affairs, Office of Management and 
Budget, Room 10235, New Executive Office Building, Washington, DC 
20503, Attn: Allison Herron Eydt, HCFA Desk Officer

List of Subjects in 45 CFR Part 142

    Administrative practice and procedure, Health facilities, Health 
insurance, Hospitals, Medicaid, Medicare, Report and recordkeeping 
requirement.

    45 CFR subtitle A, subchapter B, would be amended by adding part 42 
to read as follows:

    Note to Reader: This proposed rule is one of several proposed 
rules that are being published to implement the administrative 
simplification provisions of the Health Insurance Portability and 
Accountability Act of 1996. We propose to establish a new 45 CFR 
Part 142. Proposed Subpart A--General Provisions is exactly the same 
in each rule unless we have added new sections or definitions to 
incorporate additional general information. The subparts that follow 
relate to the specific provisions announced separately in each 
proposed rule. When we publish the first final rule, each subsequent 
final rule will revise or add to the text that is set out in the 
first final rule.

PART 142--ADMINISTRATIVE REQUIREMENTS

Subpart A--General Provisions

Sec.
142.101  Statutory basis and purpose.
142.102  Applicability.
142.103  Definitions.
142.104  General requirements for health plans.
142.105  Compliance using a health care clearinghouse.
142.106  Effective dates of a modification to a standard or 
implementation specification.

[[Page 43264]]

Subpart B--Reserved

Subpart C--Security and Electronic Signature Standards

Sec.
142.302  Applicability and scope.
142.304  Definitions.
142.306  Rules for the security standard.
142.308  Security standard.
142.310  Electronic signature standard.
142.312  Effective date of the initial implementation of the 
security and electronic standards.

    Authority: Sections 1173 and 1175 of the Social Security Act (42 
U.S.C. 1320d-2 and 1320d-4).

Subpart A--General Provisions


Sec. 142.101  Statutory basis and purpose.

    Sections 1171 through 1179 of the Social Security Act, 42 U.S.C. 
1320d, as added by section 262 of the Health Insurance Portability and 
Accountability Act of 1996, require HHS to adopt national standards for 
the electronic exchange of health information in the health care 
system. The purpose of the sections of this part is to promote 
administrative simplification.


Sec. 142.102  Applicability.

    (a) The standards adopted or designated under this part apply, in 
whole or in part, to the following:
    (1) A health plan.
    (2) A health care clearinghouse when doing the following:
    (i) Transmitting a standard transaction (as defined in 
Sec. 142.103) to a health care provider or health plan.
    (ii) Receiving a standard transaction from a health care provider 
or health plan.
    (iii) Transmitting and receiving the standard transactions when 
interacting with another health care clearinghouse.
    (3) A health care provider when transmitting an electronic 
transaction as defined in Sec. 142.103.
    (b) Means of compliance are stated in greater detail in 
Sec. 142.105.


Sec. 142.103  Definitions.

    For purposes of this part, the following definitions apply:
    Code set means any set of codes used for encoding data elements, 
such as tables of terms, medical concepts, medical diagnostic codes, or 
medical procedure codes.
    Health care clearinghouse means a public or private entity that 
processes or facilitates the processing of nonstandard data elements of 
health information into standard data elements. The entity receives 
health care transactions from health care providers or other entities, 
translates the data from a given format into one acceptable to the 
intended payer or payers, and forwards the processed transaction to 
appropriate payers and clearinghouses. Billing services, repricing 
companies, community health management information systems, community 
health information systems, and ``value-added'' networks and switches 
are considered to be health care clearinghouses for purposes of this 
part.
    Health care provider means a provider of services as defined in 
section 1861(u) of the Social Security Act, 42 U.S.C. 1395x, a provider 
of medical or other health services as defined in section 1861(s) of 
the Social Security Act, and any other person who furnishes or bills 
and is paid for health care services or supplies in the normal course 
of business.
    Health information means any information, whether oral or recorded 
in any form or medium, that--
    (1) Is created or received by a health care provider, health plan, 
public health authority, employer, life insurer, school or university, 
or health care clearinghouse; and
    (2) Relates to the past, present, or future physical or mental 
health or condition of an individual, the provision of health care to 
an individual, or the past, present, or future payment for the 
provision of health care to an individual.
    Health plan means an individual or group plan that provides, or 
pays the cost of, medical care. Health plan includes the following, 
singly or in combination:
    (1) Group health plan. A group health plan is an employee welfare 
benefit plan (as currently defined in section 3(1) of the Employee 
Retirement Income and Security Act of 1974, 29 U.S.C. 1002(1)), 
including insured and self-insured plans, to the extent that the plan 
provides medical care, including items and services paid for as medical 
care, to employees or their dependents directly or through insurance, 
or otherwise, and--
    (i) Has 50 or more participants; or
    (ii) Is administered by an entity other than the employer that 
established and maintains the plan.
    (2) Health insurance issuer. A health insurance issuer is an 
insurance company, insurance service, or insurance organization that is 
licensed to engage in the business of insurance in a State and is 
subject to State law that regulates insurance.
    (3) Health maintenance organization. A health maintenance 
organization is a Federally qualified health maintenance organization, 
an organization recognized as a health maintenance organization under 
State law, or a similar organization regulated for solvency under State 
law in the same manner and to the same extent as such a health 
maintenance organization.
    (4) Part A or Part B of the Medicare program under title XVIII of 
the Social Security Act.
    (5) The Medicaid program under title XIX of the Social Security 
Act.
    (6) A Medicare supplemental policy (as defined in section 
1882(g)(1) of the Social Security Act, 42 U.S.C. 1395ss).
    (7) A long-term care policy, including a nursing home fixed-
indemnity policy.
    (8) An employee welfare benefit plan or any other arrangement that 
is established or maintained for the purpose of offering or providing 
health benefits to the employees of two or more employers.
    (9) The health care program for active military personnel under 
title 10 of the United States Code.
    (10) The veterans health care program under 38 U.S.C. chapter 17.
    (11) The Civilian Health and Medical Program of the Uniformed 
Services (CHAMPUS), as defined in 10 U.S.C. 1072(4).
    (12) The Indian Health Service program under the Indian Health Care 
Improvement Act (25 U.S.C. 1601 et seq.).
    (13) The Federal Employees Health Benefits Program under 5 U.S.C. 
chapter 89.
    (14) Any other individual or group health plan, or combination 
thereof, that provides or pays for the cost of medical care.
    Medical care means the diagnosis, cure, mitigation, treatment, or 
prevention of disease, or amounts paid for the purpose of affecting any 
body structure or function of the body; amounts paid for transportation 
primarily for and essential to these items; and amounts paid for 
insurance covering the items and the transportation specified in this 
definition.
    Participant means any employee or former employee of an employer, 
or any member or former member of an employee organization, who is or 
may become eligible to receive a benefit of any type from an employee 
benefit plan that covers employees of that employer or members of such 
an organization, or whose beneficiaries may be eligible to receive any 
of these benefits. ``Employee'' includes an individual who is treated 
as an employee under section 401(c)(1) of the Internal Revenue Code of 
1986 (26 U.S.C. 401(c)(1)).
    Small health plan means a group health plan or individual health 
plan with fewer than 50 participants.

[[Page 43265]]

    Standard means a set of rules for a set of codes, data elements, 
transactions, or identifiers promulgated either by an organization 
accredited by the American National Standards Institute or HHS for the 
electronic transmission of health information.
    Transaction means the exchange of information between two parties 
to carry out financial and administrative activities related to health 
care. It includes the following:
    (1) Health claims or equivalent encounter information.
    (2) Health care payment and remittance advice.
    (3) Coordination of benefits.
    (4) Health claims status.
    (5) Enrollment and disenrollment in a health plan.
    (6) Eligibility for a health plan.
    (7) Health plan premium payments.
    (8) Referral certification and authorization.
    (9) First report of injury.
    (10) Health claims attachments.
    (11) Other transactions as the Secretary may prescribe by 
regulation.


Sec. 142.104  General requirements for health plans.

    If a person conducts a transaction (as defined in Sec. 142.103) 
with a health plan as a standard transaction, the following apply:
    (a) The health plan may not refuse to conduct the transaction as a 
standard transaction.
    (b) The health plan may not delay the transaction or otherwise 
adversely affect, or attempt to adversely affect, the person or the 
transaction on the ground that the transaction is a standard 
transaction.
    (c) The health information transmitted and received in connection 
with the transaction must be in the form of standard data elements of 
health information.
    (d) A health plan that conducts transactions through an agent must 
assure that the agent meets all the requirements of this part that 
apply to the health plan.


Sec. 142.105  Compliance using a health care clearinghouse.

    (a) Any person or other entity subject to the requirements of this 
part may meet the requirements to accept and transmit standard 
transactions by either--
    (1) Transmitting and receiving standard data elements; or
    (2) Submitting nonstandard data elements to a health care 
clearinghouse for processing into standard data elements and 
transmission by the health care clearinghouse and receiving standard 
data elements through the health care clearinghouse.
    (b) The transmission, under contract, of nonstandard data elements 
between a health plan or a health care provider and its agent health 
care clearinghouse is not a violation of the requirements of this part.


Sec. 142.106  Effective dates of a modification to a standard or 
implementation specification.

    HHS may modify a standard or implementation specification after the 
first year in which HHS requires the standard or implementation 
specification to be used, but not more frequently than once every 12 
months. If HHS adopts a modification to a standard or implementation 
specification, the implementation date of the modified standard or 
implementation specification may be no earlier than 180 days following 
the adoption of the modification. HHS determines the actual date, 
taking into account the time needed to comply due to the nature and 
extent of the modification. HHS may extend the time for compliance for 
small health plans.

Subpart B--[Reserved]

Subpart C--Security and Electronic Signature Standards


Sec. 142.302  Applicability and scope.

    The standards adopted or designated under this subpart apply, in 
whole or in part, to the following:
    (a) A health plan.
    (b) A health care clearinghouse or health care provider that takes 
one of the following actions:
    (1) Processes any electronic transmission between any combination 
of health care entities listed in this section.
    (2) Electronically maintains any health information used in an 
electronic transmission that has been sent or received between any 
combination of health care entities listed in this section.


Sec. 142.304  Definitions.

    For purposes of this subpart, the following definitions apply:
    Access refers to the ability or the means necessary to read, write, 
modify, or communicate data/information or otherwise make use of any 
system resource.
    Access control refers to a method of restricting access to 
resources, allowing only privileged entities access. Types of access 
control include, among others, mandatory access control, discretionary 
access control, time-of-day, and classification.
    Authentication refers to the corroboration that an entity is the 
one claimed.
    Contingency plan refers to a plan for responding to a system 
emergency. The plan includes performing backups, preparing critical 
facilities that can be used to facilitate continuity of operations in 
the event of an emergency, and recovering from a disaster.
    Encryption (or encipherment) refers to transforming confidential 
plaintext into ciphertext to protect it. An encryption algorithm 
combines plaintext with other values called keys, or ciphers, so the 
data becomes unintelligible. Once encrypted, data can be stored or 
transmitted over unsecured lines. Decrypting data reverses the 
encryption algorithm process and makes the plaintext available for 
further processing.
    Password refers to confidential authentication information composed 
of a string of characters.
    Role-based access control (RBAC) is an alternative to traditional 
access control models (e.g., discretionary or non-discretionary access 
control policies) that permits the specification and enforcement of 
enterprise-specific security policies in a way that maps more naturally 
to an organization's structure and business activities. With RBAC, 
rather than attempting to map an organization's security policy to a 
relatively low-level set of technical controls (typically, access 
control lists), each user is assigned to one or more predefined roles, 
each of which has been assigned the various privileges needed to 
perform that role.
    Token refers to a physical item necessary for user identification 
when used in the context of authentication. For example, an electronic 
device that can be inserted in a door or a computer system to obtain 
access.
    User-based access refers to a security mechanism used to grant 
users of a system access based upon the identity of the user.


Sec. 142.306  Rules for the security standard.

    (a) An entity must apply the security standard described in 
Sec. 142.308 to all health information pertaining to an individual that 
is electronically maintained or electronically transmitted.
    (b) If a health care clearinghouse is part of a larger 
organization, it must assure that all health information pertaining to 
an individual is protected from unauthorized access by the larger 
organization.

[[Page 43266]]

Sec. 142.308  Security standard.

    Each entity designated in Sec. 142.302 must assess potential risks 
and vulnerabilities to the individual health data in its possession and 
develop, implement, and maintain appropriate security measures. These 
measures must be documented and kept current, and must include, at a 
minimum, the following requirements and implementation features:
    (a) Administrative procedures to guard data integrity, 
confidentiality, and availability (documented, formal practices to 
manage the selection and execution of security measures to protect 
data, and to manage the conduct of personnel in relation to the 
protection of data). These procedures include the following 
requirements:
    (1) Certification. (The technical evaluation performed as part of, 
and in support of, the accreditation process that establishes the 
extent to which a particular computer system or network design and 
implementation meet a pre-specified set of security requirements. This 
evaluation may be performed internally or by an external accrediting 
agency.)
    (2) A chain of trust partner agreement (a contract entered into by 
two business partners in which the partners agree to electronically 
exchange data and protect the integrity and confidentiality of the data 
exchanged).
    (3) A contingency plan, a routinely updated plan for responding to 
a system emergency, that includes performing backups, preparing 
critical facilities that can be used to facilitate continuity of 
operations in the event of an emergency, and recovering from a 
disaster. The plan must include all of the following implementation 
features:
    (i) An applications and data criticality analysis (an entity's 
formal assessment of the sensitivity, vulnerabilities, and security of 
its programs and information it receives, manipulates, stores, and/or 
transmits).
    (ii) Data backup plan (a documented and routinely updated plan to 
create and maintain, for a specific period of time, retrievable exact 
copies of information).
    (iii) A disaster recovery plan (the part of an overall contingency 
plan that contains a process enabling an enterprise to restore any loss 
of data in the event of fire, vandalism, natural disaster, or system 
failure).
    (iv) Emergency mode operation plan (the part of an overall 
contingency plan that contains a process enabling an enterprise to 
continue to operate in the event of fire, vandalism, natural disaster, 
or system failure).
    (v) Testing and revision procedures (the documented process of 
periodic testing of written contingency plans to discover weaknesses 
and the subsequent process of revising the documentation, if 
necessary).
    (4) Formal mechanism for processing records (documented policies 
and procedures for the routine, and nonroutine, receipt, manipulation, 
storage, dissemination, transmission, and/or disposal of health 
information).
    (5) Information access control (formal, documented policies and 
procedures for granting different levels of access to health care 
information) that includes all of the following implementation 
features:
    (i) Access authorization (information-use policies and procedures 
that establish the rules for granting access, (for example, to a 
terminal, transaction, program, process, or some other user.)
    (ii) Access establishment (security policies and rules that 
determine an entity's initial right of access to a terminal, 
transaction, program, process or some other user).
    (iii) Access modification (security policies and rules that 
determine the types of, and reasons for, modification to an entity's 
established right of access, to a terminal, transaction, program, 
process, or some other user.)
    (6) Internal audit (in-house review of the records of system 
activity (such as logins, file accesses, and security incidents) 
maintained by an organization).
    (7) Personnel security (all personnel who have access to any 
sensitive information have the required authorities as well as all 
appropriate clearances) that includes all of the following 
implementation features:
    (i) Assuring supervision of maintenance personnel by an authorized, 
knowledgeable person. These procedures are documented formal procedures 
and instructions for the oversight of maintenance personnel when the 
personnel are near health information pertaining to an individual.
    (ii) Maintaining a record of access authorizations (ongoing 
documentation and review of the levels of access granted to a user, 
program, or procedure accessing health information).
    (iii) Assuring that operating and maintenance personnel have proper 
access authorization (formal documented policies and procedures for 
determining the access level to be granted to individuals working on, 
or near, health information).
    (iv) Establishing personnel clearance procedures (a protective 
measure applied to determine that an individual's access to sensitive 
unclassified automated information is admissible).
    (v) Establishing and maintaining personnel security policies and 
procedures (formal, documentation of procedures to ensure that all 
personnel who have access to sensitive information have the required 
authority as well as appropriate clearances).
    (vi) Assuring that system users, including maintenance personnel, 
receive security awareness training.
    (8) Security configuration management (measures, practices, and 
procedures for the security of information systems that must be 
coordinated and integrated with each other and other measures, 
practices, and procedures of the organization established in order to 
create a coherent system of security) that includes all of the 
following implementation features:
    (i) Documentation (written security plans, rules, procedures, and 
instructions concerning all components of an entity's security).
    (ii) Hardware and software installation and maintenance review and 
testing for security features (formal, documented procedures for 
connecting and loading new equipment and programs, periodic review of 
the maintenance occurring on that equipment and programs, and periodic 
security testing of the security attributes of that hardware/software).
    (iii) Inventory (the formal, documented identification of hardware 
and software assets).
    (iv) Security testing (process used to determine that the security 
features of a system are implemented as designed and that they are 
adequate for a proposed applications environment; this process includes 
hands-on functional testing, penetration testing, and verification).
    (v) Virus checking. (The act of running a computer program that 
identifies and disables:
    (A) Another ``virus'' computer program, typically hidden, that 
attaches itself to other programs and has the ability to replicate.
    (B) A code fragment (not an independent program) that reproduces by 
attaching to another program.
    (C) A code embedded within a program that causes a copy of itself 
to be inserted in one or more other programs.)
    (9) Security incident procedures (formal documented instructions 
for reporting security breaches) that include all of the following 
implementation features:
    (i) Report procedures (documented formal mechanism employed to 
document security incidents).

[[Page 43267]]

    (ii) Response procedures (documented formal rules or instructions 
for actions to be taken as a result of the receipt of a security 
incident report).
    (10) Security management process (creation, administration, and 
oversight of policies to ensure the prevention, detection, containment, 
and correction of security breaches involving risk analysis and risk 
management). It includes the establishment of accountability, 
management controls (policies and education), electronic controls, 
physical security, and penalties for the abuse and misuse of its assets 
(both physical and electronic) that includes all of the following 
implementation features:
    (i) Risk analysis, a process whereby cost-effective security/
control measures may be selected by balancing the costs of various 
security/control measures against the losses that would be expected if 
these measures were not in place.
    (ii) Risk management (process of assessing risk, taking steps to 
reduce risk to an acceptable level, and maintaining that level of 
risk).
    (iii) Sanction policies and procedures (statements regarding 
disciplinary actions that are communicated to all employees, agents, 
and contractors; for example, verbal warning, notice of disciplinary 
action placed in personnel files, removal of system privileges, 
termination of employment, and contract penalties). They must include 
employee, agent, and contractor notice of civil or criminal penalties 
for misuse or misappropriation of health information and must make 
employees, agents, and contractors aware that violations may result in 
notification to law enforcement officials and regulatory, 
accreditation, and licensure organizations.
    (iv) Security policy (statement(s) of information values, 
protection responsibilities, and organization commitment for a system). 
This is the framework within which an entity establishes needed levels 
of information security to achieve the desired confidentiality goals.
    (11) Termination procedures (formal documented instructions, which 
include appropriate security measures, for the ending of an employee's 
employment or an internal/external user's access) that include 
procedures for all of the following implementation features:
    (i) Changing locks (a documented procedure for changing 
combinations of locking mechanisms, both on a recurring basis and when 
personnel knowledgeable of combinations no longer have a need to know 
or require access to the protected facility or system).
    (ii) Removal from access lists (physical eradication of an entity's 
access privileges).
    (iii) Removal of user account(s) (termination or deletion of an 
individual's access privileges to the information, services, and 
resources for which they currently have clearance, authorization, and 
need-to-know when such clearance, authorization and need-to-know no 
longer exists).
    (iv) Turning in of keys, tokens, or cards that allow access 
(formal, documented procedure to ensure all physical items that allow a 
terminated employee to access a property, building, or equipment are 
retrieved from that employee, preferably before termination).
    (12) Training (education concerning the vulnerabilities of the 
health information in an entity's possession and ways to ensure the 
protection of that information) that includes all of the following 
implementation features:
    (i) Awareness training for all personnel, including management 
personnel (in security awareness, including, but not limited to, 
password maintenance, incident reporting, and viruses and other forms 
of malicious software).
    (ii) Periodic security reminders (employees, agents, and 
contractors are made aware of security concerns on an ongoing basis).
    (iii) User education concerning virus protection (training relative 
to user awareness of the potential harm that can be caused by a virus, 
how to prevent the introduction of a virus to a computer system, and 
what to do if a virus is detected).
    (iv) User education in importance of monitoring log-in success or 
failure and how to report discrepancies (training in the user's 
responsibility to ensure the security of health care information).
    (v) User education in password management (type of user training in 
the rules to be followed in creating and changing passwords and the 
need to keep them confidential).
    (b) Physical safeguards to guard data integrity, confidentiality, 
and availability. Protection of physical computer systems and related 
buildings and equipment from fire and other natural and environmental 
hazards, as well as from intrusion. It covers the use of locks, keys, 
and administrative measures used to control access to computer systems 
and facilities. Physical safeguards must include all of the following 
requirements and implementation features:
    (1) Assigned security responsibility (practices established by 
management to manage and supervise the execution and use of security 
measures to protect data and to manage and supervise the conduct of 
personnel in relation to the protection of data).
    (2) Media controls (formal, documented policies and procedures that 
govern the receipt and removal of hardware/software (such as diskettes 
and tapes) into and out of a facility) that include all of the 
following implementation features:
    (i) Access control.
    (ii) Accountability (the property that ensures that the actions of 
an entity can be traced uniquely to that entity).
    (iii) Data backup (a retrievable, exact copy of information).
    (iv) Data storage (the retention of health care information 
pertaining to an individual in an electronic format).
    (v) Disposal (final disposition of electronic data, and/or the 
hardware on which electronic data is stored).
    (3) Physical access controls (limited access) (formal, documented 
policies and procedures to be followed to limit physical access to an 
entity while ensuring that properly authorized access is allowed) that 
include all of the following implementation features:
    (i) Disaster recovery (the process enabling an entity to restore 
any loss of data in the event of fire, vandalism, natural disaster, or 
system failure).
    (ii) An emergency mode operation (access controls in place that 
enable an entity to continue to operate in the event of fire, 
vandalism, natural disaster, or system failure).
    (iii) Equipment control (into and out of site) (documented security 
procedures for bringing hardware and software into and out of a 
facility and for maintaining a record of that equipment. This includes, 
but is not limited to, the marking, handling, and disposal of hardware 
and storage media.)
    (iv) A facility security plan (a plan to safeguard the premises and 
building (exterior and interior) from unauthorized physical access and 
to safeguard the equipment therein from unauthorized physical access, 
tampering, and theft).
    (v) Procedures for verifying access authorizations before granting 
physical access (formal, documented policies and instructions for 
validating the access privileges of an entity before granting those 
privileges).
    (vi) Maintenance records (documentation of repairs and 
modifications to the physical components of a facility, such as

[[Page 43268]]

hardware, software, walls, doors, and locks).
    (vii) Need-to-know procedures for personnel access (a security 
principle stating that a user should have access only to the data he or 
she needs to perform a particular function).
    (viii) Procedures to sign in visitors and provide escorts, if 
appropriate (formal documented procedure governing the reception and 
hosting of visitors).
    (ix) Testing and revision (the restriction of program testing and 
revision to formally authorized personnel).
    (4) Policy and guidelines on work station use (documented 
instructions/procedures delineating the proper functions to be 
performed, the manner in which those functions are to be performed, and 
the physical attributes of the surroundings of a specific computer 
terminal site or type of site, dependent upon the sensitivity of the 
information accessed from that site).
    (5) A secure work station location (physical safeguards to 
eliminate or minimize the possibility of unauthorized access to 
information; for example, locating a terminal used to access sensitive 
information in a locked room and restricting access to that room to 
authorized personnel, not placing a terminal used to access patient 
information in any area of a doctor's office where the screen contents 
can be viewed from the reception area).
    (6) Security awareness training (information security awareness 
training programs in which all employees, agents, and contractors must 
participate, including, based on job responsibilities, customized 
education programs that focus on issues regarding use of health 
information and responsibilities regarding confidentiality and 
security).
    (c) Technical security services to guard data integrity, 
confidentiality, and availability (the processes that are put in place 
to protect information and to control individual access to 
information). These services include the following requirements and 
implementation features:
    (1) The technical security services must include all of the 
following requirements and the specified implementation features:
    (i) Access control that includes:
    (A) A procedure for emergency access (documented instructions for 
obtaining necessary information during a crisis), and
    (B) At least one of the following implementation features:
    (1) Context-based access (an access control procedure based on the 
context of a transaction (as opposed to being based on attributes of 
the initiator or target)).
    (2) Role-based access.
    (3) User-based access.
    (C) The optional use of encryption.
    (ii) Audit controls (mechanisms employed to record and examine 
system activity).
    (iii) Authorization control (the mechanism for obtaining consent 
for the use and disclosure of health information) that includes at 
least one of the following implementation features:
    (A) Role-based access.
    (B) User-based access.
    (iv) Data authentication. (The corroboration that data has not been 
altered or destroyed in an unauthorized manner. Examples of how data 
corroboration may be assured include the use of a check sum, double 
keying, a message authentication code, or digital signature.)
    (v) Entity authentication (the corroboration that an entity is the 
one claimed) that includes:
    (A) Automatic logoff (a security procedure that causes an 
electronic session to terminate after a predetermined time of 
inactivity, such as 15 minutes), and
    (B) Unique user identifier (a combination name/number assigned and 
maintained in security procedures for identifying and tracking 
individual user identity).
    (C) At least one of the following implementation features:
    (1) Biometric identification (an identification system that 
identifies a human from a measurement of a physical feature or 
repeatable action of the individual (for example, hand geometry, 
retinal scan, iris scan, fingerprint patterns, facial characteristics, 
DNA sequence characteristics, voice prints, and hand written 
signature)).
    (2) Password.
    (3) Personal identification number (PIN) (a number or code assigned 
to an individual and used to provide verification of identity).
    (4) A telephone callback procedure (method of authenticating the 
identity of the receiver and sender of information through a series of 
``questions'' and ``answers'' sent back and forth establishing the 
identity of each). For example, when the communicating systems exchange 
a series of identification codes as part of the initiation of a session 
to exchange information, or when a host computer disconnects the 
initial session before the authentication is complete, and the host 
calls the user back to establish a session at a predetermined telephone 
number.
    (5) Token.
    (2) [Reserved]
    (d) Technical security mechanisms (processes that are put in place 
to guard against unauthorized access to data that is transmitted over a 
communications network).
    (1) If an entity uses communications or network controls, its 
security standards for technical security mechanisms must include the 
following:
    (i) The following implementation features:
    (A) Integrity controls (a security mechanism employed to ensure the 
validity of the information being electronically transmitted or 
stored).
    (B) Message authentication (ensuring, typically with a message 
authentication code, that a message received (usually via a network) 
matches the message sent).
    (ii) One of the following implementation features:
    (A) Access controls (protection of sensitive communications 
transmissions over open or private networks so that they cannot be 
easily intercepted and interpreted by parties other than the intended 
recipient).
    (B) Encryption.
    (2) If an entity uses network controls (to protect sensitive 
communication that is transmitted electronically over open networks so 
that it cannot be easily intercepted and interpreted by parties other 
than the intended recipient), its technical security mechanisms must 
include all of the following implementation features:
    (i) Alarm. (In communication systems, any device that can sense an 
abnormal condition within the system and provide, either locally or 
remotely, a signal indicating the presence of the abnormality. The 
signal may be in any desired form ranging from a simple contact closure 
(or opening) to a time-phased automatic shutdown and restart cycle.)
    (ii) Audit trail (the data collected and potentially used to 
facilitate a security audit).
    (iii) Entity authentication (a communications or network mechanism 
to irrefutably identify authorized users, programs, and processes and 
to deny access to unauthorized users, programs, and processes).
    (iv) Event reporting (a network message indicating operational 
irregularities in physical elements of a network or a response to the 
occurrence of a significant task, typically the completion of a request 
for information).


Sec. 142.310  Electronic signature standard.

    (a) General rule. If an entity elects to use an electronic 
signature in a

[[Page 43269]]

transaction as defined in Sec. 142.103, or if an electronic signature 
is required by a transaction standard adopted by the Secretary, the 
entity must apply the electronic signature standard described in 
paragraph (b) of this section to that transaction.
    (b) Standard.
    (1) An electronic signature is the attribute affixed to an 
electronic document to bind it to a particular entity. An electronic 
signature secures the user authentication (proof of claimed identity) 
at the time the signature is generated; creates the logical 
manifestation of signature (including the possibility for multiple 
parties to sign a document and have the order of application recognized 
and proven); supplies additional information such as time stamp and 
signature purpose specific to that user; and ensures the integrity of 
the signed document to enable transportability of data, 
interoperability, independent verifiability, and continuity of 
signature capability. Verifying a signature on a document verifies the 
integrity of the document and associated attributes and verifies the 
identity of the signer.
    (2) The standard for electronic signature is a digital signature. A 
``digital signature'' is an electronic signature based upon 
cryptographic methods of originator authentication, computed by using a 
set of rules and a set of parameters so that the identity of the signer 
and the integrity of the data can be verified.
    (c) Required implementation features. If an entity uses electronic 
signatures, the signature method must assure all of the following 
features:
    (1) Message integrity (the assurance of unaltered transmission and 
receipt of a message from the sender to the intended recipient).
    (2) Nonrepudiation (strong and substantial evidence of the identity 
of the signer of a message, and of message integrity, sufficient to 
prevent a party from successfully denying the origin, submission, or 
delivery of the message and the integrity of its contents).
    (3) User authentication (the provision of assurance of the claimed 
identity of an entity).
    (d) Optional implementation features. If an entity uses electronic 
signatures, the entity may also use, among others, any of the following 
implementation features:
    (1) Ability to add attributes (one possible capability of a digital 
signature technology; for example, the ability to add a time stamp as 
part of a digital signature).
    (2) Continuity of signature capability (the concept that the public 
verification of a signature must not compromise the ability of the 
signer to apply additional secure signatures at a later date).
    (3) Countersignatures. (The capability to prove the order of 
application of signatures. This is analogous to the normal business 
practice of countersignatures, where a party signs a document that has 
already been signed by another party.)
    (4) Independent verifiability (the capability to verify the 
signature without the cooperation of the signer).
    (5) Interoperability (the applications used on either side of a 
communication, between trading partners and/or between internal 
components of an entity, are able to read and correctly interpret the 
information communicated from one to the other).
    (6) Multiple signatures. (With this feature, multiple parties are 
able to sign a document. Conceptually, multiple signatures are simply 
appended to the document.)
    (7) Transportability of data (the ability of a signed document to 
be transported over an insecure network to another system, while 
maintaining the integrity of the document, including content, 
signatures, signature attributes, and (if present) document 
attributes).


Sec. 142.312  Effective date of the initial implementation of the 
security and electronic signature standards.

    (a) General rules.
    (1) Except for a small health plan (defined at Sec. 142.103), each 
entity designated in Sec. 142.302 must comply with the requirements of 
this subpart by [24 months after the effective date of the final rule 
in the Federal Register].
    (2) A delay in an effective date for using a standard transaction 
described in this part does not delay the effective dates described in 
paragraphs (a)(1) and (b) of this section.
    (3) The requirements of the security standard may be implemented 
over time. Implementation must be completed by the applicable effective 
date.
    (b) Small health plans. A small health plan must comply with the 
requirements of this subpart by [36 months after the effective date of 
the final rule in the Federal Register].

    Authority: Sections 1173 and 1175 of the Social Security Act (42 
U.S.C. 1320d-2 and 1320d-4).

    Dated: July 15, 1998.
Donna E. Shalala,
Secretary.
    Note: The following appendix will not appear in the Code of 
Federal Regulations.

Addendum 1

HIPAA Security Matrix

    Please Note: (1) While we have attempted to categorize security 
requirements for ease of understanding and reading clarity, there 
are overlapping areas on the matrix in which the same requirements 
are restated in a slightly different context. (2) To ensure that no 
Requirement or Implementation feature is considered more important 
than another, this matrix has been presented, within each subject 
area, in alphabetical order.

 Administrative Procedures To Guard Data Integrity, Confidentiality, and
                              Availability                              
------------------------------------------------------------------------
              Requirement                         Implementation        
------------------------------------------------------------------------
Certification                                                           
Chain of trust partner agreement                                        
Contingency plan (all listed             Applications and data          
 implementation features must be          criticality analysis.         
 implemented).                           Data backup plan.              
                                         Disaster recovery plan.        
                                         Emergency mode operation plan. 
                                         Testing and revision.          
Formal mechanism for processing                                         
 records.                                                               
Information access control (all listed   Access authorization.          
 implementation features must be         Access establishment.          
 implemented).                           Access modification.           
Internal audit                                                          

[[Page 43270]]

                                                                        
Personnel security (all listed           Assure supervision of          
 implementation features must be          maintenance personnel by      
 implemented).                            authorized, knowledgeable     
                                          person.                       
                                         Maintainance of record of      
                                          access authorizations.        
                                         Operating, and in some cases,  
                                          maintenance personnel have    
                                          proper access authorization.  
                                         Personnel clearance procedure. 
                                         Personnel security policy/     
                                          procedure.                    
                                         System users, including        
                                          maintenance personnel, trained
                                          in security.                  
Security configuration mgmt. (all        Documentation.                 
 listed implementation features must be  Hardware/software installation 
 implemented).                            & maintenance review and      
                                          testing for security features.
                                         Inventory.                     
                                         Security Testing.              
                                         Virus checking.                
Security incident procedures (all        Report procedures.             
 listed implementation features must be  Response procedures.           
 implemented).                                                          
Security management process (all listed  Risk analysis.                 
 implementation features must be         Risk management.               
 implemented).                           Sanction policy.               
                                         Security policy.               
Termination procedures (all listed       Combination locks changed.     
 implementation features must be         Removal from access lists.     
 implemented).                           Removal of user account(s).    
                                         Turn in keys, token or cards   
                                          that allow access.            
Training (all listed implementation      Awareness training for all     
 features must be implemented).           personnel (including mgmt).   
                                         Periodic security reminders.   
                                         User education concerning virus
                                          protection.                   
                                         User education in importance of
                                          monitoring log in success/    
                                          failure, and how to report    
                                          discrepancies.                
                                         User education in password     
                                          management.                   
------------------------------------------------------------------------


    Physical Safeguards To Guard Data Integrity, Confidentiality, and   
                              Availability                              
------------------------------------------------------------------------
              Requirement                         Implementation        
------------------------------------------------------------------------
Assigned security responsibility                                        
Media controls (all listed               Access control.                
 implementation features must be         Accountability (tracking       
 implemented).                            mechanism).                   
                                         Data backup.                   
                                         Data storage.                  
                                         Disposal.                      
Physical access controls (limited        Disaster recovery.             
 access) (all listed implementation      Emergency mode operation.      
 features must be implemented).          Equipment control (into and out
                                          of site).                     
                                         Facility security plan.        
                                         Procedures for verifying access
                                          authorizations prior to       
                                          physical access.              
                                         Maintenance records.           
                                         Need-to-know procedures for    
                                          personnel access.             
                                         Sign-in for visitors and       
                                          escort, if appropriate.       
                                         Testing and revision.          
Policy/guideline on work station use                                    
Secure work station location                                            
Security awareness training                                             
------------------------------------------------------------------------


  Technical Security Services To Guard Data Integrity, Confidentiality, 
                            and Availability                            
------------------------------------------------------------------------
              Requirement                         Implementation        
------------------------------------------------------------------------
Access control (The following            Context-based access.          
 implementation feature must be          Encryption.                    
 implemented: Procedure for emergency    Procedure for emergency access.
 access. In addition, at least one of    Role-based access.             
 the following three implementation      User-based access.             
 features must be implemented: Context-                                 
 based access, Roll-based access, User-                                 
 based access. The use of Encryption is                                 
 optional).                                                             
Audit controls                                                          
Authorization Control (At least one of   Role-based access.             
 the listed implementation features      User-based access              
 must be implemented).                                                  
Data Authentication                                                     

[[Page 43271]]

                                                                        
Entity Authentication (The following     Automatic logoff.              
 implementation features must be         Biometric.                     
 implemented: Automatic logoff, Unique   Password.                      
 user identification. In addition, at    PIN.                           
 least one of the other listed           Telephone callback.            
 implementation features must be         Token.                         
 implemented).                           Unique user identification.    
------------------------------------------------------------------------


  Technical Security Mechanisms To Guard Against Unauthorized Access to 
         Data That Is Transmitted Over a Communications Network         
------------------------------------------------------------------------
                 Requirement                         Implementation     
------------------------------------------------------------------------
Communications/network controls (The           Access controls.         
 following implementation features must be     Alarm.                   
 implemented: Integrity controls, Message      Audit trail.             
 authentication. If communications or          Encryption.              
 networking is employed, one of the following  Entity authentication.   
 implementation features must be implemented:  Event reporting.         
 Access controls, Encryption. In addition, if  Integrity controls.      
 using a network, the following four           Message authentication.  
 implementation features must be implemented:                           
 Alarm, Audit trail, Entity authentication,                             
 Event reporting).                                                      
------------------------------------------------------------------------


                          Electronic Signature                          
------------------------------------------------------------------------
              Requirement                         Implementation        
------------------------------------------------------------------------
Digital signature (If digital signature  Ability to add attributes.     
 is employed, the following three        Continuity of signature        
 implementation features must be          capability.                   
 implemented: Message integrity, Non-    Counter signatures.            
 repudiation, User authentication.       Independent verifiability.     
 Other implementation features are       Interoperability.              
 optional).                              Message integrity.             
                                         Multiple Signatures.           
                                         Non-repudiation.               
                                         Transportability.              
                                         User authentication.           
------------------------------------------------------------------------

Addendum 2--HIPAA Security and Electronic Signature Standards Glossary 
of Terms

    Please Note:
    (1) While we have attempted to categorize security requirements 
for ease of understanding and reading clarity, there are overlapping 
areas on the matrix in which the same requirements are restated in a 
slightly different context.
    (2) While not appearing on the matrix, a number of terms listed 
below do appear in the glossary descriptions and have been supplied 
for additional clarity:
    (3) The definitions provided in this document have been obtained 
from multiple sources.

Ability to add attributes:
    One possible capability of a digital signature technology, for 
example, the ability to add a time stamp as part of a digital 
signature.
    Part of digital signature on the matrix.
Access:
    The ability or the means necessary to read, write, modify, or 
communicate data/information or otherwise make use of any system 
resource.
Access authorization:
    Information-use policies/procedures that establish the rules for 
granting and/or restricting access to a user, terminal, transaction, 
program, or process.
    Part of information access control on the matrix.
Access control:
    A method of restricting access to resources, allowing only 
privileged entities access. (PGP, Inc.)
    Types of access control include, among others, mandatory access 
control, discretionary access control, time-of-day, classification, 
and subject-object separation.
    Part of Media Controls on the matrix.
    Part of technical security services to control and monitor 
access to information on the matrix.
Access controls:
    The protection of sensitive communications transmissions over 
open or private networks so that it cannot be easily intercepted and 
interpreted by parties other than the intended recipient.
    Part of mechanisms to prevent unauthorized access to data that 
is transmitted over a communications network on the matrix.
Access establishment:
    The security policies, and the rules established therein, that 
determine an entity's initial right of access to a terminal, 
transaction, program, or process.
    Part of information access control on the matrix.
Access Level:
    A level associated with an individual who may be accessing 
information (for example, a clearance level) or with the information 
which may be accessed (for example, a classification level). (NRC, 
1991, as cited in HISB, DRAFT GLOSSARY OF TERMS RELATED TO 
INFORMATION SECURITY IN HEALTH CARE INFORMATION SYSTEMS draft 
Glossary of Terms Related to Information Security in Health Care 
Information Systems)
Access modification:
    The security policies, and the rules established therein, that 
determine types of, and reasons for, modification to an entity's 
established right of access to a terminal, transaction, program, or 
process.
    Part of information access control on the matrix.
Accountability:
    The property that ensures that the actions of an entity can be 
traced uniquely to that entity. (ASTM E1762--95)

[[Page 43272]]

    Part of media controls on the matrix.
Administrative procedures to guard data integrity, confidentiality 
and availability:
    Documented, formal practices to manage (1) the selection and 
execution of security measures to protect data, and (2) the conduct 
of personnel in relation to the protection of data.
    A section of the matrix.
Alarm, event reporting, and audit trail:
    (1) Alarm: In communication systems, any device that can sense 
an abnormal condition within the system and provide, either locally 
or remotely, a signal indicating the presence of the abnormality. 
(188) NOTE: The signal may be in any desired form ranging from a 
simple contact closure (or opening) to a time-phased automatic 
shutdown and restart cycle. (Glossary of INFOSEC and INFOSEC Related 
Terms--Idaho State University)
    (2) Event reporting: Network message indicating operational 
irregularities in physical elements of a network or a response to 
the occurrence of a significant task, typically the completion of a 
request for information. (Glossary of INFOSEC and INFOSEC Related 
Terms--Idaho State University)
    (3) Audit trail: Data collected and potentially used to 
facilitate a security audit. (ISO 7498-2, as cited in HISB, DRAFT 
GLOSSARY OF TERMS RELATED TO INFORMATION SECURITY IN HEALTH CARE 
INFORMATION SYSTEMS draft Glossary of Terms Related to Information 
Security in Health Care Information Systems)
    Part of mechanisms to prevent unauthorized access to data that 
is transmitted over a communications network on the matrix.
Applications and data criticality analysis:
    An entity's formal assessment of the sensitivity, 
vulnerabilities, and security of its programs and information it 
receives, manipulates, stores, and/or transmits.
    Part of contingency plan on the matrix.
Assigned security responsibility:
    Practices put in place by management to manage and supervise (1) 
the execution and use of security measures to protect data, and (2) 
the conduct of personnel in relation to the protection of data.
    Part of Physical safeguards to guard data integrity, 
confidentiality, and availability on the matrix.
Assure supervision of maintenance personnel by authorized, 
knowledgeable person:
    Documented formal procedures/instruction for the oversight of 
maintenance personnel when such personnel are in the vicinity of 
health information pertaining to an individual.
    Part of personnel security on the matrix.
Asymmetric encryption:
    Encryption and decryption performed using two different keys, 
one of which is referred to as the public key and one of which is 
referred to as the private key.
    Also known as public-key encryption. (Stallings)
Asymmetric key:
    One half of a key pair used in an asymmetric (``public-key'') 
encryption system. Asymmetric encryption systems have two important 
properties: (1) the key used for encryption is different from the 
one used for decryption (2) neither key can feasibly be derived from 
the other. (CORBA Security Services, 1997)
Audit controls:
    The mechanisms employed to record and examine system activity.
    Part of technical security services to control and monitor 
access to information on the matrix.
Authorization control:
    The mechanism for obtaining consent for the use and disclosure 
of health information.
    Part of technical security services to control and monitor 
access to information on the matrix.
Automatic logoff:
    After a pre-determined time of inactivity (for example, 15 
minutes), an electronic session is terminated.
    Part of entity authentication on the matrix.
Availability:
    The property of being accessible and useable upon demand by an 
authorized entity. (ISO 7498-2, as cited in the HISB draft Glossary 
of Terms Related to Information Security In Health care Information 
Systems)
Awareness training for all personnel (including management):
    All personnel in an organization should undergo security 
awareness training, including, but not limited to, password 
maintenance, incident reporting, and an education concerning viruses 
and other forms of malicious software.
    Part of Training on the matrix.
Biometric:.
    A biometric identification system identifies a human from a 
measurement of a physical feature or repeatable action of the 
individual (for example, hand geometry, retinal scan, iris scan, 
fingerprint patterns, facial characteristics, DNA sequence 
characteristics, voice prints, and hand written signature). (ASTM 
E1762--95, as cited in the HISB draft Glossary of Terms Related to 
Information Security In Health care Information Systems)
    Part of entity authentication on the matrix.
Certification:
    The technical evaluation performed as part of, and in support 
of, the accreditation process that establishes the extent to which a 
particular computer system or network design and implementation meet 
a pre-specified set of security requirements. This evaluation may be 
performed internally or by an external accrediting agency.
    Part of administrative procedures to guard data integrity, 
confidentiality, and availability.
Chain of Trust Partner Agreement:
    Contract entered into by two business partners in which it is 
agreed to exchange data and that the first party will transmit 
information to the second party, where the data transmitted is 
agreed to be protected between the partners. The sender and receiver 
depend upon each other to maintain the integrity and confidentiality 
of the transmitted information. Multiple such two-party contracts 
may be involved in moving information from the originator to the 
ultimate recipient, for example, a provider may contract with a 
clearing house to transmit claims to the clearing house; the 
clearing house, in turn, may contract with another clearing house or 
with a payer for the further transmittal of those same claims.
    Part of administrative procedures to guard data integrity, 
confidentiality and availability on the matrix..
Classification:
    Protection of data from unauthorized access by the designation 
of multiple levels of access authorization clearances to be required 
for access, dependent upon the sensitivity of the information.
    A type of access control on the matrix.
Clearing House:
    * * * a public or private entity that processes or facilitates 
the processing of nonstandard data elements of health information 
into standard data elements. (HIPAA, Subtitle F, Section 262(a) 
Section 1171(2))
Combination locks changed:
    Documented procedure for changing combinations of locking 
mechanisms, both on a recurring basis and when personnel 
knowledgeable of combinations no longer have a need to know or a 
requirement for access to the protected facility/system.
    Part of termination procedures on the matrix.
Confidentiality:
    The property that information is not made available or disclosed 
to unauthorized individuals, entities or processes. (ISO 7498-2, as 
cited in the HISB draft Glossary of Terms Related to Information 
Security In Health care Information Systems) .
Context-based access:
    An access control based on the context of a transaction (as 
opposed to being based on attributes of the initiator or target). 
The ``external'' factors might include time of day, location of the 
user, strength of user authentication, etc.
    Part of access control on the matrix.
Contingency Plan:
    A plan for responding to a system emergency. The plan includes 
performing backups, preparing critical facilities that can be used 
to facilitate continuity of operations in the event of an emergency, 
and recovering from a disaster. (O'Reilly, 1992, as cited in the 
HISB draft Glossary of Terms Related to Information Security In 
Health care Information Systems) Contingency plans should be updated 
routinely.
    Part of Administrative procedures to guard data integrity, 
confidentiality and availability on the matrix.
Continuity of signature capability:
    The public verification of a signature shall not compromise the 
ability of the signer to apply additional secure signatures at a 
later date. (ASTM E 1762--95)

[[Page 43273]]

    Part of digital signature on the matrix.
Counter signatures:
    It shall be possible to prove the order of application of 
signatures. This is analogous to the normal business practice of 
countersignatures, where some party signs a document which has 
already been signed by another party. (ASTM E 1762 -95)
    Part of digital signature on the matrix.
Data:
    A sequence of symbols to which meaning may be assigned. (NRC, 
1991, as cited in the HISB draft Glossary of Terms Related to 
Information Security In Health care Information Systems)
Data authentication:
    The corroboration that data has not been altered or destroyed in 
an unauthorized manner. Examples of how data corroboration may be 
assured include the use of a check sum, double keying, a message 
authentication code, or digital signature.
    Part of technical security services to control and monitor 
access to information on the matrix
Data backup:
    A retrievable, exact copy of information.
    Part of media controls on the matrix.
Data backup plan:
    A documented and routinely updated plan to create and maintain, 
for a specific period of time, retrievable exact copies of 
information.
    Part of contingency plans on the matrix.
Data Integrity:
    The property that dat has [sic] not been altered or destroyed in 
an unauthorized manner. (ASTM E1762-95).
Data storage:
    The retention of health care information pertaining to an 
individual in an electronic format.
    Part of media controls on the matrix.
Digital signature:
    An electronic signature based upon cryptographic methods of 
originator authentication, computed by using a set of rules and a 
set of parameters such that the identity of the signer and the 
integrity of the data can be verified. (FDA Electronic Record; 
Electronic Signatures; Final Rule)
    Part of electronic signature on the matrix.
Disaster recovery:
    The process whereby an enterprise would restore any loss of data 
in the event of fire, vandalism, natural disaster, or system 
failure. (CPRI, 1996c, as cited in HISB, DRAFT GLOSSARY OF TERMS 
RELATED TO INFORMATION SECURITY IN HEALTH CARE INFORMATION SYSTEMS 
draft Glossary of Terms Related to Information Security in Health 
Care Information Systems)
    Part of physical access controls (limited access) on the matrix.
Disaster recovery plan:
    Part of an overall contingency plan. The plan for a process 
whereby an enterprise would restore any loss of data in the event of 
fire, vandalism, natural disaster, or system failure. (CPRI, 1996c, 
as cited in HISB, DRAFT GLOSSARY OF TERMS RELATED TO INFORMATION 
SECURITY IN HEALTH CARE INFORMATION SYSTEMS draft Glossary of Terms 
Related to Information Security in Health Care Information Systems)
    Part of contingency plan on the matrix.
Discretionary access control:
    Discretionary Access Control (DAC) is used to control access by 
restricting a subject's access to an object. It is generally used to 
limit a user's access to a file. In this type of access control it 
is the owner of the file who controls other users' accesses to the 
file.
    A type of access control on the matrix.
Disposal:
    The final disposition of electronic data, and/or the hardware on 
which electronic data is stored.
    Part of media controls on the matrix.
Documentation:
    Written security plans, rules, procedures, and instructions 
concerning all components of an entity's security.
    Part of security configuration mgmt on the matrix.
Electronic data interchange (EDI):
    Intercompany, computer-to-computer transmission of business 
information in a standard format. For EDI purists, ``computer-to-
computer'' means direct transmission from the originating 
application program to the receiving, or processing, application 
program, and an EDI transmission consists only of business data, not 
any accompanying verbiage or free-form messages. Purists might also 
contend that a standard format is one that is approved by a national 
or international standards organization, as opposed to formats 
developed by industry groups or companies. (EDI Security, Control, 
and Audit)
Electronic signature:
    The attribute that is affixed to an electronic document to bind 
it to a particular entity. An electronic signature process secures 
the user authentication (proof of claimed identity, such as by 
biometrics (fingerprints, retinal scans, hand written signature 
verification, etc.), tokens or passwords) at the time the signature 
is generated; creates the logical manifestation of signature 
(including the possibility for multiple parties to sign a document 
and have the order of application recognized and proven) and 
supplies additional information such as time stamp and signature 
purpose specific to that user; and ensures the integrity of the 
signed document to enable transportability, interoperability, 
independent verifiability, and continuity of signature capability. 
Verifying a signature on a document verifies the integrity of the 
document and associated attributes and verifies the identity of the 
signer. There are several technologies available for user 
authentication, including passwords, cryptography, and biometrics. 
(ASTM 1762-95, as cited in the HISB draft Glossary of Terms Related 
to Information Security In Health care Information Systems)
Emergency mode operation:
    Access controls in place that enable an enterprise to continue 
to operate in the event of fire, vandalism, natural disaster, or 
system failure.
    Part of physical access controls (limited access) on the matrix.
Emergency mode operation plan:
    Part of an overall contingency plan. The plan for a process 
whereby an enterprise would be able to continue to operate in the 
event of fire, vandalism, natural disaster, or system failure.
    Part of contingency plan on the matrix.
Encryption:
    Transforming confidential plaintext into ciphertext to protect 
it. Also called encipherment. An encryption algorithm combines 
plaintext with other values called keys, or ciphers, so the data 
becomes unintelligible. Once encrypted, data can be stored or 
transmitted over unsecured lines. (EDI Security, Control, and Audit)
    Decrypting data reverses the encryption algorithm process and 
makes the plaintext available for further processing.
    Part of access control on the matrix.
Entity authentication:
    1. The corroboration that an entity is the one claimed. (ISO 
7498-2, as cited in the HISB draft Glossary of Terms Related to 
Information Security In Health care Information Systems)
    Part of technical security services to control and monitor 
access to information on the matrix.
    2. A communications/network mechanism to irrefutably identify 
authorized users, programs, and processes, and to deny access to 
unauthorized users, programs and processes.
    Part of mechanisms to prevent unauthorized access to data that 
is transmitted over a communications network on the matrix.
Equipment control (into and out of site):
    Documented security procedures for bringing hardware and 
software into and out of a facility and for maintaining a record of 
that equipment. This includes, but is not limited to, the marking, 
handling, and disposal of hardware and storage media.
    Part of physical access controls (limited access) on the matrix.
Facility security plan:
    A plan to safeguard the premises and building(s) (exterior and 
interior) from unauthorized physical access, and to safeguard the 
equipment therein from unauthorized physical access, tampering, and 
theft.
    Part of physical access controls (limited access) on the matrix.
Formal mechanism for processing records:
    Documented policies and procedures for the routine, and non-
routine, receipt, manipulation, storage, dissemination, 
transmission, and/or disposal of health information.

[[Page 43274]]

    Part of administrative procedures to guard data integrity, 
confidentiality, and availability on the matrix.
Hardware/software installation & maintenance review and testing for 
security features:
    Formal, documented procedures for (1) connecting and loading new 
equipment and programs, (2) periodic review of the maintenance 
occurring on that equipment and programs, and (3) periodic security 
testing of the security attributes of that hardware/software.
    Part of security configuration mgmt on the matrix.
Independent verifiability:
    The capability to verify the signature without the cooperation 
of the signer. Technically, it is accomplished using the public key 
of the signatory, and it is a property of all digital signatures 
performed with asymmetric key encryption
    Part of digital signature on the matrix.
Information:
    Data to which meaning is assigned, according to context and 
assumed conventions. (National Security Council, 1991, as cited in 
the HISB draft Glossary of Terms Related to Information Security In 
Health care Information Systems)
Information access control:
    Formal, documented policies and procedures for granting 
different levels of access to health care information.
    Part of administrative procedures to ensure integrity and 
confidentiality on the matrix.
Integrity controls:
    Security mechanism employed to ensure the validity of the 
information being electronically transmitted or stored.
    Part of mechanisms to prevent unauthorized access to data that 
is transmitted over a communications network on the matrix.
Internal audit:
    The in-house review of the records of system activity (for 
example, logins, file accesses, security incidents) maintained by an 
organization.
    Part of administrative procedures to guard data integrity, 
confidentiality, and availability on the matrix.
Interoperability:
    The applications used on either side of a communication, between 
trading partners and/or between internal components of an entity, 
being able to read and correctly interpret the information 
communicated from one to the other.
    Part of digital signature on the matrix.
Inventory:
    Formal, documented identification of hardware and software 
assets.
    Part of security configuration mgmt on the matrix.
Key:
    An input that controls the transformation of data by an 
encryption algorithm (NRC, 1991, as cited in the HISB draft Glossary 
of Terms Related to Information Security In Health care Information 
Systems)
Maintenance of record of access authorizations:
    Ongoing documentation and review of the levels of access granted 
to a user, program, or procedure accessing health information.
    Part of personnel security on the matrix.
Maintenance records:
    Documentation of repairs and modifications to the physical 
components of a facility, for example, hardware, software, walls, 
doors, locks.
    Part of physical access controls (limited access) on the matrix.
Mandatory Access Control (MAC):
    A means of restricting access to objects that is based on fixed 
security attributes assigned to users and to files and other 
objects. The controls are mandatory in the sense that they cannot be 
modified by users or their programs. (Stallings, 1995) (as cited in 
the HISB draft Glossary of Terms Related to Information Security In 
Health care Information Systems)
    A type of access control on the matrix.
Media controls:
    Formal, documented policies and procedures that govern the 
receipt and removal of hardware/software (for example, diskettes, 
tapes) into and out of a facility.
    Part of physical safeguards to guard data integrity, 
confidentiality, and availability on the matrix.
Message:
    A digital representation of information. (ABA Digital Signatures 
Guidelines)
Message authentication:
    Ensuring, typically with a message authentication code, that a 
message received (usually via a network) matches the message sent. 
(O'Reilly, 1992, as cited in the HISB draft Glossary of Terms 
Related to Information Security In Health care Information Systems)
    Part of mechanisms to prevent unauthorized access to data that 
is transmitted over a communications network on the matrix
Message authentication code:
    Data associated with an authenticated message that allows a 
receiver to verify the integrity of the message. (Glossary of 
INFOSEC and INFOSEC Related Terms--Idaho State University)
Message integrity:
    The assurance of unaltered transmission and receipt of a message 
from the sender to the intended recipient. (ABA Digital Signature 
Guidelines)
    Part of digital signature on the matrix.
Multiple signatures:
    It shall be possible for multiple parties to sign a document. 
Multiple signatures are conceptually, simply appended to the 
document. (ASTM E 1762-95)
    Part of digital signature on the matrix.
Need-to-know procedures for personnel access:
    A security principle stating that a user should have access only 
to the data he or she needs to perform a particular function. 
(O'Reilly, 1992, as cited in the HISB draft Glossary of Terms 
Related to Information Security In Health care Information Systems)
    Part of physical access controls (limited access) on the matrix.
Nonrepudiation:
    Strong and substantial evidence of the identity of the signer of 
a message and of message integrity, sufficient to prevent a party 
from successfully denying the origin, submission or delivery of the 
message and the integrity of its contents. (ABA Digital Signature 
Guidelines)
    Part of digital signature on the matrix.
Operating, and in some cases, maintenance personnel have proper 
access authorizations:
    Formal, documented policies and procedures to be followed in 
determining the access level to be granted to individuals working 
on, or in the vicinity of, health information.
    Part of personnel security on the matrix.
Password:
    Confidential authentication information composed of a string of 
characters. (ISO 7498--2, as cited in the HISB draft Glossary of 
Terms Related to Information Security In Health care Information 
Systems)
    Part of entity authentication on the matrix.
Periodic security reminders:
    Employees, agents and contractors should be made aware of 
security concerns on an ongoing basis.
    Part of training on the matrix.
Personnel clearance procedure:
    A protective measure applied to determine that an individual's 
access to sensitive unclassified automated information is 
admissible. The need for and extent of a screening process is 
normally based on an assessment of risk, cost, benefit, and 
feasibility as well as other protective measures in place. Effective 
screening processes are applied in such a way as to allow a range of 
implementation, from minimal procedures to more stringent procedures 
commensurate with the sensitivity of the data to be accessed and the 
magnitude of harm or loss that could be caused by the individual 
(DOE 1360.2A, as cited in Glossary of INFOSEC and INFOSEC Related 
Terms--Idaho State University)
    Part of personnel security on the matrix.
Personnel security:
    The procedures established to ensure that all personnel who have 
access to sensitive information have the required authority as well 
as appropriate clearances. (NCSC Glossary of Computer Security 
Terms, October 21, 1988)
    Part of administrative procedures to guard data integrity, 
confidentiality and availability on the matrix.
Personnel security policy/procedure:
    Formal, documentation of policies and procedures established to 
ensure that all personnel who have access to sensitive information 
have the required authority as well as appropriate clearances. 
(Glossary of INFOSEC and INFOSEC Related Terms--Idaho State 
University)
    Part of personnel security on the matrix.
Physical access controls (limited access):
    Those formal, documented policies and procedures to be followed 
to limit

[[Page 43275]]

physical access to an entity while ensuring that properly authorized 
access is allowed.
    Part of Physical safeguards to guard data integrity, 
confidentiality, and availability on the matrix.
Physical safeguards:
    Protection of physical computer systems and related buildings 
and equipment from fire and other natural and environmental hazards, 
as well as from intrusion. Also covers the use of locks, keys, and 
administrative measures used to control access to computer systems 
and facilities. (O'Reilly, 1992, as cited in HISB, draft Glossary of 
Terms Related to Information Security in Health Care Information 
Systems)
    A section of the matrix covering physical security requirements.
PIN (Personal Identification Number):
    A number or code assigned to an individual and used to provide 
verification of identity.
    Part of entity authentication on the matrix.
Policy/guideline on work station use:
    Documented instructions/procedures delineating the proper 
functions to be performed, the manner in which those functions are 
to be performed, and the physical attributes of the surroundings, of 
a specific computer terminal site or type of site, dependant upon 
the sensitivity of the information accessed from that site.
    Part of Physical safeguards to guard data integrity, 
confidentiality, and availability on the matrix.
Procedure for emergency access:
    Documented instructions for obtaining necessary information 
during a crisis.
    Part of access control on the matrix.
Procedures for verifying access authorizations prior to physical 
access:
    Formal, documented policies and instructions for validating the 
access privileges of an entity prior to granting those privileges.
    Part of physical access controls (limited access) on the matrix.
Provider:
    A supplier of services as defined in section 1861(u) of the 
HIPAA.
    A supplier of medical or other services as defined in section 
1861(s) of the HIPAA.
Public key:
    One of the two keys used in an asymmetric encryption system. The 
public key is made public, to be used in conjunction with a 
corresponding private key. [Stallings, 1995]
Removal from access lists:
    The physical eradication of an entity's access privileges.
    Part of termination procedures on the matrix.
Removal of user account(s):
    The termination or deletion of an individual's access privileges 
to the information, services, and resources for which they currently 
have clearance, authorization, and need-to-know when such clearance, 
authorization and need-to-know no longer exists.
    Part of termination procedures on the matrix.
Report procedures:
    The documented formal mechanism employed to document security 
incidents.
    Part of security incident procedures on the matrix.
Response procedures:
    The documented formal rules/instructions for actions to be taken 
as a result of the receipt of a security incident report.
    Part of security incident procedures on the matrix.
Risk analysis:
    Risk analysis, a process whereby cost-effective security/control 
measures may be selected by balancing the costs of various security/
control measures against the losses that would be expected if these 
measures were not in place.
    Part of the security management process on the matrix.
Risk management:
    Risk is the possibility of something adverse happening. Risk 
management is the process of assessing risk, taking steps to reduce 
risk to an acceptable level and maintaining that level of risk. 
(NIST Pub. 800-14)
    Part of the security management process on the matrix.
Role-based access control:
    Role-based access control (RBAC) is an alternative to 
traditional access control models (e.g., discretionary or non-
discretionary access control policies) that permits the 
specification and enforcement of enterprise-specific security 
policies in a way that maps more naturally to an organization's 
structure and business activities. With RBAC, rather than attempting 
to map an organization's security policy to a relatively low-level 
set of technical controls (typically, access control lists), each 
user is assigned to one or more predefined roles, each of which has 
been assigned the various privileges needed to perform that role.
    Part of access control on the matrix.
    Part of authorization control on the matrix.
Sanction policy:
    Organizations must have policies and procedures regarding 
disciplinary actions which are communicated to all employees, agents 
and contractors, for example, verbal warning, notice of disciplinary 
action placed in personnel files, removal of system privileges, 
termination of employment and contract penalties (ASTM E 1869)
    In addition to enterprise sanctions, employees, agents, and 
contractors must be advised of civil or criminal penalties for 
misuse or misappropriation of health information. Employees, agents 
and contractors, must be made aware that violations may result in 
notification to law enforcement officials and regulatory, 
accreditation and licensure organizations. (ASTM)
    Part of the security management process on the matrix.
Secure work station location:
    Physical safeguards to eliminate or minimize the possibility of 
unauthorized access to information, for example, locating a terminal 
used to access sensitive information in a locked room and 
restricting access to that room to authorized personnel, not placing 
a terminal used to access patient information in any area of a 
doctor's office where the screen contents can be viewed from the 
reception area.
    Part of physical safeguards to guard data integrity, 
confidentiality, and availability on the matrix.
Security:
    Security encompasses all of the safeguards in an information 
system, including hardware, software, personnel policies, 
information practice policies, disaster preparedness, and the 
oversight of all these areas. The purpose of security is to protect 
both the system and the information it contains from unauthorized 
access from without and from misuse from within.
    Through various security measures, a health information system 
can shield confidential information from unauthorized access, 
disclosure and misuse, thus protecting privacy of the individuals 
who are the subjects of the stored data. (Privacy and Health 
Information Systems: A Guide to Protecting Patient Confidentiality)
Security awareness training:
    All employees, agents, and contractors must participate in 
information security awareness training programs. Based on job 
responsibilities, individuals may be required to attend customized 
education programs that focus on issues regarding use of health 
information and responsibilities regarding confidentiality and 
security. (ASTM)
    Part of Physical safeguards to guard data integrity, 
confidentiality, and availability on the matrix.
Security configuration management:
    Measures, practices and procedures for the security of 
information systems should be coordinated and integrated with each 
other and other measures, practices and procedures of the 
organization so as to create a coherent system of security. (OECD 
Guidelines, as cited in NIST Pub 800-14)
    Part of administrative procedures to guard data integrity, 
confidentiality, and availability on the matrix.
Security incident procedures:
    Formal, documented instructions for reporting security breaches.
    Part of administrative procedures to guard data integrity, 
confidentiality and availability on the matrix.
Security management process:
    A security management process encompasses the creation, 
administration and oversight of policies to ensure the prevention, 
detection, containment, and correction of security breaches. It 
involves risk analysis and risk management, including the 
establishment of accountability, management controls (policies and 
education), electronic controls, physical security, and penalties 
for the abuse and misuse of its assets, both physical and 
electronic.

[[Page 43276]]

    Part of administrative procedures to guard data integrity, 
confidentiality and availability on the matrix.
Security policy:
    The framework within which an organization establishes needed 
levels of information security to achieve the desired 
confidentiality goals. A policy is a statement of information 
values, protection responsibilities, and organization commitment for 
a system. (OTA, 1993) The American Health Information Management 
Association recommends that security policies apply to all 
employees, medical staff members, volunteers, students, faculty, 
independent contractors, and agents. (AHIMA, 1996c) (as cited in 
HISB, DRAFT GLOSSARY OF TERMS RELATED TO INFORMATION SECURITY IN 
HEALTH CARE INFORMATION SYSTEMS draft Glossary of Terms Related to 
Information Security in Health Care Information Systems )
    Part of the security management process on the matrix
Security testing:
    A process used to determine that the security features of a 
system are implemented as designed and that they are adequate for a 
proposed applications environment. This process includes hands-on 
functional testing, penetration testing, and verification. (Glossary 
of INFOSEC and INFOSEC Related Terms--Idaho State University)
    Part of security configuration mgmt on the matrix.
Sign-in for visitors and escort, if appropriate:
    Formal, documented procedure governing the reception and hosting 
of visitors.
    Part of physical access controls (limited access) on the matrix.
Subject/object separation:
    Access to a subject does not guarantee access to the objects 
associated with that subject.
    Subject is defined as an active entity, generally in the form of 
a person, process, or device that causes information to flow among 
objects or changes the system state. Technically, a process/domain 
pair. (Glossary of INFOSEC and INFOSEC Related Terms--Idaho State 
University)
    Object is defined as a passive entity that contains or receives 
information. Access to an object potentially implies access to the 
information it contains. Examples of objects are: records blocks, 
pages, segments, files, directories, directory trees, and programs, 
as well as bits, bytes, words, fields, processors, video displays, 
keyboards, clocks, printers, network nodes, etc. (Glossary of 
INFOSEC and INFOSEC Related Terms--Idaho State University)
    A type of access control.
System users, including maintenance personnel, trained in security:
    See Awareness training (including management).
    Part of personnel security on the matrix.
Technical security mechanisms:
    The processes that are put in place to guard against 
unauthorized access to data that is transmitted over a 
communications network,
    A section of the matrix.
Technical security services:
    The processes that are put in place (1) to protect information 
and (2) to control and monitor individual access to information.
    A section of the matrix.
Telephone callback:
    A method of authenticating the identity of the receiver and 
sender of information through a series of ``questions'' and 
``answers'' sent back and forth establishing the identity of each. 
For example, when the communicating systems exchange a series of 
identification codes as part of the initiation of a session to 
exchange information, or when a host computer disconnects the 
initial session before the authentication is complete, and the host 
calls the user back to establish a session at a predetermined 
telephone number.
    Part of Entity authentication on the matrix.
Termination procedures:
    Formal, documented instructions, which include appropriate 
security measures, for the ending of an employee's employment, or an 
internal/external user's access.
    Part of administrative procedures to guard data integrity, 
confidentiality and availability on the matrix.
Testing and revision:
    (1) Testing and revision of contingency plans refers to the 
documented process of periodic testing to discover weaknesses in 
such plans and the subsequent process of revising the documentation 
if necessary.
    Part of contingency plan on the matrix.
    (2) Testing and revision of programs should be restricted to 
formally authorized personnel.
    Part of physical access controls (limited access) on the matrix.
Time-of-day:
    Access to data is restricted to certain time frames, e.g., 
Monday through Friday, 8:00 a.m. to 6:00 p.m.
    A type of access control on the matrix.
Time-stamp:
    To create a notation that indicates, at least, the correct date 
and time of an action, and the identity of the person that created 
the notation.
Token:
    A physical item that's used to provide identity. Typically an 
electronic device that can be inserted in a door or a computer 
system to obtain access. (O'Reilly, 1992) (as cited in HISB, DRAFT 
GLOSSARY OF TERMS RELATED TO INFORMATION SECURITY IN HEALTH CARE 
INFORMATION SYSTEMS draft Glossary of Terms Related to Information 
Security in Health Care Information Systems)
    Part of entity authentication on the matrix
Training:
    Education concerning the vulnerabilities of the health 
information in an entity's possession and ways to ensure the 
protection of that information.
    Part of administrative procedures to guard data integrity, 
confidentiality and availability on the matrix.
Transportability:
    A signed document can be transported (over an insecure network) 
to another system, while maintaining the integrity of the document.
    Part of digital signature on the matrix.
Turn in keys, token or cards that allow access:
    Formal, documented procedure to ensure all physical items that 
allow a terminated employee to access a property, building, or 
equipment are retrieved from that employee, preferably prior to 
termination.
    Part of termination procedures on the matrix.
Unique user identification:
    The combination name/number assigned and maintained in security 
procedures for identifying and tracking individual user identity. 
(ASTM)
    Part of Entity authentication on the matrix.
User authentication:
    The provision of assurance of the claimed identity of an entity. 
(ASTM E1762-5)
    Part of digital signature on the matrix.
User-based access:
    A security mechanism used to grant users of a system access 
based upon the identity of the user.
    Part of access control on the matrix.
    Part of authorization control on the matrix.
User education in importance of monitoring log in success/failure, 
and how to report discrepancies:
    Training in the user's responsibility to ensure the security of 
health care information.
    Part of training on the matrix.
User education concerning virus protection:
    Training relative to user awareness of the potential harm that 
can be caused by a virus, how to prevent the introduction of a virus 
to a computer system, and what to do if a virus is detected.
    Part of training on the matrix.
User education in password management:
    A type of user training in the rules to be followed in creating 
and changing passwords and the need to keep them confidential.
    Part of training on the matrix.
Virus checking:
    A computer program that identifies and disables:
    (1) another ``virus'' computer program, typically hidden, that 
attaches itself to other programs and has the ability to replicate. 
(Unchecked virus programs result in undesired side effects generally 
unanticipated by the user.)
    (2) A type of programmed threat. A code fragment (not an 
independent program) that reproduces by attaching to another 
program. It may damage data directly, or it may degrade system 
performance by taking over system resources which are then not 
available to authorized users. (O'Reilly, 1992, as cited in HISB, 
DRAFT GLOSSARY OF TERMS RELATED TO INFORMATION SECURITY IN HEALTH 
CARE INFORMATION SYSTEMS draft Glossary of Terms Related to 
Information

[[Page 43277]]

Security in Health Care Information Systems)
    (3) Code embedded within a program that causes a copy of itself 
to be inserted in one or more other programs. In addition to 
propagation, the virus usually performs some unwanted function. 
(Stallings, 1995, as cited in HISB, DRAFT GLOSSARY OF TERMS RELATED 
TO INFORMATION SECURITY IN HEALTH CARE INFORMATION SYSTEMS draft 
Glossary of Terms Related to Information Security in Health Care 
Information Systems)
    Part of security configuration mgmt on the matrix.

Acronyms

ABA  American Bar Association
ADA  American Dental Association
ANSI  American National Standards Institute
AHIMA  American Health Information Management Association
ASTM  American Society for Testing and Materials
CDT  Center for Democracy & Technology
CEN  Central European Nations
CORBA  Common Object Request Broker
CPRI  Computer-based Patient Record Institute
DAC  Discretionary Access Control
DEA  Data Encryption Algorithm
EDI  Electronic Data Interchange
EHNAC  Electronic Healthcare Network Accreditation Commission
FDA  Food and Drug Administration
HISB  Health Care Informatics Standards Board
ISO  International Organization for Standardization
MAC  Mandatory Access Control
NCSC  National Computer Security Center
NCQA  National Council for Quality Assurance
NCVHS  National Committee on Vital and Health Statistics
NUBC  National Uniform Billing Committee
NUCC  National Uniform Claim Committee
PGP  Pretty Good Privacy
PIN  Personal Identification Number
NIST  National Institutes of Standards and Technology
SDO  Standards Development Organization
WEDI  Workgroup for Electronic Data Interchange

Bibliography

ABA, Digital Signature Guidelines.
ANSI, ASC X12.58, Security Structures, June, 1997.
ASTM, E1762-95, Standard Guide for Electronic Authentication of 
Health Care Information. ASTM Committee E-31 on Computerized 
Systems, Subcommittee E31.20 on Authentication. West Conshohocken, 
PA, October 10, 1995.
ASTM, A Security Framework for Healthcare Information. ASTM 
Committee E-31 on Computerized Systems, Subcommittee E31.20 on 
Authentication. West Conshohocken, PA, February 11, 1997.
EDI Security, Control, and Audit, Marcells, Albert J. & Chan, Sally. 
Artech House, 685 Canton Street, Norwood, MA 01602, 1993.
FDA, Electronic Record; Electronic Signatures; Final Rule.
For the Record--Protecting Electronic Health Information, Computer 
Science and Telecommunications Board, NRC, National Academy Press, 
2102 Constitution Avenue, NW, Box 285, Washington, DC, 20055, 1997.
Glossary of INFOSEC and INFOSEC Related Terms, Version 6. Schou, 
Corey D., Center for Decision Support, Idaho State University. 
August, 1996
HISB, DRAFT GLOSSARY OF TERMS RELATED TO INFORMATION SECURITY IN 
HEALTH CARE INFORMATION SYSTEMS Glossary of Terms Related to 
Information Security in Health Care Information Systems draft, 1997
NCSC, Glossary of Computer Security Terms, October 21, 1988.
NIST Pub 800-14, ``Generally Accepted Principles and Practices for 
Securing Information Technology Systems'', Swanson, Marianne, & 
Guttman, Barbara, September, 1996. PGP, Inc., Cryptology Reference 
Chart, August, 1997
Privacy and Health Information Systems: A Guide to Protecting 
Patient Confidentiality, Goldman, Janlori & Mulligan, Deirdre, CDT, 
1996.

Addendum 3

HIPAA SECURITY MATRIX--mapping

    Please Note: While we have attempted to categorize security 
requirements for ease of understanding and reading clarity, there 
are overlapping areas on the matrix in which the same requirements 
are restated in a slightly different context.

 Administrative Procedures To Guard Data Integrity, Confidentiality, and
                              Availability                              
------------------------------------------------------------------------
         Requirement             Implementation       Mapped  standards 
------------------------------------------------------------------------
Certification...............  ....................  47.                 
Chain of trust partner        ....................  12, 47.             
 agreement.                                                             
Contingency plan (all listed  Applications and      17, 47, 53.         
 implementation features       data criticality     12, 17, 47.         
 must be implemented).         analysis.            12, 17, 47, 53.     
                              Data backup plan....  47, 53.             
                              Disaster recovery     12, 17, 47.         
                               plan.                                    
                              Emergency mode                            
                               operation plan.                          
                              Testing and revision                      
Formal mechanism for          ....................  12, 17.             
 processing records.                                                    
Information access control    Access authorization  12, 17, 47, 53.     
 (all listed implementation   Access establishment  17, 47, 53.         
 features must be             Access modification.  12, 17, 47, 53.     
 implemented).                                                          
Internal audit..............  ....................  12, 17, 43, 44, 47. 
   Personnel security (all    Assure supervision    17, 47.             
    listed implementation      of maintenance                           
      features must be         personnel by                             
        implemented)           authorized,                              
                               knowledgeable                            
                               person.                                  
                              Maintainance of       12, 17, 47.         
                               record of access                         
                               authorizations.                          
                              Operating, and in     17, 47.             
                               some cases,                              
                               maintenance                              
                               personnel have                           
                               proper access                            
                               authorization.                           
                              Personnel clearance   17, 47.             
                               procedure.                               
                              Personnel security    17, 47, 53.         
                               policy/procedure.                        
                              System users,         12, 17, 47, 53.     
                               including                                
                               maintenance                              
                               personnel, trained                       
                               in security.                             
Security configuration mgmt.  Documentation.......  12, 17, 47, 53.     
 (all listed implementation                                             
 features must be                                                       
 implemented).                                                          
                              Hardware/software     12, 17, 47.         
                               installation &                           
                               maintenance review                       
                               and testing for                          
                               security features.                       
                              Inventory...........  12, 17.             
                              Security testing....  12, 17, 47.         
                              Virus checking......  12, 17, 47, 53.     
Security incident procedures  Report procedures...  12, 17, 47.         
 (all listed implementation   Response procedures.  17, 47.             
 features must be                                                       
 implemented).                                                          

[[Page 43278]]

                                                                        
Security management process   Risk analysis.......  12, 17, 47, 53.     
 (all listed implementation   Risk management.....  17, 47.             
 features must be             Sanction policy.....  12, 17, 47, 53.     
 implemented).                Security policy.....  17, 47, 53.         
Termination procedures (all   Combination locks     12, 17.             
 listed implementation         changed.             12, 17, 47, 53.     
 features must be             Removal from access   12, 17, 47.         
 implemented).                 lists.               12, 17, 47.         
                              Removal of user                           
                               account(s).                              
                              Turn in keys, token                       
                               or cards that allow                      
                               access.                                  
Training (all listed          Awareness training    12, 17, 18, 47, 53. 
 implementation features       for all personnel                        
 must be implemented).         (including mgmt).                        
                              Periodic security     12, 18.             
                               reminders.                               
                              User education        ....................
                               concerning virus                         
                               protection.                              
                              User education in     12, 17, 18.         
                               importance of                            
                               monitoring log in                        
                               success/failure,                         
                               and how to report                        
                               discrepancies.                           
                              User education in     12, 18, 47          
                               password management.                     
------------------------------------------------------------------------


    Physical Safeguards To Guard Data Integrity, Confidentiality, and   
                              Availability                              
------------------------------------------------------------------------
         Requirement             Implementation       Mapped standards  
------------------------------------------------------------------------
Assigned security             ....................  47.                 
 responsibility.                                                        
Media controls (all listed    Access control......  17, 47, 53.         
 implementation features      Accountability        17, 18, 47.         
 must be implemented).         (tracking            12, 17, 47, 53.     
                               mechanism).          12, 17, 47.         
                              Data backup.........  17, 47, 53.         
                              Data storage........                      
                              Disposal............                      
Physical access controls      Disaster recovery...  17.                 
 (limited access) (all        Emergency mode        17.                 
 listed implementation         operation.           17, 47.             
 features must be             Equipment control     12, 17, 47.         
 implemented).                 (into and out of                         
                               site).                                   
                              Facility security                         
                               plan.                                    
                              Procedures for        17, 18, 47.         
                               verifying access                         
                               authorizations                           
                               prior to physical                        
                               access.                                  
                              Maintenance records.  17                  
                              Need-to-know          12, 17, 47, 53      
                               procedures for                           
                               personnel access.                        
                              Sign-in for visitors  17                  
                               and escort, if                           
                               appropriate.                             
                              Testing and revision  17, 47              
Policy/guideline on work      ....................  18.                 
 station use.                                                           
Secure work station location  ....................  17, 53.             
Security awareness training.  ....................  12, 17, 47.         
------------------------------------------------------------------------


  Technical Security Services To Guard Data Integrity, Confidentiality, 
                            and Availability                            
------------------------------------------------------------------------
         Requirement             Implementation       Mapped standards  
------------------------------------------------------------------------
Access control (The           Context-based         5, 12, 14, 16, 17,  
 following implementation      access,.              40, 47.            
 feature must be              Encryption..........  1, 6, 12, 14, 17,   
 implemented: Procedure for                          21, 22, 23, 24, 26,
 emergency access, In         Procedure for          36, 28, 29, 30, 31,
 addition, at least one of     emergency access.     47, 49, 53, 54, 55.
 the following three          Roll-based access,..  14, 17, 53.         
 implementation features      User-based access...  14, 16, 17, 40, 41, 
 must be implemented:                                47, 53.            
 Context-based access, Roll-                        11, 12, 14, 16, 17, 
 based access, User-based                            40, 41, 47, 53.    
 access. The use of                                                     
 Encryption is optional).                                               
Audit controls..............  ....................  12, 14, 18, 47, 53. 
Authorization control (At     Role-based access...  5, 14, 16, 17, 47,  
 least one of the listed      User-based access...   53.                
 implementation features                            14, 16, 47, 53.     
 must be implemented).                                                  
Data authentication.........  ....................  11, 53.             
Entity Authentication (The    Automatic logoff....  14, 16, 17, 18, 40, 
 following implementation     Biometric...........   53                 
 features must be             Password............  14, 16, 18, 40, 47, 
 implemented: Automatic       PIN.................   53.                
 logoff, Unique user          Telephone callback..  14, 16, 17, 18, 19, 
 identification. In           Token...............   40, 47, 53.        
 addition, at least one of    Unique user           14, 16, 18, 19, 40, 
 the other listed              identification.       47.                
 implementation features                            14, 17, 18, 47, 53. 
 must be implemented).                              14, 17, 47, 50, 53. 
                                                    14, 47, 53.         
------------------------------------------------------------------------


[[Page 43279]]


 Technical Security Mechanisms To Guard Data Integrity, Confidentiality,
                            and Availability                            
------------------------------------------------------------------------
         Requirement             Implementation       Mapped standards  
------------------------------------------------------------------------
Communications/network        Access controls.....  14, 17, 22, 23, 39, 
 controls (If communications  Alarm, event           47, 48, 53.        
 or networking is employed,    reporting, and       14, 17, 18, 35, 36, 
 the following                 audit trail.          37, 38, 44.        
 implementation features      Audit trail                               
 must be implemented:         Encryption..........  1, 6, 12, 14, 17,   
 Integrity controls, Message                         21, 22, 23, 24, 26,
 authentication. In           Entity                 27, 28, 29, 30, 31,
 addition, one of the          authentication.       47, 49, 52, 53.    
 following implementation                           12, 14, 17, 18, 20, 
 features must be             Event reporting        22, 23, 31, 32, 33,
 implemented: Access          Integrity controls..   34, 51, 53.        
 controls, Encryption. In     Message                                   
 addition, if using a          authentication.      14, 15, 17, 18, 22, 
 network, the following four                         23, 45, 46.        
 implementation features                            14, 15, 17, 18, 22, 
 must be implemented: Alarm,                         23, 25, 45, 46, 52.
 Audit trail, Entity                                                    
 authentication, Event                                                  
 reporting).                                                            
------------------------------------------------------------------------


                          Electronic Signature                          
------------------------------------------------------------------------
         Requirement             Implementation       Mapped standards  
------------------------------------------------------------------------
Digital signature (If         Ability to add        3, 4, 10, 11, 13, 20
 digital signature is          attributes.          3, 4, 11, 13, 14, 18
 employed, the following      Continuity of         3, 4, 10, 11, 13,   
 three implementation          signature             14, 18             
 features must be              capability.          3, 4, 11, 13, 20    
 implemented: Message         Counter signatures..  3, 4, 7, 8, 9, 13,  
 integrity, Non-repudiation,  Independent            14, 48             
 User authentication. Other    verifiability.       3, 4, 10, 11, 13,   
 implementation features are  Interoperability....   14, 18             
 optional).                   Message integrity...  3, 4, 10, 11, 13, 20
                              Multiple signatures.  2, 3, 4, 10, 11, 13,
                              Non-repudiation.....   14, 42             
                              Transportability....  3, 4, 11, 13, 14, 18
                              User authentication.  3, 4, 10, 11, 13, 20
------------------------------------------------------------------------

Mapped Standards

1. ANSI X3.92--Data Encryption Standard
2. ANSI X9.30--Part 1: Public Key Cryptography Using Irreversible 
Algorithms: Digital Signature Algorithm
3. ANSI X9.30--Part 2: Public Key Cryptography Using Irreversible 
Algorithms: Secure Hash Algorithm (SHA-1)
4. ANSI X9.31--Reversible Digital Signature Algorithms
5. ANSI X9.45--Enhanced Management Controls Using Digital Signatures 
and Attribute Certificates
6. ANSI X9.52--Triple DES Modes of Operation
7. ANSI X9.55--Extensions to Public Key Certificates and CRLs
8. ANSI X9.57--Certificate Management
9. ANSI X9.62--Elliptic Curve Digital Signature Algorithm (draft)
10. ANSI X12.58--Security Structures (version 2)
11. ASTM E 1762--Standard Guide for Authentication of Healthcare 
Information
12. ASTM E 1869--Draft Standard for Confidentiality, Privacy, Access 
and Data Security Principles
13. ASTM PS 100-97--Standard Specification for Authentication of 
Healthcare Information Using Digital Signatures
14. ASTM PS 101-97--Security Framework for Healthcare Information
15. ASTM PS 102-97--Standard Guide for Internet and Intranet 
Security
16. ASTM PS 103-97 Authentication & Authorization Guideline
17. CEN--European Pre-Standard
18. FDA--Electronic Records--Electronic Signatures--Final Rule
19. FIPS PUB 112--Password Usage
20. FIPS PUB 196--Entity Authentication Using Public Key 
Cryptography
21. FIPS PUB 46-2--Data Encryption Standard
22. IEEE 802.10: Interoperable LAN/MAN Security (SILS), 1992-1996 
(multiple parts)
23. IEEE 802.10c--LAN/WAN Security--Key Management
24. IETF ID--Combined SSL/PCT Transport Layer Security Protocol
25. IETF ID--FTP Authentication Using DSA
26. IETF ID--Secure HyperText TP Protocol (S-HTTP)
27. IETF ID--SMIME Cert Handling
28. IETF ID--SMIME Message Specification
29. IETF RFC 1422--Privacy Enhanced Mail: Part 1: Message Encryption 
and Authentication Procedures
30. IETF RFC 1424--Privacy Enhanced Mail: Part 2: Certificate-Based 
Key Management
31. IETF RFC 1423--Privacy Enhanced Mail: Part 3: Algorithms, Modes, 
and Identifiers
32. ISO/IEC 9798-1: Information Technology--Security Techniques--
Entity Authentication Mechanisms--Part 1: General Model
33. ISO/IEC 9798-2: Information Technology--Security Techniques--
Entity Authentication Mechanisms--Part 2: Entity Authentication 
Using Asymmetric Techniques
34. ISO/IEC 9798-2: Information Technology--Security Techniques--
Entity Authentication Mechanisms--Part 2: Entity Authentication 
Using Symmetric Techniques
35. ISO/IEC 10164-4--Information Technology--Open Systems 
Connection--System Management: Alarm Reporting Function
36. ISO/IEC 10164-5--Information Technology--Open Systems 
Connection--System Management: Event Report Management Function
37. ISO/IEC 10164-7--Information Technology--Open Systems 
Connection--System Management: Security Alarm Reporting Function
38. ISO/IEC 10164-8--Information Technology--Open Systems 
Connection--System Management: Security Audit Trail Function
39. ISO/IEC 10164-9--Information Technology--Open Systems 
Connection--System Management: Objects and Attributes for Access 
Control
40. ISO/IEC 10181-2--Information Technology--Security Frameworks in 
Open Systems--Authentication Framework
41. ISO/IEC 10181-3--Information Technology--Security Frameworks in 
Open Systems--Access Control Framework
42. ISO/IEC 10181-4--Information Technology--Security Frameworks in 
Open Systems--Non-repudiation Framework
43. ISO/IEC 10181-5--Information Technology--Security Frameworks in 
Open Systems--Confidentiality Framework
44. ISO/IEC 10181-7--Information Technology--Security Frameworks in 
Open Systems--Security Audit Framework
45. ISO/IEC 10736--Information Technology--Telecommunications and 
Information Exchange Between Systems--Transport Layer Security 
Protocol (TLSP)

[[Page 43280]]

46. ISO/IEC 11577--Information Technology--Telecommunications and 
Information Exchange Between Systems--Network Layer Security 
Protocol (NLSP)
47. NIST--Generally Accepted Principles and Practices for Secure 
Information Technology Systems
48. NIST MISPC--Minimum Interoperability Specification for PKI 
Components Version 1
49. PKCS #7--Cryptographic Message Syntax Standard Version 1.5 or 
later
50. PKCS #11--Cryptoki B A Cryptographic Token Interface
51. RFC 1510--Kerberos Authentication Service
52. RFC 2104--HMAC:Keyed-Hashing for Message Authentication
53. For the Record--Protecting Electronic Health Information
54. ANSI X9.42--Management of Symmetric Keys Using Diffie-Hellman
55. ANSI X9.44--Key Transport Using RSA

[FR Doc. 98-21601 Filed 8-7-98; 1:23 pm]
BILLING CODE 4120-01-P