Information Access Management
§164.308(a)(4)(i): Implement policies and procedures for authorizing access to electronic [...]
§164.308(a)(4)(i): Implement policies and procedures for authorizing access to electronic [...]
§164.308(a)(3)(ii)(C): - Implement procedures for terminating access to electronic protected [...]
§164.308(a)(3)(ii)(B): Implement procedures to determine that the access of a [...]
§164.308(a)(3)(ii)(A): Implement procedures for the authorization and/or supervision of workforce [...]
§164.308(a)(3)(i): Implement policies and procedures to ensure that all members [...]
§164.308(a)(2): Identify the security official who is responsible for the [...]
§164.308(a)(1)(ii)(D): Implement procedures to regularly review records of information system [...]
§164.308(a)(1)(ii)(C): Apply appropriate sanctions against workforce members who fail to [...]
§164.308(a)(1)(ii)(B): Implement security measures sufficient to reduce risks and vulnerabilities [...]
§164.308(a)(1)(ii)(A): Conduct an accurate and thorough assessment of the potential [...]