Size: px
Start display at page:

Download ""

Transcription

1 Documentation and Electronic Communications

2 Part I. Proactive Record- Keeping

3 We live in a litigious era, and sloppy record-keeping is an invitation to litigation.

4 Good record-keeping demonstrates your professionalism and wards off trouble.

5 Over 90% of workplace communications are now electronic.

6 has become a very Attractive communication choice, but it is not always: appropriate confidential secure

7 "IMs and employee s have become an attorney's first legal line of offense or, or, in some cases, defense for for workplace Lawsuits. epolicy Institute, Columbus, Ohio and The American Management Association.

8 The poll earlier this year of 840 U.S. companies found that one in five has either received subpoenas for employee or has used to defend the company against allegations of sexual, racial or other discrimination claims.

9 That is a dramatic increase from two years before, when one in 10 companies faced a lawsuit because of practices.

10 Today, and instant messaging are the electronic equivalent of DNA evidence." Nancy Flynn, Executive Director of epolicy Institute

11 Electronic Discovery and Evidence: E- Mail contains a host of summaries and links to articles on archiving, legal ramifications, and etc.

12 This environment requires the creation of: file folders electronic backup notes

13 This electronic environment also requires understanding of: FERPA and HIPAA constraints t Institutional access Institutional policies

14 Good intentions, ti common sense, or innocent mistakes do not mitigate privacy violations. Most FERPA violations by faculty and staff are unintentional. Nonetheless, it is the responsibility of the school to prevent violations, and intent is not a defense. Judy Hinnekamp, Assoc. Registrar, U. of Minnesota

15 Just FYI on FERPA violations An official roster cannot be passed around a class room for registration confirmation. Performance indicators of any kind even positive cannot be disclosed without advance written permission.

16 More FERPA Violations Advance written-and and-signed authorization must be obtained if a student wishes to be advised by e- mail. This authorization must include a statement that the student assumes all implicit risks such as inappropriate interception of the .

17 Notification of grades via e- mail is in violation of FERPA!

18 A hidden FERPA danger is the passive release of information through: Information visible on your desk A screen left open on your computer Where a monitor is placed in relation to doors and windows

19 Institutional tional Access Your employer owns your and has legal access to all and everything else save what is locked in a desk drawer ( sole possession records ).

20 Proactive record-keeping archiving i archiving presumes that your documentation will end up in court.

21 Archiving provides your institution and more important, you! with a layer of insulation.

22 " archiving is suddenly a priority motivated by rising volume, regulatory pressures and the threat of litigation to set policies and find effective technology.

23 A recent poll of 1,018 companies of All sizes by Kahn Consulting, Inc. in Georgia revealed that 84% of respondents said they used for forward-looking business planning

24 but only 37% said they managed relative to its content. t

25 Here and on the horizon: High-tech encryption Electronic signatures Self-destructing

26 In the meantime Create an folder for every course. Respond to each student e- mail promptly. Timeliness is now a legal issue. In a red-flag situation, BCC your reply to your supervisor.

27 This BCC option can provide an additional layer of preemptive documentation.

28 Immediately store the student in the course file after replying. py

29 What can go wrong? Message is sent to wrong person. Wrong copy of message is sent. Message is copied, rewritten, and/or forwarded.

30 Soft copy is more difficult to manage than hard copy, but it offers opportunities.

31 What opportunities? 1. Better use of office time 2. More one-on-one contact with students 3. Control 4. Legal protection

32 can be a very useful tool that provides you with a layer of insulation so long as you archive.

33 Communicating through writing=control. You set the tone. There is no question of he said/she said. Protection is provided for you, your institution, and also the students.

EMAIL COMPLIANCE RULES FOR GOVERNMENT AND EDUCATION: E-Discovery, Records Retention, and Email Management Policies & Best Practices

EMAIL COMPLIANCE RULES FOR GOVERNMENT AND EDUCATION: E-Discovery, Records Retention, and Email Management Policies & Best Practices www.arcmail.com 866-417-6495 EMAIL COMPLIANCE RULES FOR GOVERNMENT AND EDUCATION: 2011, Nancy Flynn, The epolicy Institute Authored by Nancy Flynn Founder & Executive Director, The epolicy Institute Author,

More information

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity

Career Connection, Inc. Data Privacy. Bringing Talent Together With Opportunity Career Connection, Inc. Data Privacy Objectives This course is intended for CCI employees. The course gives guidance on data privacy concepts and describes how data privacy is relevant when delivering

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

Preservation and Production of Electronic Records

Preservation and Production of Electronic Records Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces

More information

Executive Vice President of Finance and

Executive Vice President of Finance and Name of Policy: Policy Number: Electronic mail services policy. 3364-65-01 Approving Officer: Administration Executive Vice President of Finance and Responsible Agent: Vice President of Information Technology

More information

The E-Discovery Process

The E-Discovery Process POOLING PROVISIONS The E-Discovery Process A publication of Nevada Public Agency Insurance Pool The e- discovery process the search of electronic records for use as legal evidence can cost thousands of

More information

DISTRICT CODE: 211 CRIMINAL OR CIVIL ACTION AGAINST SCHOOL DISTRICT, SCHOOL BOARD MEMBER, EMPLOYEE, OR STUDENT

DISTRICT CODE: 211 CRIMINAL OR CIVIL ACTION AGAINST SCHOOL DISTRICT, SCHOOL BOARD MEMBER, EMPLOYEE, OR STUDENT SCHOOL POLICIES HOPKINS SCHOOL DISTRICT 270 1001 HIGHWAY 7 HOPKINS, MINNESOTA 55305 DISTRICT CODE: 211 CRIMINAL OR CIVIL ACTION AGAINST SCHOOL DISTRICT, SCHOOL BOARD MEMBER, EMPLOYEE, OR STUDENT I. PURPOSE

More information

Electronic Messaging Appropriate Use Policy

Electronic Messaging Appropriate Use Policy Electronic Messaging Appropriate Use Policy This Policy is Applicable to: SYSTEM WIDE Gerber, Zeeland, SHMG, SH GR Hospitals, Outpatient/Physician Practices, Corporate, Continuing Care, Priority Health,

More information

Policy and Procedure Manual for Licensee

Policy and Procedure Manual for Licensee Policy and Procedure Manual for Licensee Introduction: Realtyka LLC (DBA Real) is a real estate broker licensed by Texas Real Estate Commission (TREC) and the State of New York and the State of Georgia

More information

What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996.

What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996. HIPAA Training What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996. It provides the ability to transfer and continue health insurance coverage for workers

More information

STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS

STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act

More information

Federal Trade Commission Privacy Impact Assessment

Federal Trade Commission Privacy Impact Assessment Federal Trade Commission Privacy Impact Assessment for the: W120023 ONLINE FAX SERVICE December 2012 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal

More information

SECURE Email User Guide

SECURE Email User Guide SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive

More information

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT EMAIL MANAGEMENT POLICY STATEMENT Town of Cottesloe email accounts are intended for business transactions in support of the Town s strategic goals and objectives. Accordingly any email transmission residing

More information

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE 2 of 10 2.5 Failure to comply with this policy, in whole or in part, if grounds for disciplinary actions, up to and including discharge. ADMINISTRATIVE CONTROL 3.1 The CIO Bureau s Information Technology

More information

EMPLOYMENT LAW DEFINITION OF AN EMPLOYEE

EMPLOYMENT LAW DEFINITION OF AN EMPLOYEE EMPLOYMENT LAW The Internet affects the relationships between employers and employees. E-mail communication has become commonplace as a fast and easy method of communication between employees, clients,

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Approved By: Agency Name Management

Approved By: Agency Name Management Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices Microsurgical Eye Consultants 31 Centennial Drive Peabody, Massachusetts 01960 9-18-13 Effective Immediately This notice describes how medical information about you may be used

More information

Health Insurance Portability and Accountability Act (HIPAA) Overview

Health Insurance Portability and Accountability Act (HIPAA) Overview Health Insurance Portability and Accountability Act (HIPAA) Overview Agency, Contract and Temporary Staff Orientation Initiated: 5/04, Reviewed: 7/10, Revised: 10/10 Prepared by SHS Administration & Samaritan

More information

Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used?

Privacy Policy. What is Covered in This Privacy Policy. What Information Do We Collect, and How is it Used? Privacy Policy The Friends of the Public Garden ("FoPG" or "We") is a non-profit corporation and the owner and operator of www.friendsof thepblicgarden.org (the "Website"), which is intended to supply

More information

TABLE OF CONTENTS. University of Northern Colorado

TABLE OF CONTENTS. University of Northern Colorado TABLE OF CONTENTS University of Northern Colorado HIPAA Policies and Procedures Page # Development and Maintenance of HIPAA Policies and Procedures... 1 Procedures for Updating HIPAA Policies and Procedures...

More information

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations Health Care Litigation Webinar Series March 22, 2012 Spence Pryor Paula Stannard Jason Popp 1 HIPAA/HITECH

More information

Social Media Discovery: It's Not So Different After All

Social Media Discovery: It's Not So Different After All Social Media Discovery: It's Not So Different After All by Cris Whitman As the use of social media continues to grow, so do concerns about preserving and collecting related content. Topics surrounding

More information

Federal Trade Commission Privacy Impact Assessment. for the: Secure File Transfer System

Federal Trade Commission Privacy Impact Assessment. for the: Secure File Transfer System Federal Trade Commission Privacy Impact Assessment for the: Secure File Transfer System June 2011 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal

More information

STATE OF WYOMING Electronic Mail Policy

STATE OF WYOMING Electronic Mail Policy Introduction: STATE OF WYOMING Electronic Mail Policy Pursuant to Executive Order 1999-4 dated the 23rd of December, 1999 Electronic mail (e-mail) enables the user to send and receive messages, make appointments,

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

Human Resources Policy and Procedure Manual

Human Resources Policy and Procedure Manual Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use

More information

North Lakes Academy. A. The following uses of NLA computer systems and Internet resources or accounts are considered unacceptable:

North Lakes Academy. A. The following uses of NLA computer systems and Internet resources or accounts are considered unacceptable: North Lakes Academy Policy #: 501 Policy Name: Student and Employee Technology Adopted: November 9, 2010 Revised: Reviewed: April 9, 2013 I. Purpose The purpose of this policy is to set guidelines for

More information

TIPS FOR RESPONDING TO EEOC COMPLAINTS PRESENTED BY: RICHARD D. ALANIZ

TIPS FOR RESPONDING TO EEOC COMPLAINTS PRESENTED BY: RICHARD D. ALANIZ TIPS FOR RESPONDING TO EEOC COMPLAINTS PRESENTED BY: RICHARD D. ALANIZ ERA OF ACTIVE ENFORCEMENT Over the last several years, government agencies that regulate the workplace have been in a mode of aggressive

More information

E-Discovery Toolkit for Educational Institutions

E-Discovery Toolkit for Educational Institutions E-Discovery Toolkit for Educational Institutions The e-discovery process the search of electronic records for use as legal evidence can cost educational institutions thousands of dollars and hours. The

More information

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM BETWEEN The Division of Health Care Financing and Policy Herein after referred to as the Covered Entity and (Enter Business

More information

Business Associate Agreement

Business Associate Agreement Business Associate Agreement This Agreement is entered into as of ("Effective Date"), between ( Covered Entity ), and ( Business Associate ). RECITALS WHEREAS, Business Associate provides services on behalf

More information

Security of Student Information: Family Educational Rights and Privacy Act (FERPA)

Security of Student Information: Family Educational Rights and Privacy Act (FERPA) Security of Student Information: Family Educational Rights and Privacy Act (FERPA) FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT The Family Educational Rights and Privacy Act of 1974, as amended ("FERPA")

More information

Electronic Discovery How can I be prepared? September 2010

Electronic Discovery How can I be prepared? September 2010 Electronic Discovery How can I be prepared? September 2010 Presented by Brian Wilkinson, Director of ediscovery & Computer Forensics brian.wilkinson@us.pwc.com 410-659-3473 Table of Contents Page 1 Electronic

More information

Protection of Clients' Personal Health Information G & G LIVING CENTERS, INC.'s Privacy Practices

Protection of Clients' Personal Health Information G & G LIVING CENTERS, INC.'s Privacy Practices Protection of Clients' Personal Health Information G & G LIVING CENTERS, INC.'s Privacy Practices G & G Living Centers, Inc. has had a longstanding commitment to protecting the privacy of its clients'

More information

TOURO UNIVERSITY WORLDWIDE AND TOURO COLLEGE LOS ANGELES IDENTITY THEFT PREVENTION POLICY 1.0 POLICY/PROCEDURE 2.0 PURPOSE 3.0 SCOPE 4.

TOURO UNIVERSITY WORLDWIDE AND TOURO COLLEGE LOS ANGELES IDENTITY THEFT PREVENTION POLICY 1.0 POLICY/PROCEDURE 2.0 PURPOSE 3.0 SCOPE 4. TOURO UNIVERSITY WORLDWIDE AND TOURO COLLEGE LOS ANGELES IDENTITY THEFT PREVENTION POLICY 1.0 POLICY/PROCEDURE Touro adopts this identity theft policy to help protect employees, students, contractors and

More information

Responsible Use of Technology and Information Resources

Responsible Use of Technology and Information Resources Responsible Use of Technology and Information Resources Introduction: The policies and guidelines outlined in this document apply to the entire Wagner College community: students, faculty, staff, alumni

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

OFFICE OF EXTERNAL RELATIONS

OFFICE OF EXTERNAL RELATIONS OFFICE OF EXTERNAL RELATIONS Social Media Policy I. Purpose Social media encompass a wide variety of Internet networking and communication tools, including but not limited to sites such as Facebook and

More information

UNIVERSITY. E-mail Use Policy. Approved by: ~ b:- Date Approved: ~ - 17-20/6

UNIVERSITY. E-mail Use Policy. Approved by: ~ b:- Date Approved: ~ - 17-20/6 UNIVERSITY E-mail Use Policy Approved by: ~ b:- Date Approved: ~ - 17-20/6 Rogers State University E-mail Use Policy General Principles Rogers State University encourages and promotes the use of electronic

More information

Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308)

Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) HIPAA Business Associate Agreement Sample Notice Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) The information provided in this document does not constitute, and is no substitute

More information

Ivy Tech Community College of Indiana

Ivy Tech Community College of Indiana Ivy Tech Community College of Indiana POLICY TITLE Family Educational Rights and Privacy Act (FERPA) POLICY NUMBER 3.6 (Former APPM 3.4) PRIMARY RESPONSIBILITY Student Affairs CREATION / REVISION / EFFECTIVE

More information

INFORMATION TECHNOLOGY APPROPRIATE USE

INFORMATION TECHNOLOGY APPROPRIATE USE INFORMATION TECHNOLOGY APPROPRIATE USE POLICY 1000.0100.12 Section 10, Information Systems Responsible College Officer: Executive Director of Information Systems/CIO Originally Issued: April 24, 2008 Original

More information

Discovery Technology Group

Discovery Technology Group Discovery Technology Group E-mail Retention: Readiness Survey E-mail now represents the largest source of new documents and records generated within a company, and the most troublesome from a retention

More information

WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE. A Guide for University Faculty, Staff, and Others

WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE. A Guide for University Faculty, Staff, and Others WHAT TO DO WHEN YOU RECEIVE A LITIGATION HOLD NOTICE A Guide for University Faculty, Staff, and Others What is a Litigation Hold Notice? Notice from an authorized UW department (Attorney General s Office,

More information

HIPAA Security Training Manual

HIPAA Security Training Manual HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,

More information

Your Profile. Your Task. Steps. DUE DATE: Monday, December 7, at the end of class.

Your Profile. Your Task. Steps. DUE DATE: Monday, December 7, at the end of class. Your Profile You are employed as an executive assistant for Sally Sidekick, CEO of Sidekick Productions. Because you are an executive assistant, you are entrusted to handle more complicated or significant

More information

Dale C. Godby, Ph.D., ABPP, CGP 6330 LBJ Suite 150 Dallas, Texas 75240 972-233-0648

Dale C. Godby, Ph.D., ABPP, CGP 6330 LBJ Suite 150 Dallas, Texas 75240 972-233-0648 Dale C. Godby, Ph.D., ABPP, CGP 6330 LBJ Suite 150 Dallas, Texas 75240 972-233-0648 Problems in love and work, as well as troubling symptoms like depression and anxiety, often lead people to seek therapy.

More information

University Healthcare Physicians Compliance and Privacy Policy

University Healthcare Physicians Compliance and Privacy Policy Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University

More information

MaxMD 2200 Fletcher Ave. 5 th Floor Fort Lee, NJ (201) 963 0005 www.max.md www.mdemail.md support@max.md Page 1of 10

MaxMD 2200 Fletcher Ave. 5 th Floor Fort Lee, NJ (201) 963 0005 www.max.md www.mdemail.md support@max.md Page 1of 10 Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the MaxMD Customer signee is a Covered Entity or "HIPAA Business Associate," as defined below.

More information

Cisco Email Security Image Analysis: Protecting the Network from Explicit Images

Cisco Email Security Image Analysis: Protecting the Network from Explicit Images Solution Overview Cisco Email Security Image Analysis: Protecting the Network from Explicit Images Challenge Eighty percent of the world s business communication takes place on email, making it the primary

More information

shall immediately divert such User to another website being a third party payment gateway operator/bank.

shall immediately divert such User to another website being a third party payment gateway operator/bank. TERMS & CONDITIONS WOCKHARDT FOUNDATION, (herein after referred to as Foundation ) is a Public Trust based in India, registered under Bombay Public Trust Act, 1950 and having its registered office at Wockhardt

More information

E-mail Policy Manual for Local Government

E-mail Policy Manual for Local Government E-mail Policy Manual for Local Government E-mail Policy Manual for Local Government Developed by: Oregon State Archives 800 Summer St. NE Salem, OR 97310 http://arcweb.sos.state.or.us and Oregon Association

More information

ADMINISTRATIVE POLICY #45-11(2015) COMMUNICATION VIA ELECTRONIC MAIL

ADMINISTRATIVE POLICY #45-11(2015) COMMUNICATION VIA ELECTRONIC MAIL Policy Title: Communication via Electronic Mail Policy Type: Administrative Policy Policy Number: 45-11 (2015) Approved: 09/22/2015 Responsible Office: Human Resources/Student Affairs Responsible Executive:

More information

Law & Ethics, Policies & Guidelines, and Security Awareness

Law & Ethics, Policies & Guidelines, and Security Awareness Law & Ethics, Policies & Guidelines, and Security Awareness Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of

More information

HIPAA NOTICE OF PRIVACY PRACTICES

HIPAA NOTICE OF PRIVACY PRACTICES HIPAA NOTICE OF PRIVACY PRACTICES Marden Rehabilitation Associates, Inc. Marden Rehabilitation Associates of Ohio, Inc. Marden Rehabilitation Associates of West Virginia Health Care Plus Preferred Care

More information

PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798

PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798 PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798 Updated 12/8/15 PSYBAR, L. L. C. INDEPENDENT CONTRACTOR AGREEMENT PsyBar attempts to

More information

Guidelines Relating to Implementation of the Privacy Regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Guidelines Relating to Implementation of the Privacy Regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) HUMAN RESOURCES Index No. VI-35 PROCEDURES MEMORANDUMS TO: FROM: SUBJECT: MCC Personnel Office of the President Guidelines Relating to Implementation of the Privacy Regulations of the Health Insurance

More information

By the end of this course you will demonstrate:

By the end of this course you will demonstrate: 1 By the end of this course you will demonstrate: 1. that HIPAA privacy rules protect privacy and security of confidential information. 2. your responsibility for use and protection of protected health

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Agreement ( Agreement ) is made and entered into this day of [Month], [Year] by and between [Business Name] ( Covered Entity ), [Type of Entity], whose business address

More information

Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S

Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S What is a Litigation Hold Notice? Notice from an authorized department (e.g., Attorney General s Office Torts

More information

Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions

Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions Table of Contents Introduction... 3 1. Data Backup: The Most Critical Part of any IT Strategy...

More information

Technology Department 1350 Main Street Cambria, CA 93428

Technology Department 1350 Main Street Cambria, CA 93428 Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any

More information

Kentucky Wesleyan College Policy & Procedure Manuals - Student Information Privacy

Kentucky Wesleyan College Policy & Procedure Manuals - Student Information Privacy Kentucky Wesleyan College Policy & Procedure Manual Student Information Privacy Policy Approval: President Policy Type: College Policy Owner: Registrar Responsible Office: Registrar Revision History Approval

More information

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared; Page 1 National Organization of Alternative Programs 2014 NOAP Educational Conference HIPAA and Privacy Risks Ira J Rothman, CPHIMS, CIPP/US/IT/E/G Senior Vice President - Privacy Official March 26, 2014

More information

2014 Core Training 1

2014 Core Training 1 2014 Core Training 1 Course Agenda Review of Key Privacy Laws/Regulations: Federal HIPAA/HITECH regulations State privacy laws Privacy & Security Policies & Procedures Huntsville Hospital Health System

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

The College ofBergen Online - Acceptable Use and Disposal

The College ofBergen Online - Acceptable Use and Disposal Acceptable Use of Information Technology Policy Bergen Community College reserves the right to monitor its information technology resources and telecommunications network to protect the integrity of its

More information

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9 1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless

More information

This form may not be modified without prior approval from the Department of Justice.

This form may not be modified without prior approval from the Department of Justice. This form may not be modified without prior approval from the Department of Justice. Delete this header in execution (signature) version of agreement. HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate

More information

BUSINESS ASSOCIATE AGREEMENT. (Contractor name and address), hereinafter referred to as Business Associate;

BUSINESS ASSOCIATE AGREEMENT. (Contractor name and address), hereinafter referred to as Business Associate; BUSINESS ASSOCIATE AGREEMENT (Agreement #) THIS DOCUMENT CONSTITUTES AN AGREEMENT BETWEEN: AND (Contractor name and address), hereinafter referred to as Business Associate; The Department of Behavioral

More information

HIPAA Compliance. 2013 Annual Mandatory Education

HIPAA Compliance. 2013 Annual Mandatory Education HIPAA Compliance 2013 Annual Mandatory Education What is HIPAA? Health Insurance Portability and Accountability Act Federal Law enacted in 1996 that mandates adoption of Privacy protections for health

More information

Effective Workplace Communication: Think Before You Click and Chat

Effective Workplace Communication: Think Before You Click and Chat Effective Workplace Communication: Think Before You Click and Chat Commission on the Status of Women Annual Conference October 6, 2010 Judy Grace, Ph.D. 480-965-2495 School of Letters and Sciences Tell

More information

This notice describes how psychological and medical information about you may be used and disclosed and how you can get access to this information.

This notice describes how psychological and medical information about you may be used and disclosed and how you can get access to this information. Page 1 of 5 HIPAA Notification Policies and Practices to Protect the Privacy of Your Heath Information This notice describes how psychological and medical information about you may be used and disclosed

More information

Health Partners HIPAA Business Associate Agreement

Health Partners HIPAA Business Associate Agreement Health Partners HIPAA Business Associate Agreement This HIPAA Business Associate Agreement ( Agreement ) by and between Health Partners of Philadelphia, Inc., the Covered Entity (herein referred to as

More information

Case 3:15-cv-00617-MO Document 50 Filed 09/03/15 Page 1 of 5

Case 3:15-cv-00617-MO Document 50 Filed 09/03/15 Page 1 of 5 Case 3:15-cv-00617-MO Document 50 Filed 09/03/15 Page 1 of 5 DAVID H. ANGELI, OSB No. 020244 david@angelilaw.com KRISTEN L. TRANETZKI, OSB. No. 115730 kristen@angelilaw.com Angeli Ungar Law Group LLC 121

More information

HIPAA Violations Incur Multi-Million Dollar Penalties

HIPAA Violations Incur Multi-Million Dollar Penalties HIPAA Violations Incur Multi-Million Dollar Penalties Whitepaper HIPAA Violations Incur Multi-Million Dollar Penalties Have you noticed how many expensive Health Insurance Portability and Accountability

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement is effective September 1, 2013 and made between Community Health Solutions of America, Inc., a Florida corporation ( CHS ) and ( Company ).

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This Agreement, dated as of, 2015 ("Agreement"), by and between, on its own behalf and on behalf of all entities controlling, under common control with or controlled

More information

ELKIN & ASSOCIATES, LLC. HIPAA Privacy Policy and Procedures INTRODUCTION

ELKIN & ASSOCIATES, LLC. HIPAA Privacy Policy and Procedures INTRODUCTION ELKIN & ASSOCIATES, LLC HIPAA Privacy Policy and Procedures INTRODUCTION The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implementing regulations restrict a Covered Entity

More information

WHITE PAPER: TOP 5 HR COMPLIANCE CONCERNS FOR SMALL BUSINESS. Top 5 HR Compliance Concerns for Small Business

WHITE PAPER: TOP 5 HR COMPLIANCE CONCERNS FOR SMALL BUSINESS. Top 5 HR Compliance Concerns for Small Business WHITE PAPER: TOP 5 HR COMPLIANCE CONCERNS FOR SMALL BUSINESS Top 5 HR Compliance Concerns for Small Business As the economic horizon continues to shift and belts tighten, small and mediumsized companies

More information

Electronic Discovery

Electronic Discovery Electronic Discovery L. Amy Blum, Esq. UCLA University of California, Los Angeles 1 Topics Not Covered Best practices for E-mail E use and retention in the ordinary course of business Records Disposition

More information

Ethical and Responsible Use of EagleNet 03/26/14 AMW

Ethical and Responsible Use of EagleNet 03/26/14 AMW Campus Technology Services Solutions Center Juniata College 814.641.3619 help@juniata.edu http://services.juniata.edu/cts Ethical and Responsible Use of EagleNet 03/26/14 AMW Preamble The resources of

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

Medical Privacy Version 2015.12.10 - Standard. Business Associate Agreement. 1. Definitions

Medical Privacy Version 2015.12.10 - Standard. Business Associate Agreement. 1. Definitions Medical Privacy Version 2015.12.10 - Standard Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the Lux Scientiae HIPAA Customer signee is a

More information

Mount Wachusett Community College. Information Technology Acceptable Use Policies and Helpdesk Prioritization Practices

Mount Wachusett Community College. Information Technology Acceptable Use Policies and Helpdesk Prioritization Practices Mount Wachusett Community College Information Technology Acceptable Use Policies and Helpdesk Prioritization Practices January 25, 2011 Contents INFORMATION TECHNOLOGY GENERAL ACCEPTABLE USE POLICY...

More information

Employment Practices Liability Insurance

Employment Practices Liability Insurance Employment Practices Liability Insurance What Business Owners Need to Know Right Now A SPECIAL REPORT Employment Practices Liability Insurance: What Business Owners Need to Know Right Now Over the years,

More information

The Right Choice for Call Recording Call Recording and Regulatory Compliance

The Right Choice for Call Recording Call Recording and Regulatory Compliance Call Recording and Regulatory Compliance An OAISYS White Paper Table of Contents Increased Regulations in Response to Economic Crisis...1 The Sarbanes-Oxley Act...1 The Payment Card Industry Data Security

More information

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005

UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005 UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The

More information

The Disconnect Between Legal and IT Teams

The Disconnect Between Legal and IT Teams WHITEPAPER The Disconnect Between Legal and IT Teams The Duty to Preserve Why manual email archiving and user categorization doesn t cut it anymore #4 in a series of 4 whitepapers. Circulate this document

More information

ARIZONA SUPERIOR COURT, PIMA COUNTY HON. STEPHEN C. VILLARREAL JUDGE. DATE: May 17, 2011. PHOENIX NEWSPAPERS INC., Plaintiff, VS.

ARIZONA SUPERIOR COURT, PIMA COUNTY HON. STEPHEN C. VILLARREAL JUDGE. DATE: May 17, 2011. PHOENIX NEWSPAPERS INC., Plaintiff, VS. ARIZONA SUPERIOR COURT, PIMA COUNTY HON. STEPHEN C. VILLARREAL JUDGE CASE NO. C20111954 DATE: May 17, 2011 PHOENIX NEWSPAPERS INC., Plaintiff, VS. PIMA COMMUNITY COLLEGE, Defendant. R U L I N G IN CHAMBERS

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

SaaS. Business Associate Agreement

SaaS. Business Associate Agreement SaaS Business Associate Agreement This Business Associate Agreement ( BA Agreement ) becomes effective pursuant to the terms of Section 5 of the End User Service Agreement ( EUSA ) between Customer ( Covered

More information

Workplace Anti-Harassment Policy (Alberta)

Workplace Anti-Harassment Policy (Alberta) Workplace Anti-Harassment Policy (Alberta) Intent It is public policy in Canada to recognize the dignity and worth of every person and to provide for equal rights and opportunities free of discrimination.

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Requests to create new Distribution lists must be approved by a Vice President, President, Vice Chancellor, or the Chancellor.

Requests to create new Distribution lists must be approved by a Vice President, President, Vice Chancellor, or the Chancellor. Key points for Distribution List Use Recommendations a. Polled CCC CIO s on whether their District or Institution has Institution wide DLs and whether special approval for use is required. Rec d 25 responses

More information