General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to:

Size: px
Start display at page:

Download "General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to:"

Transcription

1 General Compliance Training General Compliance Training i The University of Texas Medical Branch at Galveston Course Overview General Compliance The intent of the Compliance Program is to: Promote compliance with all applicable laws and regulations E d h l thi l d t Encourage and help ensure ethical conduct Provide education and training Prevent non-compliance with laws and regulations Detect non-compliance if it occurs Discipline those involved in non-compliant behavior Prevent future non-compliance 1

2 General Compliance What does it mean to be in Compliance? To be in compliance means to adhere to all laws, rules and policies that apply to your job functions. Although you are not required to know all the laws and policies for UTMB and the UT System, you are responsible for knowing and following all the laws and policies that apply to you and your job functions at UTMB. The Standards of Conduct should be used as a guide to those policies and procedures and applied to how you operate on a day to day basis. General Compliance The Standards of Conduct Guide applies to: UTMB Employees Faculty Fellows Residents Students Consultants Volunteers Sub-contractors Independent p Contractors Vendors General Compliance How can you avoid trouble? Follow UTMB s Guiding Principle Do what s right When faced with a decision or situation that causes you to question your ethical judgment, ask yourself some of the following questions: does the action comply with UTMB policies and procedures? is the action legal? how would it look to your family, friend, our patients, and the general public if it was published on the front page of the newspaper or showed up on the 6 o clock news? If you know its wrong and you have to ask yourself this list of questions, don t do it!! 2

3 Progress General Compliance Fraud and Abuse Confidentiality and Integrity Business Information and Information Systems Ethical Conduct in the Workplace and Employment Practices Health and Safety Fraud: What is it? Fraud and Abuse Fraud is defined as knowingly and willfully attempting to receive financial gain by making false statements or developing ascheme eto receive eanything gof value. aue A few examples of Fraud are: Accepting free items in exchange for purchasing goods or services or patient referrals Falsifying any type of record: medical, scientific research Fraud and Abuse Abuse: What is it? Abuse is defined as activities that result in excessive or unreasonable cost to UTMB or other State or Federal agencies. An example of Abuse is: Taking products or supplies belonging to UTMB 3

4 Fraud and Abuse Where do I go with Compliance Issues? If you suspect any type of wrongdoing, including fraud, waste, abuse, or violation of federal and state laws you can report it by contacting: Your instructor/professor/program coordinator UTMB Institutional Compliance Office: (409) UTMB Fraud, Abuse and Privacy Hotline: (800) Fraud and Abuse Fraud, Abuse and Privacy Hotline (800) What is the Fraud, Abuse and Privacy Hotline? The hotline was created to allow anyone from any phone to report any suspected non-compliance issues that they are unable to discuss through regular administrative channels. Some advantages of the Fraud, Abuse and Privacy Hotline are: Its available 24/7, 365 days a year You can remain completely anonymous Call are answered by an off campus contracted company Fraud and Abuse What type of violations should be reported to the hotline? The hotline should be used for violations in the following areas: Substantial violations of laws, policies, regulations Specific danger to health or safety Conflicts of Interest Abuse of authority Theft or abuse of property Gross waste of funds Unethical conduct Contract or procurement irregularities Bribery and acceptance of gratuities 4

5 Fraud and Abuse Accepting Gifts, Gratuities, and Kickbacks. What you cannot accept: Any amount of money Cash currency or coin in any amounts Personal checks, cashier checks, money orders Gift certificates or gift cards Any gift, favor, service, or loan that might reasonably appear to influence the employee or student in the performance of duties. Tickets to athletic or other special events are expressly prohibited by Texas law. Progress General Compliance Fraud and Abuse Confidentiality and Integrity Business Information and Information Systems Ethical Conduct in the Workplace and Employment Practices Health and Safety Confidentiality and Integrity All information at UTMB is considered confidential. As employees, students, contractors, or volunteers you may have access to some confidential information and should ensure that it is handled with the appropriate discretion. S l f fid ti l d t Some examples of confidential data are: Personnel data (UTMB employee) Student information Patient information Financial data Supplier and subcontractor information Employee lists and data Proprietary computer software 5

6 Notification of Breach of Personal Information New federal and state laws are aimed at protecting an individual s personal information. This includes electronic, verbal and paper information. Sensitive personal information includes, but is not limited to: Social ilsecurity Number Driver's License Number Credit Card Number Protected Health Information (PHI) Breach is an unauthorized acquisition, access, use or UTMB employees and students must notify the disclosure Office of Institutional of data that Compliance or the Office of Informationcompromises Security immediately the security, if you privacy, suspect that there has been a breach of an or individual's integrity of privacy. sensitive personal information. Confidentiality and Integrity What can you say and to whom? Media Contact If you are approached by a news reporter for information about UTMB you should contact the department of Public Affairs. Public Affairs acts as the official spokesperson for UTMB and can be contacted 24 hours a day. Public Affairs (409) Confidentiality and Integrity What can you say and to whom? Government and Outside Investigators If you receive a subpoena, inquiry, or other legal document from any government agency regarding UTMB business immediately notify the UTMB Legal Affairs department. Legal Affairs: (409) Although you are not prohibited from speaking to a government agent or investigator, to protect yourself and UTMB, it is best to have them contact you at work if it is regarding any type of UTMB business. 6

7 Progress General Compliance Fraud and Abuse Confidentiality and Integrity Business Information and Information Systems Ethical Conduct in the Workplace and Employment Practices Health and Safety Business Information and Information Systems What are some examples of state owned property? Some examples of state owned property are: UTMB vehicles Computers Office supplies Proprietary software Furniture Copiers Business Information and Information Systems Use of State Owned Property UTMB Policy: UTMB assets must be used for state purposes only. Personal use of UTMB resources and the use of UTMB resources for personal financial gain is prohibited. Policy Exceptions: The following items can be used on an occasional basis as long as there is no additional cost to UTMB. Internet Telephones (local calls only) 7

8 Business Information and Information Systems What are some examples of misusing state owned property? Taking extra office supplies home for personal use Taking unused or broken furniture home for personal use Copying flyers advertising your catering business on a UTMB copier. Progress General Compliance Fraud and Abuse Confidentiality and Integrity Business Information and Information Systems Ethical Conduct in the Workplace and Employment Practices Health and Safety Progress General Compliance Fraud and Abuse Confidentiality and Integrity Business Information and Information Systems Ethical Conduct in the Workplace and Employment Practices Health and Safety 8

9 Health and Safety Workplace Health and Safety All UTMB employees should perform their duties in compliance with all applicable institutional policies; federal, state, and local laws; and standards relating to the environment and protection of worker health and safety. It is each employees duty to report any workplace injury or situation that may present itself as a danger to their immediate supervisor or the UTMB Safety Officer so that corrective action may be taken. Supervisors must report unsafe practices or conditions to the General Safety Committee or to UTMB Health and Safety Services at (409) Health and Safety Drug and Weapon Free Workplace UTMB is committed to a drug-free and weapon-free environment. Employees reporting to work with a weapon, under the influence of an illegal drug or alcohol, or using, possessing, or selling alcohol or illegal drugs during work hours or on UTMB property may be terminated. The use of alcoholic beverages is prohibited in and on UTMB facilities. However, the President may waive this prohibition with respect to any event sponsored by UTMB. Health and Safety Workplace Violence UTMB strives to assure that employees are provided a safe working environment. Violence in the workplace is not tolerated at UTMB. Employees who observe or experience any form of harassment or violence should report the incident immediately. Examples of behavior that may be considered workplace violence include but are not limited to: Physical interference with or restriction of an individual's movement; Physical fighting with anyone on UTMB property; and Making verbal or written threats against another employee. 9

10 Questions and Answers Let s hear from you! General HIPAA Awareness What is HIPAA? HIPAA, the Health Insurance Portability and Accountability Act of 1996, was passed to simplify claims processing and payment in the health care industry. Congress delegated to the Department of Health and Human Services (DHHS) the responsibility of establishing mandatory privacy and security standards to comply with the requirements of the federal law. In response, DHHS has issued federal regulations for: 1. simplifying of payment transactions, known as Electronic Data Interchange (EDI); 2. security; and 3. privacy. 10

11 HIPAA Background The HIPAA Privacy Regulations were written in response to patient concerns that their medical information was not being protected. The following factors led to the creation of HIPAA Privacy Regulations: The increased use of electronic information technology. Advances in genetic research and availability of individuals genetic information. Increased efforts to market health care products to consumers. Understanding PHI Regardless of where you work in healthcare, its important to understand what privacy and confidentiality mean when protecting patient information. Protected Health Information (PHI) is identifiable health information transmitted or maintained in any form or medium, including: verbal discussions; written communications; or electronic communications with or about patients. PHI is private and limited to those who need the information for treatment, payment, and healthcare operations (TPO). Only those people who are authorized to use and disclose PHI should have access to PHI. What Objectives Do the Privacy Regulations Accomplish? There are 5 basic objectives the Privacy Regulations try to accomplish. 1. They give patients more control over their health information. 2. They set boundaries on the use and disclosure of health records. 3. They establish appropriate safeguards that t all people who participate in or are associated with the provision of healthcare must achieve to protect the privacy of health information. 4. They hold violators accountable, with civil and criminal penalties that can be imposed if they violate patients privacy rights. 5. They strike a balance when public responsibility requires disclosure of some forms of data for example, to protect public health. 11

12 How Does HIPAA Achieve These Objectives? The HIPAA objectives are met through the new Privacy Regulations. The Privacy Regulations prohibit UTMB and its employees from using or disclosing an individual s PHI without an authorization from the individual, unless the use or disclosure of PHI is for Treatment, Payment, or Healthcare Operations (TPO), or in other specialized and limited situations. Additionally, UTMB must investigate violations, sanction wrongful conduct, and make process changes when required. Penalties for Failure to Comply UTMB Penalties for Violations In addition to HIPAA s civil and criminal penalties, violations of HIPAA may lead to UTMB disciplinary action including: verbal warnings written warnings suspension or termination Federal Penalties for Violations There are large civil and criminal penalties for failure to comply with HIPAA. These penalties apply to individual employees, as well as UTMB as an institution. Patient Rights Granted Under HIPAA HIPAA grants patients several unique and special rights regarding their medical records. Under HIPAA, patients have more control over their medical information. Below are seven basic rights entitled to patients under HIPAA. 1. Receive a Notice of Privacy Practices 2. Revoke an authorization for the use and disclosure of PHI 3. Restrict uses & disclosures of PHI 4. Access and receive a copy of their PHI 5. Request an amendment to their medical record 6. Receive an accounting of disclosures 7. File a Privacy Complaint 12

13 Storage of PHI Would it surprise you to learn that an average of 150 people have access to your medical records during the course of a typical hospitalization? (Predictive Systems, 2002) When you add poor storage procedures and uncontrolled access to that number, the realities of potential misuse becomes even more vivid. The buttons below give some examples of the kind of breaches that led to new Federal A Little regulations Rock, governing Arkansas the privacy physician of health information. and two former employees accessed In 2006, the CVS medical pharmacies records were of a found local television to be dumping anchor trash just A banker A Patient Info on because into Michigan-based open who also they dumpsters sat health on a were curious that county system about included health accidentally his medical pill board bottles gained posted history. with patient access the Each to patients medical the Internet employee names, records was addresses of and thousands suspended identified and/or personal of several patients terminated. physician people on They names. the with internet. cancer were As also a and called in their mortgages. criminally Inappropriate charged result, dumping and each CVS individual had to pay Inappropriate faces a maximum penalty of one year of PHI $2.25 in prison million and/or in penalties. a fine PHI of access up to $50,000. These examples of deliberate and accidental disclosures of information underscore the importance of establishing and maintaining effective processes for handling and storing patient information. Source: Pew Internet & American Life Project 2002 Departmental Responsibilities for Storing PHI PHI includes any paper or electronic file which contains personally identifiable patient contact information. One of the largest issues at UTMB is the amount of stored paper PHI we produce and maintain. The HIPAA team has initiated several security measures, working closely with department supervisors, to safeguard stored PHI in files, documents, letters, invoices, etc. Some of these measures include: Ensuring that the doors to medical record storage rooms are locked. Ensuring patient charts are kept face down. Adding physical security measures such as doors, locks, etc., to ensure PHI is safeguarded. Assisting departments in establishing procedures to control access to rooms or file cabinets where PHI is stored. Click on each icon below to view the ways you can ensure proper storage and the security of PHI in your possession. Outside of regular working hours, keep your desk and work area clean and be sure to keep any PHI locked in a filing cabinet, unless the immediate area can be secured from any unauthorized access. PHI stored medical equipment (e.g., EKG, Ultrasound,etc.) must be kept secure and disposed of correctly. If PHI is to be stored on a computer hard drive or PDA, it must be protected by either a password or encryption. If away from your computer, it must be password protected. If PHI is stored on diskettes, CD-ROM or other removable data storage media, it cannot be combined with other electronic information. Stored PHI must be stored separately from non-phi data. 13

14 Photos or Images of Patients or PHI According to UTMB IHOP Policy 9.3.2, Consent to Photograph, Video/Audio Record and/or Televise Patients the following guidelines must be followed: No pictures or images of patients may be taken at UTMB unless they comply with above IHOP Policy No uploading of patient images to the internet, social network sites, s or for personal use is allowed, even if patient identifiers have been removed. Images can only be taken for UTMB business operations that include treatment, payment, education, research or disclosures for media or advancement purposes. These require certain forms and permissions to be in place prior to taking the images. Photos or Images of Patients or PHI Examples of misuse that will lead to formal disciplinary action, which may include expulsion, are: A UTMB employee or student taking a photo of a patient and posting it on their Facebook page Using a cell phone to take a picture of a patient without the proper consent listed in IHOP Policy Forwarding a picture of a patient or PHI for personal use via cell phone, or internet Requirements for Printing & Copying PHI 1. Printers and copiers used for printing of PHI should be in secure, non-public locations. 2. If the equipment is in a public location, the information being printed or copied is required to be strictly monitored. 3. Printed versions of PHI must be promptly removed. 4. PHI printed to a shared printer must be promptly removed. Remember: PHI is very personal information and should be treated as such. 14

15 Disposal of Paper PHI All personnel must strictly observe the following standards relating to disposal of PHI. Paper or hardcopy PHI MUST NOT be discarded in the trash bins. Instead this information must be personally shredded or placed in a secured recycle bag. Printed material containing PHI shall be disposed of in a manner that ensures confidentiality. If paper records containing PHI are in your possession, it is your responsibility to make sure they are discarded properly. Fax Machines in Your Department Manage PHI received via fax as confidential. Fax machines used for patient care or patient related services shall not be located in areas accessible to the general public but rather must be in secure areas, and the department director or designee is responsible for limiting access to them. Each department is responsible for ensuring that incoming faxes are properly handled. Immediately remove the fax transmission from the fax machine and deliver it to the recipient. When sending PHI, use the new UTMB Fax Cover Sheet. Reporting Privacy Breaches If you witness activity that you believe is improper regarding patient privacy, you should report such activity to the UTMB Institutional Privacy Office. You may contact the Institutional Privacy Office by either calling the direct number or by anonymously reporting the activity through the Fraud/Abuse and Privacy Hotline. Institutional Privacy Office 301 University Boulevard Galveston, Texas Institutional Privacy Office (409) Fraud, Abuse & Privacy Hotline (800)

16 Questions Questions???? 16

Hello and welcome. I am here to discuss the Health

Hello and welcome. I am here to discuss the Health The University of Texas at Austin University Compliance Services Hello and welcome. I am here to discuss the Health Insurance Portability and Accountability Act (HIPAA) and the conforming Texas Law (Texas

More information

HIPAA and Privacy Policy Training

HIPAA and Privacy Policy Training HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training

More information

Fiscal Policies and Procedures Fraud, Waste & Abuse

Fiscal Policies and Procedures Fraud, Waste & Abuse DORCHESTER COUNTY, MARYLAND Fiscal Policies and Procedures Fraud, Waste & Abuse Adopted August 11, 2009 SECTION I - INTRODUCTION The County Council of Dorchester County, Maryland approved on August 11,

More information

Department of Health and Human Services Policy ADMN 004, Attachment A

Department of Health and Human Services Policy ADMN 004, Attachment A WASHINGTON COUNTY Department of Health and Human Services Policy ADMN 004, Attachment A HHS Confidentiality Agreement Including HIPAA (Health Information Portability and Accessibility Act of 1996) OREGON

More information

MOREHOUSE COLLEGE. Standards of Conduct Guide

MOREHOUSE COLLEGE. Standards of Conduct Guide MOREHOUSE COLLEGE Standards of Conduct Guide Purpose Compliance Risk Management Program 1. Ethical Standards TABLE OF CONTENTS 2. Contacts with the media, government and outside investigators 3. Records

More information

EADS-NA Code of Ethics

EADS-NA Code of Ethics Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and

More information

Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics

Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not

More information

HIPAA Compliance. 2013 Annual Mandatory Education

HIPAA Compliance. 2013 Annual Mandatory Education HIPAA Compliance 2013 Annual Mandatory Education What is HIPAA? Health Insurance Portability and Accountability Act Federal Law enacted in 1996 that mandates adoption of Privacy protections for health

More information

By the end of this course you will demonstrate:

By the end of this course you will demonstrate: 1 By the end of this course you will demonstrate: 1. that HIPAA privacy rules protect privacy and security of confidential information. 2. your responsibility for use and protection of protected health

More information

Health Insurance Portability and Accountability Act (HIPAA)

Health Insurance Portability and Accountability Act (HIPAA) Health Insurance Portability and Accountability Act (HIPAA) General Education Presented by: Bureau of Personnel Department of Health Department of Human Services Department of Social Services Bureau of

More information

HIPAA 101: Privacy and Security Basics

HIPAA 101: Privacy and Security Basics HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually

More information

Compliance Program and HIPAA Training For First Tier, Downstream and Related Entities

Compliance Program and HIPAA Training For First Tier, Downstream and Related Entities Compliance Program and HIPAA Training For First Tier, Downstream and Related Entities 09/2011 Training Goals In this training you will gain an understanding of: Our Compliance Program elements Pertinent

More information

HIPAA Education Level One For Volunteers & Observers

HIPAA Education Level One For Volunteers & Observers UK HealthCare HIPAA Education Page 1 September 1, 2009 HIPAA Education Level One For Volunteers & Observers ~ What does HIPAA stand for? H Health I Insurance P Portability A And Accountability A - Act

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts

More information

Administrative Policy and Procedure Manual. Code of Conduct Effective Date: 1/2005 Scope: Organizationwide Page 1 of 9

Administrative Policy and Procedure Manual. Code of Conduct Effective Date: 1/2005 Scope: Organizationwide Page 1 of 9 Scope: Organizationwide Page 1 of 9 I. Purpose The purpose of this policy is to provide direction to staff members to assist in carrying out daily activities within appropriate ethical and legal standards.

More information

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others

Pacific Medical Centers HIPAA Training for Residents, Fellows and Others Pacific Medical Centers HIPAA Training for Residents, Fellows and Others Summary of Critical Pacific Medical Centers (PMC) HIPAA Policies and Procedures For additional information or questions, please

More information

HIPAA Training for Hospice Staff and Volunteers

HIPAA Training for Hospice Staff and Volunteers HIPAA Training for Hospice Staff and Volunteers Hospice Education Network Objectives Explain the purpose of the HIPAA privacy and security regulations Name three patient privacy rights Discuss what you

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Standards of. Conduct. Important Phone Number for Reporting Violations

Standards of. Conduct. Important Phone Number for Reporting Violations Standards of Conduct It is the policy of Security Health Plan that all its business be conducted honestly, ethically, and with integrity. Security Health Plan s relationships with members, hospitals, clinics,

More information

Destiny Media Technology s Code of Conduct

Destiny Media Technology s Code of Conduct Destiny Media Technology s Code of Conduct INTRODUCTION Destiny Media Technology s ( Destiny ) reputation depends on the conduct of its employees, officers and directors who have an obligation to Destiny

More information

NRG ENERGY, INC. SUPPLIER CODE OF CONDUCT. Revision 1, Released June 10, 2014

NRG ENERGY, INC. SUPPLIER CODE OF CONDUCT. Revision 1, Released June 10, 2014 NRG ENERGY, INC. SUPPLIER CODE OF CONDUCT Revision 1, Released June 10, 2014 Ethics toll-free Helpline 888.263.0463-1 Table of Contents INTRODUCTION and MESSAGE FROM CEO 3 NRG STRIVE VALUES 4 ETHICS HELPLINE

More information

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information

ACRONYMS: HIPAA: Health Insurance Portability and Accountability Act PHI: Protected Health Information NAMI EASTSIDE - 13 POLICY: Privacy and Security of Protected Health Information (HIPAA Policies and Procedures) DATE APPROVED: Pending INTENT: (At present, none of the activities that NAMI Eastside provides

More information

HIPAA Privacy Overview

HIPAA Privacy Overview May 21, 2003 HIPAA Privacy Overview Presented to the California State University Agenda Introduction HIPAA privacy regulations HIPAA privacy impact on CSU Next steps/action items Mercer Human Resource

More information

Evergreen Solar, Inc. Code of Business Conduct and Ethics

Evergreen Solar, Inc. Code of Business Conduct and Ethics Evergreen Solar, Inc. Code of Business Conduct and Ethics A MESSAGE FROM THE BOARD At Evergreen Solar, Inc. (the Company or Evergreen Solar ), we believe that conducting business ethically is critical

More information

HIPAA Orientation. Health Insurance Portability and Accountability Act

HIPAA Orientation. Health Insurance Portability and Accountability Act HIPAA Orientation Health Insurance Portability and Accountability Act HIPAA Federal legislation enacted in 1996 to improve the efficiency and effectiveness of electronic information transfers used in the

More information

1. Compliance with Laws, Rules and Regulations

1. Compliance with Laws, Rules and Regulations CODE OF BUSINESS CONDUCT - EXAMPLE INTRODUCTION This Code of Business Conduct covers a wide range of business practices and procedures. It does not cover every issue that may arise, but it sets out basic

More information

BARRICK GOLD CORPORATION

BARRICK GOLD CORPORATION BARRICK GOLD CORPORATION Code of Business Conduct and Ethics Introduction Barrick s success is built on a foundation of personal and professional integrity and commitment to excellence. As a company and

More information

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY

PROTECTING PATIENT PRIVACY and INFORMATION SECURITY PROTECTING PATIENT PRIVACY and INFORMATION SECURITY 2 PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY PROTECTING PATIENT PRIVACY AND INFORMATION SECURITY 3 INTRODUCTION As an agency employee, student,

More information

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders HIPAA Developed by The University of Texas at Dallas Callier Center for Communication Disorders Purpose of this training Everyone with access to Protected Health Information (PHI) must comply with HIPAA

More information

Guadalupe Regional Medical Center

Guadalupe Regional Medical Center Guadalupe Regional Medical Center Health Insurance Portability & Accountability Act (HIPAA) By Debby Hernandez, Compliance/HIPAA Officer HIPAA Privacy & Security Training Module 1 This module will address

More information

Message from the Co-Chairmen and Chief Executive Officers

Message from the Co-Chairmen and Chief Executive Officers Message from the Co-Chairmen and Chief Executive Officers As each of us works to meet individual and Company-wide business goals here at Torchmark, we must all ensure that the work we perform and the business

More information

Privacy and Information Security Awareness Training. Health Insurance Portability & Accountability Act of 1996 -- HIPAA

Privacy and Information Security Awareness Training. Health Insurance Portability & Accountability Act of 1996 -- HIPAA Privacy and Information Security Awareness Training Health Insurance Portability & Accountability Act of 1996 -- HIPAA Objectives Understand basic HIPAA requirements Understand how the MCG Health System

More information

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3 INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.

More information

CODE OF ETHICS AND BUSINESS CONDUCT

CODE OF ETHICS AND BUSINESS CONDUCT CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business

More information

Patient Privacy and HIPAA/HITECH

Patient Privacy and HIPAA/HITECH Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,

More information

What is a Compliance Program?

What is a Compliance Program? Course Objectives Learn about the most important elements of the compliance program; Increase awareness and effectiveness of our compliance program; Learn about the important laws and what the government

More information

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user

More information

Sanchez Energy Corporation. Code of Business Conduct and Ethics

Sanchez Energy Corporation. Code of Business Conduct and Ethics Sanchez Energy Corporation Code of Business Conduct and Ethics Introduction The Board of Directors (the Board ) of Sanchez Energy Corporation (the Company ) has adopted this Code of Business Conduct and

More information

Clinical Solutions. 2 Hour CEU

Clinical Solutions. 2 Hour CEU 1 2 Hour CEU 2 Course Objectives The purpose of this program is to provide nurses with information about the Health Insurance Portability and Accountability Act (HIPAA), especially as it relates to protected

More information

The University of Toledo. Corporate Compliance and HIPAA Training

The University of Toledo. Corporate Compliance and HIPAA Training Disclaimer This document is not intended to be copied, reproduced, altered, or disseminated for training purposes on the departmental level. It is only intended to be used as a resource. ALL HIPAA training

More information

2012-2013 MEDICARE COMPLIANCE TRAINING EMPLOYEES & FDR S. 2012 Revised

2012-2013 MEDICARE COMPLIANCE TRAINING EMPLOYEES & FDR S. 2012 Revised 2012-2013 MEDICARE COMPLIANCE TRAINING EMPLOYEES & FDR S 2012 Revised 1 Introduction CMS Requirements As of January 1, 2011, Federal Regulations require that Medicare Advantage Organizations (MAOs) and

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

CODE OF CONDUCT. Our commitment to ethical conduct and compliance depends on all UHS personnel.

CODE OF CONDUCT. Our commitment to ethical conduct and compliance depends on all UHS personnel. CODE OF CONDUCT Our commitment to ethical conduct and compliance depends on all UHS personnel. If you find yourself in an ethical dilemma or suspect inappropriate or illegal conduct, discuss it with your

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

Our vision. A company where the best people want to work.

Our vision. A company where the best people want to work. Code of Conduct Our vision A company where the best people want to work. The world leader in chemical distribution, providing unparalleled connectivity between customers and suppliers. 2 Univar s guiding

More information

Revised 05/22/14 P a g e 1

Revised 05/22/14 P a g e 1 Corporate Office 107 W. Franklin Street P.O. Box 638 Elkhart, IN 46515-0638 Phone (574) 294-7511 Fax (574) 522-5213 INTRODUCTION PATRICK INDUSTRIES, INC. CODE OF ETHICS AND BUSINESS CONDUCT As a leader

More information

MCCP Online Orientation

MCCP Online Orientation Objectives At the conclusion of this presentation, students will be able to: Describe the federal requirements of the HIPAA/HITECH regulations that protect the privacy and security of confidential data.

More information

HIPAA Awareness Training

HIPAA Awareness Training New York State Office of Mental Health Bureau of Education and Workforce Development HIPAA Awareness Training This training material was prepared for internal use by the New York State Office of Mental

More information

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors

More information

HIPAA Training for Staff and Volunteers

HIPAA Training for Staff and Volunteers HIPAA Training for Staff and Volunteers Objectives Explain the purpose of the HIPAA privacy, security and breach notification regulations Name three patient privacy rights Discuss what you can do to help

More information

HTIC provides specialized equipment when needed. This equipment should only be used for the purpose designed.

HTIC provides specialized equipment when needed. This equipment should only be used for the purpose designed. Board Policies Section: VII.D. Title: Employee Policy Handbook (Staff) Company Policies COMPANY EQUIPMENT HTIC provides specialized equipment when needed. This equipment should only be used for the purpose

More information

Fraud Waste and Abuse Training First Tier, Downstream and Related Entities. ONECare by Care1st Health Plan Arizona, Inc. (HMO) Revised: 10/2009

Fraud Waste and Abuse Training First Tier, Downstream and Related Entities. ONECare by Care1st Health Plan Arizona, Inc. (HMO) Revised: 10/2009 Fraud Waste and Abuse Training First Tier, Downstream and Related Entities ONECare by Care1st Health Plan Arizona, Inc. (HMO) Revised: 10/2009 Overview Purpose Care1st/ ONECare Compliance Program Definitions

More information

CODE OF BUSINESS CONDUCT AND ETHICS

CODE OF BUSINESS CONDUCT AND ETHICS Effective: 1 st April 2015 Table of Contents 1. PURPOSE... 3 2. SCOPE... 3 3. OWNERSHIP... 3 4. DEFINITIONS... 3 5. CONFLICTS OF INTEREST... 3 6. CORPORATE OPPORTUNITIES... 4 7. CONFIDENTIALITY AND PRIVACY...

More information

BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS

BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS A. Scope. This Code of Business Conduct and Ethics applies to all Berkshire Hathaway directors, officers and employees, as well as to directors,

More information

Code of Conduct. 3. SCOPE: All PHI Air Medical Personnel

Code of Conduct. 3. SCOPE: All PHI Air Medical Personnel Page No. 1 of 8 1. POLICY: This policy defines the commitment that PHI Air Medical, L.L.C (PHI Air Medical) has to conducting our activities in full compliance with all federal, state and local laws. Our

More information

DEPARTMENTAL POLICY. Northwestern Memorial Hospital

DEPARTMENTAL POLICY. Northwestern Memorial Hospital Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines

More information

2014 Core Training 1

2014 Core Training 1 2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System

More information

Fraud Waste and Abuse Training First Tier, Downstream and Related Entities

Fraud Waste and Abuse Training First Tier, Downstream and Related Entities Fraud Waste and Abuse Training First Tier, Downstream and Related Entities Revised: 04/2010 OVERVIEW Centene Corporation Purpose Bridgeway Compliance Program Definitions of Fraud Waste & Abuse Laws and

More information

13.4 PHI Air Medical Code of Conduct

13.4 PHI Air Medical Code of Conduct I. PURPOSE PHI Air Medical continually strives to provide high quality emergency care and medical transportation services to our patients, and to maintain high standards of integrity in our dealings with

More information

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE

More information

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING

HIPAA PRIVACY POLICIES & PROCEDURES. Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING HIPAA PRIVACY POLICIES & PROCEDURES Department of Behavioral Health and Developmental Services DBHHDS GENERAL AWARENESS TRAINING March 2012 HIPAA Humor (North Dakota Dept of Health) 2 HIPAA-Ectomy - the

More information

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule

Reporting of HIPAA Privacy/Security Breaches. The Breach Notification Rule Reporting of HIPAA Privacy/Security Breaches The Breach Notification Rule Objectives What is the HITECH Act? An overview-what is Protected Health Information (PHI) and can I protect patient s PHI? What

More information

HIPAA (Health Insurance Portability and Accountability Act) Awareness Training for Volunteers and Interns

HIPAA (Health Insurance Portability and Accountability Act) Awareness Training for Volunteers and Interns HIPAA (Health Insurance Portability and Accountability Act) Awareness Training for Volunteers and Interns Boulder County Public Health Volunteer/Intern Services 3450 Broadway Boulder, CO 80304 1 Boulder

More information

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually

More information

8.03 Health Insurance Portability and Accountability Act (HIPAA)

8.03 Health Insurance Portability and Accountability Act (HIPAA) Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of

More information

MOTORCAR PARTS OF AMERICA, INC. CODE OF BUSINESS CONDUCT AND ETHICS ADOPTED EFFECTIVE JANUARY 15, 2015

MOTORCAR PARTS OF AMERICA, INC. CODE OF BUSINESS CONDUCT AND ETHICS ADOPTED EFFECTIVE JANUARY 15, 2015 MOTORCAR PARTS OF AMERICA, INC. CODE OF BUSINESS CONDUCT AND ETHICS ADOPTED EFFECTIVE JANUARY 15, 2015 The Board of Directors of Motorcar Parts of America, Inc. ( MPA ) has adopted the following Code of

More information

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared; Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014

More information

Annual Compliance Training. HITECH/HIPAA Refresher

Annual Compliance Training. HITECH/HIPAA Refresher Annual Compliance Training HITECH/HIPAA Refresher January 2015 Sisters of Charity of Leavenworth Health System, Inc. All rights reserved. 1 Annual Refresher Training Welcome to the SCL Health System Compliance

More information

HIPAA/ HITECH HEALTH INSURANCE PORTABILITY ACCOUNTABILITY ACT. and. Health Information Technology for Economic and Clinical Health Act.

HIPAA/ HITECH HEALTH INSURANCE PORTABILITY ACCOUNTABILITY ACT. and. Health Information Technology for Economic and Clinical Health Act. HIPAA/ HITECH HEALTH INSURANCE PORTABILITY and ACCOUNTABILITY ACT Health Information Technology for Economic and Clinical Health Act Revised 4/4/14 1 Your Accountability Quality Care Compliance Reputation

More information

HIPAA Privacy. September 21, 2013

HIPAA Privacy. September 21, 2013 HIPAA Privacy September 21, 2013 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA) requires that the University train all workforce members (faculty, staff,

More information

Catholic Health HIPAA/ HITECH

Catholic Health HIPAA/ HITECH Catholic Health HIPAA/ HITECH HEALTH INSURANCE PORTABILITY ACCOUNTABILITY ACT and HITECH Health Information Technology for Economic and Clinical Health Act 1 Objectives of HIPAA & HITECH Training Understand

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

HIPAA Privacy & Security Training for Clinicians

HIPAA Privacy & Security Training for Clinicians HIPAA Privacy & Security Training for Clinicians Agenda This training will cover the following information: Overview of Privacy Rule and Security Rules Using and disclosing Protected Health Information

More information

Hope In-Home Care CODE OF CONDUCT AND ETHICS

Hope In-Home Care CODE OF CONDUCT AND ETHICS Hope In-Home Care CODE OF CONDUCT AND ETHICS September 2014 Table of Contents A MESSAGE FROM OUR DIRECTOR... 3 INTRODUCTION TO THE CODE OF CONDUCT AND ETHICS... 4 ELEMENT 1: QUALITY OF CARE... 5 ELEMENT

More information

SAMPLE BUSINESS ASSOCIATE AGREEMENT

SAMPLE BUSINESS ASSOCIATE AGREEMENT SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT

More information

HIPAA Privacy Keys to Success Updated January 2010

HIPAA Privacy Keys to Success Updated January 2010 HIPAA Privacy Keys to Success Updated January 2010 HIPAA Job Specific Education 1 HIPAA and Its Purpose What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Title II Administrative

More information

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health

More information

POLICY AND PROCEDURES MANUAL FRAUD, WASTE, AND ABUSE

POLICY AND PROCEDURES MANUAL FRAUD, WASTE, AND ABUSE Page Number: 1 of 7 TITLE: PURPOSE: FRAUD, WASTE, AND ABUSE The Harris County Hospital District implemented a Corporate Compliance Program in an effort to establish effective internal controls that promote

More information

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N

HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N HIPAA PRIVACY AND SECURITY TRAINING P I E D M O N T COMMUNITY H EA LT H P L A N 1 COURSE OVERVIEW This course is broken down into 4 modules: Module 1: HIPAA Omnibus Rule - What you need to know to remain

More information

Health Insurance Portability and Accountability Act (HIPAA) Overview

Health Insurance Portability and Accountability Act (HIPAA) Overview Health Insurance Portability and Accountability Act (HIPAA) Overview Agency, Contract and Temporary Staff Orientation Initiated: 5/04, Reviewed: 7/10, Revised: 10/10 Prepared by SHS Administration & Samaritan

More information

CODE OF BUSINESS CONDUCT

CODE OF BUSINESS CONDUCT CODE OF BUSINESS CONDUCT POLICY OBJECTIVES 1. This policy constitutes the Code of Business Conduct of companies of the Volga Gas Group (hereinafter called Group companies ). The Code applies to all employees

More information

CODE OF CONDUCT. Providers, Suppliers and Contractors

CODE OF CONDUCT. Providers, Suppliers and Contractors CODE OF CONDUCT Providers, Suppliers and Contractors Table of Contents Code of Conduct... Honesty and integrity... Quality and Service... Responsibilities of Providers, Suppliers and Contractors... Compliance

More information

CORPORATE GOVERNANCE

CORPORATE GOVERNANCE CORPORATE GOVERNANCE Ethics are vital to Brown Strauss, Inc. (Brown Strauss) and each of its and employees. Brown Strauss is committed to the highest ethical standards and to conducting its business with

More information

WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT

WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT I. Introduction This Code of Conduct (the "Code") sets out basic principles to guide the day-today business activities of directors, officers

More information

THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) EMPLOYEE TRAINING MANUAL

THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) EMPLOYEE TRAINING MANUAL THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) EMPLOYEE TRAINING MANUAL What is HIPAA? Comprehensive federal legislation regarding health insurance which is comprised of four key areas:

More information

Prepared by: The Office of Corporate Compliance & HIPAA Administration

Prepared by: The Office of Corporate Compliance & HIPAA Administration Gwinnett Health System s Annual Education 2014 Corporate Compliance: Our Commitment to Excellence Prepared by: The Office of Corporate Compliance & HIPAA Administration Objectives After completing this

More information

CIVEO CORPORATION CORPORATE CODE OF BUSINESS CONDUCT AND ETHICS. Effective as of May 5, 2014

CIVEO CORPORATION CORPORATE CODE OF BUSINESS CONDUCT AND ETHICS. Effective as of May 5, 2014 CIVEO CORPORATION CORPORATE CODE OF BUSINESS CONDUCT AND ETHICS Effective as of May 5, 2014 Purpose This Corporate Code of Business Conduct and Ethics (this Code ) contains the policies that relate to

More information

CODE OF CONDUCT I. POLICY

CODE OF CONDUCT I. POLICY CODE OF CONDUCT American Ambulance continually strives to provide high quality emergency care and medical transportation services to our patients, and to maintain high standards of integrity in our dealings

More information

Compliance Training for Medicare Programs Version 1.0 2/22/2013

Compliance Training for Medicare Programs Version 1.0 2/22/2013 Compliance Training for Medicare Programs Version 1.0 2/22/2013 Independence Blue Cross is an independent licensee of the Blue Cross and Blue Shield Association. 1 The Compliance Program Setting standards

More information

Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015

Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Category Human Resources Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Related Documents Name Support

More information

Business Conduct, Compliance and Ethics Program. important

Business Conduct, Compliance and Ethics Program. important Business Conduct, Compliance and Ethics Program important Table of Contents Letter from Troy Kirchenbauer As healthcare s first online direct contracting market, aptitude is committed to upholding the

More information

HIPAA and Health Information Privacy and Security

HIPAA and Health Information Privacy and Security HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient

More information

About this Tool Information Security for Residents...

About this Tool Information Security for Residents... About this Tool Information Security for Residents... Purpose: Provide materials to inform and educate Residents in order to reach compliance regarding information security. Audience: New Residents Information

More information

Johnson Electric Group Code of Ethics and Business Conduct

Johnson Electric Group Code of Ethics and Business Conduct Johnson Electric Group Code of Ethics and Business Conduct Chairman s Message Johnson Electric strives to conduct its business with honesty and integrity, both within the Group and in dealing with business

More information

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014

UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014 I. Statement of Policy UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Revised as of March 3, 2014 Universal Insurance Holdings, Inc. ( UIH ) and its subsidiaries (collectively,

More information

Ur-Energy Inc. Code of Business Conduct and Ethics

Ur-Energy Inc. Code of Business Conduct and Ethics Ur-Energy Inc. Code of Business Conduct and Ethics As Amended Effective February 5, 2014 2957409.2 TABLE OF CONTENTS INTRODUCTION... 3 CONFLICTS OF INTEREST... 3 GIFTS, INVITATIONS AND ENTERTAINMENT GUIDELINES...

More information

PRIVACY AND SECURITY SURVIVAL TRAINING

PRIVACY AND SECURITY SURVIVAL TRAINING PRIVACY AND SECURITY SURVIVAL TRAINING 1.Typeorcutandpastethislinkintothe addressbar: http://hrwebdev.dhs.lacounty.gov/attestation/ 2.Clickthe downarrow 3.Select 2013Privacyand SecuritySurvivalHandbook

More information

Protecting Patient Privacy It s Everyone s Responsibility

Protecting Patient Privacy It s Everyone s Responsibility Protecting Patient Privacy It s Everyone s Responsibility Observation & Student Learning Packet 1. Read packet Instructions for Self-Study Module 2. Complete post-test. A score of 80% must be achieved.

More information