Understanding Audit Event Logs
Audit event logs allow you to run audits on the actions of your practice's users and general events. You can help protect your patients' health information by checking your audit event logs regularly for unusual or suspicious activity.
What do you want to do?
Understand the Audit Event Log
Entry types:
- Security Framework-related: includes login/logout and unauthorized access events. Unauthorized access occurs when a user attempts to access a page or view items that require an access level they do not possess.
- User Interaction: includes events completed by users, such as printing or exporting PHI.
Basic event concepts:
- Unauthorized access - user accessed a page that required an access level the user doesn't possess
- Unauthorized view/insert/update/delete - access denied, user attempted to view or modify a record that required an access level they didn't possess
- Patient record viewed - if security framework-related, entries contain record-level details of a specific patient; user interaction entries are generally related to search events
Understand Audit Log Data Points
The data points available in audit logs are standard for every type of event. The table below describes the data points available for audit log events.
| Data Point | Description |
|---|---|
| Date | System time when event occurred |
| User | Name of user that caused the entry to be generated |
| Session | Masked version of session ID associated with user that narrows scope of events to a specific user session |
| Patient | Name of patient accessed if applicable |
| Event Name | The reason the audit entry was generated |
| Record Type |
|
| Event Detail | Detailed information about the event, such as client address for login event to condensed representation of changes to a specific piece of info |