Media handling

MedStack Confidential

Metadata

Erase or destroy media containing PHI prior to disposal or re-use to prevent data from being recovered

CodeSectionTitle
ISO A.8.3.1 Management of removable media
ISO A.8.3.2 Disposal of media
CHI SR34 Disposing of Media Containing PHI
HIPAA 164.310(d)(2)(i) Disposal (Required)
HIPAA 164.310(d)(2)(ii) Media re-use (Required)
SOC2 CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity’s objectives.
SOC2 CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity’s objectives.
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.

Don’t put sensitive data on removable media

CodeSectionTitle
ISO A.8.3.3 Physical media transfer
CHI SR33 Protecting PHI on Portable Media
CHI SR35 Protecting Data Storage
CHI SR36 Protecting Storage of Unencrypted PHI in the EHRi
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.

Enforcement

References

CodeSectionTitle
ISO A.8.3 Media handling
ISO A.11.2.7 Secure disposal or re-use of equipment
HIPAA 164.310(d)(1) Standard: Device and media controls
HIPAA 164.310(d)(2)(iii) Accountability (Addressable)
SOC2 CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity’s objectives.
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.