0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
164.308(a)(7)(i): Contingency Plan
Response, Incident, Contingency, Disaster, Recovery Jeremy Pickett 10/8/24 Response, Incident, Contingency, Disaster, Recovery Jeremy Pickett 10/8/24

164.308(a)(7)(i): Contingency Plan

Establish policies and procedures for responding to an emergency or other occurrence that damages systems containing ePHI.

Read More
164.308(a)(6)(ii): Response and Reporting
Response, Reporting, Audit, Incident Jeremy Pickett 10/7/24 Response, Reporting, Audit, Incident Jeremy Pickett 10/7/24

164.308(a)(6)(ii): Response and Reporting

Identify and respond to suspected or known security incidents and mitigate, to the extent practicable, harmful effects.

Read More
164.308(a)(6)(i): Security Incident Procedures
Incident, Response, Procedures, IR Jeremy Pickett 10/4/24 Incident, Response, Procedures, IR Jeremy Pickett 10/4/24

164.308(a)(6)(i): Security Incident Procedures

Implement policies and procedures to address security incidents.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC