You are correct that this auditing must be done.  This "Application Auditing" 
must include not just what a RACF log would show - that someone had access to a 
file, but to show exactly what the user saw.  It is one thing to know that 
someone logged in, accessed a sensitive file and logged out later in the day, 
but the requirements are to be able to know what they were doing and which 
sensitive information they saw.  You would need to be able to see they same 
screens they saw.  This "Application Auditing" is possible and goes beyond what 
logs can do.  


 
Robert Galambos CIPP/C  

Compuware Senior Technical Specialist 
IBM Certified Solutions Expert - 
DB2 UDB for OS/390 Database Administration
Certified Information Privacy Professional/Canada 
[EMAIL PROTECTED]
 
  
Tel: +1 905 886 7000 
Toll Free: +1 800 263 7189
Fax: +1 905 886 7023
Quebec: +1 877-281-1888 
  
Compuware      Canada
        
Service is our best product     
 Les renseignements contenus dans le présent message électronique sont 
confidentiels et concernent exclusivement le(s) destinataire(s) désigné(s). Il 
est strictement interdit de distribuer ou de copier ce message. Si vous avez 
reçu ce message par erreur, veuillez répondre par courriel à l'expéditeur et 
effacer ou détruire toutes les copies du présent message.


The contents of this e-mail are intended for the named addressee only. It 
contains information that may be confidential. Unless you are the named 
addressee or an authorized designee, you may not copy or use it, or disclose it 
to anyone else. If you received it in error please notify us immediately and 
then destroy it.

From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of 
McKown, John
Sent: Friday, May 09, 2008 8:25 AM
To: IBM-MAIN@BAMA.UA.EDU
Subject: HIPAA auditing (was:RE: VSAM / COBOL question - redux (fwd))

> -----Original Message-----
> From: IBM Mainframe Discussion List
> [mailto:[EMAIL PROTECTED] On Behalf Of Kenneth E Tomiak
> Sent: Thursday, May 08, 2008 7:10 PM
> To: IBM-MAIN@BAMA.UA.EDU
> Subject: Re: VSAM / COBOL question - redux (fwd)
> 
> My understanding of HIPAA is access to data is not denied to everyone, 
> knowing who accessed it is the requirement. For 'confidential' data, 
> logging who accessed it even if they are AUTHORIZED is done in some 
> hospitals. Think audit trail. And of course they try to limit access. 
> But if the developers have access to production does it matter what 
> file it is in, they still accessed it.
> Proper logging would then have to log everyone that accesses the 
> copies. And th snowball starts rolling. Once you give access to 
> someone, it is hard to control what they do with it.
> 

We do log all access to this data. We produced TONS of SMF data for this (RACF 
auditing). Actually, we UAUDIT every ID which has any possibility of accessing 
this data (e.g. TSO, ftp, HTTP, ...)

--
John McKown
Senior Systems Programmer
HealthMarkets
Keeping the Promise of Affordable Coverage Administrative Services Group 
Information Technology

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to