Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. A request with the reason for removal is sent to the building manager who approves or rejects. If necessary, they fill out the RMA paperwork now.
  2. The HIPAA Liaison approves or rejects the request.If approved
  3. An authorized HIPAA covered employee will log the identifying information for each device and transfer to a secure container for transport out of the Covered Entity

  4. Container shall be locked with a key kept in the secure area.

  5. Container will transported to the designated site of wiping / destruction.

  6. HIPPA covered employee will unlock with key kept at wiping / destruction. station.

  7. Each device will be wiped or destroyed per policy.

  8. Employee will generate a certificate of wiping/destruction for each storage device and return the secure container and certificates of destruction to the Covered Entity area

    , a system administrator in the covered entity wipes the drive and notes when and by whom it was securely wiped

    .

  9. The media is given to the building manager who closes the workflow and sends the drive on. Email is sent to all parties involved.

...