ChecklistGuro logo ChecklistGuro Solutions Industries Company Pricing

Healthcare Patient Portal Access Checklist: Security & Usability

Secure patient access, enhance portal usability! This checklist ensures your healthcare portal meets security standards & delivers a seamless patient experience. Download now & boost patient engagement!

This Template was installed 0 times.

Patient Identity Verification

1 of 10

Ensuring accurate and secure patient identification before granting portal access.

Patient First Name

Patient Last Name

Date of Birth (Year)

Date of Birth (Month)

Date of Birth (Day)

Gender

Photo ID (e.g., Driver's License)

Verification Method

Authentication Methods

2 of 10

Reviewing and validating multi-factor authentication and password policies.

Primary Authentication Method

MFA Type (if applicable)

Minimum Password Length

Password Complexity Requirements

Last Password Policy Review Date

Password Reset Procedure Documentation Link

Access Control Permissions

3 of 10

Confirming appropriate access levels are assigned based on patient roles (e.g., patient, caregiver).

Patient Role Assignment

Allowed Data Access

Appointment Scheduling Permissions

Maximum Number of Caregivers

Record Sharing Scope

Data Encryption & Security

4 of 10

Verifying data encryption protocols both in transit and at rest within the portal.

Encryption Method Used (e.g., TLS 1.3, AES-256)

Encryption Key Rotation Frequency (days)

Data Encryption at Rest?

Description of Encryption Protocol Implementation

Certificate Validation Status

Last Encryption Audit Date

Portal Usability & Accessibility

5 of 10

Assessing the portal's ease of navigation, clarity of information, and adherence to accessibility standards.

Navigation Clarity

Font Size Appropriateness

Average Page Load Time (seconds)

Accessibility Features Used (Select all that apply)

Overall Ease of Use

Patient Privacy & Consent

6 of 10

Confirming patient understanding of privacy policies and obtaining necessary consent for data sharing.

Has the patient received a copy of the Privacy Notice?

Brief summary of Privacy Notice explanation provided to patient.

Does the patient understand how their data will be shared?

Patient Signature (acknowledging Privacy Notice and consent)

Date of Consent/Acknowledgement

Which data sharing categories has the patient consented to?

Audit Logging & Monitoring

7 of 10

Reviewing audit logs for suspicious activity and ensuring adequate monitoring systems are in place.

Number of Audit Log Entries Reviewed

Summary of Log Review Findings

Severity of Identified Issues (if any)

Date of Last Log Review

Time of Last Log Review

Audit Log Events Monitored

Number of Alerts Generated in Last Period

Device Security & Compliance

8 of 10

Checking for device security protocols and compliance with organizational policies when accessing the portal.

Device Operating System

Device Encryption Status (0 = Not Encrypted, 1 = Encrypted)

Security Software Installed

Device Compliance Status

Last Security Scan Date

Notes / Comments on Device Security

Training & Documentation

9 of 10

Ensuring staff have appropriate training on portal access procedures and maintaining accurate documentation.

Last Training Completion Date

Training Module Covered

Number of Staff Trained

Summary of Training Content

Attach Training Certificates/Records

Trainer Qualification

Regular Security Assessments

10 of 10

Scheduling and conducting regular vulnerability scans and penetration tests.

Last Vulnerability Scan Date

Vulnerability Scan Score (e.g., CVSS)

Scanning Tool Used

Scan Report (PDF/CSV)

Next Penetration Test Scheduled

Summary of Findings and Remediation Plan

We can do it Together

Need help with Checklists?

Have a question? We're here to help. Please submit your inquiry, and we'll respond promptly.

Email Address
How can we help?