2016 Compliance Training
|
|
- Kathleen Arnold
- 8 years ago
- Views:
Transcription
1 2016 Compliance Training EMERGENCY EXITS ELECTRONIC DEVICES ATTESTATION SHEETS ONLINE TRAINING DEADLINE TOPICS
2 Office of Audit, Compliance & Ethics University Code of Conduct and the Importance of Individual Behaviors
3 Code of Conduct "reflects the covenant that an organization has made to uphold its most important values, dealing with such matters as its commitment to employees, its standards for doing business and its relationship with the community." Driscoll, Dawn-Marie and W. Michael Hoffman, Ethics Matters: How to Implement Values-Driven Management, 2000, p. 77.
4 Purpose of the Code of Conduct Sets basic standards of workplace behavior States publicly the University s long-term commitment to the highest standards of integrity Assures that faculty, administrators and staff understand their shared responsibility for keeping the University in compliance
5 Standards Education Research Patient Care Campus-wide Business, Fiscal and Legal External Relations and University Advancement
6 Individual Behaviors Consult the Code of Conduct Seek guidance from appropriate individuals or offices Individual Responsibility Institutional Success Violations may result in appropriate disciplinary measures
7 Reportline If you wish to report a concern or a suspected violation anonymously you may contact the University s REPORTLINE Available 24 hours a day, 7 days a week Independent specialists trained to obtain complete and accurate information in a confidential manner Phone: Web reporting address:
8 University policy prohibits retaliation if you report in good faith a compliance concern to any supervisor, faculty, administrator, the Compliance Office, the REPORTLINE or any appropriate agency outside of the University Non-Retaliation
9 Office of Audit, Compliance & Ethics University Guide to the State Code of Ethics
10 State Code of Ethics for Public Officials Part of the Connecticut General Statutes Intended to prevent individuals from using their public position or authority for personal financial benefit University s policy is based upon the State Code
11 University Guide to the State Code of Ethics A conflict of interest (COI) occurs when an individual s personal interests diverge from his/her obligations as a state employee COI may take many forms including: Gifts Outside Employment Financial Benefit Contracts with the State Appearance fees
12 Gifts University employees generally may not accept gifts, discounts or gratuities from prohibited donors Anyone doing or seeking to do business with the University Anyone engaged in activities directly regulated by the University A lobbyist (current list can be found on the Office of State Ethics website) A contractor pre-qualified by Department of Administrative Services (DAS)
13 Gifts Gift exceptions: Items offered to the public at large Items valued at less than $10 with annual total equaling less than $50 Food and beverage less than $50 total in a calendar year from each donor and only if the person paying is in attendance Gifts valued at less than $100 from a supervisor or subordinate Major life events Gifts to the state
14 Outside Employment University employees may not: Use their state position to obtain another job Use state resources for their outside employment Compromise independent judgment Disclose confidential information from state service Benefit the private employer in any way through their official actions
15 Employees may not: Promote Advertise Outside Employment Solicit personal business through use of state resources
16 Faculty Consulting Faculty & AAUP Members State Ethics Exemption: Activity cannot be related to state employment Activity is related to expertise Must receive compensation (except royalties) o If compensation is only coverage of travel expenses and the faculty member will not net any compensation a consulting form is not needed. Instead, a necessary expenses form (and possibly a travel request) are required.
17 Appearance Fees May not accept fees/honorarium for appearances, speeches or articles written in an official state capacity Applies if state position was a significant factor in being asked Necessary expenses may only be accepted for items for which the University would otherwise pay
18 Necessary Expenses Reporting Reported directly to the Office of State Ethics within 30 days of receiving payment or reimbursement
19 Contracts with the State Unless an open and public process has been completed: Employees and their family members or business associates may not enter into a contract (valued at $100 or more) with the state
20 Political Activity Employees are not prohibited from seeking political office as long as it is not done on State time or with State equipment No employee of the University will engage in partisan political activities while on state time No employee will use state materials or equipment for the purpose of influencing a political election
21 Post-State Employment You may never use confidential information for financial gain You may not represent anyone concerning any matter in which you personally and substantially participated while in state service You may not, for one year, represent anyone before your former agency for compensation If you participated substantially in the negotiation or award of a state contract valued at $50,000 or more, you may not accept employment with a party to the contract for one year after leaving state service, if you resign within one year after the contract was signed
22 Office of Audit, Compliance & Ethics Information UConn
23 What is Privacy? Right to be left alone? Right to make decisions about your personal information? Right to have others who hold or use your data to keep it confidential?
24 What are the Rules? Privacy Rules (laws, regulations) are based on internationally recognized Fair Information Privacy Principles (FIPPS)
25 Difference Between Privacy & (Data) Security Lots of philosophical discussions about the difference Practically speaking at UConn, it comes down to this: Privacy is the WHAT: Privacy dictates what information we need to protect Security is the HOW: Security is the measures we take to go about protecting that information
26 The WHAT What is considered private?
27 What Information is Considered private or confidential at UConn? Confidential Data: requires highest level of privacy protection by law (e.g., student data, medical data, financial data) or through contract (e.g., non-disclosure agreements) Protected Data: must be protected, but can be released through appropriate University procedures (most University data falls in this category) Public Data: considered public and widely available to all users usually through websites, brochures or mailings
28 The HOW How do we secure what we consider to be private?
29 Information Security Policies and Protocols Available at Check out resources available through the Information Security Office (ISO) at Additional guidance is available at
30 Information Management: Combining the What & the How
31 What is a Record? recorded data or information relating to the conduct of the [University s] business prepared, owned, used, received or retained by [the University] whether such data or information be handwritten, typed, taperecorded, printed, photo-stated, photographed or recorded by any other method.
32 Records & Information Management (RIM) Lifecycle of a record Creation Records Retention Proper Storage Maintenance Privacy Information Security Destruction
33 RIM Steps 1. Inventory 2. Records Review 3. Clean up and clear out! 4. Privacy & Security review (paper & electronic) 5. Rinse & Repeat
34 When things go wrong: What happens when the WHAT or the HOW are compromised?
35
36 Repercussions for Inadequate Information Management Costs of the clean up Reputational harm Employment actions (for violations of law/university policy) Regulatory enforcement/litigation
37 My Role: Understanding the What and the How
38 Information Management & Me 1. Know what your responsibilities are What are my job duties? Am I a data custodian? For WHAT records? (And WHAT are their data classifications (public, protected, private)? Know the HOW for the records you have access to as part of your job (what level of security is required/best practice?) Understand the difference between what you CAN access and what you SHOULD access
39 Information Management & Me 2. Inventory your records Know what records you are responsible for Know where you are storing your records Have a game plan for how long you/your office will retain records Know where to get more info about RIM & Records Retention requirements at UConn:
40 Information Management & Me 3. Know what records you are permitted to access as part of your job duties Only access what you are permitted to and when you are permitted to Refer/defer to appropriate offices/records custodians when it is not your role to access the info or to answer questions about the info
41 Information Management & Me 4. Even if your access to a record is appropriate, know to whom and under what circumstances you can share information (both inside & outside the University)
42 Information Management & Me 5. Keep control of University devices and data storage locations Inventory Control tagging devices Physical Security use strong passwords, don t share passwords, lock or log out of computers, encrypt sensitive files, lock doors to storage areas where records or devices are housed, know who has access to spaces where data is stored
43 Information Management & Me 6. DO NOT keep copies of records you do not need for a business purpose Whenever possible do not store records locally Maintain records in source systems Protect any records that do need to be stored
44 Information Management & Me 7. DO store sensitive University information securely Ensure paper records are physically secured Ensure electronic records are stored on professionally maintained and encrypted computers Work with UITS to identify secure storage locations
45 Information Management & Me 8. DO transmit sensitive University data securely is not a secure transmission method FileLocker is a secure file transfer tool Do not assume recipient is secure, be particularly vigilant if sending outside of the University
46 Information Management & Me 9. Know who and what to report when things go wrong Suspect a compromised WHAT or HOW? Follow the University s Protocols: i. Report missing devices ii. Report compromised devices, systems iii. Report missing paper or compromised to physical security iv. Security Incident Protocol (activate the Security Incident Team ) v. Report suspected Identity Theft ( Red Flags )
47 Information Management & Me 10. Know where to seek help Contact the University Privacy Officer: Rachel Krinsky Rudnick (860) Contact the Information Security Office: Jason Pufahl (860)
48 Office of Audit, Compliance & Ethics Various Topics
49 Reporting Requirements under the NEW Policy Against Discrimination, Harassment and Related Interpersonal Violence
50 Sexual Violence, Intimate Partner Violence, Stalking Criminal Acts Violations of University Policy
51 Reporting Obligations - Sexual Assault, Intimate Partner Violence And Stalking WHEN & TO WHOM YOU MUST REPORT If you witness any sexual assault, intimate partner violence, stalking, first call 911, then report to ODE as soon as possible If you receive a report of a sexual assault, intimate partner violence or stalking, you must report this information as soon as possible to: The Office of Diversity and Equity ( ) YOUR REPORT SHOULD INCLUDE: Date, time and location of the incident Details known to you regarding the incident Date the incident was reported to you Identity of the victim and perpetrator (if disclosed) Your identity and contact information
52 Protection of Minors
53 Child Abuse and Neglect Reporting All University Employees are Mandated Reporters Child abuse occurs when a child under the age of 18 has had physical injury inflicted upon him or her other than by accidental means, has injuries at variance with history given of them, or is in a condition resulting in maltreatment, such as, but not limited to, malnutrition, sexual molestation or exploitation, deprivation of necessities, emotional maltreatment or cruel punishment Child neglect occurs when a child under the age of 18 has been abandoned, is being denied proper care and attention physically, emotionally, or morally, or is being permitted to live under conditions, circumstances or associations injurious to his well-being
54 Child Abuse and Neglect Reporting For further guidance: The Department of Children and Families 24 hour hotline REMINDER: Any employee who has witnessed or received a report of a sexual assault must comply with the University policy by reporting to ODE, regardless of the age of the victim. Many employees also have a duty to call the UConn Police
55 Best Practices: Examples of Standards of Conduct for those working with Minors Background Checks Criminal background checks of all those involved in the program or activity Appropriate Communication Prohibition concerning engaging minors via telephone, internet, or social media unless justified by the program or activity Consent / Waivers Written consent of parent or legal guardian before permitting minor to engage in overnight activities Training Training for all those involved in the program or activity Pick-up / Drop-off Procedures for the pick-up and dropoff of program participants Privacy / Boundaries Procedures for areas where minors are likely to be showering, bathing, sleeping or dressing Supervision Procedures to ensure adequate levels of supervision at all times and that no minor be left alone with less than 2 authorized adults Transportation Procedures to ensure that minors are not transported in the personal vehicles of authorized adults unless required by program or activity and no less than two responsible adults are present in the vehicle at all times
56 Best Practices: Residential Programs Involving Minors Fundamental protocols for overnight programs: Curfews Substance-free housing and facilities Separate accommodations for adults and participants Control access to program participants Close and careful Residential supervision by those who have received training on how to receive disclosures, provide resources and support, and how to report appropriately and immediately following any incidents or disclosures (to supervisors, UCPD, ODE and DCF)
57 Minor Protection Coordinator For further guidance: Omar Andujar Minor Protection Coordinator Office of Audit, Compliance & Ethics Telephone: (860)
58 Access and Accommodations ADA
59 What is the ADA? The Americans with Disabilities Act of 1990 (ADA) is a federal law that forbids disability-based discrimination in employment (including job applicants) and postsecondary educational programs
60 UConn s Commitment to Access and Accommodations The University is committed to: Providing reasonable accommodations for qualified persons with disabilities Ensuring that people with disabilities have the same access to programs, opportunities, and activities Eliminating existing barriers that limit full access for persons with disabilities Achieving the full participation and integration of people with disabilities into the University
61 Policy on Providing Information in Alternative Formats Intended to address the needs of individuals requiring access to University materials in alternate formats Interactive process with each person making a request for accommodations and reviews requests on a case-by-case basis Providing alternative formats is a departmental and/or program responsibility
62 Non-Discrimination Policy Statements for Publications, Printed Material and Electronic Media All official University publications, regardless of format, should contain the appropriate nondiscrimination statement
63 Meeting and Event Resources Events and Meetings: Accessibility Checklist for University Events Sample Accessible Event/Meeting Notice
64 Faculty Resources and Instructional Strategies Center for Excellence in Teaching and Learning (CETL) - Course content
65 ATTESTATION I have received annual compliance training, which included an overview of the University of Connecticut Code of Conduct and University Guide to the State Code of Ethics. I have been informed how to ask questions of or to report concerns to the Compliance Office. I understand that University policy prohibits retaliation against any individual asking questions or reporting concerns to the appropriate authority. I understand that violations of the Code of Conduct or the University Guide to the State Code of Ethics may result in disciplinary measures or sanctions by the University and/or Office of State Ethics as appropriate.
BRIDGEPORT BOARD OF EDUCATION 45 LYON TERRACE BRlDGEPORT, CT 06604 OFFICIAL CHILD ABUSE/ NEGLECT POLICY
BRIDGEPORT BOARD OF EDUCATION 45 LYON TERRACE BRlDGEPORT, CT 06604 OFFICIAL CHILD ABUSE/ NEGLECT POLICY The Bridgeport Board of Education ( Board of Education ) recognizes that child abuse and neglect
More informationSAN MATEO COUNTY MENTAL HEALTH SERVICES DIVISION. Assaults on Clients: Suspected or Reported
SAN MATEO COUNTY MENTAL HEALTH SERVICES DIVISION DATE: March 22, 2001 MENTAL HEALTH POLICY: MH 01-03 SUBJECT: Assaults on Clients: Suspected or Reported AUTHORITY: California Welfare and Institution Codes
More informationEvergreen Solar, Inc. Code of Business Conduct and Ethics
Evergreen Solar, Inc. Code of Business Conduct and Ethics A MESSAGE FROM THE BOARD At Evergreen Solar, Inc. (the Company or Evergreen Solar ), we believe that conducting business ethically is critical
More informationHope In-Home Care CODE OF CONDUCT AND ETHICS
Hope In-Home Care CODE OF CONDUCT AND ETHICS September 2014 Table of Contents A MESSAGE FROM OUR DIRECTOR... 3 INTRODUCTION TO THE CODE OF CONDUCT AND ETHICS... 4 ELEMENT 1: QUALITY OF CARE... 5 ELEMENT
More informationPART THREE: TEMPLATE POLICY ON GENDER-BASED VIOLENCE AND THE WORKPLACE
PART THREE: TEMPLATE POLICY ON GENDER-BASED VIOLENCE AND THE WORKPLACE Draft Organization s Bulletin The Secretary-General, for the purpose of preventing and addressing cases of Genderbased Violence (as
More informationCalifornia Mandated Reporting Requirements
California Mandated Reporting Requirements Our Commitment Thistrainingwas created asa a reminder to all employees and contracted providers that California law requires mandatory reporting of known or suspected:
More informationSAMPLE POLICY ON ETHICAL CONDUCT OF INSTRUCTIONAL PERSONNEL AND SCHOOL ADMINISTRATORS
SAMPLE POLICY ON ETHICAL CONDUCT OF INSTRUCTIONAL PERSONNEL AND SCHOOL ADMINISTRATORS CAUTION The attached policy on ethical conduct of instructional personnel and school administrators is provided as
More informationWe will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there
O Business with Integrity O We will pursue our business with honor, fairness, and respect for the individual and the public at large ever mindful that there is no right way to do a wrong thing. Introduction
More informationMOREHOUSE COLLEGE. Standards of Conduct Guide
MOREHOUSE COLLEGE Standards of Conduct Guide Purpose Compliance Risk Management Program 1. Ethical Standards TABLE OF CONTENTS 2. Contacts with the media, government and outside investigators 3. Records
More informationPRIVACY BREACH MANAGEMENT POLICY
PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department
More informationFiscal Policies and Procedures Fraud, Waste & Abuse
DORCHESTER COUNTY, MARYLAND Fiscal Policies and Procedures Fraud, Waste & Abuse Adopted August 11, 2009 SECTION I - INTRODUCTION The County Council of Dorchester County, Maryland approved on August 11,
More informationChecklist for Campus Sexual Misconduct Policies
Checklist for Campus Sexual Misconduct Policies The Task Force to Protect Students from Sexual Assault is committed to supporting institutions of higher education in preventing sexual misconduct, encouraging
More informationELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS
APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors
More informationAVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE
AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health
More informationA A E S C. Albuquerque Ambulatory Eye Surgery Center NOTICE OF PRIVACY PRACTICES
A A E S C Albuquerque Ambulatory Eye Surgery Center NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.
More informationGuilford Medical Associates, P.A.
Page 1 Guilford Medical Associates, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE
More informationStandards for Investigating Child Abuse and Neglect (CA/N) Reports (Levels 1, 2, 3)
Standards for Investigating Child Abuse and Neglect (CA/N) Reports (Levels 1, 2, 3) Rhode Island Department of Children, Youth and Families Policy: 500.0050 Effective Date: July 7, 1984 Revised Date: January
More informationSarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL 34239 Phone 941.954.9990 Fax 941.954.9995
Sarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL 34239 Phone 941.954.9990 Fax 941.954.9995 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY
More informationCLERY ACT CAMPUS SECURITY
CLERY ACT CAMPUS SECURITY 2015 ANNUAL SECURITY REPORT / CRIME STATISTICS Heritage College, Kansas City, Missouri 2012 2013 2014 CRIMINAL OFFENSES ON CAMPUS Burglary 0 0 0 Arrests for liquor law violations,
More informationCUBIC ENERGY, INC. Code of Business Conduct and Ethics
CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To
More informationMEDICAID COMPLIANCE POLICY
6232 MEDICAID COMPLIANCE POLICY It is the policy of the Board of Education that all school district s practices regarding Medicaid claims for services be in compliance with all applicable federal and state
More informationINDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.
More informationHIPAA Privacy Policy & Notice of Privacy Practices
HIPAA Privacy Policy & Notice of Privacy Practices 1. PURPOSE 1 The purpose of this policy is to comply with patient personal health information security rights and privacy regulations as outlined in the
More informationTax-Exempt Organizations Alert: Whistleblower Policies
Tax-Exempt Organizations Alert: Whistleblower Policies Form 990, the annual information return form filed by public charities and other tax-exempt organizations, asks nonprofit organizations to state whether
More informationHow To Report Child Abuse
REPORTING CHILD ABUSE AND ELDER ABUSE Safe Church Practices Training for Presbyterian Ministers, Elders, Deacons, and adults who work with children and youth April 28, 2013 Adults Only No One Under 18
More informationVETERANS RESOURCE CENTERS OF AMERICA CORPORATE COMPLIANCE PLAN
VETERANS RESOURCE CENTERS OF AMERICA CORPORATE COMPLIANCE PLAN COMPLIANCE STATEMENT Veterans Resource Centers of America (VRCOA) is committed to provide the highest quality behavioral health prevention
More informationProcedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
More informationAdministrative Procedures Memorandum A1452
Page 1 of 11 Date of Issue February 2, 2010 Original Date of Issue Subject References February 2, 2010 PRIVACY BREACH PROTOCOL Policy 2197 Management of Personal Information APM 1450 Management of Personal
More informationThis notice describes how psychological and medical information about you may be used and disclosed and how you can get access to this information.
Page 1 of 5 HIPAA Notification Policies and Practices to Protect the Privacy of Your Heath Information This notice describes how psychological and medical information about you may be used and disclosed
More informationPHI Air Medical, L.L.C. Compliance Plan
Page No. 1 of 13 Introduction: The PHI Air Medical, L.L.C. is to be used by employees, contractors and vendors to get a high level understanding of the key regulatory requirements relating to our participation
More informationConnecticut Carpenters Health Fund Privacy Notice
Connecticut Carpenters Health Fund Privacy Notice THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
More informationHIPAA and Privacy Policy Training
HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training
More informationHIPAA Policies and Procedures
HIPAA Policies and Procedures William T. Chen, MD, Inc. General Rule 164.502 A Covered Entity may not use or disclose PHI except as permitted or required by the privacy regulations. Permitted Disclosures:
More information2015 LSU Agricultural Center Training on Title IX and Sexual Harassment SUPPLEMENTAL MATERIAL
2015 LSU Agricultural Center Training on Title IX and Sexual Harassment SUPPLEMENTAL MATERIAL Under various Louisiana and federal laws and regulations, employees are required to receive training annually
More informationUniversity of Illinois at Chicago Student Sexual Misconduct and Sexual Violence Interim Policy
University of Illinois at Chicago Student Sexual Misconduct and Sexual Violence Interim Policy Introduction The University of Illinois at Chicago is committed to creating a safe and secure community for
More information13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
More informationRiver Valley Therapy & Sports Medicine, Inc. Notice of Privacy Practices
River Valley Therapy & Sports Medicine, Inc. Notice of Privacy Practices This notice describes how medical information about you may be used and disclosed and how you can get access to this information.
More informationREPORTING REQUIREMENTS
REPORTING REQUIREMENTS REPORTING REQUIREMENTS Consistent with state law, you must report known or suspected abuse, neglect, and/or exploitation of children and certain adults. Different rules apply to
More informationBradley D. Powell, PhD NOTICE OF PRIVACY PRACTICES: Effective June 1, 2004
Bradley D. Powell, PhD NOTICE OF PRIVACY PRACTICES: Effective June 1, 2004 A Summary of the Provisions of the Health Insurance Portability and Accountability Act ( HIPAA ) Privacy Rule (45 C.F.R. parts
More informationHAZELDENE LOWER SCHOOL
HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016
More informationState University of New York College at Old Westbury. Domestic Violence and the Workplace Policy
State University of New York College at Old Westbury Domestic Violence and the Workplace Policy Policy Statement The persons covered by this policy are: employees of SUNY College at Old Westbury (the College
More informationDestiny Media Technology s Code of Conduct
Destiny Media Technology s Code of Conduct INTRODUCTION Destiny Media Technology s ( Destiny ) reputation depends on the conduct of its employees, officers and directors who have an obligation to Destiny
More informationCT BOARD OF REGENTS FOR HIGHER EDUCATION. RESOLUTION concerning. Sexual Misconduct Reporting, Support Services and Processes Policy
CT BOARD OF REGENTS FOR HIGHER EDUCATION RESOLUTION concerning Policy Regarding Sexual Misconduct Reporting, Support Services and Processes Policy January 15, 2015 WHEREAS, The Board of Regents in accord
More informationWHAT HAPPENS NEXT? A guide to the NORTH DAKOTA CHILD PROTECTION SERVICES. This guide is made available by
WHAT HAPPENS NEXT? A guide to the NORTH DAKOTA CHILD PROTECTION SERVICES This guide is made available by NORTH DAKOTA CHILD PROTECTION SERVICES CHILDREN AND FAMILY SERVICES North Dakota Department of Human
More informationPolicies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
More informationMOUNT ROYAL UNIVERSITY
MOUNT ROYAL UNIVERSITY PERFORMANCE APPRAISAL FORM ANNUAL REVIEW Employee Name: Department: Position Title: Appraisal Period: To: SECTION I: AREAS OF RESPONSIBILITY AND OBJECTIVES This performance appraisal
More informationEADS-NA Code of Ethics
Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and
More informationBARRICK GOLD CORPORATION
BARRICK GOLD CORPORATION Code of Business Conduct and Ethics Introduction Barrick s success is built on a foundation of personal and professional integrity and commitment to excellence. As a company and
More informationSUNY Delhi Domestic Violence and the Workplace Policy
SUNY Delhi Domestic Violence and the Workplace Policy Policy Statement Domestic violence permeates the lives and compromises the safety of thousands of New York State employees each day, with tragic, destructive,
More informationELECTRO RENT CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS CANADA
ELECTRO RENT CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS CANADA Dear Colleague: Since its founding in 1965, Electro Rent has always prided itself on maintaining and delivering quality products and
More informationSDC-League Health Fund
SDC-League Health Fund 1501 Broadway, 17 th Floor New York, NY 10036 Tel: 212-869-8129 Fax: 212-302-6195 E-mail: health@sdcweb.org NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION
More information1. Compliance with Laws, Rules and Regulations
CODE OF BUSINESS CONDUCT - EXAMPLE INTRODUCTION This Code of Business Conduct covers a wide range of business practices and procedures. It does not cover every issue that may arise, but it sets out basic
More informationR345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
More informationIF YOU HAVE ANY QUESTIONS ABOUT THIS NOTICE OR IF YOU NEED MORE INFORMATION, PLEASE CONTACT OUR PRIVACY OFFICER:
NOTICE OF PRIVACY PRACTICES COMPLETE EYE CARE THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED OR DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
More informationHelix Energy Solutions Group, Inc. Code of Business Conduct and Ethics
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not
More informationPC CONNECTION, INC. CODE OF BUSINESS CONDUCT AND ETHICS
I. Purpose. PC CONNECTION, INC. CODE OF BUSINESS CONDUCT AND ETHICS Applicable to All Subsidiaries To establish uniform standards of conduct under which each of the PC Connection, Inc. family of companies
More informationGuidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
More informationFrequently Asked Questions: Reporting Child Abuse and Neglect in the University System of Maryland
Frequently Asked Questions: Reporting Child Abuse and Neglect in the University System of Maryland I. What Constitutes Child Abuse and Neglect A. What is Child Abuse? Abuse is defined in Maryland law as
More informationCODE OF BUSINESS CONDUCT AND ETHICS
1.0 INTRODUCTION Integrity is a core value of British Columbia Ferry Services Inc. and its subsidiaries ( BCF or the Company ). It is a fundamental principle of this organization that all Directors, Officers,
More informationHARTFORD PUBLIC SCHOOLS DISTRICT SAFE SCHOOL CLIMATE PLAN
HARTFORD PUBLIC SCHOOLS DISTRICT SAFE SCHOOL CLIMATE PLAN The Hartford Public Schools Board of Education is committed to creating and maintaining a physically, emotionally, and intellectually safe educational
More informationCode of Business Conduct
Code of Business Conduct Our Employees We treat each other with fairness, respect, and dignity, offering equal opportunities to all individuals. Intimidation, harassment, or discrimination based on race,
More informationHIPAA Compliance. 2013 Annual Mandatory Education
HIPAA Compliance 2013 Annual Mandatory Education What is HIPAA? Health Insurance Portability and Accountability Act Federal Law enacted in 1996 that mandates adoption of Privacy protections for health
More informationCompliance Program and HIPAA Training For First Tier, Downstream and Related Entities
Compliance Program and HIPAA Training For First Tier, Downstream and Related Entities 09/2011 Training Goals In this training you will gain an understanding of: Our Compliance Program elements Pertinent
More informationMessage from the Co-Chairmen and Chief Executive Officers
Message from the Co-Chairmen and Chief Executive Officers As each of us works to meet individual and Company-wide business goals here at Torchmark, we must all ensure that the work we perform and the business
More informationAcceptable Use Policy
Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal
More informationTHE CIPM ASSOCIATION CODE OF ETHICS AND STANDARDS OF PROFESSIONAL CONDUCT PREAMBLE THE CODE OF ETHICS
THE CIPM ASSOCIATION CODE OF ETHICS AND STANDARDS OF PROFESSIONAL CONDUCT PREAMBLE The CIPM Association Code of Ethics and Standards of Professional Conduct (Code and Standards) are essential to achieving
More informationGeneral Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to:
General Compliance Training General Compliance Training i The University of Texas Medical Branch at Galveston Course Overview General Compliance The intent of the Compliance Program is to: Promote compliance
More informationVALPARAISO UNIVERSITY NOTICE OF PRIVACY PRACTICES. Health, Dental and Vision Benefits Health Care Reimbursement Account
VALPARAISO UNIVERSITY NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
More informationPATHWAYS CMH. POLICY TITLE: ABUSE AND NEGLECT EFFECTIVE DATE: April 14, 2003 REVIEW DATE: July 11, 2013
PATHWAYS CMH POLICY TITLE: ABUSE AND NEGLECT EFFECTIVE DATE: April 14, 2003 REVIEW DATE: July 11, 2013 RESPONSIBLE PARTY: Recipient Rights Supervisor or Designee CATEGORY: RECIPIENT RIGHTS BOARD APPROVAL
More informationDefinitions For purposes of this policy, the following terms will be defined as follows.
The College at Brockport State University of New York Policy Title: Domestic Violence in the Workplace Policy Category: Human Resources Responsible Office: Human Resources Date: Revised December 2013 Domestic
More informationIMAX CORPORATION PROTOCOL FOR REPORTING SUSPECTED VIOLATIONS OF THE IMAX CODE OF ETHICS. (Whistle Blower Program)
IMAX CORPORATION PROTOCOL FOR REPORTING SUSPECTED VIOLATIONS OF THE IMAX CODE OF ETHICS (Whistle Blower Program) November 2004 (updated February 2012) PROTOCOL FOR REPORTING SUSPECTED VIOLATIONS OF THE
More informationREPORTING CHILD ABUSE
CHILD CARE LAW CENTER 221 PINE STREET, 3 RD FLOOR SAN FRANCISCO CALIFORNIA 94104 TELEPHONE: 415.394.7144 FAX: 415.394.7140 E-MAIL: INFO@CHILDCARELAW.ORG LEGAL ISSUES FOR FAMILY CHILD CARE PROVIDERS IN
More informationHow To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
More informationDr. Adam Apfelblat 5140 Highland Road Waterford 48327 Phone: (248)618-3467 Fax: (248)618-3515
Dr. Adam Apfelblat 5140 Highland Road Waterford 48327 HIPAA NOTICE OF PRIVACY PRACTICES PLEASE REVIEW THIS NOTICE CAREFULLY. IT DESCRIBES HOW YOUR MEDICAL INFORMATION MAY BE USED AND DISCLOSED AND HOW
More information13.4 PHI Air Medical Code of Conduct
I. PURPOSE PHI Air Medical continually strives to provide high quality emergency care and medical transportation services to our patients, and to maintain high standards of integrity in our dealings with
More informationCorporate Compliance and Ethics Program Effective as adopted on February 21, 2012
Corporate Compliance and Ethics Program Effective as adopted on February 21, 2012 Page 1 of 7 SECTION 1. STATEMENT OF INTENT As a specialty pharmaceutical company and diagnostic laboratory, Prometheus
More informationSenior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES
Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the
More informationState of Arizona Reporting Procedures
Arizona Department of Education Arizona State Board of Education State of Arizona Reporting Procedures October 2012 Table of Contents Preface 3 Section One: Reporting Statutes Reporting to law enforcement
More informationCODE OF ETHICS POLICY
CODE OF ETHICS POLICY The YMCA's reputation is dependent upon the good judgment, ethical standards and personal integrity of every individual in the YMCA. As the YMCA continues to grow, it is of paramount
More informationUniversity of New England. Institutional Compliance Plan and Codes of Conduct
University of New England Institutional Compliance Plan and Codes of Conduct I. Mission, Introduction and Purpose The University of New England is an independent, entrepreneurial institution committed
More informationCalifornia Mutual Insurance Company Code of Business Conduct and Ethics
California Mutual Insurance Company Code of Business Conduct and Ethics This Code of Business Conduct and Ethics (the Code ) applies to all officers, employees, and directors of California Mutual Insurance
More informationPolicy on Sexual Assault, Stalking, Dating Violence, and Domestic Violence
Administrative Regulation 6:2 Responsible Office: Title IX Coordinator / VP Student Affairs Date Effective: 12/3/2014 Supersedes Version: 9/30/2014 (Interim) Policy on Sexual Assault, Stalking, Dating
More informationB. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.
Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER
More informationI. Introduction. 1919 Madison Avenue, New York, NY 10035 tel: 212-987-1777 toll free: 866-778-6827 fax: 212-987-1776
I. Introduction The Ralph Lauren Center for Cancer Care ( RLCCC or The Center ) operates a freestanding diagnostic and treatment center, licensed under Article 28 of the New York State health law, located
More informationCOURTNEE A. PELTON, PSY.D.
1 COURTNEE A. PELTON, PSY.D. 703-343-0849 CPELTON.PSYCH@GMAIL.COM Outpatient Services Contract Welcome to my practice. This agreement contains important information about my professional services and office
More informationNOTICE OF PRIVACY PRACTICES ILLINOIS EYE CENTER
NOTICE OF PRIVACY PRACTICES ILLINOIS EYE CENTER THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED OR DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
More informationMANDATED REPORTING OF CHILD NEGLECT OR PHYSICAL OR SEXUAL ABUSE 214. A. Child means a person under age 18.
I. PURPOSE It is the policy of Lakes International Language Academy (the school ) to maintain this policy on mandated reporting of child neglect or physical or sexual abuse. The purpose of this policy
More informationFor purposes of this policy, the following terms will be defined as follows.
DOMESTIC VIOLENCE AND THE WORKPLACE POLICY STATEMENT The City University of New York ( CUNY ) disapproves of violence against women, men, or children in any form, whether as an act of workplace violence
More informationVOLUNTEER POLICY MANUAL. Volunteer Escambia
VOLUNTEER POLICY MANUAL Escambia County Board of County Commissioners Volunteer Escambia This Volunteer Policy Manual is intended to establish and explain the policies by which volunteers will be incorporated
More information3/24/16. Why School Nurses? Legal and Practical Issues for the School Nurse: a Global Approach: a Global Approach
Legal and Practical Issues for the School Nurse: a Global Approach: a Global Approach Gary R. Brochu March 31, 2016 Shipman & Goodwin LLP 2016. All rights reserved. Why School Nurses? Conn. Gen. Stat.
More informationUNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
More informationNew Housing Rights for Victims of Domestic Violence, Rape, Sexual Assault and Stalking
New Housing Rights for Victims of Domestic Violence, Rape, Sexual Assault and Stalking Victims of domestic violence, rape, sexual assault and stalking have increased rights and protections under a new
More informationParent s Guide. to Child Protective Services (CPS) Children s. Administration. Division. of Children. and Family. Services
Parent s Guide to Child Protective Services (CPS) Children s Administration Division of Children and Family Services Table Of Contents Topic Page What Is Child Protective Services (CPS)?... What Is Child
More information5151.7. Students. Reporting Child Abuse or Neglect
Reporting Child Abuse or Neglect In compliance with state law, any District, employee having reasonable cause to suspect that a child seen in the course of professional duties has been abused or neglected
More informationATLANTIS CHIROPRACTIC, INC.
ATLANTIS CHIROPRACTIC, INC. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THAT INFORMATION PLEASE REVIEW THIS
More informationDr. Sunette Steyn Executive Chairperson DATE: 11 November 2009 POLICY NO. : HB/01/2009 SECTION: 1 VERSION: 1
Page 3 of 186 DEPARTMENT: HUMAN RESOURCES Child Protection Policy PREPARED BY: Teresa McNeill APPROVED BY: Dr. Sunette Steyn Executive Chairperson DATE: 11 November 2009 POLICY NO. : HB/01/2009 SECTION:
More informationNOTICE OF PRIVACY PRACTICES Allergy Treatment Center of New Jersey, P.C. Effective Date: April 14, 2003
Allergy Treatment Center of New Jersey, P.C. 388 Pompton Avenue 415 Avenel Street Cedar Grove, NJ 07009 Avenel, NJ 07001 (973) 857 9890 (732) 636-7030 NOTICE OF PRIVACY PRACTICES Allergy Treatment Center
More informationUNIVERSITY COMPLIANCE PLAN
UNIVERSITY COMPLIANCE PLAN Objectives of the Compliance Program The University Compliance Program provides a proactive program that ensures full compliance with all applicable policies, procedures, laws
More informationa. employees Company; or
Code of Busines ss Conduct and Ethics 1. Introduction a. This Code of Business Conduct and Ethics (the Code ) applies to all directors, officers, employees and third parties employed or directly engaged
More information