Policy.angeleye.health

18. Employees Policy

Web18.1.1 Applicable Standards from the HITRUST Common Security Framework. 01.h - Clear Desk and Clear Screen Policy. 02.e - Information Security Awareness, Education, and …

Actived: 1 days ago

URL: https://policy.angeleye.health/18-employees_policy/

8. Configuration Management Policy

Web8.2 Configuration Management Policies. Docker and Kubernetes are used to standardize and automate configuration management. No systems are deployed into AngelEye …

Category:  Health Go Health

3. Risk Management Policy

Web3.2 Risk Management Policies. It is the policy of AngelEye Health to conduct thorough and timely risk assessments of the potential threats and vulnerabilities to the confidentiality, …

Category:  Health Go Health

10. Incident Response Policy

WebIncident Response Policy. AngelEye Health implements an information security incident response process to consistently detect, respond, and report incidents, minimize loss …

Category:  Health Go Health

7. Auditing Policy

Web7.2 Auditing Policies. Responsibility for auditing information system access and activity is assigned to AngelEye Health's Security Officer. The Security Officer shall: Assign the …

Category:  Health Go Health

11. Breach Policy

Web11.2 AngelEye Health Breach Policy. Discovery of Breach: A breach of ePHI shall be treated as "discovered" as of the first day on which such breach is known to the …

Category:  Health Go Health

6. System Access Policy

WebSystem Access Policy. 6. System Access Policy. Access to AngelEye Health systems and application is limited for all users, including but not limited to workforce members, …

Category:  Health Go Health

9. Facility Access Policy

Web9. Facility Access Policy. AngelEye Health works with Subcontractors to assure restriction of physical access to systems used as part of the AngelEye Health Platform. AngelEye …

Category:  Health Go Health

5. Data Management Policy

WebData Management Policy. AngelEye Health has procedures to create and maintain retrievable exact copies of electronic protected health information (ePHI) stored the …

Category:  Health Go Health

23. HIPAA Mappings to AngelEye Health Controls

Web23. HIPAA Mappings to AngelEye Health Controls. Below is a list of HIPAA Safeguards and Requirements and the AngelEye Health controls in place to meet those. Administrative …

Category:  Health Go Health

12. Disaster Recovery Policy

WebAngelEye Health's Policies & Procedures: 12. Disaster Recovery Policy. 12. Disaster Recovery Policy. The AngelEye Health Contingency Plan establishes procedures to …

Category:  Health Go Health

2. Policy Management Policy

WebAngelEye Health's Policies & Procedures: 2. Policy Management Policy. 2. Policy Management Policy. AngelEye Health implements policies and procedures to maintain …

Category:  Health Go Health

15. Vulnerability Scanning Policy

WebAngelEye Health's Policies & Procedures: 15. Vulnerability Scanning Policy. 15. Vulnerability Scanning Policy. AngelEye Health is proactive about information security …

Category:  Health Go Health

21. Key Definitions

WebKey Definitions. 21. Key Definitions. Application: An application hosted by AngelEye Health, either maintained and created by AngelEye Health, or maintained and created by a …

Category:  Health Go Health

20. 3rd Party Policy

WebAngelEye Health's Policies & Procedures: 20. 3rd Party Policy. 20. 3rd Party Policy. AngelEye Health makes every effort to assure all 3rd party organizations are compliant …

Category:  Health Go Health