Skip to main content
Patient Protect circular logo mark in purple and white used for site navigationPatient Protect

Defense · ePHI Audit Logs

Every access logged. Every action timestamped.

Immutable per-session, per-tab audit trail. OCR-ready by default. No assembly required when the auditor calls.

Included in Core·Starting at $39/mo
Patient Protect — ePHI Audit Logs
Patient Protect ePHI Audit Logs showing per-personnel access records with timestamps, session IDs, and PHI scope details

HIPAA mapping

What this satisfies in the Security Rule.

4 citations, each with the specific ePHI Audit Logs behavior that satisfies it. The mapping is the receipt — what you can show an auditor without assembling anything new.

§164.312(b)

Audit controls

Implements hardware, software, and procedural mechanisms that record and examine activity in information systems containing PHI. Patient Protect records every PHI access by every workforce member.

§164.308(a)(1)(ii)(D)

Information system activity review

Implements procedures to regularly review records of information system activity. The audit log is searchable, filterable, and reviewable in seconds.

§164.316(b)(2)

Time limit

Retains documentation for six years from creation or last effective date. The log retains the full required window automatically.

§164.530(j)

Documentation retention

Same six-year requirement applied to privacy documentation. Same compliance posture.

What it does

The audit trail that's already there when the auditor calls.

§164.312(b) is one sentence: implement hardware, software, and procedural mechanisms that record and examine activity in information systems containing electronic protected health information.

Most practices treat that sentence as a problem to be solved the week before audit. Patient Protect treats it as an architectural default — every PHI access, by every workforce member, on every device, is recorded the moment it happens, in a form OCR auditors expect to receive.

When OCR asks who accessed what and when — a question that follows almost every breach notification and many enforcement actions — the answer is one query away. The export is in the format OCR expects. No retroactive log assembly. No “we'll need a few weeks to get back to you.”

How it works

5 mechanisms keep ePHI Audit Logs working.

01

Per-session, per-tab granularity.

Every authenticated session gets a session ID. Every tab gets a tab ID. Every event records both. Two clinicians on the same device, in the same office, accessing different patients at the same time — distinguishable in the log.

02

Immutable storage.

Logs are append-only. New entries write; existing entries cannot be modified or deleted. The immutability is enforced at the database layer, not the application layer — application exploits cannot rewrite history. Hash chains validate integrity over time.

03

PHI scope per event.

Each event records what PHI was accessed at what scope — demographic only, full clinical record, billing record, imaging, etc. When the question is “did this user see clinical notes or just demographics?” the log answers specifically.

04

Anomaly detection.

Patterns that suggest abnormal access surface as alerts: unusual access times, access volumes outside the member's normal pattern, access to records outside their typical patient panel. Alerts are triaged in the platform with one click to investigate the underlying log entries.

05

Export in OCR format.

The log exports as CSV, PDF, and as an audit-pack ZIP. The audit pack includes the log itself plus the supporting context — workforce members, roles at the time, devices in service, BAAs active. Audit responses go from “get back to you in a month” to “here by end of day.”

Who this is for

Built for the practices that need it most.

Practices that have to be ready, not get ready.

Audits don't announce themselves with months of warning. The practices that survive enforcement scrutiny are the ones whose audit trail was already there when the request came in. The log is built for that posture.

Specialty practices with high-sensitivity records.

Behavioral health, substance use treatment, HIV care, reproductive health — sectors where access scrutiny is particularly intense. The per-event PHI scope and the anomaly detection are designed for environments where unauthorized access would be a serious matter.

Practices recovering from a breach.

If your practice is in the post-breach corrective action phase, the log is the documentation that demonstrates new control effectiveness. OCR's expectation of “evidence of ongoing audit control function” maps directly to the log's output.

What you get

5outcomes you'll feel in week one.

No assembly when audits hit.

The log is already in the format OCR expects. Export and respond.

Per-session, per-tab granularity.

Distinguishable activity even in multi-clinician, multi-tab environments.

Immutable record.

No one can rewrite the audit trail — not workforce, not administrators, not Patient Protect.

Six-year retention by default.

§164.316(b)(2) handled architecturally, not by reminder.

Anomaly surfacing.

The log isn't just storage — it's observation, with patterns that suggest unauthorized access flagged for review.

FAQ

What people ask first.

6 questions cover most first-time evaluations. See all FAQs →

How long are logs retained?
Six years minimum, matching §164.316(b)(2). Configurable upward for practices wanting longer retention. Logs retain through workforce termination, role changes, and account restructuring.
Can administrators delete log entries?
No. Logs are append-only at the database layer. Even Patient Protect personnel cannot modify or delete entries — the infrastructure enforces this, not policy.
What about scale? Does the log slow the platform down?
No. Logging is asynchronous and write-optimized. The user-facing platform performs at full speed; logs land in storage in parallel. Practices with hundreds of thousands of access events monthly run without performance impact.
Can I see the log for a specific patient?
Yes. Filter by patient ID and the log returns every access event for that patient — by whom, when, from where, at what scope. This is the answer to a patient request for accounting of disclosures (§164.528).
Can I see the log for a specific workforce member?
Yes. Filter by workforce member and the log returns their complete activity history. Useful during periodic access reviews (§164.308(a)(4)) and during investigation of suspected misuse.
How is this different from just having access logs in my EHR?
EHR logs typically cover EHR-internal activity. Patient Protect's log covers all PHI access across the platform — including documents, forms, secure messaging, exports, and patient-facing materials. The scope is broader, the format is OCR-aligned, and the export is built for compliance use, not clinical use.

Next step

Audit-readiness is built in. Not built up.

The practices that have audit-ready logs built it in from the start. Patient Protect builds it in for you.

No contracts. No consultants. Starting at $39/mo.