THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS
|
|
- Dwayne Beasley
- 8 years ago
- Views:
Transcription
1 THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS Data Law Group, P.C. Kari Kelly Deborah Shinbein
2 YOU CAN T OUTSOURCE COMPLIANCE! Various statutes and regulations govern the privacy and security of personally identifiable information ( PII ) Complex patchwork of federal and state laws, industry sector laws and regulations, and international laws When companies use third party vendors to collect, process, or provide other data management services, the company is responsible to ensure the vendors maintain security practices in accordance with applicable laws and regulations governing the company s PII Before engaging a vendor, be sure it can comply on your behalf Take adequate internal precautions to prevent unauthorized access This presentation is just a brief overview of applicable laws, security precautions, and other considerations, there are many more!
3 WHAT IS HIPAA & HITECH? HIPAA is the Health Insurance Portability and Accountability Act specifies laws for the protection and use of Personal (or Protected) Health Information (PHI) in medical records. HITECH is the Health Information Technology for Economic and Clinical Health Act applicable to Electronic Medical Records. Requires 3 things: Integrity of information the medical record must be accurate Confidentiality The medical record should only be seen by those with a need to know and all uses of that data should be knowable by the individual. Availability The medical record must be available, in essence, no reasonably avoidable downtime.
4 WHAT IS A BUSINESS ASSOCIATE? A BA is a service provider to a Covered Entity that requires access the Protected Health Information of their customers to provide services under a Business Associate Agreement. BA s, their contractors and covered entities must comply with the technical, administrative and safeguard requirements and disclosure limitations in the Privacy Rule and as set out in the Business Associate Agreement with its clients. Examples of BAs: Bill processing company that sends medical invoices & processes payments Cloud providers that host and perform managed services for covered entities (new definition under the Omnibus Rules) Outsourced call centers
5 GRAHAM-LEACH-BLILEY ACT Applies to any Financial Institution - defined as any U.S. Company that is significantly engaged in financial activities. It regulates the way that a financial institution manages nonpublic personal information and consumer financial information. Requires Financial Institutions to enter into contracts with third party vendor or service provider that has access to the NPI or consumer financial information. Implemented by numerous regulatory bodies: FTC SEC CFPB OCC
6 VENDOR MANAGEMENT: COMPLYING WITH THE SAFEGUARDS RULE The Safeguards Rule requires companies to develop a Written Information Security Plan (WISP) that describes their program to protect customer information. As part of its plan, each company must take various measures including: selecting service providers that can maintain appropriate safeguards make sure your contract requires them to maintain safeguards oversee their handling of customer information The plan must be appropriate to: the company s size and complexity, the nature and scope of its activities and the sensitivity of the customer information it handles
7 PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS This is an industry standard applicable to organizations that hold, process or exchange credit card information Defines controls to ensure that consumer data is not exposed to identity fraud and theft Not itself a law, but incorporated into various state laws Using a third party to process, store or transmit credit card information does not remove a merchant s obligation to comply with PCI for these functions Merchants required to maintain a written agreements with services providers acknowledging that the service providers are responsible for the security of cardholder data the service providers possess
8 MASSACHUSETTS INFORMATION SECURITY LAW Applies to any entity that receives, stores, maintains, processes, or has access to certain PII of a MA resident (even if company is not in MA) Triggers: SSN, drivers license, credit/debit or financial account Organizations have a legal responsibility to ensure the following regarding service providers with access to PII: Select and retain providers capable of maintaining appropriate security measures for PII Contractually require service providers to maintain safeguards Requires updates for contracts created before March 2010
9 VARIOUS STATE LAWS Many states have information security laws with specific requirements even for entities located elsewhere if the entity interacts with certain PII from residents of the state. Nevada requires encryption of PII transmitted outside company's secure system both in transit and when stored on a device California requires reasonable security measures appropriate to the nature of information Numerous other state laws, information security, data destruction, breach notification, and other requirements.
10 FEDERAL TRADE COMMISSION FTC has authority to enforce against unfair and deceptive trade practices Has brought more than 50 enforcement actions related to security breaches (misrepresenting security is deceptive, inadequate security is unfair) Often focused on companies not maintaining privacy/security promises to consumers, whether themselves or their vendors FTC holds companies responsible for their vendor s failures if the company did not take reasonable measures, etc.
11 FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA) Applies to educational institutions that receive any federal funding Prohibits disclosure of students education records (broadly defined) without written parent or eligible student consent Includes education records maintained by a third party on behalf of the school Allowing a service provider to access, process, or store education records with PII may be deemed a disclosure, so the service provider must comply with FERPA
12 SARBANES-OXLEY Establishes a set of requirements for financial systems, to deter fraud and increase corporate accountability Dictates which records must be stored, for how long, Third parties must comply and must be overseen Data owner is required to know the location of data in the cloud/elsewhere and to maintain control over it
13 RED FLAGS RULE Requires financial institutions and creditors that hold any "covered account" to develop and implement an Identity Theft Prevention Program Must monitor the activities of service providers that conduct activities that are specifically covered by the rule or that are considered to be at risk for identity theft Vendors must apply similar standards the company would if it were performing the tasks itself Implement procedures to detect red flags, reporting policies and certain prevention measures FTC holds companies responsible for compliance by vendors
14 DIFFERENT LEGAL APPROACHES Some laws/agencies require companies to generally pass on their obligations to vendors that accesses or receive regulated personal information (GLBA, HIPAA, FERPA, and FTC Act enforcements) Some say companies have to monitor the vendors and what that involves (Massachusetts/CFPB) Some say you have to monitor the vendors appropriately, but generally leave it up to you to decide what that entails.
15 BEST PRACTICES DURING EACH STAGE OF THE VENDOR RELATIONSHIP (CUSTOMER PERSPECTIVE)
16 EVALUATE THE VENDOR: 1. DUE DILIGENCE General Due Diligence: before digging into security requirements, evaluate the vendor s general suitability as a trusted business partner: Reputation get appropriate references from former or current clients Similar clients to your business/depth of experience Financial Condition Insurance Type of coverage and limitations (cyber liability if applicable) Employee training and awareness Vendor incident response plan, business continuity and disaster/recovery plan.
17 2. INFORMATION SECURITY DUE DILIGENCE Perform a thorough analysis of the vendor s security capabilities. Remember that you may be trusting your entire business reputation to this vendor and if it suffers a security breach with your PII, you will suffer Create a vendor questionnaire so the vendor can provide details on the following (and copies of plans/policies/procedures where appropriate) Perform site visits/audits to see if vendor is complying with its policies and responses
18 VENDOR QUESTIONNAIRE Do you have a written information security program (include a copy) Evaluate based on legal requirements depending on type data Do you have ongoing compliance training programs for individuals who would handle data Do you require employee background checks What is your data governance structure and process How do you identify, analyze and evaluate risks and options for handling risks What controls do you have in place for risks How often do you monitor and review your security program
19 VENDOR QUESTIONNAIRE (CONTINUED) Describe the scope and boundaries of your information security management system (security policies, etc.) How do you monitor firewalls Do you have a data classification policy? Do you have a data retention/destruction policy? What type of encryption to you use (at different stages in data lifecycle) How is data shared with customers and business partners? Do you everything? How do you limit access to your network?
20 VENDOR QUESTIONNAIRE (CONTINUED) What physical controls do you have in place to prevent theft of data? Are external audits performed on a regular basis? What third party certifications do you have (include audits, etc.) There are MANY more questions to ask (tailored depending on nature of services, type of data, applicable laws/regs, etc.) To address the current lack of standards in cloud services, the Cloud Security Alliance recently proposed the Trusted Cloud Initiative with the goal of developing industry-recommended infrastructure and security configurations and practices. Questionnaire to use when selecting cloud service providers
21 EVALUATE THE VENDOR: 3. THIRD PARTY STANDARDS Vendors can show credibility via audits using accepted third party standards SSAE 16 NIST ISO
22 SSAE 16 STANDARDS SSAE 16 Attestation Replaces SAS 70 certification Attestation is a written statement by key executives that contains essential clauses describing the system and a statement on the suitability of the design and operating effectiveness of various controls
23 SOC 1 & 2 STANDARDS SOC 1 focus is on the internal controls for a service provider over financial reporting SOC 2 is most relevant for IT portion of GLBA Safeguards Rule that requires IT system controls and HIPAA Security Rule compliance Focuses on information technology security controls, availability, processing integrity, confidentiality and privacy principles.
24 SOC 3 STANDARDS SOC 3 Trust Services and Criteria for online businesses: Security Availability Processing Integrity Confidentiality Privacy
25 NIST U.S. STANDARDS FOR INFORMATION TECHNOLOGY National Institute of Standards in Technology Emphasis on state-of-the-art management, operational, and technical security controls Used in government contracting
26 INTERNATIONAL STANDARDS ISO Standards International voluntary standards for business process, information security management (ISO 27001) Certain internationally accredited entities can audit or certify that an organization meets specified ISO standards. An ISO certification specifies requirements for the establishment, implementation, monitoring, review, maintenance and improvement of system to manage an organization s information security risks.
27 CONSIDERATIONS BEFORE THE RELATIONSHIP BEGINS Determine appropriate level of vendor access: In addition to evaluating the vendor s general security capabilities, consider the specific needs in this situation, how the vendor s access to PII and systems can be limited to protect your company s confidential information. Basic concepts: Ensure the vendor has no greater access than necessary Compartmentalize data, Limit access to people who need it
28 CONSIDERATIONS BEFORE THE RELATIONSHIP BEGINS (CONTINUED) Is access ongoing, only once, or intermittent E.g. is this a one time software installation project which does not require the continued access to PII or an outsourcing arrangement where vendor will have ongoing access to the PII? Are there technical controls that can alleviate the need for certain access? Can access be limited to specified individuals or departments? Determine when are various types of encryption/security requirements applicable? Encryption in transit vs. at rest
29 CONSIDERATIONS BEFORE THE RELATIONSHIP BEGINS (CONTINUED) Limit Access/Segregate Systems Ensure systems are segregated Consider all systems connected into the main network/internet, even if not data-specific systems (e.g. video monitoring, HVAC, others) While retailers build defenses around their payment systems, they may not invest as heavily in protecting the systems used by building management Ensure measures can be implemented to limit access to systems once a vendor is inside the company s perimeter Many networks guard against intrusion but expect trust once inside the walls
30 CONSIDERATIONS BEFORE THE RELATIONSHIP BEGINS (CONTINUED) Document all data and systems potentially implicated by the relationship Notify department managers and collaborate re: planned implementation Determine point of contact for all aspects of the relationship Ensure your company s own WISP and procedures allow for use of the vendor and contain appropriate guidance/security measures Perform risk assessment based on use of the vendor and the project
31 CONSIDERATIONS BEFORE THE RELATIONSHIP BEGINS (CONTINUED) Evaluate optimal point of transfer Transfer between the procuring organization and the vendor is a potential vulnerable spot Design and implement secure methods of transfer and access Determine appropriate data retention and destruction schedule Include required means of disposal (consider state/industry laws)
32 INTERNATIONAL CONSIDERATIONS Other factors must be evaluated if the vendor is in another country or if data will be transferred or stored there May be more difficult for customer (and data subject if applicable) to gain immediate access (required by some laws) May provide international jurisdiction if data is in other countries Difficult to investigate or litigate against foreign offenders May add compliance hurdles to the extent data is transferred from a foreign country
33 READY TO PROCEED: NEGOTIATING VENDOR CONTRACTS Key considerations: Contractually shift responsibility when you trust an outside entity with data However remember the legal obligation is your own you can t outsource compliance obligations Evaluate whether to include specific/detailed requirements or merely require compliance with applicable laws/regulations
34 NEGOTIATING VENDOR CONTRACTS: Clearly define all types of data to be accessed, collected, processed, etc. If trying to limit what vendor can access, consider making the definition narrow and based on specific time periods Ownership and license of data Distinguish between different types of data if applicable (e.g. PII and aggregate de-identified data) Do rights change after transfer or processing of certain data? License grant/reservation of rights if applicable
35 NEGOTIATING VENDOR CONTRACTS Restrictions on vendor access and use of PII Specify use parameters Only in the performance of this agreement List permitted means of access, how data will be exported to processor, etc. (or as instructed by customer) Encryption/security requirements applicable during this process if different than remainder of contract Timing limitations
36 NEGOTIATING VENDOR CONTRACTS Information Security Requirements Typically in an addendum Specific IT measures to comply with acceptable industry practices: encryption of data (in transit, at rest, web-facing applications) firewalls network security mobile security access controls/authentication segregation of vendor s data/systems vendor application of latest security patches Employee background checks/training Limit physical access to facilities Other requirements based on applicable laws Data centers: location requirements needed if processing PII or ephi to comply with data import/export regulations and local laws
37 NEGOTIATING VENDOR CONTRACTS Audit and Monitoring Rights Third party audit of vendor s IT security practices, inspection of data centers confirm vendor's infrastructure and security practices via an onsite inspection at least at least once per year specify what this should cover customer selects the auditor Note: be sure you want this, if no corrective actions taken, may be deemed negligent HIPAA requires if HCP is aware of ongoing conduct by a BA that violates HIPAA, the HCP must intervene Audit data collected/accessed, other aspects of contract performance Consider monitoring software
38 NEGOTIATING VENDOR CONTRACTS Security Breach Notification and Disclosures Immediately notify customer of all suspected breaches (specify details) Procedures vendor must follow in the event of a breach Investigation details (timing, approved by customer, vendor pays) What vendor has done/will do to mitigate potential damage, prevent future breaches Notification to consumer Require compliance with various state/industry breach notification laws Customer approves (or controls) all public communications Vendor pays costs for notification program, credit monitoring, etc.
39 NEGOTIATING VENDOR CONTRACTS Compliance With Laws Require the vendor to comply with all applicable information security and privacy laws and regulations Include an additional list if vendor may not be aware of some for your industry Confidentiality Obligations Data, results of processing, other relevant business information Require notification to customer of any subpoenas/other requests by government or third parties for data Access limitations legitimate business need to know Survival of obligation of confidentiality post termination Require the vendor to return, or destroy, all data in the vendor s possession or control Compliance with applicable data destruction laws
40 NEGOTIATING VENDOR CONTRACTS Personnel and Subcontractors Right to approve key people on the project Right to prohibit/approve use of any subcontractors Background check, training, monitoring, other restrictions Contractual requirements for subcontractors
41 NEGOTIATING VENDOR CONTRACTS Service Level Agreements Uptime guarantees Error response and remediation timing Support contacts, timing, escalation procedures Based on how critical Notification before suspension of services Maintenance windows late night/early morning Penalties for noncompliance credits, termination rights Reporting daily, monthly, only when downtime or errors occur? Monetary credits for failure to meet standards Emergency resource allocation: preferential treatment and allocation of vendor s resources for customer (or no less favorable than others) if a disaster or emergency occurs
42 NEGOTIATING VENDOR CONTRACTS Risk Allocation Provisions Limitation liability Indemnification by vendor Additional indemnification re: all costs related to security breach
43 NEGOTIATING VENDOR CONTRACTS Termination Issues Include threshold for SLA violations or certain breaches for which no cure is allowed Post termination obligations transition assistance data transfer (customer designates format)
44 NEGOTIATING VENDOR CONTRACTS Insurance Requirements Cyber insurance covering both data loss and data breach response General commercial liability, other as applicable Additional insured
45 REPRESENTING THE VENDOR Don t accept greater access than you need for the project In contract negotiations, remove sections not necessary if you don t have PII/ePHI, etc. If customer refuses, add if applicable or if vendor receives PII in performance of this agreement etc. Keep track of the requirements of different customers Designate team members responsible Audit your own practices to ensure compliance with customer requirements Consider industry certifications to easy compliance with customer requests Maintain industry best practices for IT security/uptime as applicable Be prepared to meet reporting obligations/error response times in the event of outages (per SLA)
46 IMPROVING EXISTING VENDOR RELATIONSHIPS Create an inventory of all vendors, partners, others What service are they providing What information can they access Ask current vendors the questions you would now ask a potential new vendor (assess their security measures, etc.) Determine if existing vendors should be audited or if you can obtain copies of annual audits already being done Make sure your company has its own privacy/security policies, procedures, training, risk assessments, remediation measures, communication plans, and monitoring applicable to vendors Collaborate with your company s business unit managers to understand what type of vendor services are required at each stage of the information life cycle
47 THANK YOU! PLEASE CONTACT US WITH QUESTIONS: Deborah Shinbein, CIPP/US Kari Kelly
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM This Business Associate Addendum ( Addendum ), effective, 20 ( Effective Date ), is entered into by and between University of Southern California, ( University
More informationWritten Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
More informationWritten Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP
More informationData Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015
Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security
More informationPrivacy Law Basics and Best Practices
Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?
More informationWritten Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
More informationEthics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015
Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Katherine M. Layman Cozen O Connor 1900 Market Street Philadelphia, PA 19103 (215) 665-2746
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (Hereinafter "Agreement") dated as of, 2013, is made by and between (Hereinafter Covered Entity ) and (Hereinafter Business Associate ). ARTICLE
More informationProtecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting
More informationUNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
More information9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania
Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of
More informationSTATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM
STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM BETWEEN The Division of Health Care Financing and Policy Herein after referred to as the Covered Entity and (Enter Business
More informationA How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1
A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1 Policy and Procedure Templates Reflects modifications published in the Federal Register
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT 1. DEFINITIONS: 1.1 Undefined Terms: Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms defined by the Health Insurance Portability
More informationTop Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology
More informationUNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S):
UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S): THIS AGREEMENT is made by and between UNIVERSITY PHYSICIANS OF BROOKLYN, INC., located at 450 Clarkson Ave., Brooklyn,
More informationManaging data security and privacy risk of third-party vendors
Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected
More informationHIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers
How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,
More informationHEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES I. Overview / Definitions The Health Insurance Portability and Accountability Act is a federal law
More informationPage 1 of 15. VISC Third Party Guideline
Page 1 of 15 VISC Third Party Guideline REVISION CONTROL Document Title: Author: File Reference: VISC Third Party Guidelines Andru Luvisi CSU Information Security Managing Third Parties policy Revision
More informationHITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?
HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations
More informationBusiness Associate Agreement
Business Associate Agreement This Business Associate Agreement (the Agreement ) is made by and between Business Associate, [Name of Business Associate], and Covered Entity, The Connecticut Center for Health,
More informationVENDOR MANAGEMENT. General Overview
VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor
More informationHealthcare Payment Processing: Managing Data Security and Privacy Risks
Moderator: Linda A. Malek Chair, Healthcare Moses & Singer LLP Healthcare Payment Processing: Managing Data Security and Privacy Risks Thursday, September 13, 2012 Panelists: Beth L. Rubin Senior Counsel
More informationMIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement and is made between BEST Life and Health Insurance Company ( BEST Life ) and ( Business Associate ). RECITALS WHEREAS, the U.S.
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS
More informationBUSINESS ASSOCIATE AGREEMENT. Recitals
BUSINESS ASSOCIATE AGREEMENT This Agreement is executed this 8 th day of February, 2013, by BETA Healthcare Group. Recitals BETA Healthcare Group consists of BETA Risk Management Authority (BETARMA) and
More informationBusiness Associate and Data Use Agreement
Business Associate and Data Use Agreement This Business Associate and Data Use Agreement (the Agreement ) is entered into by and between ( Covered Entity ) and HealtHIE Nevada ( Business Associate ). W
More informationwww.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Agreement ( Agreement ) is made and entered into this day of [Month], [Year] by and between [Business Name] ( Covered Entity ), [Type of Entity], whose business address
More informationUniversity Healthcare Physicians Compliance and Privacy Policy
Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of
More informationHIPAA in the Cloud How to Effectively Collaborate with Cloud Providers
How to Effectively Collaborate with Cloud Providers Agenda Overview of Topics Covered Agenda Evolution of the Cloud Comparison of Private vs. Public Clouds Other Regulatory Frameworks Similar to HIPAA
More informationLouisiana State University System
PM-36: Attachment 4 Business Associate Contract Addendum On this day of, 20, the undersigned, [Name of Covered Entity] ("Covered Entity") and [Name of Business Associate] ("Business Associate") have entered
More informationBUSINESS ASSOCIATE AGREEMENT ( BAA )
BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
More informationOverview of Topics Covered
How to Effectively Collaborate with Cloud Providers Agenda Overview of Topics Covered Agenda Evolution of the Cloud Comparison of Private vs. Public Clouds Other Regulatory Frameworks Similar to HIPAA
More informationWhite Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
More informationBEST PRACTICES FOR COMMERCIAL COMPLIANCE
BEST PRACTICES FOR COMMERCIAL COMPLIANCE [ BEST PRACTICES FOR COMMERCIAL COMPLIANCE ] 2 Contents OVERVIEW... 3 Health Insurance Portability and Accountability Act (HIPAA) of 1996... 4 Sarbanes-Oxley Act
More informationHealth Partners HIPAA Business Associate Agreement
Health Partners HIPAA Business Associate Agreement This HIPAA Business Associate Agreement ( Agreement ) by and between Health Partners of Philadelphia, Inc., the Covered Entity (herein referred to as
More informationPrivacy Legislation and Industry Security Standards
Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,
More informationData Security Standard (DSS) Compliance. SIFMA June 13, 2012
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance SIFMA June 13, 2012 EisnerAmper Consulting Services Group Overview of EisnerAmper Fifth fhlargest accounting firm in the Metro New York
More information12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
More informationHealth Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know
Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection
More informationCloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
More informationBUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION This Agreement governs the provision of Protected Health Information ("PHI") (as defined in 45 C.F.R.
More informationDisclaimer: Template Business Associate Agreement (45 C.F.R. 164.308)
HIPAA Business Associate Agreement Sample Notice Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) The information provided in this document does not constitute, and is no substitute
More informationSAMPLE BUSINESS ASSOCIATE AGREEMENT
SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT
More informationSaaS. Business Associate Agreement
SaaS Business Associate Agreement This Business Associate Agreement ( BA Agreement ) becomes effective pursuant to the terms of Section 5 of the End User Service Agreement ( EUSA ) between Customer ( Covered
More informationVERSION DATED AUGUST 2013/TEXAS AND CALIFORNIA
VERSION DATED AUGUST 2013/TEXAS AND CALIFORNIA This Business Associate Addendum ("Addendum") supplements and is made a part of the service contract(s) ("Contract") by and between St. Joseph Health System
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its
More informationCYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
More informationEXHIBIT C BUSINESS ASSOCIATE AGREEMENT
EXHIBIT C BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT is made and entered into by and between ( Covered Entity ) and KHIN ( Business Associate ). This Agreement is effective as of, 20 ( Effective Date
More informationOFFICE OF CONTRACT ADMINISTRATION 60400 PURCHASING DIVISION. Appendix A HEALTHCARE INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA)
Appendix A HEALTHCARE INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA) BUSINESS ASSOCIATE ADDENDUM This Business Associate Addendum ( Addendum ) supplements and is made a part of the contract ( Contract
More informationBUSINESS ASSOCIATE AGREEMENT TERMS
BUSINESS ASSOCIATE AGREEMENT TERMS This Addendum ( Addendum ) is incorporated into and made part of the Agreement between SIGNATURE HEALTHCARE CORPORATION ("Covered Entity ) and ( Business Associate"),
More informationHIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist
HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various
More informationVendor Management Challenge Doing More with Less
Vendor Management Challenge Doing More with Less Megan Hertzler Assistant General Counsel Director of Data Privacy Xcel Energy Boris Segalis Partner InfoLawGroup LLP Session ID: GRC-402 Insert presenter
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT ( Agreement ) by and between OUR LADY OF LOURDES HEALTH CARE SERVICES, INC., hereinafter referred to as Covered Entity, and hereinafter referred
More informationBusiness Associate Agreement
This Business Associate Agreement Is Related To and a Part of the Following Underlying Agreement: Effective Date of Underlying Agreement: Vendor: Business Associate Agreement This Business Associate Agreement
More informationHackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common
Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable Steven J. Fox (sjfox@postschell.com) Peter D. Hardy (phardy@postschell.com) Robert Brandfass (BrandfassR@wvuh.com) (Mr. Brandfass
More informationRisk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
More informationInfinedi HIPAA Business Associate Agreement RECITALS SAMPLE
Infinedi HIPAA Business Associate Agreement This Business Associate Agreement ( Agreement ) is entered into this day of, 20 between ( Company ) and Infinedi, LLC, a Limited Liability Corporation, ( Contractor
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Addendum is made part of the agreement between Boston Medical Center ("Covered Entity ) and ( Business Associate"), dated [the Underlying Agreement ]. In connection with
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) is by and between ( Covered Entity )and CONEX Med Pro Systems ( Business Associate ). This Agreement has been attached to,
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is by and between ( Covered Entity ) and Xelex Digital, LLC ( Business Associate ), and is effective as of. WHEREAS,
More informationIntroduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery
Today s Topics Introduction to Data Privacy & ediscovery General Overview Data Privacy in the United States Data Privacy in Foreign Countries Intersection of Data Privacy & ediscovery Preservation of Data
More informationBUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement is made as of the day of, 2010, by and between Methodist Lebonheur Healthcare, on behalf of itself and all of its affiliates ( Covered Entity
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University
More informationVendor Management Best Practices
23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion
More informationBusiness Associate Agreement (BAA) Guidance
Business Associate Agreement (BAA) Guidance Introduction The purpose of this document is to provide guidance for creating or updating business associate agreements between your Practice ( Covered Entity
More informationWhy Lawyers? Why Now?
TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business
More informationHIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions
HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions A. Business Associate. Business Associate shall have the meaning given to such term under the Privacy and Security Rules, including,
More informationSecurity Information Lifecycle
Security Information Lifecycle By Eric Ogren Security Analyst, April 2006 Copyright 2006. The, Inc. All Rights Reserved. Table of Contents Executive Summary...2 Figure 1... 2 The Compliance Climate...4
More informationIT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014
IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the "Agreement") is made and entered into this day of,, by and between Quicktate and idictate ("Business Associate") and ("Covered Entity").
More informationAm I a Business Associate?
Am I a Business Associate? Now What? JENNIFER L. RATHBURN Quarles & Brady LLP KATEA M. RAVEGA Quarles & Brady LLP agenda» Overview of HIPAA / HITECH» Business Associate ( BA ) Basics» What Do BAs Have
More informationTrust in the Cloud Legal and Regulatory Framework
Trust in the Cloud Legal and Regulatory Framework Cloud Security Alliance San Francisco, CA February 26, 2014 Francoise Gilbert, JD, CIPP Managing Director IT Law Group 2014 IT Law Group All Rights Reserved
More informationHIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant
1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad
More informationCloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
More informationIntelligent Vendor Risk Management
Intelligent Vendor Risk Management Cliff Baker, Managing Partner, Meditology Services LeeAnn Foltz, JD Compliance Resource Consultant, WoltersKluwer Law & Business Agenda Why it s Needed Regulatory Breach
More informationManaging Cyber & Privacy Risks
Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past
More informationPII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
More informationCFPB Readiness Series: Compliant Vendor Management Overview
CFPB Readiness Series: Compliant Vendor Management Overview Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must be tailored to the
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( the Agreement ) is entered into this day of, 20 by and between the Tennessee Chapter of the American Academy of Pediatrics ( Business Associate
More informationCloud Computing and HIPAA Privacy and Security
Cloud Computing and HIPAA Privacy and Security This is just one example of the many online resources Practical Law Company offers. Christine A. Williams, Perkins Coie LLP, with PLC Employee Benefits &
More informationPsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798
PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798 Updated 12/8/15 PSYBAR, L. L. C. INDEPENDENT CONTRACTOR AGREEMENT PsyBar attempts to
More informationPII Personally Identifiable Information Training and Fraud Prevention
PII Personally Identifiable Information Training and Fraud Prevention Topics What is Personally Identifiable Information (PII)? Why are we committed to protecting PII? What laws govern us? How do we comply?
More informationThe Institute of Professional Practice, Inc. Business Associate Agreement
The Institute of Professional Practice, Inc. Business Associate Agreement This Business Associate Agreement ( Agreement ) effective on (the Effective Date ) is entered into by and between The Institute
More informationBUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ), is made effective as of the sign up date on the login information page of the CarePICS.com website, by and between CarePICS,
More informationBUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc.
BUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc. THIS BUSINESS ASSOCIATE AGREEMENT (BAA) is entered into by and between First Choice Community Healthcare, with a principal place of
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is entered into as of the day of, 2013 by and between RUTGERS UNIVERSITY, a Hybrid Entity, on behalf and for the
More informationRequirements for Technology Outsourcing
Requirements for Technology Outsourcing Table of Contents Revision History... 3 Overview... 4 Service Provider Selection... 5 Service Delivery Models... 5 Legal Considerations... 5 Security Assessments...
More informationHIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing
HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information
More informationLegal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms v2.18.11, rev 1 Presenters Joseph DeMarco, Partner DeVore & DeMarco, LLP Lauren Shy, Assistant General Counsel Fragomen,
More informationBUSINESS ASSOCIATE ADDENDUM
BUSINESS ASSOCIATE ADDENDUM This BA Agreement, effective as of the effective date of the Terms of Use, adds to and is made part of the Terms of Use by and between Business Associate and Covered Entity.
More informationIt s a New Regulatory Landscape: Do You Know Where Your Business Associates are and What They are Doing?
It s a New Regulatory Landscape: Do You Know Where Your Business Associates are and What They are Doing? The AMC Privacy & Security Conference Series Securely Connecting Communities for Improved Health
More informationGUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
More information