{"version":"1.0","provider_name":"Eagle Associates News","provider_url":"https:\/\/eagleassociates.net\/news","title":"Information System Activity Review | Eagle Associates News","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zDYXfAZRTt\"><a href=\"https:\/\/eagleassociates.net\/news\/2024\/04\/information-system-activity-review\/\">Information System Activity Review<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/eagleassociates.net\/news\/2024\/04\/information-system-activity-review\/embed\/#?secret=zDYXfAZRTt\" width=\"600\" height=\"338\" title=\"&#8220;Information System Activity Review&#8221; &#8212; Eagle Associates News\" data-secret=\"zDYXfAZRTt\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/eagleassociates.net\/news\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2024\/04\/AdobeStock_297479726-scaled.jpeg","thumbnail_width":2560,"thumbnail_height":1707,"description":"HIPAA\u2019s Security Rule requires in paragraph 164.308(a)(1)(ii)(D) that covered entities \u201cImplement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.\u201d Many organizations are not in full compliance with this required specification. The purpose of reviewing system activity is to identify whether any EPHI is... Continue reading &#8594;"}