2016 Compliance Training

Size: px
Start display at page:

Download "2016 Compliance Training"

Transcription

1 2016 Compliance Training EMERGENCY EXITS ELECTRONIC DEVICES ATTESTATION SHEETS ONLINE TRAINING DEADLINE TOPICS

2 Office of Audit, Compliance & Ethics University Code of Conduct and the Importance of Individual Behaviors

3 Code of Conduct "reflects the covenant that an organization has made to uphold its most important values, dealing with such matters as its commitment to employees, its standards for doing business and its relationship with the community." Driscoll, Dawn-Marie and W. Michael Hoffman, Ethics Matters: How to Implement Values-Driven Management, 2000, p. 77.

4 Purpose of the Code of Conduct Sets basic standards of workplace behavior States publicly the University s long-term commitment to the highest standards of integrity Assures that faculty, administrators and staff understand their shared responsibility for keeping the University in compliance

5 Standards Education Research Patient Care Campus-wide Business, Fiscal and Legal External Relations and University Advancement

6 Individual Behaviors Consult the Code of Conduct Seek guidance from appropriate individuals or offices Individual Responsibility Institutional Success Violations may result in appropriate disciplinary measures

7 Reportline If you wish to report a concern or a suspected violation anonymously you may contact the University s REPORTLINE Available 24 hours a day, 7 days a week Independent specialists trained to obtain complete and accurate information in a confidential manner Phone: Web reporting address:

8 University policy prohibits retaliation if you report in good faith a compliance concern to any supervisor, faculty, administrator, the Compliance Office, the REPORTLINE or any appropriate agency outside of the University Non-Retaliation

9 Office of Audit, Compliance & Ethics University Guide to the State Code of Ethics

10 State Code of Ethics for Public Officials Part of the Connecticut General Statutes Intended to prevent individuals from using their public position or authority for personal financial benefit University s policy is based upon the State Code

11 University Guide to the State Code of Ethics A conflict of interest (COI) occurs when an individual s personal interests diverge from his/her obligations as a state employee COI may take many forms including: Gifts Outside Employment Financial Benefit Contracts with the State Appearance fees

12 Gifts University employees generally may not accept gifts, discounts or gratuities from prohibited donors Anyone doing or seeking to do business with the University Anyone engaged in activities directly regulated by the University A lobbyist (current list can be found on the Office of State Ethics website) A contractor pre-qualified by Department of Administrative Services (DAS)

13 Gifts Gift exceptions: Items offered to the public at large Items valued at less than $10 with annual total equaling less than $50 Food and beverage less than $50 total in a calendar year from each donor and only if the person paying is in attendance Gifts valued at less than $100 from a supervisor or subordinate Major life events Gifts to the state

14 Outside Employment University employees may not: Use their state position to obtain another job Use state resources for their outside employment Compromise independent judgment Disclose confidential information from state service Benefit the private employer in any way through their official actions

15 Employees may not: Promote Advertise Outside Employment Solicit personal business through use of state resources

16 Faculty Consulting Faculty & AAUP Members State Ethics Exemption: Activity cannot be related to state employment Activity is related to expertise Must receive compensation (except royalties) o If compensation is only coverage of travel expenses and the faculty member will not net any compensation a consulting form is not needed. Instead, a necessary expenses form (and possibly a travel request) are required.

17 Appearance Fees May not accept fees/honorarium for appearances, speeches or articles written in an official state capacity Applies if state position was a significant factor in being asked Necessary expenses may only be accepted for items for which the University would otherwise pay

18 Necessary Expenses Reporting Reported directly to the Office of State Ethics within 30 days of receiving payment or reimbursement

19 Contracts with the State Unless an open and public process has been completed: Employees and their family members or business associates may not enter into a contract (valued at $100 or more) with the state

20 Political Activity Employees are not prohibited from seeking political office as long as it is not done on State time or with State equipment No employee of the University will engage in partisan political activities while on state time No employee will use state materials or equipment for the purpose of influencing a political election

21 Post-State Employment You may never use confidential information for financial gain You may not represent anyone concerning any matter in which you personally and substantially participated while in state service You may not, for one year, represent anyone before your former agency for compensation If you participated substantially in the negotiation or award of a state contract valued at $50,000 or more, you may not accept employment with a party to the contract for one year after leaving state service, if you resign within one year after the contract was signed

22 Office of Audit, Compliance & Ethics Information UConn

23 What is Privacy? Right to be left alone? Right to make decisions about your personal information? Right to have others who hold or use your data to keep it confidential?

24 What are the Rules? Privacy Rules (laws, regulations) are based on internationally recognized Fair Information Privacy Principles (FIPPS)

25 Difference Between Privacy & (Data) Security Lots of philosophical discussions about the difference Practically speaking at UConn, it comes down to this: Privacy is the WHAT: Privacy dictates what information we need to protect Security is the HOW: Security is the measures we take to go about protecting that information

26 The WHAT What is considered private?

27 What Information is Considered private or confidential at UConn? Confidential Data: requires highest level of privacy protection by law (e.g., student data, medical data, financial data) or through contract (e.g., non-disclosure agreements) Protected Data: must be protected, but can be released through appropriate University procedures (most University data falls in this category) Public Data: considered public and widely available to all users usually through websites, brochures or mailings

28 The HOW How do we secure what we consider to be private?

29 Information Security Policies and Protocols Available at Check out resources available through the Information Security Office (ISO) at Additional guidance is available at

30 Information Management: Combining the What & the How

31 What is a Record? recorded data or information relating to the conduct of the [University s] business prepared, owned, used, received or retained by [the University] whether such data or information be handwritten, typed, taperecorded, printed, photo-stated, photographed or recorded by any other method.

32 Records & Information Management (RIM) Lifecycle of a record Creation Records Retention Proper Storage Maintenance Privacy Information Security Destruction

33 RIM Steps 1. Inventory 2. Records Review 3. Clean up and clear out! 4. Privacy & Security review (paper & electronic) 5. Rinse & Repeat

34 When things go wrong: What happens when the WHAT or the HOW are compromised?

35

36 Repercussions for Inadequate Information Management Costs of the clean up Reputational harm Employment actions (for violations of law/university policy) Regulatory enforcement/litigation

37 My Role: Understanding the What and the How

38 Information Management & Me 1. Know what your responsibilities are What are my job duties? Am I a data custodian? For WHAT records? (And WHAT are their data classifications (public, protected, private)? Know the HOW for the records you have access to as part of your job (what level of security is required/best practice?) Understand the difference between what you CAN access and what you SHOULD access

39 Information Management & Me 2. Inventory your records Know what records you are responsible for Know where you are storing your records Have a game plan for how long you/your office will retain records Know where to get more info about RIM & Records Retention requirements at UConn:

40 Information Management & Me 3. Know what records you are permitted to access as part of your job duties Only access what you are permitted to and when you are permitted to Refer/defer to appropriate offices/records custodians when it is not your role to access the info or to answer questions about the info

41 Information Management & Me 4. Even if your access to a record is appropriate, know to whom and under what circumstances you can share information (both inside & outside the University)

42 Information Management & Me 5. Keep control of University devices and data storage locations Inventory Control tagging devices Physical Security use strong passwords, don t share passwords, lock or log out of computers, encrypt sensitive files, lock doors to storage areas where records or devices are housed, know who has access to spaces where data is stored

43 Information Management & Me 6. DO NOT keep copies of records you do not need for a business purpose Whenever possible do not store records locally Maintain records in source systems Protect any records that do need to be stored

44 Information Management & Me 7. DO store sensitive University information securely Ensure paper records are physically secured Ensure electronic records are stored on professionally maintained and encrypted computers Work with UITS to identify secure storage locations

45 Information Management & Me 8. DO transmit sensitive University data securely is not a secure transmission method FileLocker is a secure file transfer tool Do not assume recipient is secure, be particularly vigilant if sending outside of the University

46 Information Management & Me 9. Know who and what to report when things go wrong Suspect a compromised WHAT or HOW? Follow the University s Protocols: i. Report missing devices ii. Report compromised devices, systems iii. Report missing paper or compromised to physical security iv. Security Incident Protocol (activate the Security Incident Team ) v. Report suspected Identity Theft ( Red Flags )

47 Information Management & Me 10. Know where to seek help Contact the University Privacy Officer: Rachel Krinsky Rudnick (860) Contact the Information Security Office: Jason Pufahl (860)

48 Office of Audit, Compliance & Ethics Various Topics

49 Reporting Requirements under the NEW Policy Against Discrimination, Harassment and Related Interpersonal Violence

50 Sexual Violence, Intimate Partner Violence, Stalking Criminal Acts Violations of University Policy

51 Reporting Obligations - Sexual Assault, Intimate Partner Violence And Stalking WHEN & TO WHOM YOU MUST REPORT If you witness any sexual assault, intimate partner violence, stalking, first call 911, then report to ODE as soon as possible If you receive a report of a sexual assault, intimate partner violence or stalking, you must report this information as soon as possible to: The Office of Diversity and Equity ( ) YOUR REPORT SHOULD INCLUDE: Date, time and location of the incident Details known to you regarding the incident Date the incident was reported to you Identity of the victim and perpetrator (if disclosed) Your identity and contact information

52 Protection of Minors

53 Child Abuse and Neglect Reporting All University Employees are Mandated Reporters Child abuse occurs when a child under the age of 18 has had physical injury inflicted upon him or her other than by accidental means, has injuries at variance with history given of them, or is in a condition resulting in maltreatment, such as, but not limited to, malnutrition, sexual molestation or exploitation, deprivation of necessities, emotional maltreatment or cruel punishment Child neglect occurs when a child under the age of 18 has been abandoned, is being denied proper care and attention physically, emotionally, or morally, or is being permitted to live under conditions, circumstances or associations injurious to his well-being

54 Child Abuse and Neglect Reporting For further guidance: The Department of Children and Families 24 hour hotline REMINDER: Any employee who has witnessed or received a report of a sexual assault must comply with the University policy by reporting to ODE, regardless of the age of the victim. Many employees also have a duty to call the UConn Police

55 Best Practices: Examples of Standards of Conduct for those working with Minors Background Checks Criminal background checks of all those involved in the program or activity Appropriate Communication Prohibition concerning engaging minors via telephone, internet, or social media unless justified by the program or activity Consent / Waivers Written consent of parent or legal guardian before permitting minor to engage in overnight activities Training Training for all those involved in the program or activity Pick-up / Drop-off Procedures for the pick-up and dropoff of program participants Privacy / Boundaries Procedures for areas where minors are likely to be showering, bathing, sleeping or dressing Supervision Procedures to ensure adequate levels of supervision at all times and that no minor be left alone with less than 2 authorized adults Transportation Procedures to ensure that minors are not transported in the personal vehicles of authorized adults unless required by program or activity and no less than two responsible adults are present in the vehicle at all times

56 Best Practices: Residential Programs Involving Minors Fundamental protocols for overnight programs: Curfews Substance-free housing and facilities Separate accommodations for adults and participants Control access to program participants Close and careful Residential supervision by those who have received training on how to receive disclosures, provide resources and support, and how to report appropriately and immediately following any incidents or disclosures (to supervisors, UCPD, ODE and DCF)

57 Minor Protection Coordinator For further guidance: Omar Andujar Minor Protection Coordinator Office of Audit, Compliance & Ethics Telephone: (860)

58 Access and Accommodations ADA

59 What is the ADA? The Americans with Disabilities Act of 1990 (ADA) is a federal law that forbids disability-based discrimination in employment (including job applicants) and postsecondary educational programs

60 UConn s Commitment to Access and Accommodations The University is committed to: Providing reasonable accommodations for qualified persons with disabilities Ensuring that people with disabilities have the same access to programs, opportunities, and activities Eliminating existing barriers that limit full access for persons with disabilities Achieving the full participation and integration of people with disabilities into the University

61 Policy on Providing Information in Alternative Formats Intended to address the needs of individuals requiring access to University materials in alternate formats Interactive process with each person making a request for accommodations and reviews requests on a case-by-case basis Providing alternative formats is a departmental and/or program responsibility

62 Non-Discrimination Policy Statements for Publications, Printed Material and Electronic Media All official University publications, regardless of format, should contain the appropriate nondiscrimination statement

63 Meeting and Event Resources Events and Meetings: Accessibility Checklist for University Events Sample Accessible Event/Meeting Notice

64 Faculty Resources and Instructional Strategies Center for Excellence in Teaching and Learning (CETL) - Course content

65 ATTESTATION I have received annual compliance training, which included an overview of the University of Connecticut Code of Conduct and University Guide to the State Code of Ethics. I have been informed how to ask questions of or to report concerns to the Compliance Office. I understand that University policy prohibits retaliation against any individual asking questions or reporting concerns to the appropriate authority. I understand that violations of the Code of Conduct or the University Guide to the State Code of Ethics may result in disciplinary measures or sanctions by the University and/or Office of State Ethics as appropriate.

BRIDGEPORT BOARD OF EDUCATION 45 LYON TERRACE BRlDGEPORT, CT 06604 OFFICIAL CHILD ABUSE/ NEGLECT POLICY

BRIDGEPORT BOARD OF EDUCATION 45 LYON TERRACE BRlDGEPORT, CT 06604 OFFICIAL CHILD ABUSE/ NEGLECT POLICY BRIDGEPORT BOARD OF EDUCATION 45 LYON TERRACE BRlDGEPORT, CT 06604 OFFICIAL CHILD ABUSE/ NEGLECT POLICY The Bridgeport Board of Education ( Board of Education ) recognizes that child abuse and neglect

More information

SAN MATEO COUNTY MENTAL HEALTH SERVICES DIVISION. Assaults on Clients: Suspected or Reported

SAN MATEO COUNTY MENTAL HEALTH SERVICES DIVISION. Assaults on Clients: Suspected or Reported SAN MATEO COUNTY MENTAL HEALTH SERVICES DIVISION DATE: March 22, 2001 MENTAL HEALTH POLICY: MH 01-03 SUBJECT: Assaults on Clients: Suspected or Reported AUTHORITY: California Welfare and Institution Codes

More information

Evergreen Solar, Inc. Code of Business Conduct and Ethics

Evergreen Solar, Inc. Code of Business Conduct and Ethics Evergreen Solar, Inc. Code of Business Conduct and Ethics A MESSAGE FROM THE BOARD At Evergreen Solar, Inc. (the Company or Evergreen Solar ), we believe that conducting business ethically is critical

More information

Hope In-Home Care CODE OF CONDUCT AND ETHICS

Hope In-Home Care CODE OF CONDUCT AND ETHICS Hope In-Home Care CODE OF CONDUCT AND ETHICS September 2014 Table of Contents A MESSAGE FROM OUR DIRECTOR... 3 INTRODUCTION TO THE CODE OF CONDUCT AND ETHICS... 4 ELEMENT 1: QUALITY OF CARE... 5 ELEMENT

More information

PART THREE: TEMPLATE POLICY ON GENDER-BASED VIOLENCE AND THE WORKPLACE

PART THREE: TEMPLATE POLICY ON GENDER-BASED VIOLENCE AND THE WORKPLACE PART THREE: TEMPLATE POLICY ON GENDER-BASED VIOLENCE AND THE WORKPLACE Draft Organization s Bulletin The Secretary-General, for the purpose of preventing and addressing cases of Genderbased Violence (as

More information

California Mandated Reporting Requirements

California Mandated Reporting Requirements California Mandated Reporting Requirements Our Commitment Thistrainingwas created asa a reminder to all employees and contracted providers that California law requires mandatory reporting of known or suspected:

More information

SAMPLE POLICY ON ETHICAL CONDUCT OF INSTRUCTIONAL PERSONNEL AND SCHOOL ADMINISTRATORS

SAMPLE POLICY ON ETHICAL CONDUCT OF INSTRUCTIONAL PERSONNEL AND SCHOOL ADMINISTRATORS SAMPLE POLICY ON ETHICAL CONDUCT OF INSTRUCTIONAL PERSONNEL AND SCHOOL ADMINISTRATORS CAUTION The attached policy on ethical conduct of instructional personnel and school administrators is provided as

More information

We will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there

We will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there O Business with Integrity O We will pursue our business with honor, fairness, and respect for the individual and the public at large ever mindful that there is no right way to do a wrong thing. Introduction

More information

MOREHOUSE COLLEGE. Standards of Conduct Guide

MOREHOUSE COLLEGE. Standards of Conduct Guide MOREHOUSE COLLEGE Standards of Conduct Guide Purpose Compliance Risk Management Program 1. Ethical Standards TABLE OF CONTENTS 2. Contacts with the media, government and outside investigators 3. Records

More information

PRIVACY BREACH MANAGEMENT POLICY

PRIVACY BREACH MANAGEMENT POLICY PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department

More information

Fiscal Policies and Procedures Fraud, Waste & Abuse

Fiscal Policies and Procedures Fraud, Waste & Abuse DORCHESTER COUNTY, MARYLAND Fiscal Policies and Procedures Fraud, Waste & Abuse Adopted August 11, 2009 SECTION I - INTRODUCTION The County Council of Dorchester County, Maryland approved on August 11,

More information

Checklist for Campus Sexual Misconduct Policies

Checklist for Campus Sexual Misconduct Policies Checklist for Campus Sexual Misconduct Policies The Task Force to Protect Students from Sexual Assault is committed to supporting institutions of higher education in preventing sexual misconduct, encouraging

More information

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS

ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS APPENDIX I ELEMENT FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS As of December 14, 2011 1. Introduction This Code of Business Conduct and Ethics ( Code ) has been adopted by our Board of Directors

More information

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health

More information

A A E S C. Albuquerque Ambulatory Eye Surgery Center NOTICE OF PRIVACY PRACTICES

A A E S C. Albuquerque Ambulatory Eye Surgery Center NOTICE OF PRIVACY PRACTICES A A E S C Albuquerque Ambulatory Eye Surgery Center NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

More information

Guilford Medical Associates, P.A.

Guilford Medical Associates, P.A. Page 1 Guilford Medical Associates, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE

More information

Standards for Investigating Child Abuse and Neglect (CA/N) Reports (Levels 1, 2, 3)

Standards for Investigating Child Abuse and Neglect (CA/N) Reports (Levels 1, 2, 3) Standards for Investigating Child Abuse and Neglect (CA/N) Reports (Levels 1, 2, 3) Rhode Island Department of Children, Youth and Families Policy: 500.0050 Effective Date: July 7, 1984 Revised Date: January

More information

Sarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL 34239 Phone 941.954.9990 Fax 941.954.9995

Sarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL 34239 Phone 941.954.9990 Fax 941.954.9995 Sarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL 34239 Phone 941.954.9990 Fax 941.954.9995 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY

More information

CLERY ACT CAMPUS SECURITY

CLERY ACT CAMPUS SECURITY CLERY ACT CAMPUS SECURITY 2015 ANNUAL SECURITY REPORT / CRIME STATISTICS Heritage College, Kansas City, Missouri 2012 2013 2014 CRIMINAL OFFENSES ON CAMPUS Burglary 0 0 0 Arrests for liquor law violations,

More information

CUBIC ENERGY, INC. Code of Business Conduct and Ethics

CUBIC ENERGY, INC. Code of Business Conduct and Ethics CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To

More information

MEDICAID COMPLIANCE POLICY

MEDICAID COMPLIANCE POLICY 6232 MEDICAID COMPLIANCE POLICY It is the policy of the Board of Education that all school district s practices regarding Medicaid claims for services be in compliance with all applicable federal and state

More information

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3 INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.

More information

HIPAA Privacy Policy & Notice of Privacy Practices

HIPAA Privacy Policy & Notice of Privacy Practices HIPAA Privacy Policy & Notice of Privacy Practices 1. PURPOSE 1 The purpose of this policy is to comply with patient personal health information security rights and privacy regulations as outlined in the

More information

Tax-Exempt Organizations Alert: Whistleblower Policies

Tax-Exempt Organizations Alert: Whistleblower Policies Tax-Exempt Organizations Alert: Whistleblower Policies Form 990, the annual information return form filed by public charities and other tax-exempt organizations, asks nonprofit organizations to state whether

More information

How To Report Child Abuse

How To Report Child Abuse REPORTING CHILD ABUSE AND ELDER ABUSE Safe Church Practices Training for Presbyterian Ministers, Elders, Deacons, and adults who work with children and youth April 28, 2013 Adults Only No One Under 18

More information

VETERANS RESOURCE CENTERS OF AMERICA CORPORATE COMPLIANCE PLAN

VETERANS RESOURCE CENTERS OF AMERICA CORPORATE COMPLIANCE PLAN VETERANS RESOURCE CENTERS OF AMERICA CORPORATE COMPLIANCE PLAN COMPLIANCE STATEMENT Veterans Resource Centers of America (VRCOA) is committed to provide the highest quality behavioral health prevention

More information

Procedure for Managing a Privacy Breach

Procedure for Managing a Privacy Breach Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access

More information

Administrative Procedures Memorandum A1452

Administrative Procedures Memorandum A1452 Page 1 of 11 Date of Issue February 2, 2010 Original Date of Issue Subject References February 2, 2010 PRIVACY BREACH PROTOCOL Policy 2197 Management of Personal Information APM 1450 Management of Personal

More information

This notice describes how psychological and medical information about you may be used and disclosed and how you can get access to this information.

This notice describes how psychological and medical information about you may be used and disclosed and how you can get access to this information. Page 1 of 5 HIPAA Notification Policies and Practices to Protect the Privacy of Your Heath Information This notice describes how psychological and medical information about you may be used and disclosed

More information

PHI Air Medical, L.L.C. Compliance Plan

PHI Air Medical, L.L.C. Compliance Plan Page No. 1 of 13 Introduction: The PHI Air Medical, L.L.C. is to be used by employees, contractors and vendors to get a high level understanding of the key regulatory requirements relating to our participation

More information

Connecticut Carpenters Health Fund Privacy Notice

Connecticut Carpenters Health Fund Privacy Notice Connecticut Carpenters Health Fund Privacy Notice THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.

More information

HIPAA and Privacy Policy Training

HIPAA and Privacy Policy Training HIPAA and Privacy Policy Training July 2015 1 This training addresses the requirements for maintaining the privacy of confidential information received from HFS and DHS (the Agencies). During this training

More information

HIPAA Policies and Procedures

HIPAA Policies and Procedures HIPAA Policies and Procedures William T. Chen, MD, Inc. General Rule 164.502 A Covered Entity may not use or disclose PHI except as permitted or required by the privacy regulations. Permitted Disclosures:

More information

2015 LSU Agricultural Center Training on Title IX and Sexual Harassment SUPPLEMENTAL MATERIAL

2015 LSU Agricultural Center Training on Title IX and Sexual Harassment SUPPLEMENTAL MATERIAL 2015 LSU Agricultural Center Training on Title IX and Sexual Harassment SUPPLEMENTAL MATERIAL Under various Louisiana and federal laws and regulations, employees are required to receive training annually

More information

University of Illinois at Chicago Student Sexual Misconduct and Sexual Violence Interim Policy

University of Illinois at Chicago Student Sexual Misconduct and Sexual Violence Interim Policy University of Illinois at Chicago Student Sexual Misconduct and Sexual Violence Interim Policy Introduction The University of Illinois at Chicago is committed to creating a safe and secure community for

More information

13.19 ETHICS REPORTING POLICY AND PROCEDURE

13.19 ETHICS REPORTING POLICY AND PROCEDURE 13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment

More information

River Valley Therapy & Sports Medicine, Inc. Notice of Privacy Practices

River Valley Therapy & Sports Medicine, Inc. Notice of Privacy Practices River Valley Therapy & Sports Medicine, Inc. Notice of Privacy Practices This notice describes how medical information about you may be used and disclosed and how you can get access to this information.

More information

REPORTING REQUIREMENTS

REPORTING REQUIREMENTS REPORTING REQUIREMENTS REPORTING REQUIREMENTS Consistent with state law, you must report known or suspected abuse, neglect, and/or exploitation of children and certain adults. Different rules apply to

More information

Bradley D. Powell, PhD NOTICE OF PRIVACY PRACTICES: Effective June 1, 2004

Bradley D. Powell, PhD NOTICE OF PRIVACY PRACTICES: Effective June 1, 2004 Bradley D. Powell, PhD NOTICE OF PRIVACY PRACTICES: Effective June 1, 2004 A Summary of the Provisions of the Health Insurance Portability and Accountability Act ( HIPAA ) Privacy Rule (45 C.F.R. parts

More information

HAZELDENE LOWER SCHOOL

HAZELDENE LOWER SCHOOL HAZELDENE LOWER SCHOOL POLICY AND PROCEDURES FOR MONITORING EQUIPMENT AND APPROPRIATE ICT USE WRITTEN MARCH 2015 SIGNED HEADTEACHER SIGNED CHAIR OF GOVERNORS DATE.. DATE. TO BE REVIEWED SEPTEMBER 2016

More information

State University of New York College at Old Westbury. Domestic Violence and the Workplace Policy

State University of New York College at Old Westbury. Domestic Violence and the Workplace Policy State University of New York College at Old Westbury Domestic Violence and the Workplace Policy Policy Statement The persons covered by this policy are: employees of SUNY College at Old Westbury (the College

More information

Destiny Media Technology s Code of Conduct

Destiny Media Technology s Code of Conduct Destiny Media Technology s Code of Conduct INTRODUCTION Destiny Media Technology s ( Destiny ) reputation depends on the conduct of its employees, officers and directors who have an obligation to Destiny

More information

CT BOARD OF REGENTS FOR HIGHER EDUCATION. RESOLUTION concerning. Sexual Misconduct Reporting, Support Services and Processes Policy

CT BOARD OF REGENTS FOR HIGHER EDUCATION. RESOLUTION concerning. Sexual Misconduct Reporting, Support Services and Processes Policy CT BOARD OF REGENTS FOR HIGHER EDUCATION RESOLUTION concerning Policy Regarding Sexual Misconduct Reporting, Support Services and Processes Policy January 15, 2015 WHEREAS, The Board of Regents in accord

More information

WHAT HAPPENS NEXT? A guide to the NORTH DAKOTA CHILD PROTECTION SERVICES. This guide is made available by

WHAT HAPPENS NEXT? A guide to the NORTH DAKOTA CHILD PROTECTION SERVICES. This guide is made available by WHAT HAPPENS NEXT? A guide to the NORTH DAKOTA CHILD PROTECTION SERVICES This guide is made available by NORTH DAKOTA CHILD PROTECTION SERVICES CHILDREN AND FAMILY SERVICES North Dakota Department of Human

More information

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices

More information

MOUNT ROYAL UNIVERSITY

MOUNT ROYAL UNIVERSITY MOUNT ROYAL UNIVERSITY PERFORMANCE APPRAISAL FORM ANNUAL REVIEW Employee Name: Department: Position Title: Appraisal Period: To: SECTION I: AREAS OF RESPONSIBILITY AND OBJECTIVES This performance appraisal

More information

EADS-NA Code of Ethics

EADS-NA Code of Ethics Page: 1 of 7 EADS-NA Code of Ethics Introduction The Company demands high ethical standards of conduct from its directors, employees, and agents and will conduct its business with honesty, integrity, and

More information

BARRICK GOLD CORPORATION

BARRICK GOLD CORPORATION BARRICK GOLD CORPORATION Code of Business Conduct and Ethics Introduction Barrick s success is built on a foundation of personal and professional integrity and commitment to excellence. As a company and

More information

SUNY Delhi Domestic Violence and the Workplace Policy

SUNY Delhi Domestic Violence and the Workplace Policy SUNY Delhi Domestic Violence and the Workplace Policy Policy Statement Domestic violence permeates the lives and compromises the safety of thousands of New York State employees each day, with tragic, destructive,

More information

ELECTRO RENT CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS CANADA

ELECTRO RENT CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS CANADA ELECTRO RENT CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS CANADA Dear Colleague: Since its founding in 1965, Electro Rent has always prided itself on maintaining and delivering quality products and

More information

SDC-League Health Fund

SDC-League Health Fund SDC-League Health Fund 1501 Broadway, 17 th Floor New York, NY 10036 Tel: 212-869-8129 Fax: 212-302-6195 E-mail: health@sdcweb.org NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION

More information

1. Compliance with Laws, Rules and Regulations

1. Compliance with Laws, Rules and Regulations CODE OF BUSINESS CONDUCT - EXAMPLE INTRODUCTION This Code of Business Conduct covers a wide range of business practices and procedures. It does not cover every issue that may arise, but it sets out basic

More information

R345, Information Technology Resource Security 1

R345, Information Technology Resource Security 1 R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,

More information

IF YOU HAVE ANY QUESTIONS ABOUT THIS NOTICE OR IF YOU NEED MORE INFORMATION, PLEASE CONTACT OUR PRIVACY OFFICER:

IF YOU HAVE ANY QUESTIONS ABOUT THIS NOTICE OR IF YOU NEED MORE INFORMATION, PLEASE CONTACT OUR PRIVACY OFFICER: NOTICE OF PRIVACY PRACTICES COMPLETE EYE CARE THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED OR DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.

More information

Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics

Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not

More information

PC CONNECTION, INC. CODE OF BUSINESS CONDUCT AND ETHICS

PC CONNECTION, INC. CODE OF BUSINESS CONDUCT AND ETHICS I. Purpose. PC CONNECTION, INC. CODE OF BUSINESS CONDUCT AND ETHICS Applicable to All Subsidiaries To establish uniform standards of conduct under which each of the PC Connection, Inc. family of companies

More information

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4

Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4 Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User

More information

Frequently Asked Questions: Reporting Child Abuse and Neglect in the University System of Maryland

Frequently Asked Questions: Reporting Child Abuse and Neglect in the University System of Maryland Frequently Asked Questions: Reporting Child Abuse and Neglect in the University System of Maryland I. What Constitutes Child Abuse and Neglect A. What is Child Abuse? Abuse is defined in Maryland law as

More information

CODE OF BUSINESS CONDUCT AND ETHICS

CODE OF BUSINESS CONDUCT AND ETHICS 1.0 INTRODUCTION Integrity is a core value of British Columbia Ferry Services Inc. and its subsidiaries ( BCF or the Company ). It is a fundamental principle of this organization that all Directors, Officers,

More information

HARTFORD PUBLIC SCHOOLS DISTRICT SAFE SCHOOL CLIMATE PLAN

HARTFORD PUBLIC SCHOOLS DISTRICT SAFE SCHOOL CLIMATE PLAN HARTFORD PUBLIC SCHOOLS DISTRICT SAFE SCHOOL CLIMATE PLAN The Hartford Public Schools Board of Education is committed to creating and maintaining a physically, emotionally, and intellectually safe educational

More information

Code of Business Conduct

Code of Business Conduct Code of Business Conduct Our Employees We treat each other with fairness, respect, and dignity, offering equal opportunities to all individuals. Intimidation, harassment, or discrimination based on race,

More information

HIPAA Compliance. 2013 Annual Mandatory Education

HIPAA Compliance. 2013 Annual Mandatory Education HIPAA Compliance 2013 Annual Mandatory Education What is HIPAA? Health Insurance Portability and Accountability Act Federal Law enacted in 1996 that mandates adoption of Privacy protections for health

More information

Compliance Program and HIPAA Training For First Tier, Downstream and Related Entities

Compliance Program and HIPAA Training For First Tier, Downstream and Related Entities Compliance Program and HIPAA Training For First Tier, Downstream and Related Entities 09/2011 Training Goals In this training you will gain an understanding of: Our Compliance Program elements Pertinent

More information

Message from the Co-Chairmen and Chief Executive Officers

Message from the Co-Chairmen and Chief Executive Officers Message from the Co-Chairmen and Chief Executive Officers As each of us works to meet individual and Company-wide business goals here at Torchmark, we must all ensure that the work we perform and the business

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 AUDIENCE... 4 COMPLIANCE & ENFORCEMENT... 4 POLICY STATEMENTS... 5 1. General... 5 2. Authorized Users... 5 3. Loss and Theft... 5 4. Illegal

More information

THE CIPM ASSOCIATION CODE OF ETHICS AND STANDARDS OF PROFESSIONAL CONDUCT PREAMBLE THE CODE OF ETHICS

THE CIPM ASSOCIATION CODE OF ETHICS AND STANDARDS OF PROFESSIONAL CONDUCT PREAMBLE THE CODE OF ETHICS THE CIPM ASSOCIATION CODE OF ETHICS AND STANDARDS OF PROFESSIONAL CONDUCT PREAMBLE The CIPM Association Code of Ethics and Standards of Professional Conduct (Code and Standards) are essential to achieving

More information

General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to:

General Compliance. General Compliance Training. Course Overview. General Compliance. The intent of the Compliance Program is to: General Compliance Training General Compliance Training i The University of Texas Medical Branch at Galveston Course Overview General Compliance The intent of the Compliance Program is to: Promote compliance

More information

VALPARAISO UNIVERSITY NOTICE OF PRIVACY PRACTICES. Health, Dental and Vision Benefits Health Care Reimbursement Account

VALPARAISO UNIVERSITY NOTICE OF PRIVACY PRACTICES. Health, Dental and Vision Benefits Health Care Reimbursement Account VALPARAISO UNIVERSITY NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.

More information

PATHWAYS CMH. POLICY TITLE: ABUSE AND NEGLECT EFFECTIVE DATE: April 14, 2003 REVIEW DATE: July 11, 2013

PATHWAYS CMH. POLICY TITLE: ABUSE AND NEGLECT EFFECTIVE DATE: April 14, 2003 REVIEW DATE: July 11, 2013 PATHWAYS CMH POLICY TITLE: ABUSE AND NEGLECT EFFECTIVE DATE: April 14, 2003 REVIEW DATE: July 11, 2013 RESPONSIBLE PARTY: Recipient Rights Supervisor or Designee CATEGORY: RECIPIENT RIGHTS BOARD APPROVAL

More information

Definitions For purposes of this policy, the following terms will be defined as follows.

Definitions For purposes of this policy, the following terms will be defined as follows. The College at Brockport State University of New York Policy Title: Domestic Violence in the Workplace Policy Category: Human Resources Responsible Office: Human Resources Date: Revised December 2013 Domestic

More information

IMAX CORPORATION PROTOCOL FOR REPORTING SUSPECTED VIOLATIONS OF THE IMAX CODE OF ETHICS. (Whistle Blower Program)

IMAX CORPORATION PROTOCOL FOR REPORTING SUSPECTED VIOLATIONS OF THE IMAX CODE OF ETHICS. (Whistle Blower Program) IMAX CORPORATION PROTOCOL FOR REPORTING SUSPECTED VIOLATIONS OF THE IMAX CODE OF ETHICS (Whistle Blower Program) November 2004 (updated February 2012) PROTOCOL FOR REPORTING SUSPECTED VIOLATIONS OF THE

More information

REPORTING CHILD ABUSE

REPORTING CHILD ABUSE CHILD CARE LAW CENTER 221 PINE STREET, 3 RD FLOOR SAN FRANCISCO CALIFORNIA 94104 TELEPHONE: 415.394.7144 FAX: 415.394.7140 E-MAIL: INFO@CHILDCARELAW.ORG LEGAL ISSUES FOR FAMILY CHILD CARE PROVIDERS IN

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Dr. Adam Apfelblat 5140 Highland Road Waterford 48327 Phone: (248)618-3467 Fax: (248)618-3515

Dr. Adam Apfelblat 5140 Highland Road Waterford 48327 Phone: (248)618-3467 Fax: (248)618-3515 Dr. Adam Apfelblat 5140 Highland Road Waterford 48327 HIPAA NOTICE OF PRIVACY PRACTICES PLEASE REVIEW THIS NOTICE CAREFULLY. IT DESCRIBES HOW YOUR MEDICAL INFORMATION MAY BE USED AND DISCLOSED AND HOW

More information

13.4 PHI Air Medical Code of Conduct

13.4 PHI Air Medical Code of Conduct I. PURPOSE PHI Air Medical continually strives to provide high quality emergency care and medical transportation services to our patients, and to maintain high standards of integrity in our dealings with

More information

Corporate Compliance and Ethics Program Effective as adopted on February 21, 2012

Corporate Compliance and Ethics Program Effective as adopted on February 21, 2012 Corporate Compliance and Ethics Program Effective as adopted on February 21, 2012 Page 1 of 7 SECTION 1. STATEMENT OF INTENT As a specialty pharmaceutical company and diagnostic laboratory, Prometheus

More information

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES Senior School 1 PURPOSE The policy defines and describes the acceptable use of ICT (Information and Communications Technology) and mobile phones for school-based employees. Its purpose is to minimise the

More information

State of Arizona Reporting Procedures

State of Arizona Reporting Procedures Arizona Department of Education Arizona State Board of Education State of Arizona Reporting Procedures October 2012 Table of Contents Preface 3 Section One: Reporting Statutes Reporting to law enforcement

More information

CODE OF ETHICS POLICY

CODE OF ETHICS POLICY CODE OF ETHICS POLICY The YMCA's reputation is dependent upon the good judgment, ethical standards and personal integrity of every individual in the YMCA. As the YMCA continues to grow, it is of paramount

More information

University of New England. Institutional Compliance Plan and Codes of Conduct

University of New England. Institutional Compliance Plan and Codes of Conduct University of New England Institutional Compliance Plan and Codes of Conduct I. Mission, Introduction and Purpose The University of New England is an independent, entrepreneurial institution committed

More information

California Mutual Insurance Company Code of Business Conduct and Ethics

California Mutual Insurance Company Code of Business Conduct and Ethics California Mutual Insurance Company Code of Business Conduct and Ethics This Code of Business Conduct and Ethics (the Code ) applies to all officers, employees, and directors of California Mutual Insurance

More information

Policy on Sexual Assault, Stalking, Dating Violence, and Domestic Violence

Policy on Sexual Assault, Stalking, Dating Violence, and Domestic Violence Administrative Regulation 6:2 Responsible Office: Title IX Coordinator / VP Student Affairs Date Effective: 12/3/2014 Supersedes Version: 9/30/2014 (Interim) Policy on Sexual Assault, Stalking, Dating

More information

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources. Chicago Public Schools Policy Manual Title: ACCEPTABLE USE OF THE CPS NETWORK AND COMPUTER RESOURCES Section: 604.1 Board Report: 09-0722-PO3 Date Adopted: July 22, 2009 Policy: THE CHIEF EXECUTIVE OFFICER

More information

I. Introduction. 1919 Madison Avenue, New York, NY 10035 tel: 212-987-1777 toll free: 866-778-6827 fax: 212-987-1776

I. Introduction. 1919 Madison Avenue, New York, NY 10035 tel: 212-987-1777 toll free: 866-778-6827 fax: 212-987-1776 I. Introduction The Ralph Lauren Center for Cancer Care ( RLCCC or The Center ) operates a freestanding diagnostic and treatment center, licensed under Article 28 of the New York State health law, located

More information

COURTNEE A. PELTON, PSY.D.

COURTNEE A. PELTON, PSY.D. 1 COURTNEE A. PELTON, PSY.D. 703-343-0849 CPELTON.PSYCH@GMAIL.COM Outpatient Services Contract Welcome to my practice. This agreement contains important information about my professional services and office

More information

NOTICE OF PRIVACY PRACTICES ILLINOIS EYE CENTER

NOTICE OF PRIVACY PRACTICES ILLINOIS EYE CENTER NOTICE OF PRIVACY PRACTICES ILLINOIS EYE CENTER THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED OR DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.

More information

MANDATED REPORTING OF CHILD NEGLECT OR PHYSICAL OR SEXUAL ABUSE 214. A. Child means a person under age 18.

MANDATED REPORTING OF CHILD NEGLECT OR PHYSICAL OR SEXUAL ABUSE 214. A. Child means a person under age 18. I. PURPOSE It is the policy of Lakes International Language Academy (the school ) to maintain this policy on mandated reporting of child neglect or physical or sexual abuse. The purpose of this policy

More information

For purposes of this policy, the following terms will be defined as follows.

For purposes of this policy, the following terms will be defined as follows. DOMESTIC VIOLENCE AND THE WORKPLACE POLICY STATEMENT The City University of New York ( CUNY ) disapproves of violence against women, men, or children in any form, whether as an act of workplace violence

More information

VOLUNTEER POLICY MANUAL. Volunteer Escambia

VOLUNTEER POLICY MANUAL. Volunteer Escambia VOLUNTEER POLICY MANUAL Escambia County Board of County Commissioners Volunteer Escambia This Volunteer Policy Manual is intended to establish and explain the policies by which volunteers will be incorporated

More information

3/24/16. Why School Nurses? Legal and Practical Issues for the School Nurse: a Global Approach: a Global Approach

3/24/16. Why School Nurses? Legal and Practical Issues for the School Nurse: a Global Approach: a Global Approach Legal and Practical Issues for the School Nurse: a Global Approach: a Global Approach Gary R. Brochu March 31, 2016 Shipman & Goodwin LLP 2016. All rights reserved. Why School Nurses? Conn. Gen. Stat.

More information

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment

More information

New Housing Rights for Victims of Domestic Violence, Rape, Sexual Assault and Stalking

New Housing Rights for Victims of Domestic Violence, Rape, Sexual Assault and Stalking New Housing Rights for Victims of Domestic Violence, Rape, Sexual Assault and Stalking Victims of domestic violence, rape, sexual assault and stalking have increased rights and protections under a new

More information

Parent s Guide. to Child Protective Services (CPS) Children s. Administration. Division. of Children. and Family. Services

Parent s Guide. to Child Protective Services (CPS) Children s. Administration. Division. of Children. and Family. Services Parent s Guide to Child Protective Services (CPS) Children s Administration Division of Children and Family Services Table Of Contents Topic Page What Is Child Protective Services (CPS)?... What Is Child

More information

5151.7. Students. Reporting Child Abuse or Neglect

5151.7. Students. Reporting Child Abuse or Neglect Reporting Child Abuse or Neglect In compliance with state law, any District, employee having reasonable cause to suspect that a child seen in the course of professional duties has been abused or neglected

More information

ATLANTIS CHIROPRACTIC, INC.

ATLANTIS CHIROPRACTIC, INC. ATLANTIS CHIROPRACTIC, INC. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THAT INFORMATION PLEASE REVIEW THIS

More information

Dr. Sunette Steyn Executive Chairperson DATE: 11 November 2009 POLICY NO. : HB/01/2009 SECTION: 1 VERSION: 1

Dr. Sunette Steyn Executive Chairperson DATE: 11 November 2009 POLICY NO. : HB/01/2009 SECTION: 1 VERSION: 1 Page 3 of 186 DEPARTMENT: HUMAN RESOURCES Child Protection Policy PREPARED BY: Teresa McNeill APPROVED BY: Dr. Sunette Steyn Executive Chairperson DATE: 11 November 2009 POLICY NO. : HB/01/2009 SECTION:

More information

NOTICE OF PRIVACY PRACTICES Allergy Treatment Center of New Jersey, P.C. Effective Date: April 14, 2003

NOTICE OF PRIVACY PRACTICES Allergy Treatment Center of New Jersey, P.C. Effective Date: April 14, 2003 Allergy Treatment Center of New Jersey, P.C. 388 Pompton Avenue 415 Avenel Street Cedar Grove, NJ 07009 Avenel, NJ 07001 (973) 857 9890 (732) 636-7030 NOTICE OF PRIVACY PRACTICES Allergy Treatment Center

More information

UNIVERSITY COMPLIANCE PLAN

UNIVERSITY COMPLIANCE PLAN UNIVERSITY COMPLIANCE PLAN Objectives of the Compliance Program The University Compliance Program provides a proactive program that ensures full compliance with all applicable policies, procedures, laws

More information

a. employees Company; or

a. employees Company; or Code of Busines ss Conduct and Ethics 1. Introduction a. This Code of Business Conduct and Ethics (the Code ) applies to all directors, officers, employees and third parties employed or directly engaged

More information