Electronic Health Information Exchange. Volume 3: Business Rules General All Points of Service

Size: px
Start display at page:

Download "Electronic Health Information Exchange. Volume 3: Business Rules General All Points of Service"

Transcription

1 British Clumbia Prfessinal and Sftware Cnfrmance Standards Electrnic Health Infrmatin Exchange Vlume 3: Business Rules General All Pints f Service Versin Security Classificatin: Lw Sensitivity

2 Cpyright Ntice Cpyright 2014 Prvince f British Clumbia All rights reserved. This material is wned by the Gvernment f British Clumbia and prtected by cpyright law. It may nt be reprduced r redistributed withut the prir written permissin f the Prvince f British Clumbia. Disclaimer and Limitatin f Liabilities This dcument and all f the infrmatin it cntains is prvided "as is" withut warranty f any kind, whether express r implied. All implied warranties, including, withut limitatin, implied warranties f merchantability, fitness fr a particular purpse, and nn-infringement, are hereby expressly disclaimed. Under n circumstances will the Gvernment f British Clumbia be liable t any persn r business entity fr any direct, indirect, special, incidental, cnsequential, r ther damages based n any use f this dcument, including, withut limitatin, any lst prfits, business interruptin, r lss f prgrams r infrmatin, even if the Gvernment f British Clumbia has been specifically advised f the pssibility f such damages. Authr: Ministry f Health Cnfrmance and Integratin Services Date Created: Last Updated: Versin: 0.2

3 Table f Cntents 1.0 Intrductin Cnfrmance Standards Vlume Set Key t Dcument Terminlgy Purpse f Dcument Intended Audience Ministry f Health Cnfrmance Standards Cntact General Rules Access Rules General Access Rules HIAL Users Clinical Data and Educatin Privacy and Security Accunt Management Hardware and Peripherals Netwrk Lcal...17 Tables Table 1 General Business Rules... 6 Table 2 Access Rules - General... 7 Table 3 Access Rules HIAL users... 8 Table 4 Clinical Data Business Rules... 9 Table 5 and Educatin Rules... 9 Table 6 Privacy and Security - Patient Recrds...12 Table 7 Privacy and Security - Accunt Management...14 Table 8 Privacy and Security - Hardware and Peripherals...14 Table 9 Privacy and Security - Netwrk...15 Table 10 Privacy and Security - Lcal...17

4 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin Intrductin Organizatins develping interfaces t health infrmatin exchange (HIE) systems ffered by the Ministry f Health (the Ministry ) must meet the British Clumbia Prfessinal and Sftware Cnfrmance Standards (the Cnfrmance Standards ) which the ministry publishes. The Ministry s Cnfrmance and Integratin Services team will facilitate the registratin, cnnectin, cnfrmance testing and certificatin prcesses required fr applicatins t cnnect t the Ministry HIE systems. 1.1 Cnfrmance Standards Vlume Set The Cnfrmance Standards are the central reference fr rganizatins wanting t integrate their Pints f Service (POS) applicatins with Ministry HIE systems. This integratin will allw their users t exchange imprtant demgraphic and clinical infrmatin with ther health care prfessinals in supprt f efficient and safe patient care. The Cnfrmance Standards cntain multiple vlumes and must be reviewed as a cmplete set. The vlumes in the Cnfrmance Standards are divided int tpics such as: business rules, applicatin-enfrced rules, change management rules, privacy and security rules, and technial message and transprt specificatins. The Cnfrmance Standards are available n the Cnfrmance and Integratin Services website: Key t Dcument Terminlgy The Cnfrmance Standards in this vlume use a cnsistent language cnventin: The wrd shuld is used t indicate a recmmended requirement meaning that the standard is ptinal (i.e., nt cmpulsry yet encuraged). Cnfrmance testing, service n-barding activities and/ r applicatin testing will cnfirm that this standard is crrectly implemented where apprpriate. All ther standards r rules as stated are a cmpulsry functin r requirement. The wrds must will, minimum, r mandatry are used t indicate this. Cnfrmance testing, service n-barding activities and/ r applicatin testing will cnfirm that this standard is crrectly implemented. Acrnyms and abbreviatins are used fr repetitins f sme system and rganizatin names. The first time an acrnym r abbreviatin appears in the dcument it is accmpanied by the full name. A Glssary f Terms is prvided in a separate vlume f the Cnfrmance Standards. Each defined term, acrnym and abbreviatin that is included in the glssary is italicized in the Cnfrmance Standards the first time it appears in the vlume. Security Classificatin: Lw Sensitivity Page 4 f 18

5 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin Purpse f Dcument This dcument describes the business rules fr the users at a pint f service (POS) wh are access/exchange ministry electrnic health infrmatin with Ministry infrmatin exchange systems. 1.4 Intended Audience The intended audience fr this dcument is: Infrmatin Cnsumers wh access electrnic health infrmatin frm a Ministry r prvincial data repsitry (e.g., end users); Infrmatin Custdians wh maintain r administer electrnic health infrmatin (EHI) resurces n behalf f the Infrmatin Authrity; Infrmatin Authrity wh have the respnsibility and decisin making authrity fr EHI thrughut its lifecycle, including creating, classifying, restricting, regulating, and administering its use r disclsure; Data Prviders wh prvide data t, r exchange data with a Ministry data repsitry (e.g., system t system uplad); Sftware Organizatins rganizatins (including in-huse system develpment teams) wh develp interfaces t health infrmatin exchange systems and/r supprt thse interfaces; Cnfrmance Team(s) wh are respnsible fr evaluating and testing cnfrmance, including rganizatinal security practices and business prcesses; and Audit Team(s) wh are respnsible fr independent examinatin and evaluatin f cmpliance including rganizatinal security practices and business prcesses. 1.5 Ministry f Health Cnfrmance Standards Cntact Fr mr infrmatin r questins regarding the Cnfrmance Standards shuld be directed t Cnfrmance and Integratin Services at: HLTH.CISSupprt@gv.bc.ca Security Classificatin: Lw Sensitivity Page 5 f 18

6 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin General Rules The fllwing general business rules apply t all pints f service where infrmatin is accessed and exchanged with Ministry health infrmatin exchange systems. Table 1 General Business Rules # Rule Educatin and Bus1.0 Bus1.1 Bus1.2 Bus1.3 Review f Trusted Identity Dcumentatin Trusted identity dcumentatin must be reviewed t ensure names, birth dates, and gender are crrectly entered. Trusted identity dcumentatin includes: BC Services Card Birth Certificate Canadian Citizenship ID Card Canadian Frces ID Card Canadian Recrd f Landing r Cnfirmatin f Permanent Residence r Permanent Resident Card Change f Name Dcument Driver's License Marriage Certificate Certificate f Indian Status Card (Abriginal Affairs and Nrthern Develpment Canada AANDC) Passprt Other Prvincial Health Insurance Cards (i.e. nt BC) Alignment with EHR Standards Users shuld wrk with their vendrs t identify where their lcal data may nt align with data in a ministry system ( e.g., address frmat, preferred name strage, phne number frmat) and remedy the discrepancies. Ntes: 1. If this is nt dne prir t using the ministry systems, the Pint f Service may experience a difficult transitin. Envirnments Acceptable Use The terms specified in the Acceptable Use Plicy fr Nnprductin Envirnments must be read and abided by. Cnfirm Patient Identity Befre prviding treatment the client s identity must be cnfirmed using prper dcumentatin. BC health card with pht If the client has a BC health card with a pht it must be used t cnfirm their identity and the PHN used t find the client in the PharmaNet. ECR.02 Cnfirm Client Identity TCR.02 Cnfirm Client Identity TGEN.02 Alignment with EHR Standards EGEN.01 EHR User Access EGEN.01 EHR User Access ECR.02 Cnfirm a Patient s Identity TCR.02 Cnfirm Client Identity TCR.03 Cnfirm a Security Classificatin: Lw Sensitivity Page 6 f 18

7 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin # Rule Educatin and BC health card n pht If the client presents a nn-pht BC health card their identity must be cnfirmed by viewing a trusted identity dcument (e.g., a Drivers Licence) - refer t the Review f Trusted Identity Dcuments rule abve. N health card, n PHN If the patient des nt have their BC health card, r claims that they d nt have a PHN, use the demgraphic infrmatin they prvide and verify their identify using a trusted identity dcument t lcate them in PharmaNet. Patient s Identity: BC Health Card with Pht Presented (Match) TCR.04 Cnfirm a Patient s Identity: BC Health Card with Pht Presented (Mismatch) TCR.05 Cnfirm a Patient s Identity: BC Health Card withut Pht Presented (Match) TCR.06 Cnfirm a Patient s Identity: N BC Health Card r PHN Presented (Match Bus1.4 User Supprt Users must cntact their vendr as primary supprt t assist with any cncern related t using their applicatin, prvincial netwrk and ministry systems. Ntes: 1. There are a few situatins where an EHR Helpdesk shuld be cntacted directly. When this is dne, the vendr will nt be included in any cmmunicatin regarding that incident. These situatins are described in the educatin materials. EGEN.02 User Supprt TGEN.03 User Supprt 2.1 Access Rules General Table 2 Access Rules - General # Rule Educatin and Bus2.1 Bus2.2 Cnfrmant Sftware The Pint f Service must use cnfrmant sftware t access ministry systems. Ntes: 1. A list f cnfrmant sftware is available frm the ministry s Cnfrmance and Integratin Services. Legal Agreement Every user wh accesses a ministry system must first sign a legal agreement acknwledging their bligatins. NA Nt yet written Security Classificatin: Lw Sensitivity Page 7 f 18

8 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin # Rule Educatin and Bus2.2 Key Administrative rles Resurces cnducting key POS administrative rles must be identified and apprpriate training directed t each as part f the readiness assessment prcess. These rles must be defined fr each POS, regardless f size. Nt yet written Ntes: 1. An emplyee may be dedicated t a single rle r fulfill the functins f mre than ne rle. 2. The pint f service, regardless f its size, must have ne r mre emplyees specifically assigned t the fllwing activities: implementing and perating apprpriate privacy and security standards fr the POS, including, but nt limited t: training staff n privacy and security requirements, reviewing business prcesses fr cmpliance with rules as specified by the Ministry, receiving and respnding t privacy and security related ntificatins. establishing and redesigning business prcesses as required upn the intrductin f new functinality fr the Ministry interface. managing staff accunt access. ensuring that all staff receive required training. technically supprting the POS applicatin: receiving and reviewing release ntes frm the sftware prvider, and receiving and cmmunicating system messages frm the sftware prvider (e.g., utages). wrking with the sftware prvider t ensure that the Business Cntinuity Plan is in place fr the POS. An emplyee may be dedicated t a single activity r fulfill the functins f mre than ne activity. 2.2 Access Rules HIAL Users Table 3 Access Rules HIAL users # Rule Educatin and Bus3.1 Authrized Access All users (bth health prfessinals and supprt staff) requiring EGEN.01 EHR User Access Security Classificatin: Lw Sensitivity Page 8 f 18

9 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin # Rule Educatin and Bus3.3 access t ministry systems must be authrized. Ntes: 1. A frmal applicatin prcess must be initiated several days befre the user requires access t allw technical cnfiguratin changes implemented by the POS sftware prvider and the ministry. Requesting Access be Remved When a user n lnger requires access t ministry systems (e.g., change in jb functin, jb terminatin, end f lcum, extended leave) the rganizatin must submit a request t the Ministry t have the access deactiviated. Ntes: 1. This functin must be assigned t an individual at the POS. See Key Administrative Activities rule. Nt yet written 2.3 Clinical Data Table 4 Clinical Data Business Rules # Rule Educatin and Bus4.1 Bus4.2 N General Brwsing There must be a business r clinical prerequisite t search fr clients and client data. General brwsing is nt permitted and may be harshly penalized. Anntatins 1. EHI data cannt be mdified but may be anntated when stred in the POS applicatin. EGEN.01 EHR User Access ECR.03 Find Patient EGEN.03 EHR Data TGEN.06 Anntatins 2.4 and Educatin Table 5 and Educatin Rules # Rule Educatin and Bus5.1 User All users must receive training prir t accessing ministry systems. must cver sftware functin and features, and related plicy, prcedures and business rules as indicated in the applicable Change Management and vlumes. Ntes: EGEN.02 User Supprt EBus.02 TBUS1.02 Security Classificatin: Lw Sensitivity Page 9 f 18

10 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin # Rule Educatin and Bus5.2 Bus5.3 Bus All sftware prviders are required t prvide training t their users. Subsequent training may be prvided by smene at the POS trained fr this purpse (e.g., a superuser). 2. The training requirements are prvided in the Cnfrmance Standards, Vlume 6 Change Management and. User Educatin Materials Users must read the educatin materials applicable t their jb functins prir t accessing ministry systems. Educatin materials must nt be duplicated withut permissin frm the Ministry f Health. Ntes: 1. All educatin materials will be referenced in user training materials. 2. All educatin materials will be available cntinuusly n the ministry web site. Ntificatin f Updates t User Educatin Materials T be ntified when there are changes t ministry-prvided educatin materials, the POS must subscribe t updates n the Cnfrmance and Integratin Services website. Key Administrative Activities The POS, regardless f its size, must have ne r mre emplyees specifically assigned t the fllwing activities: a) Implementing and perating apprpriate privacy and security standards fr the POS, including, but nt limited t: training staff n privacy and security requirements; reviewing business prcesses fr cmpliance with rules as specified by the ministry; receiving and respnding t privacy- and securityrelated ntificatins; answering privacy and security questins (e.g., frm patients); respnding t cmplaints, incidents, breaches, audits; and updating plicies/prcedures. b) Establishing and redesigning business prcesses as required upn the intrductin f new functinality fr the ministry interface; c) Managing staff accunt access, including: user enrlment and access management (e.g., new user set up); changes t user privileges; and deactivatin f ld user accunts. d) Ensuring that all POS staff receive required training; and EBus.03 Educatin TBUS1.03 Educatin EBus.03 Educatin TBUS1.03 Educatin EBus.01 Key Admin Activities TBUS1.01 Key Admin Activities Security Classificatin: Lw Sensitivity Page 10 f 18

11 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin # Rule Educatin and Bus5.5 Bus5.6 e) Technically supprting the POS applicatin: Ntes: receiving and reviewing release ntes frm their sftware prvider; receiving and cmmunicating system messages frm the sftware prvider (e.g., utages); and wrking with the sftware prvider t ensure that the Business Cntinuity Plan is in place fr the POS. 1. An emplyee may be dedicated t a single activity r fulfill the functins f mre than ne activity. Trainer Replacement If the POS relies n trainers internal t their rganizatin (e.g., super users trained by the sftware prvider), such trainers must be fully trained in the sftware s functin and features, and related plicy, prcedures and business rules. Ntes: 1. Users may request vendr-prvided training fr all POS trainers (e.g., super users) and their replacements. Evaluatin All users wh receive training, including thse trained by a POS trainer (super user), will receive a training evaluatin feedback frm frm their sftware prvider. Ebus.02 TBUS1.02 Ebus.02 TBUS1.02 Security Classificatin: Lw Sensitivity Page 11 f 18

12 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin Privacy and Security This sectin defines the cmmn business-related infrmatin privacy and security rules that must be implemented fr accessing the ministry s Health Infrmatin Exchange (HIE) Services. Table 6 Privacy and Security - Patient Recrds # Rule Bus6.1 Bus6.2 Bus6.3 Bus6.4 Establish Plicies and Prcedures Privacy and security plicies and prcedures must be established and include the fllwing: a) Cnfidentiality f persnal health infrmatin; b) Maintaining patient recrds: Printing, secure strage, retentin, transprt, and dispsal. c) Faxing dcuments cntaining persnal infrmatin; d) Using curiers t send dcuments cntaining persnal infrmatin; e) Reviewing audit lgs at scheduled intervals; and f) Maintaining user accunts, including deactivating thse n lnger required. Plicies and Prcedures Maintenance The plicies and prcedures must be regularly reviewed and updated as required, either at planned intervals and/r when significant changes ccur. User Access Audit A schedule and prcedures must be in place fr a designated individual t rutinely and peridically (i.e., spt audit) mnitr user access audit trails fr unusual patterns r anmalies. Any ptential security weaknesses r breaches must be reprted t the POS management. Restricted Audit Lg Access Access t the audit lgs and audit tls must be restricted t authrized persnnel t prevent misuse r cmprmise. Educatin & Recrds Patient Recrds Recrds Patient Recrds Recrds Patient Recrds Recrds Patient Recrds Security Classificatin: Lw Sensitivity Page 12 f 18

13 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin # Rule Bus6.5 Privacy and Security Incidents r Breach Prcedures that meet, at a minimum, requirements recmmended by the Office f Infrmatin Privacy Cmmissiner fr British Clumbia must be established fr managing suspected and actual privacy and security incidents and breaches. Educatin & Recrds Patient Recrds When a privacy r security incident invlves access t r data received frm ministry systems, yu must prmptly ntify the prvince accrding t yur systems access agreement. Bus6.6 Bus6.7 Bus6.8 Bus6.9 Bus6.10 Bus6.11 Nte: 1. Privacy Breaches: Tls and Resurces by the Office f the Infrmatin Prevacy Cmmissiner fr British Clumbia - Patient Privacy Ntificatin A patient privacy ntice r ther cmmunicatin materials that infrm patients abut infrmatin privacy practices must be made readily available. Patient Privacy Requests Prcedures fr dealing with patient requests fr infrmatin, crrectins, and cmplaints must be established and penly cmmunicated (e.g., via pster r pamphlet). Dispsal f Cmputer Equipment Befre dispsing f cmputer equipment, all persnal health infrmatin must be permanently remved frm the equipment in a manner that ensures the infrmatin cannt be recnstructed. Cntract Privacy Prtectin Clause Cntracts with third parties that invlve persnal infrmatin (e.g., technlgy supprt service) must cntain privacy prtectin bligatins. Cnfidentiality Agreement Anyne wh may be privy t cnfidential clinical r patient infrmatin (e.g., emplyees, cntractrs and third parties) must sign a cnfidentiality agreement that: a) specifies bligatins and expectatins including repercussins fr inapprpriately cllecting, using, r disclsing persnal infrmatin; and b) are reviewed/renewed annually with the rganizatin. Annual Privacy and Security All persnnel (emplyees and cntractrs) must receive annual privacy and security training. The training must include: a) Hw t maintain privacy and cnfidentially f persnal health infrmatin; and b) Hw users safeguard their user IDs and passwrds, keys, tkens and ther access credentials. Recrds Patient Recrds Recrds Patient Recrds Recrds Patient Recrds Recrds Patient Recrds Recrds Patient Recrds Recrds Patient Recrds Security Classificatin: Lw Sensitivity Page 13 f 18

14 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin # Rule Bus6.12 Electrnic Health Infrmatin Cnfidentiality All persnnel (emplyees and cntractrs) must be infrmed that EHI received frm the ministry is part f the patient s recrd and it is the duty f the rganizatin t prtect its cnfidentiality. Educatin & Recrds Patient Recrds 3.1 Accunt Management Table 7 Privacy and Security - Accunt Management # Rule Bus7.1 Bus7.2 Bus7.3 Bus7.4 User ID Requirements Each user must have: Ntes: a) A unique user ID and passwrd; r b) A tw factr tken when tw-factr authenticatin is used. 1. Passwrd and tkens must nt be shared. Apprpriate Access Level The level f access prvided fr each user must match the user's need t knw and prvide the least privilege necessary based n the user's jb functin. Transmissin f Passwrds Passwrds, passphrases and passcdes must be securely cmmunicated and separated frm the user ID when transmitted electrnically. Inactive User Accunts A user accunt inactive (r nt activated) fr 90 days r greater is cnsidered drmant and must be: a) Remved frm the system; r b) Disabled t prhibit lgin t the system. Educatin & EBus.05 P&S Accunt Management TBUS2.02 P&S Accunt Management EBus.05 P&S Accunt Management TBUS2.02 P&S Accunt Management EBus.05 P&S Accunt Management TBUS2.02 P&S Accunt Management EBus.05 P&S Accunt Management TBUS2.02 P&S Accunt Management 3.2 Hardware and Peripherals Table 8 Privacy and Security - Hardware and Peripherals # Rule Educatin & Security Classificatin: Lw Sensitivity Page 14 f 18

15 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin # Rule Bus8.1 Bus8.2 Bus8.3 Bus8.4 Bus8.5 Bus8.6 Bus8.7 Bus8.8 Current Security Patches Operating system and applicatin security patches n cmputers must be kept current using scheduled updates r real-time update prtcls. Anti-virus sftware Anti-virus sftware must be deplyed n all systems (particularly persnal cmputers and servers). Current Anti-virus Mechanisms Anti-virus mechanisms must be current, actively running, and generating audit lgs. Firewalls Persnal (end-pint prtectin) firewalls must be installed and running n cmputers. Unattended Wrk Statins After a defined perid f inactivity (maximum f 15 minutes) cmputers left unattended must autmatically lck ut all users (e.g., use a screensaver requiring the authrized user t lg n again). Mnitr Placement Cmputer mnitrs must be situated in a manner that prevents unauthrized viewing. Safeguard Mbile Devices Mbile devices (e.g., laptps, smartphnes and ipds) and remvable media (e.g., USB drives) cntaining persnal health infrmatin must be passwrd prtected and encrypted. When these devices are nt in the user s direct cntrl, measures must be taken (e.g., by using lcking devices with physical lcks r equivalent) t prtect the device frm theft r misuse. Peripheral Device Security Peripheral devices (e.g., printers, fax machines) must be lcated in secure (nn-patient accessible) areas t prevent unauthrized access. Educatin & EBus.07 P&S Netwrk TBUS2.04 P&S Netwrk EBus.07 P&S Netwrk TBUS2.04 P&S Netwrk EBus.07 P&S Netwrk TBUS2.04 P&S Netwrk EBus.07 P&S Netwrk TBUS2.04 P&S Netwrk EBus.06 P&S Hardware and Peripherals TBUS2.03 P&S Hardware and Peripherals EBus.06 P&S Hardware and Peripherals TBUS2.03 P&S Hardware and Peripherals EBus.06 P&S Hardware and Peripherals TBUS2.03 P&S Hardware and Peripherals EBus.06 P&S Hardware and Peripherals TBUS2.03 P&S Hardware and Peripherals 3.3 Netwrk Table 9 Privacy and Security - Netwrk Security Classificatin: Lw Sensitivity Page 15 f 18

16 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin # Rule Bus9.1 Bus9.2 Security f Infrmatin Technlgy Equipment Areas that huse infrmatin technlgy equipment (e.g., server rms, netwrk r telecmmunicatins clsets) must be prtected against unauthrized access by using physical security measures such as: a) Lcked rm with slid wall (flr-t-ceiling) cnstructin r specialized lcked cabinet r equivalent; b) Restricted key access t (a); c) Lcks, blts (r equivalent) n vulnerable drs and windws; and d) Mtin detectrs and intrusin alarm systems. WLAN Encryptin And Security Measures Wireless lcal area netwrks (WLAN) must be encrypted and have security measures that, at a minimum, are equivalent t the Secure Wireless Lcal Area Netwrk Cnnectivity Standard as defined by the Ministry: Educatin & EBus.07 P&S Netwrk TBUS2.04 P&S Netwrk EBus.07 P&S Netwrk TBUS2.04 P&S Netwrk Bus9.3 Bus.30 a) Physically secure wireless access pints; b) Wi-Fi Prtected Access II (WPA2) Enterprise; Authenticatin: EAP-TLS; Encryptin: AES-CCMP (128 bits minimum); c) Wi-Fi Prtected Access II (WPA2) Persnal; Authenticatin Pre-shared keys (PSK) with a minimum 13 characters randm passphrase; PSK must be secured and changed n a regular basis; PSK must be changed whenever emplyees/cntractrs that have access t the netwrk leave the rganizatin; and Encryptin: AES-CCMP (128 bits minimum). Ntes: 1. Persnal mde must nly be used fr small netwrk installatins that d nt have authenticatin servers available. Managed Perimeter Defence Safeguards The lcal area netwrk (LAN) must implement managed perimeter defence safeguards t mediate all traffic and t prtect systems frm ver the netwrk attacks and attempts at security breaches. Direct Cnnectin t SPANBC r PPN There must be n crss cnnectin t an external netwrk (e.g., a cmmercial internet prvider like Shaw) when yur lcal area netwrk (LAN) is directly cnnected t the Shared Prvincial Netwrk (SPANBC) r Private Physician Netwrk (PPN). EBus.07 P&S Netwrk TBUS2.04 P&S Netwrk EBus.07 P&S Netwrk TBUS2.04 P&S Netwrk Security Classificatin: Lw Sensitivity Page 16 f 18

17 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin Lcal The rules in the next table apply t a POS that stres ministry EHI n a lcal server. Nte: Medical Practice applicatins are hused in applicatin and data hsting centres; therefre the rules in this table d nt apply t thse lcatins. Table 10 Privacy and Security - Lcal # Rule Bus10.1 Bus10.2 Bus10.3 Bus10.4 Bus10.5 Secure Area The lcal server must be hused in a physically secure area with prper envirnmental cnditins (temperature, humidity and pwer surces) and prtected against unauthrized access by using the fllwing physical security measures: a) Lcked rm with slid wall (flr-t-ceiling) cnstructin r specialized lcked cabinet r equivalent; b) Restricted key access t (a); c) Lcks, blts (r equivalent) n vulnerable drs and windws; and Mtin detectrs and intrusin alarm systems. N Unauthrized Access Unauthrized persnnel must nt be permitted int the server area. Restricted Netwrk Access The fllwing must be implemented in the server envirnment: Operating system and applicatin security patches must be kept current using scheduled updates r realtime update prtcls. Anti-virus sftware must be deplyed, current, actively running, and generating audit lgs. Firewalls must be installed and running. Managed perimeter defence safeguards must be used t mediate all traffic and t prtect systems frm ver the netwrk attacks and attempts at security breaches. Business Cntinuity and Disaster Recvery All lcal servers with peratinally critical data must have dcumented back-up, system and applicatin restratin (including cnfiguratins), and data restratin prcedures t supprt business cntinuity and disaster recvery planning. Files Backup Strage Backup files must be stred in a secure lcatin, preferably ffsite. If backup files are stred ff-site, they must be encrypted t a minimum f AES-256. Educatin & EBus.08 P&S Lcal TBUS2.05 P&S Lcal EBus.08 P&S Lcal TBUS2.05 P&S Lcal EBus.08 P&S Lcal TBUS2.05 P&S Lcal EBus.08 P&S Lcal TBUS2.05 P&S Lcal EBus.08 P&S Lcal TBUS2.05 P&S Lcal Security Classificatin: Lw Sensitivity Page 17 f 18

18 Cnfrmance Standards Vlume 3: Business Rules General All Pints f Service Versin # Rule Bus10.6 Bus10.7 Bus 10.8 Regular System Lg Review The lcal server must have system lgging capabilities enabled and lgs must be reviewed regularly. A schedule and prcedures must be in place fr a designated individual t rutinely mnitr system lgs fr unusual patterns r anmalies. Any ptential security weaknesses r breaches must be reprted t the POS management. Update Prcedures Prcedures and accuntability fr evaluating and applying perating system and applicatin updates, ht fixes, and patches must be implemented fr the lcal server. Envirnmental Cntrls Envirnmental cntrls must be prvisined and prperly maintained, including but nt limited t: 1. uninterrupted pwer supply t facilitate an rderly shutdwn prcess; 2. fire detectin and suppressin; 3. temperature and humidity cntrls; and 4. water damage detectin and mitigatin. Educatin & EBus.08 P&S Lcal TBUS2.05 P&S Lcal EBus.08 P&S Lcal TBUS2.05 P&S Lcal TBD Security Classificatin: Lw Sensitivity Page 18 f 18

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

Technical Writing - TheUsers Visa (SHR User Accunt)

Technical Writing - TheUsers Visa (SHR User Accunt) POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Sources of Federal Government and Employee Information

Sources of Federal Government and Employee Information Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

General Records Authority 33. Accredited Training

General Records Authority 33. Accredited Training General Recrds Authrity 33 2012/00579704 Accredited Training February 2013 This is an accurate reprductin f the authrised recrds authrity cntent, created fr accessibility purpses CONTENTS INTRODUCTION

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

Bill Payment Agreement & Disclosures

Bill Payment Agreement & Disclosures Bill Payment Agreement & Disclsures Welcme t Online Banking Bill Payment Service. Use f the Bill Payment Service indicates acceptance f terms and cnditins set frth in the Online Banking Agreement & Disclsures

More information

DISASTER RECOVERY PLAN TEMPLATE

DISASTER RECOVERY PLAN TEMPLATE www.disasterrecveryplantemplate.rg The bjective f a disaster recvery plan is t ensure that yu can respnd t a disaster r ther emergency that affects infrmatin systems and minimize the effect n the peratin

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Woodstock Multimedia, INC. Software/Hardware Usage Policy Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly

More information

Presentation: The Demise of SAS 70 - What s Next?

Presentation: The Demise of SAS 70 - What s Next? Presentatin: The Demise f SAS 70 - What s Next? September 15, 2011 1 Presenters: Jeffrey Ziplw - Partner BlumShapir Jennifer Gerasimv Senir Manager Delitte. SAS 70 Backgrund and Overview Purpse f a SAS

More information

System Business Continuity Classification

System Business Continuity Classification Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument

More information

OITS Service Level Agreement

OITS Service Level Agreement OITS Service Level Agreement Objective A Service Level Agreement (SLA) describes the IT Service, dcuments Service Level Targets, and specifies the respnsibilities f the IT Service Prvider and the Custmer.

More information

Helpdesk Support Tickets & Knowledgebase

Helpdesk Support Tickets & Knowledgebase Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate

More information

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY

TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015

ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015 ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY Gvernrs Cmmittee: Finance and General Purpses Apprved by Gverning Bdy n: 6 th May 2015 Signed: (Chair f Cmmittee) Signed: (Headteacher) Date t be

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

System Business Continuity Classification

System Business Continuity Classification System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

How To Ensure That The Internet Is Safe For A Health Care Worker

How To Ensure That The Internet Is Safe For A Health Care Worker POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

RSA SecurID Software Token Security Best Practices Guide. Version 3

RSA SecurID Software Token Security Best Practices Guide. Version 3 RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

Payment Card Industry (PCI) Qualified Integrators and Resellers

Payment Card Industry (PCI) Qualified Integrators and Resellers Payment Card Industry (PCI) Qualified Integratrs and Resellers Prgram Guide Versin 3.0 September 2015 Dcument Changes Date Versin Descriptin August 2012 1.0 Initial release f the PCI Qualified Integratrs

More information

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt

More information

New York Institute of Technology Faculty and Staff Email Retention Policy

New York Institute of Technology Faculty and Staff Email Retention Policy New Yrk Institute f Technlgy Faculty and Staff Email Retentin Plicy Nvember 2013 I. PURPOSE As electrnic mail (email) has becme the primary frm f cmmunicatin at NYIT and thrughut the wrld, the vlume f

More information

State of California California Technology Agency. Software Management Plan Guidelines

State of California California Technology Agency. Software Management Plan Guidelines State f Califrnia Califrnia Technlgy Agency Sftware Management Plan Guidelines Revised April 2011 Sectin 1 1.0 Overview INTRODUCTION TO SOFTWARE MANAGEMENT PLANNING The State Administrative Manual (SAM)

More information

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

Help Desk Level Competencies

Help Desk Level Competencies Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

Frequently Asked Questions About I-9 Compliance

Frequently Asked Questions About I-9 Compliance Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

iphone Mobile Application Guide Version 2.2.2

iphone Mobile Application Guide Version 2.2.2 iphne Mbile Applicatin Guide Versin 2.2.2 March 26, 2014 Fr the latest update, please visit ur website: www.frte.net/mbile Frte Payment Systems, Inc. 500 West Bethany, Suite 200 Allen, Texas 75013 (800)

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

FINRA Regulation Filing Application Batch Submissions

FINRA Regulation Filing Application Batch Submissions FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 28th January 2014 Versin 3 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

UBC Incident Response Plan V1.5

UBC Incident Response Plan V1.5 UBC Incident Respnse Plan V1.5 Cntents 1. Ratinale... 2 2. Objective... 2 3. Applicatin... 2 4. Reprting a Cmputer Security Incident... 2 5. Managing the Security Incident... 2 5.1. All Incidents... 2

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS. Version 1.0

GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS. Version 1.0 GUIDELINES FOR SECURING SOCIAL MEDIA ACCOUNTS Versin 1.0 Published Octber 2015 Dcument Cntrl Versin: 1.0 Authr: Cyber Security Divisin - ictqatar Classificatin: Public Date f Issue: Octber 2015 2 Page

More information

SBClient and Microsoft Windows Terminal Server (Including Citrix Server)

SBClient and Microsoft Windows Terminal Server (Including Citrix Server) SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance

More information

NERC-CIP Cyber Security Standards Compliance Documentation

NERC-CIP Cyber Security Standards Compliance Documentation Cmpliance Dcumentatin Briv OnAir 8/3/20154 Page 2 Overview This dcument is intended t be the primary surce f infrmatin fr Briv s cmpliance with the Nrth America Electric Reliability Crpratin (NERC) reliability

More information

Transition to Electronic Medical Records (EMR)

Transition to Electronic Medical Records (EMR) Transitin t Electrnic Medical Recrds (EMR) CPSA Guideline September 2004 This infrmatin is prvided t assist practitiners in making decisins related t the transitin t using electrnic medical recrds in their

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

Oracle Cloud Enterprise Hosting and Delivery Policies

Oracle Cloud Enterprise Hosting and Delivery Policies Oracle Clud Enterprise Hsting and Delivery Plicies Statement f Changes Versin 1.5, 6/01/2015 This dcument utlines changes made t the Oracle Clud Enterprise Hsting and Delivery Plicies dated December 1,

More information