// Level 3 · Controls
Technical Safeguards
Technology controls protecting ePHI access and transmission.
164.312(a)(1)Critical
Access Control
Unique user identification (R), Emergency access procedure (R), Automatic logoff (A), Encryption and decryption (A).
164.312(b)High
Audit Controls
Implement hardware, software, and/or procedural mechanisms to record and examine activity in systems containing ePHI.
164.312(c)(1)High
Integrity
Mechanism to authenticate ePHI (A) — protect ePHI from improper alteration or destruction.
164.312(d)Critical
Person or Entity Authentication
Verify that a person or entity seeking access to ePHI is the one claimed.
164.312(e)(1)Critical
Transmission Security
Integrity controls (A), Encryption (A) — guard against unauthorized access to ePHI being transmitted over a network.