Timeline of Upcoming ARRA Related HIPAA Changes, Rules and Guidance

Size: px
Start display at page:

Download "Timeline of Upcoming ARRA Related HIPAA Changes, Rules and Guidance"

Transcription

1 Timeline f Upcming ARRA Related HIPAA Changes, Rules and Guidance By December 31, 2009 HHS t issue additinal guidelines regarding accunting fr disclsures Due within ne year f enactment (by February 17, 2010) HHS t prvide guidance and rules n de-identificatin, pting ut f fundraising slicitatins HHS and the Federal Trade Cmmissin will reprt n privacy and security requirements fr Persnal Health Recrd (PHR) vendrs and applicatins February 17, 2010 HHS t issue rules n which entities are required t be business assciates Individuals right t restrict disclsures t health plans fr services paid fr ut f pcket Right f electrnic access f recrds by patients takes effect Business Assciates directly subject t HIPAA regulatin HHS required t cnduct peridic audits f entities cvered by HIPAA Within 18 mnths f enactment (by August 17, 2010) HHS t issue guidance n HIPAA minimum necessary rules HHS t release regulatins regarding prhibitin f sale f data January 1, 2011 Initial Deadline fr cmplying with new accunting and disclsure rules fr infrmatin kept in EHRs acquired after January 1, 2009 January 1, 2014 Initial deadline fr cmplying with new accunting and disclsure rules fr infrmatin kept in EHRs acquired befre January 1, W.J. Flynn and Assciates, LLC

2 Summary f the HHS interim final rule t require ntificatin f breaches f unsecured prtected health infrmatin Editrs Nte: This summary cnsists principally f edited text taken directly frm the discussin sectin f the HHS interim final regulatins published August 24 th in the Federal Register. The editrs have remved sme f the discussin (fr example, discussin f cmments received) in an attempt t simplify the review and fcus n cntent and HHS cmments mst helpful in assisting a Cvered Entity r Business Assciate in implementing the plicies and prcedures necessary t cmply with these regulatins. Statutry and Regulatry references have, fr the mst part, been remved and replace by generic terms (i.e. as defined by HIPAA ) fr the sake f clarity. Full regulatry and statutry references and additinal cmmentary is included in the full text f the HHS interim final rule. Exclusin f sme text frm this summary in n way implies that the infrmatin is nt relevant r imprtant. A link t the full text can be fund n ur website at -The Editrs While every effrt has been taken in cmpiling this infrmatin t ensure that its cntents are ttally accurate, neither the publisher nr the authr can accept any liability whatsever fr any inaccuracies r changed circumstances f any infrmatin herein r fr the cnsequences f any reliance placed upn it. This publicatin is distributed n the understanding that the publisher is nt engaged in rendering legal, accunting r ther prfessinal advice r services. Readers shuld always and withut exceptin seek prfessinal advice befre entering int any cmmitments. Backgrund The Health Infrmatin Technlgy fr Ecnmic and Clinical Health (HITECH) Act was enacted n February 17, Subtitle D f Divisin A f the HITECH Act (the Act), entitled Privacy, amng ther prvisins, requires the Department f Health and Human Services (HHS r the Department) t issue interim final regulatins fr breach ntificatin by cvered entities subject t the Administrative Simplificatin prvisins f HIPAA and their business assciates. These breach ntificatin prvisins are fund in f the Act and apply t HIPAA cvered entities and their business assciates that access, maintain, retain, mdify, recrd, stre, destry, r therwise hld, use, r disclse unsecured prtected health infrmatin. The Act incrprates the definitins f cvered entity, business assciate, and prtected health infrmatin used in the HIPAA regulatins. The Act requires HIPAA cvered entities t prvide ntificatin t affected individuals and t the Secretary f HHS fllwing the discvery f a breach f unsecured prtected health infrmatin. In additin, in sme cases, the Act requires cvered entities t prvide ntificatin t the media f breaches. In the case f a breach f unsecured prtected health infrmatin at r by a business assciate f a cvered entity, the Act requires the business assciate t ntify the cvered entity f the breach. Finally, the Act requires the Secretary t pst n an HHS web site a list f cvered entities that experience breaches f unsecured prtected health infrmatin invlving mre than 500 individuals. Sectin-by-Sectin Descriptin f Interim Final Rule A. Applicability Sectin Sectin f the interim final rule prvides that this breach ntificatin rule is applicable t breaches ccurring n r after 30 days frm the date f publicatin f this interim final rule. The interim final rule was published in the Federal Register n Mnday August 24 th, making the effective date f these regulatins September 23 rd, W.J. Flynn and Assciates, LLC

3 B. Definitins Sectin Sectin B cntains regulatry definitins f the tw principal definitins related t the requirements; 1. What is a Breach 2. What is Unsecured Prtected Health Infrmatin 1 Breach The interim final rule defines breach as the acquisitin, access, use, r disclsure f prtected health infrmatin in a manner nt permitted under HIPAA which cmprmises the security r privacy f the prtected health infrmatin. Prtected Health Infrmatin The definitin f breach is limited t prtected health infrmatin. If infrmatin is de-identified in accrdance with HIPAA regulatins, it is nt prtected health infrmatin, and thus, any inadvertent r unauthrized use r disclsure f such infrmatin will nt be cnsidered a breach fr purpses f this subpart. Cvered entities and business assciates are required t prvide the breach ntificatins nly upn a breach f unsecured prtected health infrmatin (see sectin 2 belw). Unauthrized Acquisitin, Access, Use, r Disclsure The interim final rule interprets the unauthrized acquisitin, access, use, r disclsure f prtected health infrmatin as the acquisitin, access, use, r disclsure f prtected health infrmatin in a manner nt permitted under HIPAA. Fr an acquisitin, access, use, r disclsure f prtected health infrmatin t cnstitute a breach, it must cnstitute a vilatin f the Privacy Rule. Therefre, ne f the first steps in determining whether ntificatin is necessary is t determine whether a use r disclsure vilates the Privacy Rule. Nt all vilatins f the Privacy Rule will be breaches, and therefre, cvered entities and business assciates need nt prvide breach ntificatin in all cases f impermissible uses and disclsures. Vilatins f administrative requirements, such as a lack f reasnable safeguards r a lack f training, d nt themselves qualify as ptential breaches under this subpart (althugh such vilatins certainly may lead t impermissible uses r disclsures that qualify as breaches). Cmprmises the Security r Privacy f Prtected Health Infrmatin The Act and regulatin limit the definitin f breach t a use r disclsure that cmprmises the security r privacy f the prtected health infrmatin. Accrdingly, nce it is established that a use r disclsure vilates the Privacy Rule, the cvered entity must determine whether the vilatin cmprmises the security r privacy f the prtected health infrmatin. Cmprmises the security r privacy f the prtected health infrmatin means the breach pses a significant risk f financial, reputatinal, r ther harm t the individual. T determine if an impermissible use r disclsure f prtected health infrmatin cnstitutes a breach, cvered entities and business assciates will need t perfrm a risk assessment t determine if there is a significant risk f harm t the individual as a result f the impermissible use r disclsure. In perfrming the risk assessment, cvered entities and business assciates may need t cnsider a number r cmbinatin f factrs. Cvered entities and business assciates shuld cnsider wh impermissibly used r t whm the infrmatin was impermissibly disclsed when evaluating the risk f harm t individuals. 3 W.J. Flynn and Assciates, LLC

4 If, fr example, prtected health infrmatin is impermissibly disclsed t anther entity gverned by the HIPAA Privacy and Security Rules r t a Federal agency that is bligated t cmply with the Privacy Act f 1974 and the Federal Infrmatin Security Management Act f 2002, there may be less risk f harm t the individual, since the recipient entity is bligated t prtect the privacy and security f the infrmatin it received in the same r similar manner as the entity that disclsed the infrmatin. In cntrast, if prtected health infrmatin is impermissibly disclsed t any entity r persn that des nt have similar bligatins t maintain the privacy and security f the infrmatin, the risk f harm t the individual is much greater. There may be circumstances where a cvered entity takes immediate steps t mitigate an impermissible use r disclsure. Fr example, by btaining the recipient s satisfactry assurances that the infrmatin will nt be further used r disclsed (thrugh a cnfidentiality agreement r similar means) r will be destryed. If such steps eliminate r reduce the risk f harm t the individual t a less than significant risk, then the security and privacy f the infrmatin has nt been cmprmised and, therefre, n breach has ccurred. There may be circumstances where impermissibly disclsed prtected health infrmatin is returned prir t it being accessed fr an imprper purpse. Fr example, if a laptp is lst r stlen and then recvered, and a frensic analysis f the cmputer shws that its infrmatin was nt pened, altered, transferred, r therwise cmprmised, such a breach may nt pse a significant risk f harm t the individuals whse infrmatin was n the laptp. Nte, hwever, that if a cmputer is lst r stlen, we d nt cnsider it reasnable t delay breach ntificatin based n the hpe that the cmputer will be recvered. In perfrming a risk assessment, cvered entities and business assciates shuld als cnsider the type and amunt f prtected health infrmatin invlved in the impermissible use r disclsure. If the nature f the prtected health infrmatin des nt pse a significant risk f financial, reputatinal, r ther harm, then the vilatin is nt a breach. Fr example, if a cvered entity imprperly disclses prtected health infrmatin that merely included the name f an individual and the fact that he received services frm a hspital, then this wuld cnstitute a vilatin f the Privacy Rule, but it may nt cnstitute a significant risk f financial r reputatinal harm t the individual. In cntrast, if the infrmatin indicates the type f services that the individual received (such as nclgy services), that the individual received services frm a specialized facility (such as a substance abuse treatment prgram), r if the prtected health infrmatin includes infrmatin that increases the risk f identity theft (such as a scial security number, accunt number, r mther s maiden name), then there is a higher likelihd that the impermissible use r disclsure cmprmised the security and privacy f the infrmatin. The risk assessment shuld be fact specific, and the cvered entity r business assciate shuld keep in mind that many frms f health infrmatin, nt just infrmatin abut sexually transmitted diseases r mental health, shuld be cnsidered sensitive fr purpses f the risk f reputatinal harm especially in light f fears abut emplyment discriminatin. Exceptins t Breach A cvered entity r business assciate is nt respnsible fr a breach by a third party t whm it permissibly disclsed prtected health infrmatin unless the third party received the infrmatin in its rle as an agent f the cvered entity r business assciate. The Act als includes three exceptins t the definitin f breach that encmpass situatins Cngress clearly intended t nt cnstitute breaches: (1) Unintentinal acquisitin, access, r use f prtected health infrmatin by an emplyee r individual acting under the authrity f a cvered entity r business assciate; 4 W.J. Flynn and Assciates, LLC

5 Example - A billing emplyee receives and pens an cntaining prtected health infrmatin abut a patient which a nurse mistakenly sent t the billing emplyee. The billing emplyee ntices that he is nt the intended recipient, alerts the nurse f the misdirected , and then deletes it. The billing emplyee unintentinally accessed prtected health infrmatin t which he was nt authrized t have access. Hwever, the billing emplyee s use f the infrmatin was dne in gd faith and within the scpe f authrity, and therefre, wuld nt cnstitute a breach and ntificatin wuld nt be required, prvided the emplyee did nt further use r disclse the infrmatin accessed in a manner nt permitted by the Privacy Rule. In cntrast, a receptinist at a cvered entity wh is nt authrized t access prtected health infrmatin decides t lk thrugh patient files in rder t learn f a friend s treatment. In this case, the impermissible access t prtected health infrmatin wuld nt fall within this exceptin t breach because such access was neither unintentinal, dne in gd faith, nr within the scpe f authrity. (2) Inadvertent disclsure f prtected health infrmatin frm ne persn authrized t access prtected health infrmatin at a cvered entity r business assciate t anther similarly situated persn authrized t access prtected health infrmatin at the cvered entity r business assciate; Fr example, a physician wh has authrity t use r disclse prtected health infrmatin at a hspital by virtue f participating in an rganized health care arrangement with the hspital imprperly disclses PHI t a t a nurse r billing emplyee at the hspital. In cntrast, the physician is nt similarly situated t an emplyee at the hspital wh is nt authrized t access prtected health infrmatin, thus an imprper disclsure t a security wrker nt authrized t access the PHI wuld be a breach subject t these regulatins. (3) Unauthrized disclsures in which an unauthrized persn t whm prtected health infrmatin is disclsed wuld nt reasnably have been able t retain the infrmatin. Fr example, a cvered entity, due t a lack f reasnable safeguards, sends a number f explanatins f benefits (EOBs) t the wrng individuals. A few f the EOBs are returned by the pst ffice, unpened, as undeliverable. In these circumstances, the cvered entity can cnclude that the imprper addressees culd nt reasnably have retained the infrmatin. The EOBs that were nt returned as undeliverable, hwever, and that the cvered entity knws were sent t the wrng individuals, shuld be treated as ptential breaches. As anther example, a nurse mistakenly hands a patient the discharge papers belnging t anther patient, but she quickly realizes her mistake and recvers the prtected health infrmatin frm the patient. If the nurse can reasnably cnclude that the patient culd nt have read r therwise retained the infrmatin, then this wuld nt cnstitute a breach. Determining if a Breach Has Occurred Cvered entities and business assciates will need t d the fllwing t determine whether a breach ccurred. First, the cvered entity r business assciate must determine whether there has been an impermissible use r disclsure f prtected health infrmatin under the Privacy Rule. Secnd, the cvered entity r business assciate must determine, and dcument, whether the impermissible use r disclsure cmprmises the security r privacy f the prtected health infrmatin. This ccurs when there is a significant risk f financial, reputatinal, r ther harm t the individual. Lastly, the cvered entity r business assciate may need t determine whether the incident falls under ne f the exceptins t the breach definitin. 5 W.J. Flynn and Assciates, LLC

6 2. Unsecured Prtected Health Infrmatin Guidance Specifying the Technlgies and Methdlgies That Render Prtected Health Infrmatin Unusable, Unreadable, r Indecipherable t Unauthrized Individuals Backgrund The Act defines unsecured prtected health infrmatin as prtected health infrmatin that is nt secured thrugh the use f a technlgy r methdlgy specified by the Secretary in guidance and requires the Secretary t specify in the guidance the technlgies and methdlgies that render prtected health infrmatin unusable, unreadable, r indecipherable t unauthrized individuals. This guidance was issued n April 17, 2009, and later published in the Federal Register n April 27, 2009 (74 FR 19006). The guidance specified encryptin and destructin as the technlgies and methdlgies fr rendering prtected health infrmatin, unusable, unreadable, r indecipherable t unauthrized individuals such that breach ntificatin is nt required. Future guidance (n specified technlgy and methds) will be published n the HHS web site. Methds t Render PHI Unusable Prtected health infrmatin (PHI) is rendered unusable, unreadable, r indecipherable t unauthrized individuals if ne r mre f the fllwing applies: (a) Electrnic PHI has been encrypted as specified in the HIPAA Security Rule by the use f an algrithmic prcess t transfrm data int a frm in which there is a lw prbability f assigning meaning withut use f a cnfidential prcess r key and such cnfidential prcess r key that might enable decryptin has nt been breached. T avid a breach f the cnfidential prcess r key, these decryptin tls shuld be stred n a device r at a lcatin separate frm the data they are used t encrypt r decrypt. (b) The media n which the PHI is stred r recrded has been destryed in ne f the fllwing ways: (i) Paper, film, r ther hard cpy media have been shredded r destryed such that the PHI cannt be read r therwise cannt be recnstructed. Redactin is specifically excluded as a means f data destructin. (ii) Electrnic media have been cleared, purged, r destryed cnsistent with NIST Special Publicatin , Guidelines fr Media Sanitizatin, 6 such that the PHI cannt be retrieved. C. Ntificatin t Individuals Sectin General Rule A cvered entity shall, fllwing the discvery f a breach f unsecured prtected health infrmatin, ntify each individual whse unsecured prtected health infrmatin has been, r is reasnably believed by the cvered entity t have been, accessed, acquired, used, r disclsed as a result f such breach. Breaches Treated as Discvered A breach shall be treated as discvered by a cvered entity as f the first day the breach is knwn t the cvered entity, r by exercising reasnable diligence wuld have been knwn t the cvered entity. A cvered entity is deemed t have knwledge f a breach if such breach is knwn, r by exercising reasnable diligence wuld have been knwn, t any persn (ther than the persn cmmitting the breach) wh is a wrkfrce member r agent f the cvered entity. 6 W.J. Flynn and Assciates, LLC

7 it is imprtant fr such cvered entities t implement reasnable systems fr discvery f breaches. These prvisins attribute knwledge f a breach by a wrkfrce member r ther agent, such as certain business assciates, t the cvered entity itself. Timeliness This is imprtant, as knwledge f a breach, i.e., when a breach is treated as discvered, starts the clck in terms f the perid f time a cvered entity has t make the ntificatins required by the interim final rule. Cvered entities shuld ensure their wrkfrce members and ther agents are adequately trained and aware f the imprtance f timely reprting f privacy and security incidents and f the cnsequences f failing t d s. A cvered entity shall send the required ntificatin withut unreasnable delay and in n case later than 60 calendar days after the date the breach was discvered Cntent The cvered entity may take a reasnable time t investigate the circumstances surrunding the breach, in rder t cllect and develp the infrmatin required t be included in the ntice t the individual. It may be an unreasnable delay t wait until the 60th day t prvide ntificatin. Fr example, if a cvered entity has cmpiled the infrmatin necessary t prvide ntificatin t individuals n day 10 but waits until day 60 t send the ntificatins, it wuld cnstitute an unreasnable delay despite the fact that the cvered entity has prvided ntificatin within 60 days. The Act requires the ntificatin t include, t the extent pssible, the fllwing elements: (1) a brief descriptin f what happened, including the date f the breach and the date f the discvery f the breach, if knwn; (2) A descriptin f the types f unsecured prtected health infrmatin that were invlved in the breach (such as whether full name, scial security number, date f birth, hme address, accunt number, diagnsis, disability cde, r ther types f infrmatin were invlved); (3) any steps individuals shuld take t prtect themselves frm ptential harm resulting frm the breach; (4) a brief descriptin f what the cvered entity invlved is ding t investigate the breach, t mitigate harm t individuals, and t prtect against any further breaches; and (5) cntact prcedures fr individuals t ask questins r learn additinal infrmatin, which must include a tll-free telephne number, an address, web site, r pstal address. With respect t indicating in the ntificatin the types f prtected health infrmatin invlved in a breach, this prvisin requires cvered entities t describe nly the types f infrmatin invlved. Cvered entities shuld nt include a listing f the actual prtected health infrmatin that was breached (e.g., list in the ntice the individual s scial security number r credit card number that was breached) and generally shuld avid including any sensitive infrmatin in the ntificatin itself. Frm f Ntice The Act requires a cvered entity t prvide breach ntice t the individual in written frm by first-class mail at the last knwn address f the individual. The interim final rule als prvides that written ntice may be in the frm f electrnic mail, prvided the individual agrees t receive electrnic ntice and such agreement has nt been withdrawn. 7 W.J. Flynn and Assciates, LLC

8 Where the individual affected by a breach is a minr r therwise lacks legal capacity due t a physical r mental cnditin, ntice t the parent r ther persn wh is the persnal representative f the individual will satisfy the requirements The statute als requires that, if the individual is deceased, ntice must be sent t the last knwn address f the next f kin r persnal representative. Substitute Ntice If a cvered entity des nt have sufficient cntact infrmatin fr sme r all f the affected individuals, r if sme ntices are returned as undeliverable, the cvered entity must prvide substitute ntice fr the unreachable individuals. Substitute ntice shuld be prvided as sn as reasnably pssible after the cvered entity is aware that it has insufficient r ut-f-date cntact infrmatin fr affected individuals. Whatever frm f substitute ntice is prvided, the ntice must cntain all the elements that are required t be included in the direct written ntice t individuals. If there are fewer than 10 individuals fr whm the cvered entity has insufficient r ut-f-date cntact infrmatin t prvide the written ntice, The Act permits the cvered entity t prvide substitute ntice t such individuals thrugh an alternative frm f written ntice, by telephne, r ther means. Fr example, if the cvered entity learns that the hme address it has fr ne f its patients is ut-f-date but it has the patient s address, it may prvide substitute ntice by even if the patient has nt agreed t electrnic ntice. Alternatively, psting a ntice n the web site f the cvered entity r at anther lcatin may be apprpriate if the cvered entity lacks any current cntact infrmatin fr the patients, s lng as the psting is dne in a manner that is reasnably calculated t reach the individuals. If a cvered entity has insufficient r ut-f-date cntact infrmatin fr 10 r mre individuals, The cvered entity t prvide substitute ntice thrugh either a cnspicuus psting fr a perid f 90 days n the hme page f its web site r cnspicuus ntice in majr print r bradcast media in gegraphic areas where the individuals affected by the breach likely reside. Substitute ntice thrugh the website r media fr 10 r mre individuals requires the cvered entity t have a tll-free phne number, active fr 90 days, where an individual can learn whether the individual s unsecured PHI may be included in the breach and t include the number in the ntice. If the cvered entity chses t prvide substitute ntice n the hme page f its web site, the ntice must be cnspicuus and psted fr at least 90 days. A cvered entity may prvide all the infrmatin directly n its hme page r may prvide a hyperlink t the ntice cntaining such infrmatin. If a cvered entity uses a hyperlink n the hme page t cnvey the substitute ntice, the hyperlink shuld be prminent s that it is nticeable given its size, clr, and graphic treatment in relatin t ther parts f the page, and it shuld be wrded t cnvey the nature and imprtance f the infrmatin t which it leads. D. Ntificatin t the Media The Act requires that ntice be prvided t prminent media utlets serving a State r jurisdictin, fllwing the discvery f a breach if the unsecured prtected health infrmatin f mre than 500 residents f such State r jurisdictin is, r is reasnably believed t have been, accessed, acquired, r disclsed during such breach. 8 W.J. Flynn and Assciates, LLC

9 The Act requires that ntificatin t the media under this prvisin be prvided within the same timeframe as ntice is t be prvided t the individual. Ntificatin t the media under this prvisin must include the same infrmatin required t be included in the ntificatin t the individual. T illustrate hw these prvisins apply, HHS prvided the fllwing examples: If laptps cntaining the unsecured prtected health infrmatin f mre than 500 residents f a particular city were stlen frm a cvered entity, ntificatin under this sectin shuld be prvided t prminent media utlets serving that city. In this case, the prminent media utlet may be a majr televisin statin r newspaper (r ther media utlet) serving primarily the residents f that city r a prminent media utlet serving the entire state. Alternatively, fr a breach invlving 500 r mre residents acrss a State and nt within any ne particular cunty r city f the State, the prminent media utlet chsen must serve the entire State. If a cvered entity discvers a breach f 600 individuals, 200 f which reside in Virginia, 200 f which reside in Maryland, and 200 f which reside in the District f Clumbia, such a breach did nt affect mre than 500 residents f any ne State r jurisdictin, and as such, ntificatin is nt required t be prvided t the media. E. Ntificatin t the Secretary Fr breaches invlving 500 r mre individuals, the Act requires cvered entities t ntify the Secretary (HHS) immediately. Fr breaches invlving less than 500 individuals, the Act prvides that a cvered entity may maintain a lg f such breaches and annually submit such lg t the Secretary dcumenting the breaches ccurring during the year invlved. Breaches invlving mre than 500 individuals The term immediately requires ntificatin be sent t the Secretary cncurrently with the ntificatin sent t the individual. HHS will pst instructins n its web site fr submitting bth this ntificatin as well as the annual ntificatin described belw. The Secretary will pst n the HHS web site a list f cvered entities that submit reprts f breaches f unsecured prtected health infrmatin invlving mre than 500 individuals. Cvered entities must ntify the Secretary f discvered breaches invlving mre than 500 individuals generally, withut regard t whether the breach invlved mre than 500 residents f a particular State r jurisdictin Breaches invlving less than 500 individuals The Act requires a cvered entity t maintain a lg r ther dcumentatin f such breaches and t submit infrmatin annually t the Secretary fr breaches ccurring during the preceding calendar year. The interim final rule requires the submissin f this infrmatin t the Secretary n later than 60 days after the end f each calendar year. Infrmatin abut breaches invlving less than 500 individuals is t be prvided t the Secretary in the manner specified n the HHS web site. HHS will specify n its web site the infrmatin t be submitted and hw t submit such infrmatin. Fr calendar year 2009, the cvered entity is nly required t submit infrmatin t the Secretary fr breaches ccurring after the effective date f this regulatin. F. Ntificatin by a Business Assciate The Act requires a business assciate f a cvered entity t ntify the cvered entity when it discvers a breach f PHI. 9 W.J. Flynn and Assciates, LLC

10 A business assciate that maintains the prtected health infrmatin f multiple cvered entities need ntify nly the cvered entity(s) t which the breached infrmatin relates. Hwever, in cases in which a breach invlves the unsecured prtected health infrmatin f multiple cvered entities and it is unclear t whm the breached infrmatin relates, it may be necessary t ntify all ptential affected cvered entities. A business assciate must prvide ntice f a breach f unsecured prtected health infrmatin t a cvered entity withut unreasnable delay and in n case later than 60 days fllwing the discvery f a breach. If a business assciate is acting as an agent (based n the principles f the federal cmmn law f agency) f a cvered entity, then, the business assciate s discvery f the breach will be imputed t the cvered entity. Accrdingly, in such circumstances, the cvered entity must prvide ntificatins based n the time the business assciate discvers the breach, nt frm the time the business assciate ntifies the cvered entity. In cntrast, if the business assciate is an independent cntractr f the cvered entity (i.e., nt an agent), then the cvered entity must prvide ntificatin based n the time the business assciate ntifies the cvered entity f the breach. Cvered entities may wish t address the timing f the ntificatin in their business assciate cntracts. The Act requires business assciates, t the extent pssible, t prvide cvered entities with the identity f each individual whse unsecured prtected health infrmatin has been, r is reasnably believed t have been, breached. G. Law Enfrcement Delay The Act prvides that if a law enfrcement fficial determines that a ntificatin, ntice, r psting required under this sectin wuld impede a criminal investigatin r cause damage t natinal security, such ntificatin, ntice, r psting shall be delayed in the same manner as prvided under the HIPAA Privacy Rule. The Act prvides fr a temprary delay f ntificatin in situatins in which a law enfrcement fficial prvides a statement in writing that the delay is necessary because ntificatin wuld impede a criminal investigatin r cause damage t natinal security, and specifies the time fr which a delay is required. In these instances, the cvered entity is required t delay the ntificatin, ntice, r psting fr the time perid specified by the fficial. The Act als requires a cvered entity r business assciate t temprarily delay a ntificatin, ntice, r psting if a law enfrcement fficial states rally that a ntificatin wuld impede a criminal investigatin r cause damage t natinal security. In this case, the cvered entity r business assciate is required t dcument the statement and the identity f the fficial and delay ntificatin fr n lnger than 30 days. H. Administrative Requirements and Burden f Prf The regulatins require cvered entities and business assciates t develp and dcument plicies and prcedures related t these breach ntificatin rules cnsistent with HIPAA s administrative requirements including but nt limited t: Train wrkfrce members n, and have sanctins fr failure t cmply with these plicies and prcedures Permit individuals t file cmplaints regarding these plicies and prcedures r a failure t cmply with them Refrain frm intimidating r retaliatry acts 10 W.J. Flynn and Assciates, LLC

11 Thus, a cvered entity is required t cnsider and incrprate the requirements f this subpart with respect t its HIPAA administrative cmpliance and ther bligatins. Burden f Prf Fllwing an impermissible use r disclsure under the Privacy Rule, cvered entities and business assciates have the burden f demnstrating that all ntificatins were made as required. As part f demnstrating that all required ntificatins were made, a cvered entity r business assciate als must be able t demnstrate that an impermissible use r disclsure did nt cnstitute a breach, in cases where it is determined that ntificatins were nt required. When a cvered entity r business assciate knws f an impermissible use r disclsure f prtected health infrmatin, it shuld maintain dcumentatin that all required ntificatins were made, r, alternatively, f its risk assessment r the applicatin f any exceptins t the definitin f breach t demnstrate that ntificatin was nt required. Fr mre infrmatin r fr assistance with HIPAA cmpliance cntact: Bb Radecki Principal W.J. Flynn and Assciates, LLC bb.radecki@wjflynnandassciates.cm 11 W.J. Flynn and Assciates, LLC

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

Information Security Policy

Information Security Policy Purpse The risk t Charlestn Suthern University, its emplyees and students frm data lss and identity theft is f significant cncern t the University and can be reduced nly thrugh the cmbined effrts f every

More information

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices

Hampton Roads Orthopaedics & Sports Medicine. Notice of Privacy Practices This is being prvided t yu as a requirement f the privacy regulatins issued under the Health Insurance Prtability and Accuntability Act f 1996 (HIPAA). This ntice describes hw HROSM may use and disclse

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

Employees - recruitment, records and monitoring

Employees - recruitment, records and monitoring Emplyees - recruitment, recrds and mnitring This guidance has been prduced t help rganisatins cmply with the Data Prtectin Act (DPA) when recruiting and emplying wrkers. It is relevant t public sectr emplyers,

More information

Issue Brief. SBC Distribution Rules for Employer Sponsored Health Plans October 2012. Summary. Which Plans Are Required to Provide the SBC?

Issue Brief. SBC Distribution Rules for Employer Sponsored Health Plans October 2012. Summary. Which Plans Are Required to Provide the SBC? Issue Brief SBC Distributin Rules fr Emplyer Spnsred Health Plans Octber 2012 Summary The Affrdable Care Act (ACA) expands ERISA's disclsure requirements by requiring that a summary f benefits and cverage

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

DATA REQUEST GUIDELINES

DATA REQUEST GUIDELINES DATA REQUEST GUIDELINES This dcument describes prcedures law enfrcement authrities and individuals invlved in civil litigatin shuld fllw t request data frm LinkedIn and its affiliated service prviders.

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre

More information

Key Steps to Responding to Privacy Breaches. Nova Scotia Freedom of Information and Protection of Privacy Review Office

Key Steps to Responding to Privacy Breaches. Nova Scotia Freedom of Information and Protection of Privacy Review Office Key Steps t Respnding t Privacy Breaches Nva Sctia Freedm f Infrmatin and Prtectin f Privacy Review Office ~ 1 ~ ~ 1 ~ 1 ~ Key Steps t Respnding t Privacy Breaches 1 Key Key Steps Steps t t Respnding

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

Bill Payment Agreement & Disclosures

Bill Payment Agreement & Disclosures Bill Payment Agreement & Disclsures Welcme t Online Banking Bill Payment Service. Use f the Bill Payment Service indicates acceptance f terms and cnditins set frth in the Online Banking Agreement & Disclsures

More information

Privacy Breach and Complaint Protocol

Privacy Breach and Complaint Protocol Privacy Breach and Cmplaint Prtcl Effective: December 31, 2012 Apprved by: Le McKenna, CFO 1.0 General Privacy breaches and privacy cmplaints will be handled in accrdance with this prtcl. This prtcl is

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

Preventing Identity Theft

Preventing Identity Theft Preventing Identity Theft Each year, millins f Americans have their identity stlen. ENG Lending wants yu t have the infrmatin yu need t prtect yurself against identity theft. While there are n guarantees

More information

Consumer ebanking Account and Services Agreement

Consumer ebanking Account and Services Agreement Cnsumer ebanking Accunt and Services Agreement Intrductin: As used in this agreement, the wrds yu and yur refer t the accunt hlder(s) and the wrds Bank, us, and we refer t CnnectOne Bank. Cnsumer ebanking:

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

Creating an Ethical Culture and Protecting Your Bottom Line:

Creating an Ethical Culture and Protecting Your Bottom Line: Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please

More information

RQ10.06 AACo Share Trading Policy

RQ10.06 AACo Share Trading Policy Australian Agricultural Cmpany Limited ACN 010 892 270 RQ10.06 AAC Share Trading Plicy Versin 5 This plicy was apprved by the Bard f Australian Agricultural Cmpany Limited n 15 December 2010. This plicy

More information

CLEARANCE REVIEWS FOR STUDENT RESTRICTION ISSUES OTHER THAN ACADEMIC PROGRESS

CLEARANCE REVIEWS FOR STUDENT RESTRICTION ISSUES OTHER THAN ACADEMIC PROGRESS CLEARANCE REVIEWS FOR STUDENT RESTRICTION ISSUES OTHER THAN ACADEMIC PROGRESS Only the Ministry f Training, Clleges & Universities can cnsider clearance reviews fr mst ther student restrictin issues. These

More information

Public consultation paper

Public consultation paper Public cnsultatin paper Nvember 2012 Public cnsultatin n guidelines fr prfessinal indemnity insurance arrangements fr nurses and nurse practitiners. Please prvide feedback by email t: nmbafeedback@ahpra.gv.au

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Infrmatin Security Incident Respnse Plan Agency: Date: Cntact: 1 TABLE OF CONTENTS Intrductin... 3 Authrity... 4 Terms and Definitins... 4 Rles and Respnsibilities... 5 Prgram... 6 Educatin and Awareness...

More information

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE Clumbine Federal Credit Unin ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE 1. Online Banking/Bill Payment 2. Online Banking/ Bill Payment Limitatins 3. Online Bill Payment

More information

We will record and prepare documents based off the information presented

We will record and prepare documents based off the information presented Dear Client: We appreciate the pprtunity f wrking with yu regarding yur Payrll needs. T ensure a cmplete understanding between us, we are setting frth the pertinent infrmatin abut the services that we

More information

NAIC Replacement Requirements For Certain Life Insurance Policies And Annuity Contracts

NAIC Replacement Requirements For Certain Life Insurance Policies And Annuity Contracts NAIC Replacement Requirements Fr Certain Life Insurance Plicies And Annuity Cntracts Duties f Prducers If a transactin invlves a replacement, the prducer must leave with the applicant, at the time an applicatin

More information

Frequently Asked Questions About I-9 Compliance

Frequently Asked Questions About I-9 Compliance Frequently Asked Questins Abut I-9 Cmpliance What is required t verify wrk authrizatin? The basic requirement t verify wrk authrizatin is the Frm I-9. This frm is available n the HR website: http://www.fit.edu/hr/dcuments/frms/i-9.pdf

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS

COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS fr STUDY ABROAD PROGRAMS Belw is a list f items t address and questins that need t be addressed in the cmprehensive safety assessment. In additin t the safety

More information

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents

TITLE: Supplier Contracting Guidelines Process: FIN_PS_PSG_050 Replaces: Manual Sections 6.4, 7.1, 7.5, 7.6, 7.11 Effective Date: 10/1/2014 Contents TITLE: Supplier Cntracting Guidelines Prcess: FIN_PS_PSG_050 Replaces: Manual Sectins 6.4, 7.1, 7.5, 7.6, 7.11 Cntents 1 Abut university supplier cntracting... 2 2 When is a cntract required?... 2 3 Wh

More information

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT

Kentwood Police Department 4742 Walma Ave SE Kentwood, Michigan 49512 (616) 698-6580 http://www.ci.kentwood.mi.us REPORTING IDENTITY THEFT Kentwd Plice Department 4742 Walma Ave SE Kentwd, Michigan 49512 (616) 698-6580 http://www.ci.kentwd.mi.us REPORTING IDENTITY THEFT If yu are the victim f identity theft and ne f the fllwing cnditins are

More information

FAQs about Registration & Licensing in Dubai

FAQs about Registration & Licensing in Dubai FAQs abut Registratin & Licensing in Dubai Trade Names 1. Is it required t register a trade name in rder t apply fr an initial apprval? N, a trade name may be bked fr ne year renewable perid, against payment

More information

WORKPLACE INJURY/ILLNESS/INCIDENT INVESTIGATION & REPORTING POLICY (BC VERSION)

WORKPLACE INJURY/ILLNESS/INCIDENT INVESTIGATION & REPORTING POLICY (BC VERSION) WORKPLACE INJURY/ILLNESS/INCIDENT INVESTIGATION & REPORTING POLICY (BC VERSION) Intrductin: Hw t Use This Tl As d all ther jurisdictins, BC requires emplyers t investigate and reprt specific kinds f wrkplace

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE

COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE COMPLIANCE WITH THE FEDERAL TRADE COMMISSION S SAFEGUARDS RULE Mst dealers are familiar with the requirements f the Gramm-Leach-Bliley Act

More information

NSW FAIR TRADING. Real Estate Fraud Prevention Guidelines

NSW FAIR TRADING. Real Estate Fraud Prevention Guidelines NSW FAIR TRADING Real Estate Fraud Preventin Guidelines Real Estate Fraud Preventin Guidelines Cntents 1. Intrductin..... 2 2. Backgrund.. 2 3. The Law.. 2 4. Cmmissiner s Guidance.... 3 5. Prescribed

More information

THRIFTY DRUG STORES, INC. d/b/a THRIFTY WHITE DRUG / WHITE DRUG / BELL PHARMACY/VALLEY DRUG/ THRIFTY NYSTROM DRUG NOTICE OF PRIVACY PRACTICES

THRIFTY DRUG STORES, INC. d/b/a THRIFTY WHITE DRUG / WHITE DRUG / BELL PHARMACY/VALLEY DRUG/ THRIFTY NYSTROM DRUG NOTICE OF PRIVACY PRACTICES THRIFTY DRUG STORES, INC. d/b/a THRIFTY WHITE DRUG / WHITE DRUG / BELL PHARMACY/VALLEY DRUG/ THRIFTY NYSTROM DRUG NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY

More information

SPENCER STUART CANDIDATE DATA PROTECTION STANDARDS

SPENCER STUART CANDIDATE DATA PROTECTION STANDARDS SPENCER STUART CANDIDATE DATA PROTECTION STANDARDS Spencer Stuart is the leading privately-held glbal executive search firm and advisr f chice amng tp cmpanies seeking guidance and cunsel n senir leadership

More information

Scotiabank Group Privacy Agreement

Scotiabank Group Privacy Agreement Sctiabank Grup Privacy Agreement Last revised Octber 2010 Yur privacy is imprtant t Sctiabank. This Agreement sets ut the infrmatin practices fr Sctiabank Grup Members in Canada, including what type f

More information

CSUSB Containment Guidelines CSUSB, Information Security Office

CSUSB Containment Guidelines CSUSB, Information Security Office CSUSB, Infrmatin Security Office Last Revised: 01/30/2013 Final REVISION CONTROL Dcument Title: Authr: File Reference: CSUSB Cntainment Guidelines Javier Trner Date By Actin Pages 03/30/05 J Trner Created

More information

Corporate Standards for data quality and the collation of data for external presentation

Corporate Standards for data quality and the collation of data for external presentation The University f Kent Crprate Standards fr data quality and the cllatin f data fr external presentatin This paper intrduces a set f standards with the aim f safeguarding the University s psitin in published

More information

DALBAR Due Diligence: Trust, but Verify

DALBAR Due Diligence: Trust, but Verify BEST INTEREST INVESTMENT RECOMMENDATIONS Advisr Rle under Best Interest Regulatins January 27, 2016 In the era when the cntractual bligatin is t act in the client s best interest, investment decisins can

More information

Munising Memorial Hospital. Administrative/Financial Policy

Munising Memorial Hospital. Administrative/Financial Policy Munising Memrial Hspital Administrative/Financial Plicy SUBJECT: Credit and Cllectins & Financial Assistance POLICY NO. 100-072 REVISED: March 26, 2014 Authrized By: The credit and cllectin plicy f Munising

More information

Internet Banking Agreement and Disclosure Statement

Internet Banking Agreement and Disclosure Statement Internet Banking Agreement and Disclsure Statement This agreement cntains the terms and cnditins that gvern accessing r using Internet Banking (NetTeller), Bill Payment Services, Mbile Banking and On Demand

More information

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t

More information

WRHA Health Interpreter Guidelines 1 for Message Relay, Reminder Call and Conference Call

WRHA Health Interpreter Guidelines 1 for Message Relay, Reminder Call and Conference Call WRHA Health Interpreter Training Prgram WRHA Health Interpreter Guidelines 1 fr Message Relay, Reminder Call and Cnference Call 2011 1 Develped by Dnna Jyette, Jyette Cnsulting Services, adapted fr WRHA

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

Health and Safety Training and Supervision

Health and Safety Training and Supervision Intrductin: Health and Safety Training and Supervisin University f Nttingham is cmmitted t maintaining and develping standards f excellence in all aspects f its business. T that end, the University aspires

More information

Municipal Advisor Registration

Municipal Advisor Registration FACT SHEET Municipal Advisr Registratin SEC Open Meeting Sept. 18, 2013 The Securities and Exchange Cmmissin tday will cnsider whether t adpt a rule that wuld establish a permanent registratin regime fr

More information

Directives to Hospitals in respect of Reporting Requirements under the BPSAA

Directives to Hospitals in respect of Reporting Requirements under the BPSAA DRAFT Directives t Hspitals in respect f Reprting Requirements under the BPSAA Issued By Minister f Health and Lng-Term Care Effective April 1, 2011 DRAFT March 28, 2011 Table f Cntents 1. BACKGROUND...

More information

Letter of Engagement. as instructed from time to time in respect of your/the company/trusts affairs

Letter of Engagement. as instructed from time to time in respect of your/the company/trusts affairs We enclse material which sets ut: Letter f Engagement Infrmatin fr clients which lawyers are required by the New Zealand Law Sciety t prvide; and Our standard terms f engagement. Services t be prvided

More information

IMPORTANT INFORMATION ABOUT MEDICAL CARE FOR YOUR WORK-RELATED INJURY OR ILLNESS

IMPORTANT INFORMATION ABOUT MEDICAL CARE FOR YOUR WORK-RELATED INJURY OR ILLNESS IMPORTANT INFORMATION ABOUT MEDICAL CARE FOR YOUR WORK-RELATED INJURY OR ILLNESS MEDICAL PROVIDER NETWORK (MPN) NOTIFICATION If yu are injured at wrk, Califrnia Law requires yur emplyer t prvide and pay

More information

Symantec User Authentication Service Level Agreement

Symantec User Authentication Service Level Agreement Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Improved ADP and ACP Safe Harbor Plan Designs

Improved ADP and ACP Safe Harbor Plan Designs Imprtant Infrmatin Plan Administratin and Operatin April 2000* Imprved ADP and ACP Safe Harbr Plan Designs WHO'S AFFECTED This infrmatin applies t defined cntributin plans with a 401(k) feature r emplyer

More information

Notice of Protection Provided by Utah Life and Health Insurance Guaranty Association

Notice of Protection Provided by Utah Life and Health Insurance Guaranty Association Ntice f Prtectin Prvided by Utah Life and Health Insurance Guaranty Assciatin This ntice prvides a brief summary f the Utah Life and Health Insurance Guaranty Assciatin ("the Assciatin") and the prtectin

More information

Bl$wing the Whistle $n the New Whistlebl$wer Pr$tecti$ns Created by the D$dd-Frank Act. By: Michael James L$mbardin$

Bl$wing the Whistle $n the New Whistlebl$wer Pr$tecti$ns Created by the D$dd-Frank Act. By: Michael James L$mbardin$ Oct$ber 22, 2010 Bl$wing the Whistle $n the New Whistlebl$wer Pr$tecti$ns Created by the D$dd-Frank Act By: Michael James L$mbardin$ The "D&dd-Frank Wall Street Ref&rm and C&nsumer Pr&tecti&n Act" (D&dd-Frank)

More information

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Audit Cmmittee Charter St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd Versin 2.0, 22 February 2016 Apprver Bard f Directrs St Andrew

More information

Internet Banking Agreement & Disclosure

Internet Banking Agreement & Disclosure Internet Banking Agreement & Disclsure Please read this agreement carefully befre cntinuing. Intrductin This Internet Banking Agreement and Disclsure gverns yur use f Internet Banking. Thrughut this web

More information

INFORMATIONAL NOTICE MISCELLANEOUS TAX 2013-01. Issued: January 02, 2013

INFORMATIONAL NOTICE MISCELLANEOUS TAX 2013-01. Issued: January 02, 2013 INFORMATIONAL NOTICE MISCELLANEOUS TAX 2013-01 Issued: January 02, 2013 Pennsylvania Department f Revenue Guidelines fr Cllectin and Administrative Bank Attachment Required by Act 85 f 2012 Per the Tax

More information

THIRD PARTY PROCUREMENT PROCEDURES

THIRD PARTY PROCUREMENT PROCEDURES ADDENDUM #1 THIRD PARTY PROCUREMENT PROCEDURES NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS TRANSPORTATION DEPARTMENT JUNE 2011 OVERVIEW These prcedures establish standards and guidelines fr the Nrth Central

More information

Chicago Department of Finance. Tax Audit Process

Chicago Department of Finance. Tax Audit Process Chicag Department f Finance Tax Audit Prcess Audit Overview There are varius ways a business gets selected fr audit. The mst cmmn are referrals frm anther divisin f the Department f Finance, referral frm

More information

Heythrop College Disciplinary Procedure for Support Staff

Heythrop College Disciplinary Procedure for Support Staff Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

Group Term Life Insurance: Table I Straddle Testing and Imputed Income for Dependent Life Insurance

Group Term Life Insurance: Table I Straddle Testing and Imputed Income for Dependent Life Insurance An American Benefits Cnsulting White Paper American Benefits Cnsulting, LLC 99 Park Ave, 25 th Flr New Yrk, NY 10016 212 716-3400 http://www.abcsys.cm Grup Term Life Insurance: Table I Straddle Testing

More information

Care Plan Oversight. Home Health Certification. July 23, 2014. Agenda

Care Plan Oversight. Home Health Certification. July 23, 2014. Agenda Care Plan Oversight Hme Health Certificatin July 23, 2014 Agenda Care Plan Oversight Why We Are Prviding the Educatin Prcedure cdes Descriptin f Services Wh Can Perfrm Frequency f Services Face-t-Face

More information

Accessible Service Policy

Accessible Service Policy Accessible Service Plicy Date Created Revisin Oct. 16, 2012 1 Gal This plicy is intended t meet the requirements f the Accessibility Standards fr Custmer Service, Ontari Regulatin 429/07 under the Accessibility

More information

New Hampshire. Address: New Hampshire Real Estate Commission 64 South Street Concord, NH 03301-3670

New Hampshire. Address: New Hampshire Real Estate Commission 64 South Street Concord, NH 03301-3670 New Hampshire Gverning Agency New Hampshire Real Estate Cmmissin Website: http://www.nh.gv/nhrec/ Address: New Hampshire Real Estate Cmmissin 64 Suth Street Cncrd, NH 03301-3670 Telephne N.: (603) 271-2701

More information

LOUISIANA TECH UNIVERSITY Division of Student Financial Aid Post Office Box 7925 Ruston, LA 71272

LOUISIANA TECH UNIVERSITY Division of Student Financial Aid Post Office Box 7925 Ruston, LA 71272 LOUISIANA TECH UNIVERSITY Divisin f Student Financial Aid Pst Office Bx 7925 Rustn, LA 71272 Dear Financial Aid Applicant, Accrding t yur 2011-2012 Student Aid Reprt (SAR), yu did nt include any parental

More information

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management

Montana Acquisition & Contracting System (emacs) emacs Handbook. Vendor Registration and Data Management Mntana Acquisitin & Cntracting System (emacs) emacs Handbk Vendr Registratin and Data Management Welcme The purpse f this emacs Handbk fr Vendr Registratin and Data Management is t prvide vendrs with the

More information

MAYFAIR INSURANCE & MORTGAGE CONSULTANTS LTD 11 Lurke Street, Bedford MK40 3HZ Telephone: 01234 242900

MAYFAIR INSURANCE & MORTGAGE CONSULTANTS LTD 11 Lurke Street, Bedford MK40 3HZ Telephone: 01234 242900 MAYFAIR INSURANCE & MORTGAGE CONSULTANTS LTD 11 Lurke Street, Bedfrd MK40 3HZ Telephne: 01234 242900 Please read this dcument carefully as it sets ut the terms n which we agree t act fr ur clients and

More information

Accident Investigation

Accident Investigation Accident Investigatin APPLICABLE STANDARD: 1960.29 EMPLOYEES AFFECTED: All emplyees WHAT IS IT? Accident investigatin is the prcess f determining the rt causes f accidents, n-the-jb injuries, prperty damage,

More information

Quality Area 7: Leadership and Service Management

Quality Area 7: Leadership and Service Management 1/5 Quality Area 7: Leadership and Service Management Children s Services Guiding Principles Electrnic Archiving Plicy Review Date: Octber 2015 Intrductin Within the Children s Services sectin there are

More information

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative

More information

LEGAL BRIEF FORECLOSURE ON RENTAL PROPERTY March 2014

LEGAL BRIEF FORECLOSURE ON RENTAL PROPERTY March 2014 LEGAL BRIEF FORECLOSURE ON RENTAL PROPERTY March 2014 PREPARED BY NELLIS LAW CENTER, 4428 England Ave (Bldg 18), Nellis AFB, Nevada 89191-6505 702-652-5407, Appt. Line 702-652-7531 If yu rent prperty yu

More information