DATA PRIVACY SAFEGUARD PROGRAM DATA MANAGEMENT PLAN REVIEW CHECKLIST EVALUATION GUIDE
|
|
|
- Tabitha Jennings
- 9 years ago
- Views:
Transcription
1 The Data Management Plan Evaluation Guide was developed to inform you about our process of reviewing your Data Management Plan(s). We believe that the Evaluation Guide will help you to understand what information is requested by the Centers for Medicare and Medicaid Services (CMS) and assist you with submitting a complete and detailed Data Management Plan. This document provides guidance on how to address each step within the revised Data Management Plan. We will use this Guide to review and assess your Data Management Plan(s). The Evaluation Guide is a living document. We will modify the document as needed, to include lessons learned while reviewing your Data Management Plans and to maintain consistency with the Data Privacy Safeguard Program (DPSP) objectives. We will notify you of any program related updates, including modifications to the review process and Evaluation Guide. Please contact ResDAC via phone ( ) or ([email protected]) if you have any questions about the Data Management Plan Evaluation Guide or if you have any questions about how to prepare a Data Management Plan. ResDAC staff will respond to your questions promptly. Please also review the Data Management Plan Guidelines for additional information. Please click here for additional information about the DPSP. 1
2 DATA PRIVACY SAFEGUARD PROGRAM DATA MANAGEMENT PLAN REVIEW CHECKLIST EVALUATION GUIDE Employee Name: This should be completed with one of the following: Booz Allen/CMS/ResDAC Review Date: This should be completed with the date that this checklist is completed External Organization s Name: This should read: Company Name OR University, Specific School (e.g. RTI International OR University of Memphis, School of Public Health) External Organization s Location: This should be completed with the City and State Principal Investigator s Name: This should be completed with the Principal Investigator s (PI) First and Last Name. In some instances, the DUA User/Requestor will not be the same individual as the PI and in those cases, that person can additionally be listed here as well (but cannot replace the PI listed here). Study Title: This should be completed with the Title of the Study Data Management Plan Requirements STEP 1 OF THE DATA MANAGEMENT PLAN - PHYSICAL POSSESSION AND STORAGE OF CMS DATA FILES Evaluation Criteria A response means that the response answers the question completely and is acceptable by CMS data protection standards or industry best practices for data protection. A response means that the response either a) is not answered completely, and/or b) the response given is not acceptable by CMS data protection standards or industry best practices for data protection. A response means that the response given does not allow for a proper analysis as to whether the response is complete or not. This may be an instance where the response appears to address part of the question sufficiently but it is assumed that there is more to the answer than is written. A common example of this is when procedures are explained, but no policies are referenced when requested, such as for questions 1.7, 2.3, etc. This can also denote that the response 2
3 causes confusion and more discussion is needed for clarity sake. A response means that the question does not apply to the organization. will be used rarely and only on a case by case basis. Only one box should be checked for each question. 1.1 Does the organization 1 provide the name(s) of individuals that will be responsible for organizing, storing and archiving data? When a response is complete, the following language should be inserted in the evaluation guide for that question: Information provided is sufficient, additional information is not required. This response should list the full name (and title when available) of the individual who is responsible for organizing, storing and archiving data. 1.2 Does the organization maintain a current inventory of CMS data files, or have plans in place to develop an inventory? This response should denote whether or not the organization keeps a current inventory of CMS files and also how the organization plans to inventory new CMS files it receives. 1.3 Does the organization reference the agreement that binds all members (i.e., organizations, individual staff) of research teams to specific privacy and security rules in using those data files? This response should list all agreements non-disclosure agreements, Rules of Behavior, Memoranda of Understanding, confidentiality agreements, sub-contracts, etc that bind the organization as well as the individuals. This list should be comprehensive for all privacy and security agreements. 1 Throughout this document, organization can be interpreted as the company, agency, or group or team within a company, depending on which makes more sense in context with the research study for which CMS data files are being used. For example, large companies may defer to a CMS data file inventory for just their team; whereas smaller companies may keep a single CMS data file inventory for the entire company. 2 Note that we are specifically asking you to reference your written policies and procedures related to your organization s administrative, technical and physical safeguards. If policies and procedures have not been developed, please explain any ongoing activities your organization is taking to document and make them available to staff. Organizations selected for DPSP reviews will be asked to provide copies of written policies and procedures. Please note that an explanation of the process is not sufficient. 3
4 1.4 Does the organization provide details on who and how the organization will notify CMS of any project staffing changes? This response should explain the process of how the organization will inform CMS about any changes, additions, removals, etc of staffing on the project. This response should list the full name (and title when available) of the individual that will notify CMS of staffing changes. 1.5 Does the organization reference training programs they have developed or use to educate staff on how to protect CMS data? This response should list all trainings security training, privacy training, role-based training, general training, HIPAA training, etc that the organization requires the individuals on the project to take. This list should be comprehensive. 1.6 Does the organization explain the infrastructure (facilities, hardware, software, other) that will secure the CMS data files? This response should explain all infrastructure used to protect CMS data files. This will include facilities, hardware, software and anything else that the respondent believes constitutes infrastructure. This response should be as comprehensive as possible. 1.7 Does the organization discuss and reference policies and procedures regarding the physical possession and storage of CMS data files? This response should list what policies govern the physical possession and storage of CMS data files, and should also describe the procedures listed in those policies. 1.8 Does the organization explain a system or process to track the status and roles of the research team? This response should explain the process for tracking the status (e.g. active, pending, retired) and roles (e.g. Primary Investigator, researcher with full access, researcher with limited access, etc) of the individuals that comprise the research team. 1.9 Does the organization explain physical and technical safeguards they use to protect CMS data files (including physical access and logical access to the files)? This response will likely be detailed and lengthy, although this will be 4
5 dependent on the amount of CMS data files that the organization has in its possession. The response should detail all physical and technical safeguards that the organization has in place and uses to protect CMS data files. This should be a comprehensive list. STEP 2 OF THE DATA MANAGEMENT PLAN DATA SHARING, ELECTRONIC TRANSMISSION AND DISTRUBUTION 2.1 Does the organization discuss and reference policies and procedures regarding the sharing, transmission, and distribution of CMS data files (including Data Sharing Agreements)? This response should explain which policies govern the sharing, transmission and distribution of CMS data files as well as what those procedures entail. 2.2 Does the organization currently employ, or have plans to employ, a data tracking system? Does the organization explain the data tracking system that is used? This response should note whether or not the organization employs a data tracking system, and if so, the response should detail the process for maintaining this system. 2.3 Does the organization discuss and reference the policies and procedures they developed for the physical removal, transport and transmission of CMS data? This response should explain the processes that the organization employs regarding the physical removal, transport and transmission of CMS data. If no physical removal, transport and transmission is allowed, then this evaluation checkbox can still be a, if there are 5
6 policies and procedures prohibiting the physical removal, transport and transmission. 2.4 Does the organization explain how they will tailor and restrict data access privileges based on an individual s role on the research team? This response should note whether or not the organization tailors and restricts data access privileges, and if so, explain the methods by which the organization tailors and restricts access privileges based on an individual s role and responsibilities on the research team. 2.5 Does the organization explain their use of technical safeguards for data access (which may include password protocols, log-on/log-off protocols, session time out protocols, and encryption for data in motion and data at rest)? Detailed information and examples are required for this question. This response should explain all the technical safeguards for data access that the organization employs. This list should be comprehensive. 2.6 Will the organization involve additional organizations in analyzing CMS data? If so, does the organization provide the names of those additional organizations? This response should note whether or not other organizations will be involved in analyzing CMS data, and if so, this response should provide the names of those organizations. A yes or no response is not sufficient here. This requires an explanation. If the response is a, the answer should be clarified as following: No, the organization does not involve additional organizations in the analysis of CMS data. If the answer is yes, the organization will need to provide the names of the other organizations that will be involved in analyzing data. 2.7 Will the organization house CMS data in a separate location? And if so, does the organization provide details on how the data will be transferred to that separate location? This response should note whether or not the organization will house CMS data in a separate location, and if so, this response should provide details on how the data will be transferred. A yes or no response is not sufficient here. This requires an explanation. If the response is a, the answer should be clarified as following: No, the organization does not house the data in a separate location.. If the response is a, the answer should be clarified as following: Yes, data will be housed in a separate location. STEP 3 OF THE DATA MANAGEMENT PLAN DATA REPORTING AND PUBLICATION 3.1 Does the organization explain how its Data Management Plans are reviewed and approved? This response should detail the DMP review processes and the DMP 6
7 approval processes that the organization employs. If no such processes are employed by the organization, this evaluation checkbox is a. 3.2 Does the organization explain whether and how its Data Management Plans are subjected to periodic updates during the DUA period? This response should explain the policies and procedures employed by the organization regarding periodic reviews and updates to the DMP. If no such updates are conducted by the organization, this evaluation checkbox is a. 3.3 Does the organization agree to adhere to CMS cell suppression policy? This question is answered with a / response on the DMP. 3.4 Does the organization agree that pharmacies, providers, prescribers or health plans will not be identified in this study? This question is answered with a / response on the DMP. If the Principal Investigator/organization is not requesting Medicare Part D data, then a response is acceptable. STEP 4 OF THE DATA MANAGEMENT PLAN COMPLETION OF RESEARCH TASKS AND DATA DESTRUCTION 4.1 Does the organization discuss a process they have in place to complete the Certificate of Data Destruction form and reference policies and procedures to destroy data files upon completion of its research? This response should include the name or title of the individual that will submit the form Certification of Data Destruction form to CMS. The response should also state that the organization does destroy data upon completion of its research and also detail the process that the organization uses for the data destruction. A Certificate of Data Destruction may be referred to in similar yet different words, such as a destruction report. 7
8 4.2 Does the organization discuss and reference policies and procedures they use to protect CMS data files when individual staff members of research teams (as well as collaborating organizations) terminate their participation in research projects (which may include staff exit interviews and immediate access termination)? This response should explain the policies and procedures for protecting CMS data files when members of the research team (individuals and organizations) terminate their participation in the research. 4.3 Does the organization discuss and reference policies and procedures they use to inform CMS of project staffing changes, including when individual staff members terminate their participation in the research project, voluntarily or involuntarily? This response should explain the policies and procedures that the organization uses to inform CMS of any project changes that occur throughout the timeline of the research project. 4.4 Does the organization discuss and reference policies and procedures to ensure original data files are not used following the completion of the project? 8
9 This question should explain the policies and procedures that the organization uses to ensure that original data files, including output, physical copies, electronic copies, and data stored on servers, are not used following the completion of the project (e.g. policies and procedures regarding return of data or destruction of data or prohibiting reuse of data). SUMMARY Has the organization described the actions that will be taken to secure CMS data files throughout the four stages of data possession below? 1. Physical Possession and Storage of CMS data files 2. Data Sharing, Electronic Transmission and Distribution 3. Data Reporting and Publication 4. Completion of Research Tasks and Data Destruction These /PARTIALLY /DOES T ADDRESS evaluations should be determined based on the average / evaluation determined for each question of the 4 sections in the previous part of the document. For each section, if ALL responses are, then the evaluation would be an for that step in this Summary section. However, if even just one question in a section is a, then the evaluation would be a PARTIALLY for that step here in the Summary. Lastly, if there are issues with all or most of the responses in a section, whatever those issues may be, then the Summary evaluation should be a DOES T ADDRESS. The same evaluation criteria apply to all sections. This /PARTIALLY /DOES T ADDRESS evaluation Summary section does require a level of human analysis to determine. Step 1: PARTIALLY DOES T ADDRESS Step 2: PARTIALLY DOES T ADDRESS Step 3: PARTIALLY DOES T ADDRESS Step 4: PARTIALLY DOES T ADDRESS 9
10 COMMENTS (Use the section below to list your comments, recommendations and follow up/action items) This section is an area for the reviewer to list any additional comments, evaluations, or recommendations that are not addressed fully in the previous question-by-question section of this document. ADDITIONAL GUIDANCE FOR REVIEWING A DATA MANAGEMENT PLAN Various scenarios may apply to how research teams organize themselves to complete their research protocols. The examples provided below are meant to prompt your thinking about how your data environment is structured. Please note that these are just a few examples of scenarios and not meant to be an exhaustive list. Consider specific organizational, personnel, and technical safeguards for your organization s scenario when reviewing a Data Management Plan. BELOW WE HAVE PROVIDED EXAMPLES OF SCENARIOS THAT MAY APPLY TO AN ORANIZATION Step 1 PHYSICAL POSSESSION AND STORAGE OF CMS DATA FILES In the proposed research, the Data Management Plan will limit access to/distribution of CMS data files to a team within the same organization, or within a single administrative unit (department, office), which is under a single administrative supervisor The Data Management Plan calls for distributing/sharing CMS data files 1) among multiple departments/locations within a single organization, or 2) across one or more distinct organizations Step 2 DATA SHARING, ELECTRONIC TRANSMISSION, DISTRIBUTION Our Data Management Plan proposes to store and maintain all original and backup CMS data files (and any derivatives made thereof for analytical use) on standalone, non-networked computer(s) in one or more physical locations The Data Management Plan proposes to deploy original CMS data files on systems within our organization, with multiple simultaneous users, who may work in one or more physical locations Either or both of the above scenarios may apply, and the Data Management Plan allows for staff to download and capture abstracts of the original CMS data files to their own computer Step 3 DATA REPORTING AND PUBLICATION For the proposed research, the Data Management Plan will clearly state how your organization will adhere to the publication requirements For the proposed research, the Data Management Plan will provide an overview of your organization s process for reviewing and approving research protocols, including the Data Management Plan Step 4 COMPLETION OF RESEARCH TASKS AND DATA DESTRUCTION The subject research protocol and Data Management Plan includes staff exit/termination policies and procedures that have been developed by my organization The subject research protocol and Data Management Plan is governed by staff exit/termination policies and procedures that have been developed by my organization and supplemented by the research team Either 1 or 2 above applies, plus other external organizations are collaborating on this research protocol and their exit protocols are relevant to this step 10
1.1. Who will have the main responsibility for organizing, storing, and archiving the data? Please provide name(s) and job title(s).
Executive Summary for Research Identifiable Data Version /03 DATA MANAGEMENT PLAN Please reference the Data Management Plan Guidelines, Data Management Plan Evaluation Guide, and/or the FAQ document for
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
1. The records have been created, sent or received in connection with the compilation.
Record Retention & Destruction Policy Bradley Kirschner PC recognizes that the firm s engagement and administrative files are critical assets. As such, the firm has established this formal written policy
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
HIPAA Security Series
7 Security Standards: Implementation for the Small Provider What is the Security Series? The security series of papers provides guidance from the Centers for Medicare & Medicaid Services (CMS) on the rule
Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance
RADSpa HIPAA Compliance 1. Introduction 3 1.1. Scope and Field of Application 3 1.2. HIPAA 3 2. Security Architecture 4 2.1 Authentication 4 2.2 Authorization 4 2.3 Confidentiality 4 2.3.1 Secure Communication
HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Information Security Policy
Information Security Policy Contents Version: 1 Contents... 1 Introduction... 2 Anti-Virus Software... 3 Media Classification... 4 Media Handling... 5 Media Retention... 6 Media Disposal... 7 Service Providers...
FDOH Information and Privacy Awareness Training Learner Course Guide
Florida Department of Health FDOH Information and Privacy Awareness Training Learner Course Guide To protect, promote & improve the health of all people in Florida through integrated state, county, & community
ESI Incident Response Procedures 1
ESI Incident Response Procedures 1 Core Document Approval Date, USNH Legal Counsel: 2/12/2010 Core Document Approval Date, UNH CIO: Pending Objectives 1. Understand which policies, procedures and laws
CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS STANDARD 012 IMAGE SECURITY STANDARD
CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS STANDARD 012 IMAGE SECURITY STANDARD 2013 CANADIAN PAYMENTS ASSOCIATION 2013 ASSOCIATION CANADIENNE DES PAIEMENTS This Rule is copyrighted
HIPAA Security. 5 Security Standards: Organizational, Policies. Security Topics. and Procedures and Documentation Requirements
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
B. Preservation is not limited to simply avoiding affirmative acts of destruction because day-to-day operations routinely alter or destroy evidence.
This is a sample approach to developing a sound document collection process, referenced at Section II(7)(vi) of the Guidelines on Best Practices for Litigating Cases Before the Court of Chancery. It should
Volume UC DAVIS HEALTH SYSTEM. HIPAA Security Compliance Workbook. Multi User Guide
Volume 1 UC DAVIS HEALTH SYSTEM HIPAA Security Compliance Workbook Multi User Guide UC DAVIS HEALTH SYSTEM HIPAA Security Compliance Workbook Guide Table of Contents Introduction General Instructions SECTION
HIPAA Security. 1 Security 101 for Covered Entities. Security Topics
HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security. Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Proc - A edures, dministrativ and e Documentation Safeguards
University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary
University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary This Summary was prepared March 2009 by Ian Huggins prior to HSC adoption of the most recent
THE INFORMATION SECURITY POLICY OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT
THE INFORMATION SECURITY POLICY OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Effective Date November 6, 2012 THE INFORMATION SECURITY POLICY OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT
ECSA EuroCloud Star Audit Data Privacy Audit Guide
ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Volume UC DAVIS HEALTH SYSTEM. HIPAA Security Compliance Workbook. Single - User Guide
Volume 1 UC DAVIS HEALTH SYSTEM HIPAA Security Compliance Workbook Single - User Guide UC DAVIS HEALTH SYSTEM HIPAA Security Compliance Workbook Guide 1 Table of Contents Introduction General Instructions
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015
Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
White Paper Instant Messaging (IM) HIPAA Compliance
White Paper Instant Messaging (IM) HIPAA Compliance - 1 - Statement of Purpose This document is focused on providing health care companies, and all others bound by HIPAA regulations, with an eye opening
The HIPAA Audit Program
The HIPAA Audit Program Anna C. Watterson Davis Wright Tremaine LLP The U.S. Department of Health and Human Services (HHS) was given authority, and a mandate, to conduct periodic audits of HIPAA 1 compliance
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
Access to Electronic Health Records Policy Franciscan Health System
Access to Electronic Health Records Policy Franciscan Health System PURPOSE: The purpose of the Access to Electronic Health Records Policy ( EHR Policy ) is to establish processes and procedures for permitting
Information Systems and Technology
As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation
E-Discovery Toolkit for Educational Institutions
E-Discovery Toolkit for Educational Institutions The e-discovery process the search of electronic records for use as legal evidence can cost educational institutions thousands of dollars and hours. The
The E-Discovery Process
POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of
PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE. EIIP Volume VI
Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT APPENDIX E PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 This page is intentionally left blank.
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
CAQH ProView. Practice Manager Module User Guide
CAQH ProView Practice Manager Module User Guide Table of Contents Chapter 1: Introduction... 1 CAQH ProView Overview... 1 System Security... 2 Chapter 2: Registration... 3 Existing Practice Managers...
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
ChangeIt Privacy Policy - Canada
ChangeIt Privacy Policy - Canada 1. Policy on Privacy of Personal Information Formulating Change Inc. ( FCI, we, us or our ) is committed to protecting the privacy and security of your Personal Information
Security in Fax: Minimizing Breaches and Compliance Risks
Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION This Agreement governs the provision of Protected Health Information ("PHI") (as defined in 45 C.F.R.
COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL
PAYMENT CARD INDUSTRY COMPLIANCE (PCI) Effective June 1, 2011 Page 1 of 6 (1) Definitions a. Payment Card Industry Data Security Standards (PCI-DSS): A set of standards established by the Payment Card
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
The Second National HIPAA Summit
HIPAA Security Regulations: Documentation and Procedures The Second National HIPAA Summit Healthcare Computing Strategies, Inc. John Parmigiani Practice Director, Compliance Programs Tom Walsh, CISSP Practice
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
NIST Special Publication 800-66 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule Joan Hash, Pauline Bowen, Arnold Johnson, Carla
HIPAA Security Compliance Reviews
HIPAA Security Compliance Reviews Elizabeth S. Holland, MPA Office of E-Health Standards and Services Centers for Medicare & Medicaid Services U.S. Department of Health and Human Services 1 2 What is HIPAA?
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
CONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1
CONTRACT ADDENDUM BUSINESS ASSOCIATE CONTRACT 1 THIS AGREEMENT is entered into on ( Effective Date ) by and between LaSalle County Health Department, hereinafter called Covered Entity and, hereinafter
HIPAA Compliance Review Analysis and Summary of Results
HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk
Copyright 2011 DataNet Quality Systems. All rights reserved. Printed in U.S.A. WinSPC is a registered trademarks of DataNet Quality Systems.
Copyright 2011 DataNet Quality Systems. All rights reserved. Printed in U.S.A. WinSPC is a registered trademarks of DataNet Quality Systems. All other trademarks or registered trademarks are the property
Clinic 1407 South 4 th St 1850 Gateway Dr Suite A DeKalb, IL 60115 Sycamore, IL 60178
Lehan Drugs & Home Medical Equipment Lehan Drugs @ the DeKalb Clinic 1407 South 4 th St 1850 Gateway Dr Suite A DeKalb, IL 60115 Sycamore, IL 60178 THIS NOTICE DECRIBES HOW MEDICAL INFORMATION ABOUT YOU
Self-Assessment of eresearch Compliance with 21 CFR Part 11, Electronic Record; Electronic Signatures
Self-Assessment of eresearch Compliance with 21 CFR Part 11, Electronic Record; Electronic Signatures Subpart A General Provisions Sec. 11.1 Scope. (a) The regulations in this part set forth the criteria
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice
Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help
HIPAA ephi Security Guidance for Researchers
What is ephi? ephi stands for Electronic Protected Health Information (PHI). It is any PHI that is stored, accessed, transmitted or received electronically. 1 PHI under HIPAA means any information that
HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations
HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
CMS Operational Policy for VPN Access to 3-Zone Admin and Development /Validation Segments
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for VPN Access to 3-Zone Admin and Development /Validation Segments January 9, 2008
Exhibit 2. Business Associate Addendum
Exhibit 2 Business Associate Addendum This Business Associate Addendum ( Addendum ) governs the use and disclosure of Protected Health Information by EOHHS when functioning as a Business Associate in performing
Unicenter Patch Management
Unicenter Patch Management Best Practices for Managing Security Updates R11 This documentation (the Documentation ) and related computer software program (the Software ) (hereinafter collectively referred
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
MCR Checklist for Automated Information Systems (Major Applications and General Support Systems)
MCR Checklist for Automated Information Systems (Major Applications and General Support Systems) Name of GSS or MA being reviewed: Region/Office of GSS or MA being reviewed: System Owner: System Manager:
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
How to Use the NYeC Privacy and Security Toolkit V 1.1
How to Use the NYeC Privacy and Security Toolkit V 1.1 Scope of the Privacy and Security Toolkit The tools included in the Privacy and Security Toolkit serve as guidance for educating stakeholders about
Document Number: SOP/RAD/SEHSCT/007 Page 1 of 17 Version 2.0
Standard Operating Procedures (SOPs) Research and Development Office Title of SOP: Computerised Systems for Clinical Trials SOP Number: 7 Version Number: 2.0 Supercedes: 1.0 Effective date: August 2013
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
MEDICAL OFFICE COMPLIANCE TOOLKIT. The Complete Medical Practice Compliance Resource HIPAA HITECH OSHA CLIA
MEDICAL OFFICE COMPLIANCE TOOLKIT The Complete Medical Practice Compliance Resource HIPAA HITECH OSHA CLIA MEDICAL OFFICE COMPLIANCE TOOLKIT The Complete Medical Practice Compliance Resource HIPAA HITECH
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
