Skip to content

HIPAA Controls

We are not lawyers, this is not legal advise.

It is your responsibility to discover what law applies to you and how to best comply with it. In case of doubt, consult your Data Protection Officer (DPO) or equivalent.

For Welkin Customers

Please get in touch with Elastisys for a mapping of controls to Welkin features, including evidence of implementation.

Other HIPAA Controls

HIPAA controls are taken from these documents:

The following controls are outside the scope of Welkin and need to be implemented by the organization operating Welkin. ISO-27001-certified Welkin operators, such as Elastisys already have the right processes in place.

  • S1 - Security Management Process - § 164.308(a)(1)
  • S2 - Security Management Process - Risk Analysis - § 164.308(a)(1)(ii)(A)
  • S3 - Security Management Process - Risk Management - § 164.308(a)(1)(ii)(B)
  • S4 - Security Management Process - Sanction Policy - § 164.308(a)(1)(ii)(C)
  • S6 - Assigned Security Responsibility - § 164.308(a)(2)
  • S7 - Workforce Security - § 164.308(a)(3)
  • S8 - Workforce security - Authorization and/or Supervision - § 164.308(a)(3)(ii)(A)
  • S9 - Workforce security - Workforce Clearance Procedure - § 164.308(a)(3)(ii)(B)
  • S10 - Workforce security - Establish Termination Procedures - § 164.308(a)(3)(ii)(C)
  • S11 - Information Access Management - § 164.308(a)(4)
  • S15 - Security Awareness and Training - § 164.308(a)(5)
  • S19 - Security Awareness, Training, and Tools - Password Management - § 164.308(a)(5)(ii)(D)
  • S21 - Security Incident Procedures - Response and Reporting - § 164.308(a)(6)
  • S22 - Contingency Plan - § 164.308(a)(7)
  • S25 - Contingency Plan - Emergency Mode Operation Plan - § 164.308(a)(7)(ii)(C)
  • S27 - Contingency Plan - Application and Data Criticality Analysis - § 164.308(a)(7)(ii)(E)
  • S28 - Evaluation - § 164.308(a)(8)
  • S30 - Business Associate Contracts and Other Arrangements - Written Contract or Other Arrangement - § 164.308(b)(4)
  • S36 - Workstation Use - § 164.310(b)
  • S37 - Workstation Security - § 164.310(c)
  • S38 - Device and Media Controls - § 164.310(d)(1)
  • S40 - Device and Media Controls - Media Re-use - § 164.310(d)(2)(ii)
  • S41 - Device and Media Controls - Accountability - § 164.310(d)(2)(iii)
  • S42 - Device and Media Controls - Data Backup and Storage Procedures - § 164.310(d)(2)(iv)
  • S46 - Access Control - Automatic Logoff - § 164.312(a)(2)(iii)

    Important

    Welkin API access is configured so as to require a new OpenID flow every 12 hours.

  • S49 - Integrity - § 164.312(c)(1)

  • S50 - Integrity - Mechanism to Authenticate ePHI - § 164.312(c)(2)
  • S51 - Person or Entity Authentication - § 164.312(d)