HIPAA/HITECH PRIVACY & SECURITY CHECKLIST ASSESSMENT AND GUIDANCE INSTRUCTIONS

Size: px
Start display at page:

Download "HIPAA/HITECH PRIVACY & SECURITY CHECKLIST ASSESSMENT AND GUIDANCE INSTRUCTIONS"

Transcription

1 HIPAA/HITECH PRIVACY & SECURITY CHECKLIST ASSESSMENT AND GUIDANCE INSTRUCTIONS Thank yu fr taking the time t fill ut the privacy & security checklist. Once cmpleted, this checklist will help us get a better understanding f where we can better assist yu. Belw yu will find sme acrnyms that are shwn thrughut the checklist as well as sme brief instructins fr cmpleting the assessment. This checklist als gives specific guidance fr many f the requirements. Hwever, it is imprtant that any safeguard that is implemented shuld be based n yur risk analysis and part f yur risk management strategy. Instructins (a)(1)(i) (a)(1)(ii)(A) TVS004 HIPAA SECURITY RULE - ADMINISTRATIVE SAFEGUARDS (R) = REQUIRED, (A) = ADDRESSABLE Security Management Prcess: Implement plicies and prcedures t prevent, detect, cntain, and crrect security vilatins Has a Risk Analysis been cmpleted in accrdance with NIST Guidelines (NIST )? (R) 4 5 Risk analysis shuld include the fllwing steps System characterizatin Threat identificatin Vulnerability identificatin Cntrl analysis Likelihd determinatin Impact analysis 6 Risk determinatin Cntrl recmmendatins Results dcumentatin 1 - The HIPAA Security Rule specifies a list f required r addressable safeguards. If an (R) is shwn after the safeguard then implementatin f that safeguard is required. If an (A) is shwn then the safeguard must be assessed t determine whether r nt it is a reasnable and apprpriate safeguard in yur envirnment. If nt implemented, then it s required t dcument the reasn why and als implement an equivalent alternative safeguard if reasnable and apprpriate. 2 The reference refers t the C.F.R. (Cde f Federal Regulatins) that maps t the requirement r safeguard t the specific regulatin. The next line, if applicable, references the Threat/Vulnerability Statement (TVSxxx) statement frm the Security Risk Assessment spreadsheet. 3 This field is the requirement r safeguard that is being evaluated. If shwn in bld, then specifying a status fr that particular safeguard is nt necessary because it s an verview f the fllwing rws t be evaluated. 4 Fr any f the highlighted fields, a status is nt required because that rw is just an verview f the fllwing rws t be evaluated. 5 This field is t specify the status f the requirement r safeguard. Please specify the fllwing:,,,, r. Please feel free t add any additinal cmments t the field r n a separate sheet f paper. P a g e 1

2 6 This area prvides guidance and examples related t many f the safeguards. Sme examples may be specified fr multiple requirements due t having sme relevance in multiple areas. Acrnyms NIST FIPS PHI EPHI BA CE EHR HHS IS Natinal Institute f Standards and Technlgy Federal Infrmatin Prcess Standards Prtected Health Infrmatin Electrnic Prtected Health Infrmatin Business Assciate Cvered Entity Electrnic Health Recrd Health and Human Services Infrmatin System P a g e 2

3 HIPAA/HITECH PRIVACY & SECURITY CHECKLIST ASSESSMENT & GUIDANCE HIPAA/HITECH REFERENCE HIPAA PRIVACY RULE / HIPAA SECURITY RULE HITECH ACT STATUS, COMPLETE, IN PROGRESS, NOT COMPLETE, UNKNOWN HIPAA PRIVACY RULE Develp "minimum necessary" plicies fr: Uses - Rutine disclsures - Nn-rutine disclsures - Limit request t minimum necessary - Ability t rely n request fr minimum necessary Develp plices fr business assciate (BA) relatinships and amend business assciate cntracts r agreements: The cntract must: - Describe the permitted and required uses f prtected health infrmatin by the business assciate - Prvide that the business assciate will nt use r further disclse the prtected health infrmatin ther than as permitted r required by the cntract r as required by law - Require the business assciate t use apprpriate safeguards t prevent a use r disclsure f the prtected health infrmatin ther than as prvided fr by the cntract. Where a cvered entity knws f a material breach r vilatin by the business assciate f the cntract r agreement, the cvered entity is required t take reasnable steps t cure the breach r end the vilatin, and if such steps are unsuccessful, t terminate the cntract r arrangement. If terminatin f the cntract r agreement is nt feasible, a cvered entity is required t reprt the prblem t the Department f Health and Human Services (HHS) Office fr Civil Rights (OCR). Limit disclsures t thse that are authrized by the client, r that are required r allwed by the privacy regulatins and state law Develp and disseminate ntice f privacy practice Ntice shuld include (nt all-inclusive): - The ways that the Privacy Rule allws the cvered entity t use and disclse prtected health infrmatin. It must als explain that the entity will get patient permissin, r authrizatin, befre using health recrds fr any ther reasn. P a g e 3

4 - The cvered entity s duties t prtect health infrmatin privacy. - Patient privacy rights, including the right t cmplain t HHS and t the cvered entity if believed that their privacy rights have been vilated. - Patient s right t inspect and btain a cpy f their PHI upn written ntice - Hw t cntact the entity fr mre infrmatin and t make a cmplaint Develp plicies fr alternative means f cmmunicatin requests Develp plicies fr access t designated recrd sets: - Prviding access - Denying access Develp plicies fr amendment requests: - Accepting an amendment - Denying an amendment - Actins n ntice f an amendment - Dcumentatin Develp plicies fr accunting f disclsures Implementatin f Privacy Rule Administrative requirements, including: - Appint a HIPAA privacy fficer. - Training f wrkfrce - Sanctins fr nn-cmpliance - Develp cmpliance plicies. - Develp anti-retaliatin plicies. - Plicies and Prcedures (a)(1)(i) (a)(1)(ii)(A) TVS004 HIPAA SECURITY RULE - ADMINISTRATIVE SAFEGUARDS (R) = REQUIRED, (A) = ADDRESSABLE Security Management Prcess: Implement plicies and prcedures t prevent, detect, cntain, and crrect security vilatins. Has a Risk Analysis been cmpleted in accrdance with NIST Guidelines (NIST )? (R) Risk analysis shuld include the fllwing steps P a g e 4

5 (a)(1)(ii)(B) TVS (a)(1)(ii)(C) TVS003 System characterizatin Threat identificatin Vulnerability identificatin Cntrl analysis Likelihd determinatin Impact analysis Risk determinatin Cntrl recmmendatins Results dcumentatin Has the Risk Management prcess been cmpleted in accrdance with NIST Guidelines (NIST )? (R) Risk management invlves Initiatin Develpment r acquisitin Implementatin Operatin r maintenance Dispsal D yu have frmal sanctins against emplyees wh fail t cmply with security plicies and prcedures? (R) A frmal sanctin plicy shuld include: Types f vilatins that require sanctins, including: Accessing infrmatin that yu d nt need t knw t d yur jb. Sharing cmputer access cdes (user name & passwrd). Leaving cmputer unattended while yu are lgged int PHI prgram. Disclsing cnfidential r patient infrmatin with unauthrized persns. Cpying infrmatin withut authrizatin. Changing infrmatin withut authrizatin. Discussing cnfidential infrmatin in a public area r in an area where the public culd verhear the cnversatin. Discussing cnfidential infrmatin with an unauthrized persn. Failing/refusing t cperate with the cmpliance fficer, ISO, r ther designee Failing/refusing t cmply with a remediatin reslutin r recmmendatin Recmmended disciplinary actins include Verbal r written reprimand Retraining n privacy/security awareness, plicies, HIPAA, HITECH, P a g e 5

6 (a)(1)(ii)(D) TVS014, TVS017, TVS (a)(2) TVS (a)(3)(i) and civil and criminal prsecutin Letter f reprimand r suspensin Terminatin f emplyment r cntract Have yu implemented prcedures t regularly review recrds f IS activity such as audit lgs, access reprts, and security incident tracking? (R) Ensure EMR and ther audit lgs are enabled and mnitred regularly. alerts als shuld be setup fr lgin failures and ther events. Enabling and mnitring f Windws Security Event Lgs (wrkstatin and servers). It is als imprtant t mnitr the ther Event Lgs as well (Applicatin and System Lgs). Mnitring f lgs frm netwrking equipment, i.e. switches, ruters, wireless access pints, and firewalls Audit reductin, review, and reprting tls (i.e. a central syslg server) supprts after-the-fact investigatins f security incidents withut altering the riginal audit recrds. Cntinuus mnitring f the infrmatin system by using manual and autmated methds. Manual methds include the use f designated persnnel r utsurced prvider that manually reviews lgs r reprts n a regular basis, i.e. every mrning. Autmated methds include the use f alerts generated frm syslg servers, servers and netwrking equipment, and EMR sftware alerts t designated persnnel. Track and dcument infrmatin system security incidents n an nging basis Reprting f incidents t the apprpriate persnnel, i.e. designated Privacy Officer r Infrmatin Security Officer (ISO) Use f central syslg server fr mnitring and alerting f audit lgs and abnrmalities n the netwrk, including: Accunt lcked due t failed attempts Failed attempts by unauthrized users Escalatin f rights Installatin f new services Event lg stpped Virus activity Assigned Security Respnsibility: Identify the security fficial wh is respnsible fr the develpment and implementatin f the plicies and prcedures required by this subpart fr the entity. (R) Wrkfrce Security: Implement plicies and prcedures t P a g e 6

7 (a)(3)(ii)(A) TVS003 ensure that all members f its wrkfrce have apprpriate access t EPHI, as prvided under paragraph (a)(4) f this sectin, and t prevent thse wrkfrce members wh d nt have access under paragraph (a)(4) f this sectin frm btaining access t electrnic prtected health infrmatin (EPHI). Have yu implemented prcedures fr the authrizatin and/r supervisin f emplyees wh wrk with EPHI r in lcatins where it might be accessed? (A) Plicies and prcedures that specify hw and when access is granted t EHR systems, laptps, wireless access pints, etc. t nly thse individuals that require access VPN access t ffice when cnnecting frm hme, htel, etc. using IPSec D nt access the ffice server r wrkstatin with a Remte Desktp cnnectin withut the use f an IPSec VPN cnnectin. Therefre yur firewall shuld nt have tcp prt 3389 pened (frwarded) t any server r wrkstatin in the facility fr accessing an EMR system r any ther sftware Rle-based access t data that allws access fr users based n jb functin / rle within the rganizatin. This includes access t EMR systems, wrkstatins, servers, netwrking equipment, etc. Enfrcement thrugh Access Cntrl Lists (ACL s) by permitting nly the necessary traffic t and frm the infrmatin system as required. The default decisin within the flw cntrl enfrcement is t deny traffic and anything allwed has t be explicitly added t the ACL The prvider reviews the activities f users by utilizing the EMR auditing functins, Windws Event Lgs, and netwrking lgs frm ruters, switches, and firewalls. alerts f lgin failures, elevated access, and ther events are recmmended Audit lgs shuld be cmpiled t a centralized lcatin thrugh the use f a syslg server The prvider allws nly authrized persnnel t perfrm maintenance n the infrmatin system, including; EMR systems, wrkstatins, servers, and netwrking equipment Disable the ability fr users t write data t USB & CD/DVD Drives thrugh the use f Grup Plicies r enfrced lcally n the wrkstatins. Writing shuld nly be allwed if FIPS cmpliant encryptin is utilized P a g e 7

8 (a)(3)(ii)(B) TVS (a)(3)(ii)(C) TVS003, TVS009 Security plicy fr all persnnel that is signed and updated regularly which specifies apprpriate use n the systems, i.e. cmmunicatin, EMR access, keeping passwrds safe, use f cable lcks and privacy screens, etc. The use f use f nndisclsure agreements, acceptable use agreements, rules f behavir, and cnflict-finterest agreements Security plicy fr third-party persnnel and the mnitring fr cmpliance t the plicy Third-party persnnel include EMR vendrs, utsurced IT functins, and any ther thirdparty prvider r cntractr Have yu implemented prcedures t determine that the Access f an emplyee t EPHI is apprpriate? (A) Apprval prcess fr activating and mdifying accunts t laptps / wrkstatins and EHR systems (i.e. a netwrk access request frm that requires apprpriate signatures befre creating r mdifying a user accunt) Prcess fr disabling and remving accunts fr vluntary and invluntary terminatins EMR sftware cnfigured t lg and track all access which specifies each user accessing PHI, whether success r failure. Security plicy fr all persnnel that is signed and updated regularly which specifies apprpriate use n the systems, i.e. cmmunicatin, EMR access, keeping passwrds safe, use f cable lcks and privacy screens, etc. The screening f individuals (i.e. backgrund checks) requiring access t rganizatinal infrmatin and infrmatin systems befre authrizing access The use f use f nndisclsure agreements, acceptable use agreements, rules f behavir, and cnflict-finterest agreements Have yu implemented prcedures fr terminating access t EPHI when an emplyee leaves yu rganizatin? (A) Security plicy fr all persnnel that is signed and updated regularly which specifies apprpriate use n the systems, i.e. cmmunicatin, EMR access, keeping passwrds safe, use f cable lcks and privacy screens, etc. Prcedures fr terminating emplyment f individuals (full-time, part-time, temprary, cntractrs, etc.) including: Disabling f any EMR user accunts Disabling f Windws accunts t wrkstatins and/r servers P a g e 8

9 Terminatin f any ther system access Cnduct exit interviews Retrieval f all rganizatinal prperty Prvides apprpriate persnnel with access t fficial recrds created by the terminated emplyee that are stred n the infrmatin system (i.e. cmputer, server, etc.) Prcedures fr when persnnel are reassigned r transferred t ther psitins within the rganizatin and initiates apprpriate actins. Apprpriate actins include: Returning ld and issuing new keys, identificatin cards, and building passes Clsing f ld accunts and establishing new accunts Changing system access authrizatins Prviding fr access t fficial recrds created r cntrlled by the emplyee at the ld wrk lcatin and in the ld accunts (a)(4)(i) (a)(4)(ii)(A) TVS (a)(4)(ii)(B) TVS003, TVS007, TVS008 Infrmatin Access Management: Implement plicies and prcedures fr authrizing access t EPHI that are cnsistent with the applicable requirements f subpart E f this part. If yu are a clearinghuse that is part f a larger rganizatin, have yu implemented plicies and prcedures t prtect EPHI frm the larger rganizatin? (A) Plicies and prcedures shuld be in place t help prtect the EPHI data frm the larger rganizatin that may nt require access t the data. The rganizatin may have a shared netwrk s it s imprtant fr the safeguards t limit r islate access t EPHI fr nly thse that are specifically authrized. The safeguards shuld include: Restricted user access n laptps and wrkstatins t help prevent sftware installatins and mdificatins t the Operating System and its services Use f Micrsft Active Directry (Windws Dmain Cntrller) accunts t limit permissins based n rle r jb functin Firewall Access Cntrl List set t deny access by default and t nly allw the needed access (prts, prtcls, and services) thrugh Have yu implemented plicies and prcedures fr granting access t EPHI, fr example, thrugh access t a wrkstatin, transactin, prgram, r prcess? (A) P a g e 9

10 (a)(4)(ii)(C) TVS001, TVS003, TVS015 Plicy and prcedures that specify hw and when access is granted t EHR systems, laptps, etc. t nly thse individuals that require access Apprval prcess fr activating and mdifying accunts t laptps / wrkstatins and EHR systems (i.e. a netwrk access request frm that requires apprpriate signatures befre creating r mdifying a user accunt) Prcess fr disabling and remving accunts fr vluntary and invluntary terminatins EHR sftware t lg and track all access which specifies each user Rle-based access t data that allws access fr users based n jb functin / rle within the rganizatin. This includes access t EMR systems, wrkstatins, servers, netwrking equipment, etc. Enfrcement thrugh Access Cntrl Lists (ACL s) by permitting nly the necessary traffic t and frm the infrmatin system as required. The default decisin within the flw cntrl enfrcement is t deny traffic and anything allwed has t be explicitly added t the ACL The prvider reviews the activities f users utilizing the EMR auditing functins, Windws Event Lgs, and netwrking lgs frm ruters, switches, and firewalls. alerts f lgin failures, elevated access, and ther events are recmmended Audit lgs shuld be cmpiled t a centralized lcatin thrugh the use f a syslg server The use f use f nndisclsure agreements, acceptable use agreements, rules f behavir, and cnflict-finterest agreements Security plicy fr third-party persnnel and mnitring f cmpliance t the security plicy Third-party persnnel include EMR vendrs, utsurced IT functins, and any ther thirdparty prvider r cntractr Have yu implemented plicies and prcedures that are based upn yur access authrizatin plicies t establish, dcument, review, and mdify a user s right f access t a wrkstatin, transactin, prgram, r prcess? (A) Plicy and prcedures that specify hw and when access is granted t EHR systems, laptps, etc. t nly thse individuals that require access Apprval prcess fr activating and mdifying accunts t laptps / wrkstatins and EHR systems (i.e. a netwrk access request frm that requires apprpriate signatures befre creating r mdifying a user accunt) P a g e 10

11 (a)(5)(i) (a)(5)(ii)(A) TVS005, TVS006 Prcess fr disabling and remving accunts fr vluntary and invluntary terminatins EHR sftware t lg and track all access which specifies each user Security Awareness and Training: Implement a security awareness and training prgram fr all members f its wrkfrce (including management). D yu prvide peridic infrmatin security reminders? (A) Security awareness training t all users befre authrizing access t the system, i.e. during new emplyee rientatin. Examples f prviding infrmatin security reminders include: Face-t-face meetings updates Newsletters Pstings in public areas, i.e. hallways, kitchen Cmpany Intranet Security awareness training shuld be cnducted at an n-ging basis Maintain cntact with special interest grups, specialized frums, prfessinal assciatins, news grups, and/r peer grups f security prfessinals t stay up t date with the latest recmmended security practices, techniques, and technlgies. Subscribe t security alerts and advisries including: Cisc security alerts CERT advisry alerts NIST publicatins and vulnerability alerts Other vendr-specific alerts like McAfee, Symantec, etc (a)(5)(ii)(B) TVS014, TVS018, TVS019, TVS025 D yu have plicies and prcedures fr guarding against, detecting, and reprting malicius sftware? (A) Security awareness training t all users befre authrizing access t the system, i.e. during new emplyee rientatin. Security awareness training shuld be cnducted at an n-ging basis Antivirus prtectin n every wrkstatin/server within the rganizatin (i.e. McAfee, Symantec, etc.) Updated at least daily but wuld recmmend every 4 hurs Regularly scheduled antivirus scans f all systems, i.e. weekly r mnthly Centralized administratin, updating, and P a g e 11

12 reprting is recmmended Use f central syslg server fr mnitring and alerting f audit lgs and abnrmalities n the netwrk, including: Accunt lcked due t failed attempts Failed attempts by unauthrized users Escalatin f rights Installatin f new services Event lg stpped Virus activity Spam prtectin can be perfrmed n the wrkstatins themselves and/r at the gateway (entry/exit pint int the netwrk) Wrkstatin slutins include built-in Micrsft Outlk Junk- ptin r McAfee/Symantec suites that include Spam prtectin with their antivirus slutins Gateway slutins include Websense, Barracuda Netwrks, TrendMicr, etc (a)(5)(ii)(C) TVS014, TVS019 D yu have prcedures fr mnitring lgin attempts and reprting discrepancies? (A) Apprval prcess fr activating and mdifying accunts t laptps / wrkstatins and EHR systems (i.e. a netwrk access request frm that requires apprpriate signatures befre creating r mdifying a user accunt) Prcess fr disabling and remving accunts fr vluntary and invluntary terminatins The prvider reviews the activities f users utilizing the EMR auditing functins, Windws Event Lgs, and netwrking lgs frm ruters, switches, and firewalls. alerts f lgin failures, elevated access, and ther events are recmmended Audit lgs shuld be cmpiled t a centralized lcatin thrugh the use f a syslg server It's recmmended t have audit lgs g t a central server by using a syslg server Example syslg servers fr central mnitring and alerting f auditable events include, Kiwisyslg, Gfi Event Manager, Syslg Manager, Slarwinds Syslg Mnitr, Splunk Syslg Examples f auditable events include, but are nt limited t: Accunt creatin Accunt mdificatin Accunt disabled Accunt escalatin P a g e 12

13 (a)(5)(ii)(D) TVS006 Server health Netwrk health Access allwed Access denied Service installatin Service deletin Cnfiguratin changes Ensure EMR and ther audit lgs are enabled and mnitred regularly. alerts als shuld be setup fr lgin failures and ther events. EHR sftware t lg and track all access which specifies each user Enabling and mnitring f Windws Security Event Lgs (wrkstatin and servers). Als imprtant t mnitr the ther Event Lgs as well (Applicatin and System Lgs). Mnitring f lgs frm netwrking equipment, i.e. switches, ruters, wireless access pints, and firewalls D yu have prcedures fr creating, changing, and safeguarding passwrds? (A) Passwrds include tkens, bimetrics, and certificates in additin t standard passwrds. Standard passwrds shuld meet the fllwing criteria: Enfrce passwrd histry. Previus 12 passwrds cannt be used Maximum passwrd age. Passwrds shuld expire every days. Minimum passwrd age. Passwrds can nly be changed manually by the user after 1 day Minimum passwrd length. 8 r mre characters lng Passwrd cmplexity. Passwrds shuld cntain 3 f the fllwing criteria Uppercase characters (A-Z) Lwercase characters (a-z) Numbers (0-9) Special characters (i.e.!,#,&,*) Accunt lckut. Accunts lck after 3 unsuccessful passwrd attempts Enfrced in the EMR system, Active Directry, r at least n the lcal wrkstatin r server. Passwrds include Micrsft lgins (Active Directry Dmain Cntrller r just lcally lgging int a cmputer) fr each individual user. Unique username and passwrd fr EHR systems. The use f passwrds and/r tkens fr remte access thrugh a Virtual Private Netwrk (VPN) Example tken prducts include, RSA SecureID r Aladdin s etken P a g e 13

14 (a)(6)(i) (a)(6)(ii) TVS (a)(7)(i) (a)(7)(ii)(A) TVS026 Each user has a unique identifier (i.e. user ID and passwrd) when accessing their cmputer, EHR sftware, r any ther system r resurce Security awareness and training prgram t educate users and managers fr safeguarding f passwrds. See (a)(5)(i) N shared access fr any resurce r system (i.e. cmputer r EHR system) The management f authenticatrs (i.e. security tkens). Management includes the prcedures fr initial distributin, lst/cmprmised r damaged authenticatrs, r revking f authenticatrs. Authenticatrs culd be tkens, PKI certificates, bimetrics, passwrds, and key cards Authenticatr feedback includes the displaying f asterisks when a user types in a passwrd. The gal is t ensure the system des nt prvide infrmatin that wuld allw an unauthrized user t cmprmise the authenticatin mechanism. Security Incident Prcedures: Implement plicies and prcedures t address security incidents. D yu have prcedures t identify and respnd t suspected r knwn security incidents; mitigate t the extent practicable, harmful effects f knwn security incidents; and dcument incidents and their utcmes? (R) Incident handling prcess can include audit mnitring f the EMR system, netwrk mnitring, physical access mnitring. The prcess shuld detail hw the incident is reprted, cntained, eradicated, and then recvered. Track and dcument infrmatin system security incidents n an nging basis Reprting f incidents t the apprpriate persnnel, i.e. designated Privacy Officer r Infrmatin Security Officer (ISO) The training f persnnel fr the handling and reprting f security incidents Cntingency Plan: Establish (and implement as needed) plicies and prcedures fr respnding t an emergency r ther ccurrence (fr example, fire, vandalism, system failure, and natural disaster) that damages systems that cntain EPHI. Have yu established and implemented prcedures t create and maintain retrievable exact cpies f EPHI? (R) Perfrm nightly backups f PHI which are taken ffsite n a daily, at a minimum weekly, basis t an authrized P a g e 14

15 (a)(7)(ii)(B) TVS (a)(7)(ii)(C) TVS026 strage facility It s recmmended that the strage lcatin be at least 60 miles away Regularly test backups t verify reliable restratin f data (i.e. tests perfrmed at least n a quarterly basis) All backups shuld be encrypted using FIPS cmpliant sftware and algrithms Backups shuld be verified t help ensure the integrity f the files being backed up Even fr hsted EMR slutins, it is imprtant t ensure the vendr is perfrming these functins and that these prcedures are part f the Agreement Have yu established (and implemented as needed) prcedures t restre any lss f EPHI data that is stred electrnically? (R) Prcedure fr btaining necessary PHI during an emergency. This shuld be part f yur Cntingency Plan Identified an alternate prcessing facility in case f disaster The use f a primary and alternate telecmmunicatin services in the event that the primary telecmmunicatin capabilities are unavailable The time t revert t the alternate service is defined by the rganizatin and is based n the critical business functins An example wuld be as simple as frwarding the main ffice number t an alternate ffice r even a cell phne Perfrm nightly backups f PHI which are taken ffsite n a daily, at a minimum weekly, basis t an authrized strage facility It s recmmended that the strage lcatin be at least 60 miles away Regularly tests backups t verify reliable restratin f data (i.e. tests perfrmed at least n a quarterly basis) All backups shuld be encrypted using FIPS cmpliant sftware and algrithms Backups shuld be verified t help ensure the integrity f the files being backed up Even fr hsted EMR slutins, it is imprtant t ensure the vendr is perfrming these functins and that these prcedures are part f the Agreement Have yu established (and implemented as needed) prcedures t enable cntinuatin f critical business prcesses and fr prtectin f EPHI while perating in the emergency mde? (R) Prcedure fr btaining necessary PHI during an emergency. This shuld be part f the Cntingency Plan P a g e 15

16 (a)(7)(ii)(D) TVS (a)(7)(ii)(E) TVS (a)(8) TVS024, TVS026 The training f persnnel in their cntingency rles and respnsibilities Training shuld ccur at least annually The testing f the cntingency plan at least annually, i.e. a table tp test t determine the incident respnse effectiveness and dcument the results Reviewing the cntingency plan at least annually and revising the plan as necessary (i.e. based n system/rganizatinal changes r prblems encuntered during plan implementatin, executin, r testing. Prcedures t allw the infrmatin system t be recvered and recnstituted t a knwn secure state after a disruptin r failure. This culd include prcedures t restre backup tapes t a new server in respnse t a hardware failure. Have yu implemented prcedures fr peridic testing and revisin f cntingency plans? (A) The training f persnnel in their cntingency rles and respnsibilities Training shuld ccur at least annually Testing f the cntingency plan at least annually, i.e. a table tp test t determine the incident respnse effectiveness and dcument the results Reviewing the cntingency plan at least annually and revise the plan as necessary (i.e. based n system/rganizatinal changes r prblems encuntered during plan implementatin, executin, r testing. Have yu assessed the relative criticality f specific applicatins and data in supprt f ther cntingency plan cmpnents? (A) Prcedure fr btaining necessary PHI during an emergency. This shuld be part f the Cntingency Plan Business Impact Analysis (BIA) will help determine the criticality f specific applicatins and data Categrize the infrmatin system based n guidance frm FIPS 199, which defines three levels f ptential impact n rganizatins r individuals shuld there be a breach f security (i.e. a lss f cnfidentiality, integrity, r availability) Ptential impact ptins are Lw, Mderate, r High Have yu established a plan fr peridic technical and nn technical evaluatin f the standards under this rule in respnse t envirnmental r peratinal changes affecting the security f EPHI? (R) P a g e 16

17 (b)(1) (b)(4) TVS (a)(1) Plicy and prcedures that facilitate the implementatin f the security assessment, certificatin, and accreditatin f the system. Yearly assessment f the security safeguards t determine the extent t which they are implemented crrectly, perating as intended, and prducing the desired utcme with respect t meeting the security requirements. A senir persn in the practice signs and apprves infrmatin systems fr prcessing befre peratins r when there is a significant change t the system. Cntinuus mnitring f infrmatin systems using manual and autmated methds. Manual methds include the use f designated persnnel r utsurced prvider that manually reviews lgs r reprts n a regular basis, i.e. every mrning. Autmated methds include the use f alerts generated frm syslg servers, servers and netwrking equipment, and EMR sftware alerts t designated persnnel. Business Assciate Cntracts and Other Arrangements: A cvered Entity (CE), in accrdance with Sec , may permit a business assciate t create, receive, maintain, r transmit EPHI n the cvered entity s behalf nly if the CE btains satisfactry assurances, in accrdance with Sec (a) that the business assciate apprpriately safeguard the infrmatin. Have yu established written cntracts r ther arrangements with yur trading partners that dcuments satisfactry assurances that the BA will apprpriately safeguard the infrmatin? (R) Authrizatin and mnitring f all cnnectins frm the infrmatin system t ther infrmatin systems, i.e. a VPN cnnectin frm the prvider's system t an EMR sftware vendr The rganizatin requires that prviders f external infrmatin systems (i.e. EMR vendrs) emply adequate security cntrls in accrdance with applicable laws, Executive Orders, directives, plicies, regulatins, standards, and guidance. This will ultimately invlve a Business Assciate Agreement but can als include additinal cntracts as well. HIPAA SECURITY RULE - PHYSICAL SAFEGUARDS (R) = REQUIRED, (A) = ADDRESSABLE Facility Access Cntrls: Implement plicies and prcedures t limit physical access t its electrnic P a g e 17

18 (a)(2)(i) TVS010, TVS (a)(2)(ii) TVS010, TVS (a)(2)(iii) TVS001, TVS010, TVS015 infrmatin systems and the facility r facilities in which they are hused, while ensuring that prperly authrized access is allwed. Have yu established (and implemented as needed) prcedures that allw facility access in supprt f restratin f lst data under the disaster recvery plan and emergency mde peratins plan in the event f an emergency? (A) Prcedure fr btaining necessary PHI during an emergency. This shuld be part f the Cntingency Plan Tape backups taken ffsite t an authrized strage facility Identify alternate prcessing facility in case f disaster Alternate wrk sites have apprpriate administrative, physical, and technical safeguards. Have yu implemented plicies and prcedures t safeguard the facility and the equipment therein frm unauthrized physical access, tampering, and theft? (A) Plicy and prcedures that specify physical and envirnmental safeguards used (a)(2)(iii) utlines sme specific safeguards that are recmmended System security plan that specifies an verview f the security requirements fr the system and a descriptin f the security cntrls in place r planned fr meeting thse requirements. Have yu implemented prcedures t cntrl and validate a persn s access t facilities based n their rle r functin, including visitr cntrl, and cntrl f access t sftware prgrams fr testing and revisin? (A) Enfrcement thrugh Access Cntrl Lists (ACL s) by permitting nly the necessary traffic t and frm the infrmatin system as required. The default decisin within the flw cntrl enfrcement is t deny traffic and anything allwed has t be explicitly added t the ACL VPN access t ffice when cnnecting frm hme, htel, etc. using IPSec D nt access the ffice server r wrkstatin with a Remte Desktp cnnectin withut the use f an IPSec VPN cnnectin. Therefre yur firewall shuld nt have tcp prt 3389 pened (frwarded) t any server r wrkstatin in the facility fr accessing an EMR system r any ther sftware Rle-based access t data that allws access fr users based n jb functin / rle within the rganizatin. This includes access t EMR systems, P a g e 18

19 wrkstatins, servers, netwrking equipment, etc. Plicy and prcedures that specify physical and envirnmental safeguards used. A list f persnnel with authrized access t specific areas. If a card-access system is used then the list can be generated by the card-access system. The use f cipher lcks and/r card access cntrl system t sensitive areas f the facility Cipher lcks require a cde fr entry instead f just a standard physical key Keri Access Cntrl System is an example f a system that requires the user t have a card that has t be swiped r held in frnt f a sensr fr entry Mnitring physical access thrugh the use f cardaccess system, i.e. Keri access cntrl system Mnitring physical access thrugh the use f vide cameras Cntrls physical access by authenticating visitrs at the frnt desk (r ther sensitive areas) befre authrizing access t the facility Presenting an authrized badge r ID fr access Recrds f physical access are kept that includes: (i) name and rganizatin f the persn visiting; (ii) signature f the visitr; (iii) frm f identificatin; (iv) date f access; (v) time f entry and departure; (vi) purpse f visit; and (vii) name and rganizatin f persn visited. Designated persnnel within the facility review the visitr access recrds daily (a)(2)(iv) (b) Have yu implemented plicies and prcedures t dcument repairs and mdificatins t the physical cmpnents f a facility, which are related t security (fr example, hardware, walls, drs, and lcks)? (A) Plicies and prcedures that specify maintenance t the facility Change management prcess that allws request, review, and apprval f changes t the infrmatin system r facility Spare parts available fr quick maintenance f hardware, drs, lcks, etc. Have yu implemented plicies and prcedures that specify the prper functins t be perfrmed, the manner in which thse functins are t be perfrmed, and the physical attributes f the P a g e 19

20 surrundings f a specific wrkstatin r class f wrkstatin that can access EPHI? (R) Rle-based access t data that allws access fr users based n jb functin / rle within the rganizatin. This includes access t EMR systems, wrkstatins, servers, netwrking equipment, etc. Enfrcement thrugh Access Cntrl Lists (ACL s) by permitting nly the necessary traffic t and frm the infrmatin system as required. The default decisin within the flw cntrl enfrcement is t deny traffic and anything allwed has t be explicitly added t the ACL Firewall r brder ruter prevents spfing with utside incming traffic by denying RFC 3330 (Special use address space) and RFC 1918 (Private internets) as the surce address. ACL's (access cntrl lists) are als used n ruters, switches and firewalls t specifically allw r deny traffic (prtcls, prts and services) thugh the devices and nly n authrized interfaces. Enfrce sessin lck after 10 minutes (n mre than 30 minutes) f inactivity n the cmputer system. This can be enfrced thrugh Active Directry Grup Plicies if in a Windws Dmain envirnment r at least set lcally n the cmputer if nt n a dmain. Users have the ability t manually initiate a sessin lck n their cmputer as needed (i.e. Alt, Ctrl, Delete then Enter) Sessin lck shuld nt be mre than 30 minutes fr remte access (VPN access) and prtable devices (laptps, PDA's, etc.) Terminate VPN sessins after 30 minutes f inactivity Terminate terminal services r Citrix sessins after 30 minutes f inactivity. Terminate EHR sessin after 30 minutes f inactivity Cntrlling and mnitring f all remte access thrugh the use f a syslg server, VPN server, and Windws Active Directry and/r Cisc Access Cntrl Server (ACS). IPSec VPN cnnectins fr remte access Disable the ability fr users t write data t USB & CD/DVD Drives thrugh the use f Grup Plicies r enfrced lcally n the wrkstatins. Writing shuld nly be allwed if FIPS cmpliant encryptin is utilized Use f central management and encryptin f remvable media including USB thumb drives (i.e. PGP, Safeguard Easy, PintSec Prtectr, etc.) The use f cipher lcks and/r card access cntrl P a g e 20

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Christchurch Polytechnic Institute of Technology Access Control Security Standard

Christchurch Polytechnic Institute of Technology Access Control Security Standard CPIT Crprate Services Divisin: ICT Christchurch Plytechnic Institute f Technlgy Access Cntrl Security Standard Crprate Plicies & Prcedures Sectin 1: General Administratin Dcument CPP121a Principles Infrmatin

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

HIPAA Legislation - Key Provisions

HIPAA Legislation - Key Provisions HIPAA SECURITY, PRIVACY, AND THE NATIONAL PROVIDER IDENTIFIER Frederick Britten Frt Hays State University Carl Ann Raymnd The University f Gergia Outline HIPAA Review Enfrcement Update Natinal Prvider

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

2. Are there any restrictions on when the work can be performed (e.g. only at night, only during business hours, only on weekends)? No.

2. Are there any restrictions on when the work can be performed (e.g. only at night, only during business hours, only on weekends)? No. HIPAA Technical Risk Security Assessment 1. Will yu be issuing additinal directins fr the frmatting f the final prpsal due Nvember 21 st? There is nt specific frmatting requirements, just submit the prpsal

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

IT Account and Access Procedure

IT Account and Access Procedure IT Accunt and Access Prcedure Revisin Histry Versin Date Editr Nature f Change 1.0 3/23/06 Kelly Matt Initial Release Table f Cntents 1.0 Overview... 1 2.0 Purpse... 1 3.0 Scpe... 1 4.0 Passwrds... 1 4.1

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 28th January 2014 Versin 3 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine Title: Identity Theft Prgram Effective Date: July 2009 NYU Langne Medical Center NYU Hspitals Center NYU Schl f Medicine POLICY It is the plicy f the NYU Langne Medical Center t educate and train staff

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

BackupAssist SQL Add-on

BackupAssist SQL Add-on WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

Woodstock Multimedia, INC. Software/Hardware Usage Policy

Woodstock Multimedia, INC. Software/Hardware Usage Policy Wdstck Multimedia, INC. Sftware/Hardware Usage Plicy POLICY PURPOSE The purpse f the Wdstck Multimedia, INC. Sftware / Hardware Usage Plicy is t ensure that Wdstck Multimedia, INC. emplyees are prperly

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

MigrationWiz HIPAA Compliant Migration. Focus on data migration, not regulation. BitTitan Global Headquarters: 3933 Lake Washington Blvd NE Suite 200

MigrationWiz HIPAA Compliant Migration. Focus on data migration, not regulation. BitTitan Global Headquarters: 3933 Lake Washington Blvd NE Suite 200 MigratinWiz HIPAA Cmpliant Migratin Fcus n data migratin, nt regulatin. BitTitan Glbal Headquarters: 3933 Lake Washingtn Blvd NE Suite 200 Table f Cntents Kirkland, WA 98033 www.bittitan.cm sales@bittitan.cm

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students

Immaculate Conception School, Prince George Bring Your Own Device Policy for Students Bring Yur Own Device Plicy fr Students Purpse This plicy utlines the acceptable use f electrnic devices t maintain a safe and secure educatin envirnment with the gal f preparing students fr the future,

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

System Business Continuity Classification

System Business Continuity Classification Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required

More information

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite CISP/PCI Implementatin Guidance fr Odyssey Suite Applicable Applicatin Versin This dcument supprts the fllwing applicatin versin: Odyssey Suite Versin 2.0 Intrductin Systems which prcess payment transactins

More information

Process of Setting up a New Merchant Account

Process of Setting up a New Merchant Account Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

NERC-CIP Cyber Security Standards Compliance Documentation

NERC-CIP Cyber Security Standards Compliance Documentation Cmpliance Dcumentatin Briv OnAir 8/3/20154 Page 2 Overview This dcument is intended t be the primary surce f infrmatin fr Briv s cmpliance with the Nrth America Electric Reliability Crpratin (NERC) reliability

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply Sectin 1 General Infrmatin RFR Number: (Reference BPO Number) Functinal Area (Enter One Only) F50B3400026 7 Infrmatin System Security Labr Categry A single supprt resurce may be engaged fr a perid nt t

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

ScaleIO Security Configuration Guide

ScaleIO Security Configuration Guide ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:

More information

Password Reset for Remote Users

Password Reset for Remote Users 1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin

More information

A Guide to HIPAA Security Standards and the Quest HIPAA Report Pack

A Guide to HIPAA Security Standards and the Quest HIPAA Report Pack A Guide t HIPAA Security Standards and the Quest HIPAA Reprt Pack Cpyright Quest Sftware, Inc. 2004. All rights reserved. This guide cntains prprietary infrmatin, which is prtected by cpyright. The sftware

More information

Managed Firewall Service Definition. SD007v1.1

Managed Firewall Service Definition. SD007v1.1 Managed Firewall Service Definitin SD007v1.1 Managed Firewall Service Definitin Service Backgrund It is imprtant t nte that the functin f any firewall service is t filter traffic cming int the netwrk (als

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5

Supersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5 Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: Backup@AmlInternet.c.uk Cntents Page Situatin Analysis 3 AML Internet - The Slutin

More information

Technical Writing - TheUsers Visa (SHR User Accunt)

Technical Writing - TheUsers Visa (SHR User Accunt) POLICY Number: 7311-25-004 Title: Saskatn Health Regin User Accunt Plicy Authrizatin [ ] President and CEO [X] Vice President, Finance and Crprate Services Surce: Directr, Infrmatin Technlgy Services Crss

More information

ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015

ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY. Approved by Governing Body on: 6 th May 2015 ALBAN CHURCH OF ENGLAND ACADEMY COMPUTER SECURITY POLICY Gvernrs Cmmittee: Finance and General Purpses Apprved by Gverning Bdy n: 6 th May 2015 Signed: (Chair f Cmmittee) Signed: (Headteacher) Date t be

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin

More information

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released

Version Date Comments / Changes 1.0 January 2015 Initial Policy Released Page 1 f 6 Vice President, Infrmatics and Transfrmatin Supprt APPROVED (S) REVISED / REVIEWED SUMMARY Versin Date Cmments / Changes 1.0 Initial Plicy Released INTENT / PURPOSE The Infrmatin and Data Gvernance

More information

SaaS Listing CA Cloud Service Management

SaaS Listing CA Cloud Service Management SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters

More information

Request for Proposal Technology Services

Request for Proposal Technology Services Avca Schl District 37 Wilmette, IL Request fr Prpsal Technlgy Services Netwrk and Systems Infrastructure Management Services December 5, 2013 Avca Schl District 37 is seeking an IT cnsulting firm t manage

More information

THIRD PARTY PROCUREMENT PROCEDURES

THIRD PARTY PROCUREMENT PROCEDURES ADDENDUM #1 THIRD PARTY PROCUREMENT PROCEDURES NORTH CENTRAL TEXAS COUNCIL OF GOVERNMENTS TRANSPORTATION DEPARTMENT JUNE 2011 OVERVIEW These prcedures establish standards and guidelines fr the Nrth Central

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

Yur Infrmatin technlgy Security Plicy

Yur Infrmatin technlgy Security Plicy INFORMATION TECHNOLOGY USAGE POLICY COUNTY OF ORANGE Cunty f Orange Infrmatin Technlgy Usage Plicy 1 INTRODUCTION: The Cunty f Orange Infrmatin Technlgy (IT) Usage Plicy is the fundatin f the Cunty s infrmatin

More information

Name. Description. Rationale

Name. Description. Rationale Cmplliiance Cmpnentt Descriptin Ratinale Benefits List the Dmain List the Discipline List the Technlgy Area List Prduct Cmpnent Dcument the Cmpliance Cmpnent Type Cmpnent Sub-type DEEFFI INITION Hst-Based

More information

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

System Business Continuity Classification

System Business Continuity Classification System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality

More information

General Records Authority 33. Accredited Training

General Records Authority 33. Accredited Training General Recrds Authrity 33 2012/00579704 Accredited Training February 2013 This is an accurate reprductin f the authrised recrds authrity cntent, created fr accessibility purpses CONTENTS INTRODUCTION

More information

Understand Business Continuity

Understand Business Continuity Understand Business Cntinuity Lessn Overview In this lessn, yu will learn abut: Business cntinuity Data redundancy Data availability Disaster recvery Anticipatry Set What methds can be emplyed by a system

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

OITS Service Level Agreement

OITS Service Level Agreement OITS Service Level Agreement Objective A Service Level Agreement (SLA) describes the IT Service, dcuments Service Level Targets, and specifies the respnsibilities f the IT Service Prvider and the Custmer.

More information

Monitor Important Windows Security Events using EventTracker

Monitor Important Windows Security Events using EventTracker Mnitr Imprtant Windws Security Events using EventTracker White Paper Publicatin Date: Mar 14, 2014 EventTracker 8815 Centre Park Drive Clumbia MD 21045 www.eventtracker.cm EventTracker: Mnitr Imprtant

More information

Information Security Policy

Information Security Policy Purpse The risk t Charlestn Suthern University, its emplyees and students frm data lss and identity theft is f significant cncern t the University and can be reduced nly thrugh the cmbined effrts f every

More information

Help Desk Level Competencies

Help Desk Level Competencies Help Desk Level Cmpetencies Level 1 Take user calls and manage truble tickets Ability t staff and manage the rganizatins helpdesk and effectively respnd t rutine custmer calls Ability t use prper grammar

More information

Presentation: The Demise of SAS 70 - What s Next?

Presentation: The Demise of SAS 70 - What s Next? Presentatin: The Demise f SAS 70 - What s Next? September 15, 2011 1 Presenters: Jeffrey Ziplw - Partner BlumShapir Jennifer Gerasimv Senir Manager Delitte. SAS 70 Backgrund and Overview Purpse f a SAS

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

Monthly All IFS files, all Libraries, security and configuration data

Monthly All IFS files, all Libraries, security and configuration data Server Backup Plicy Intrductin Data is ne f Banks DIH Limited s mst imprtant assets. In rder t prtect this asset frm lss r destructin, it is imperative that it be safely and securely captured, cpied, and

More information

CHANGE MANAGEMENT STANDARD

CHANGE MANAGEMENT STANDARD The electrnic versin is current, r when printed and stamped with the green cntrlled dcument stamp. All ther cpies are uncntrlled. DOCUMENT INFORMATION Descriptin Dcument Owner This standard utlines the

More information