Search
Search
Login
Toggle navigation
Home
HITRUST Policy
1) Introduction
2) HIPAA Inheritance
3) Policy Management
4) Risk Management
5) Roles Policy
6) Data Management Policy
7) System Access Policy
8) Auditing Policy
9) Configuration Management Policy
10) Facility Access Policy
11) Incident Response Policy
12) Breach Policy
13) Disaster Recovery Policy
14) Disposable Media Policy
15) IDS Policy
16) Vulnerability Scanning Policy
17) Data Integrity Policy
18) Data Retention Policy
19) Employees Policy
20) Approved Tools Policy
21) Third-Party Policy
22) Key Definitions
23) LifeWIRE HIPAA Business Associate Agreement (“BAA”)
24) HIPAA Mappings to LifeWIRE Controls
Back
|
Next
2.1 HIPAA Inheritance for LifeWIRE Customers
2.2 HIPAA Inheritance for Platform Add-on Customers