Auditable events and tamper-resistance (MU3)
From OpenEMR Project Wiki
Revision as of 05:48, 10 October 2020 by Bradymiller (talk | contribs)
- Regulation text:
§170.315 (d)(2) Auditable events and tamper-resistance—`Record actions. Technology must be able to: Record actions related to electronic health information in accordance with the standard specified in §170.210(e)(1); Record the audit log status (enabled or disabled) in accordance with the standard specified in §170.210(e)(2) unless it cannot be disabled by any user; and Record the encryption status (enabled or disabled) of electronic health information locally stored on end-user devices by technology in accordance with the standard specified in §170.210(e)(3) unless the technology prevents electronic health information from being locally stored on end-user devices (see paragraph (d)(7) of this section). Default setting. Technology must be set by default to perform the capabilities specified in paragraph (d)(2)(i)(A) of this section and, where applicable, paragraphs (d)(2)(i)(B) and (d)(2)(i)(C) of this section. When disabling the audit log is permitted. For each capability specified in paragraphs (d)(2)(i)(A) through (C) of this section that technology permits to be disabled, the ability to do so must be restricted to a limited set of users. Audit log protection. Actions and statuses recorded in accordance with paragraph (d)(2)(i) of this section must not be capable of being changed, overwritten, or deleted by the technology. Detection. Technology must be able to detect whether the audit log has been altered.
- To ensure accurate time, server will need to set up a Network Time Protocol server that supports version 4 Network Time Protocol (NTP) as defined by RFC 5905.
- ASTM E2147-01 7.1.1 through 7.1.3 and 7.1.6 through 7.1.9, 7.2 and 7.4
- Any changes to a user’s privileges must be captured to meet this criterion (e.g., user account creation, user switches roles and new privileges are assigned, revoking privileges, account disabling, etc.).