THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS

Size: px
Start display at page:

Download "THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS"

Transcription

1 THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS Data Law Group, P.C. Kari Kelly Deborah Shinbein

2 YOU CAN T OUTSOURCE COMPLIANCE! Various statutes and regulations govern the privacy and security of personally identifiable information ( PII ) Complex patchwork of federal and state laws, industry sector laws and regulations, and international laws When companies use third party vendors to collect, process, or provide other data management services, the company is responsible to ensure the vendors maintain security practices in accordance with applicable laws and regulations governing the company s PII Before engaging a vendor, be sure it can comply on your behalf Take adequate internal precautions to prevent unauthorized access This presentation is just a brief overview of applicable laws, security precautions, and other considerations, there are many more!

3 WHAT IS HIPAA & HITECH? HIPAA is the Health Insurance Portability and Accountability Act specifies laws for the protection and use of Personal (or Protected) Health Information (PHI) in medical records. HITECH is the Health Information Technology for Economic and Clinical Health Act applicable to Electronic Medical Records. Requires 3 things: Integrity of information the medical record must be accurate Confidentiality The medical record should only be seen by those with a need to know and all uses of that data should be knowable by the individual. Availability The medical record must be available, in essence, no reasonably avoidable downtime.

4 WHAT IS A BUSINESS ASSOCIATE? A BA is a service provider to a Covered Entity that requires access the Protected Health Information of their customers to provide services under a Business Associate Agreement. BA s, their contractors and covered entities must comply with the technical, administrative and safeguard requirements and disclosure limitations in the Privacy Rule and as set out in the Business Associate Agreement with its clients. Examples of BAs: Bill processing company that sends medical invoices & processes payments Cloud providers that host and perform managed services for covered entities (new definition under the Omnibus Rules) Outsourced call centers

5 GRAHAM-LEACH-BLILEY ACT Applies to any Financial Institution - defined as any U.S. Company that is significantly engaged in financial activities. It regulates the way that a financial institution manages nonpublic personal information and consumer financial information. Requires Financial Institutions to enter into contracts with third party vendor or service provider that has access to the NPI or consumer financial information. Implemented by numerous regulatory bodies: FTC SEC CFPB OCC

6 VENDOR MANAGEMENT: COMPLYING WITH THE SAFEGUARDS RULE The Safeguards Rule requires companies to develop a Written Information Security Plan (WISP) that describes their program to protect customer information. As part of its plan, each company must take various measures including: selecting service providers that can maintain appropriate safeguards make sure your contract requires them to maintain safeguards oversee their handling of customer information The plan must be appropriate to: the company s size and complexity, the nature and scope of its activities and the sensitivity of the customer information it handles

7 PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS This is an industry standard applicable to organizations that hold, process or exchange credit card information Defines controls to ensure that consumer data is not exposed to identity fraud and theft Not itself a law, but incorporated into various state laws Using a third party to process, store or transmit credit card information does not remove a merchant s obligation to comply with PCI for these functions Merchants required to maintain a written agreements with services providers acknowledging that the service providers are responsible for the security of cardholder data the service providers possess

8 MASSACHUSETTS INFORMATION SECURITY LAW Applies to any entity that receives, stores, maintains, processes, or has access to certain PII of a MA resident (even if company is not in MA) Triggers: SSN, drivers license, credit/debit or financial account Organizations have a legal responsibility to ensure the following regarding service providers with access to PII: Select and retain providers capable of maintaining appropriate security measures for PII Contractually require service providers to maintain safeguards Requires updates for contracts created before March 2010

9 VARIOUS STATE LAWS Many states have information security laws with specific requirements even for entities located elsewhere if the entity interacts with certain PII from residents of the state. Nevada requires encryption of PII transmitted outside company's secure system both in transit and when stored on a device California requires reasonable security measures appropriate to the nature of information Numerous other state laws, information security, data destruction, breach notification, and other requirements.

10 FEDERAL TRADE COMMISSION FTC has authority to enforce against unfair and deceptive trade practices Has brought more than 50 enforcement actions related to security breaches (misrepresenting security is deceptive, inadequate security is unfair) Often focused on companies not maintaining privacy/security promises to consumers, whether themselves or their vendors FTC holds companies responsible for their vendor s failures if the company did not take reasonable measures, etc.

11 FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA) Applies to educational institutions that receive any federal funding Prohibits disclosure of students education records (broadly defined) without written parent or eligible student consent Includes education records maintained by a third party on behalf of the school Allowing a service provider to access, process, or store education records with PII may be deemed a disclosure, so the service provider must comply with FERPA

12 SARBANES-OXLEY Establishes a set of requirements for financial systems, to deter fraud and increase corporate accountability Dictates which records must be stored, for how long, Third parties must comply and must be overseen Data owner is required to know the location of data in the cloud/elsewhere and to maintain control over it

13 RED FLAGS RULE Requires financial institutions and creditors that hold any "covered account" to develop and implement an Identity Theft Prevention Program Must monitor the activities of service providers that conduct activities that are specifically covered by the rule or that are considered to be at risk for identity theft Vendors must apply similar standards the company would if it were performing the tasks itself Implement procedures to detect red flags, reporting policies and certain prevention measures FTC holds companies responsible for compliance by vendors

14 DIFFERENT LEGAL APPROACHES Some laws/agencies require companies to generally pass on their obligations to vendors that accesses or receive regulated personal information (GLBA, HIPAA, FERPA, and FTC Act enforcements) Some say companies have to monitor the vendors and what that involves (Massachusetts/CFPB) Some say you have to monitor the vendors appropriately, but generally leave it up to you to decide what that entails.

15 BEST PRACTICES DURING EACH STAGE OF THE VENDOR RELATIONSHIP (CUSTOMER PERSPECTIVE)

16 EVALUATE THE VENDOR: 1. DUE DILIGENCE General Due Diligence: before digging into security requirements, evaluate the vendor s general suitability as a trusted business partner: Reputation get appropriate references from former or current clients Similar clients to your business/depth of experience Financial Condition Insurance Type of coverage and limitations (cyber liability if applicable) Employee training and awareness Vendor incident response plan, business continuity and disaster/recovery plan.

17 2. INFORMATION SECURITY DUE DILIGENCE Perform a thorough analysis of the vendor s security capabilities. Remember that you may be trusting your entire business reputation to this vendor and if it suffers a security breach with your PII, you will suffer Create a vendor questionnaire so the vendor can provide details on the following (and copies of plans/policies/procedures where appropriate) Perform site visits/audits to see if vendor is complying with its policies and responses

18 VENDOR QUESTIONNAIRE Do you have a written information security program (include a copy) Evaluate based on legal requirements depending on type data Do you have ongoing compliance training programs for individuals who would handle data Do you require employee background checks What is your data governance structure and process How do you identify, analyze and evaluate risks and options for handling risks What controls do you have in place for risks How often do you monitor and review your security program

19 VENDOR QUESTIONNAIRE (CONTINUED) Describe the scope and boundaries of your information security management system (security policies, etc.) How do you monitor firewalls Do you have a data classification policy? Do you have a data retention/destruction policy? What type of encryption to you use (at different stages in data lifecycle) How is data shared with customers and business partners? Do you everything? How do you limit access to your network?

20 VENDOR QUESTIONNAIRE (CONTINUED) What physical controls do you have in place to prevent theft of data? Are external audits performed on a regular basis? What third party certifications do you have (include audits, etc.) There are MANY more questions to ask (tailored depending on nature of services, type of data, applicable laws/regs, etc.) To address the current lack of standards in cloud services, the Cloud Security Alliance recently proposed the Trusted Cloud Initiative with the goal of developing industry-recommended infrastructure and security configurations and practices. Questionnaire to use when selecting cloud service providers

21 EVALUATE THE VENDOR: 3. THIRD PARTY STANDARDS Vendors can show credibility via audits using accepted third party standards SSAE 16 NIST ISO

22 SSAE 16 STANDARDS SSAE 16 Attestation Replaces SAS 70 certification Attestation is a written statement by key executives that contains essential clauses describing the system and a statement on the suitability of the design and operating effectiveness of various controls

23 SOC 1 & 2 STANDARDS SOC 1 focus is on the internal controls for a service provider over financial reporting SOC 2 is most relevant for IT portion of GLBA Safeguards Rule that requires IT system controls and HIPAA Security Rule compliance Focuses on information technology security controls, availability, processing integrity, confidentiality and privacy principles.

24 SOC 3 STANDARDS SOC 3 Trust Services and Criteria for online businesses: Security Availability Processing Integrity Confidentiality Privacy

25 NIST U.S. STANDARDS FOR INFORMATION TECHNOLOGY National Institute of Standards in Technology Emphasis on state-of-the-art management, operational, and technical security controls Used in government contracting

26 INTERNATIONAL STANDARDS ISO Standards International voluntary standards for business process, information security management (ISO 27001) Certain internationally accredited entities can audit or certify that an organization meets specified ISO standards. An ISO certification specifies requirements for the establishment, implementation, monitoring, review, maintenance and improvement of system to manage an organization s information security risks.

27 CONSIDERATIONS BEFORE THE RELATIONSHIP BEGINS Determine appropriate level of vendor access: In addition to evaluating the vendor s general security capabilities, consider the specific needs in this situation, how the vendor s access to PII and systems can be limited to protect your company s confidential information. Basic concepts: Ensure the vendor has no greater access than necessary Compartmentalize data, Limit access to people who need it

28 CONSIDERATIONS BEFORE THE RELATIONSHIP BEGINS (CONTINUED) Is access ongoing, only once, or intermittent E.g. is this a one time software installation project which does not require the continued access to PII or an outsourcing arrangement where vendor will have ongoing access to the PII? Are there technical controls that can alleviate the need for certain access? Can access be limited to specified individuals or departments? Determine when are various types of encryption/security requirements applicable? Encryption in transit vs. at rest

29 CONSIDERATIONS BEFORE THE RELATIONSHIP BEGINS (CONTINUED) Limit Access/Segregate Systems Ensure systems are segregated Consider all systems connected into the main network/internet, even if not data-specific systems (e.g. video monitoring, HVAC, others) While retailers build defenses around their payment systems, they may not invest as heavily in protecting the systems used by building management Ensure measures can be implemented to limit access to systems once a vendor is inside the company s perimeter Many networks guard against intrusion but expect trust once inside the walls

30 CONSIDERATIONS BEFORE THE RELATIONSHIP BEGINS (CONTINUED) Document all data and systems potentially implicated by the relationship Notify department managers and collaborate re: planned implementation Determine point of contact for all aspects of the relationship Ensure your company s own WISP and procedures allow for use of the vendor and contain appropriate guidance/security measures Perform risk assessment based on use of the vendor and the project

31 CONSIDERATIONS BEFORE THE RELATIONSHIP BEGINS (CONTINUED) Evaluate optimal point of transfer Transfer between the procuring organization and the vendor is a potential vulnerable spot Design and implement secure methods of transfer and access Determine appropriate data retention and destruction schedule Include required means of disposal (consider state/industry laws)

32 INTERNATIONAL CONSIDERATIONS Other factors must be evaluated if the vendor is in another country or if data will be transferred or stored there May be more difficult for customer (and data subject if applicable) to gain immediate access (required by some laws) May provide international jurisdiction if data is in other countries Difficult to investigate or litigate against foreign offenders May add compliance hurdles to the extent data is transferred from a foreign country

33 READY TO PROCEED: NEGOTIATING VENDOR CONTRACTS Key considerations: Contractually shift responsibility when you trust an outside entity with data However remember the legal obligation is your own you can t outsource compliance obligations Evaluate whether to include specific/detailed requirements or merely require compliance with applicable laws/regulations

34 NEGOTIATING VENDOR CONTRACTS: Clearly define all types of data to be accessed, collected, processed, etc. If trying to limit what vendor can access, consider making the definition narrow and based on specific time periods Ownership and license of data Distinguish between different types of data if applicable (e.g. PII and aggregate de-identified data) Do rights change after transfer or processing of certain data? License grant/reservation of rights if applicable

35 NEGOTIATING VENDOR CONTRACTS Restrictions on vendor access and use of PII Specify use parameters Only in the performance of this agreement List permitted means of access, how data will be exported to processor, etc. (or as instructed by customer) Encryption/security requirements applicable during this process if different than remainder of contract Timing limitations

36 NEGOTIATING VENDOR CONTRACTS Information Security Requirements Typically in an addendum Specific IT measures to comply with acceptable industry practices: encryption of data (in transit, at rest, web-facing applications) firewalls network security mobile security access controls/authentication segregation of vendor s data/systems vendor application of latest security patches Employee background checks/training Limit physical access to facilities Other requirements based on applicable laws Data centers: location requirements needed if processing PII or ephi to comply with data import/export regulations and local laws

37 NEGOTIATING VENDOR CONTRACTS Audit and Monitoring Rights Third party audit of vendor s IT security practices, inspection of data centers confirm vendor's infrastructure and security practices via an onsite inspection at least at least once per year specify what this should cover customer selects the auditor Note: be sure you want this, if no corrective actions taken, may be deemed negligent HIPAA requires if HCP is aware of ongoing conduct by a BA that violates HIPAA, the HCP must intervene Audit data collected/accessed, other aspects of contract performance Consider monitoring software

38 NEGOTIATING VENDOR CONTRACTS Security Breach Notification and Disclosures Immediately notify customer of all suspected breaches (specify details) Procedures vendor must follow in the event of a breach Investigation details (timing, approved by customer, vendor pays) What vendor has done/will do to mitigate potential damage, prevent future breaches Notification to consumer Require compliance with various state/industry breach notification laws Customer approves (or controls) all public communications Vendor pays costs for notification program, credit monitoring, etc.

39 NEGOTIATING VENDOR CONTRACTS Compliance With Laws Require the vendor to comply with all applicable information security and privacy laws and regulations Include an additional list if vendor may not be aware of some for your industry Confidentiality Obligations Data, results of processing, other relevant business information Require notification to customer of any subpoenas/other requests by government or third parties for data Access limitations legitimate business need to know Survival of obligation of confidentiality post termination Require the vendor to return, or destroy, all data in the vendor s possession or control Compliance with applicable data destruction laws

40 NEGOTIATING VENDOR CONTRACTS Personnel and Subcontractors Right to approve key people on the project Right to prohibit/approve use of any subcontractors Background check, training, monitoring, other restrictions Contractual requirements for subcontractors

41 NEGOTIATING VENDOR CONTRACTS Service Level Agreements Uptime guarantees Error response and remediation timing Support contacts, timing, escalation procedures Based on how critical Notification before suspension of services Maintenance windows late night/early morning Penalties for noncompliance credits, termination rights Reporting daily, monthly, only when downtime or errors occur? Monetary credits for failure to meet standards Emergency resource allocation: preferential treatment and allocation of vendor s resources for customer (or no less favorable than others) if a disaster or emergency occurs

42 NEGOTIATING VENDOR CONTRACTS Risk Allocation Provisions Limitation liability Indemnification by vendor Additional indemnification re: all costs related to security breach

43 NEGOTIATING VENDOR CONTRACTS Termination Issues Include threshold for SLA violations or certain breaches for which no cure is allowed Post termination obligations transition assistance data transfer (customer designates format)

44 NEGOTIATING VENDOR CONTRACTS Insurance Requirements Cyber insurance covering both data loss and data breach response General commercial liability, other as applicable Additional insured

45 REPRESENTING THE VENDOR Don t accept greater access than you need for the project In contract negotiations, remove sections not necessary if you don t have PII/ePHI, etc. If customer refuses, add if applicable or if vendor receives PII in performance of this agreement etc. Keep track of the requirements of different customers Designate team members responsible Audit your own practices to ensure compliance with customer requirements Consider industry certifications to easy compliance with customer requests Maintain industry best practices for IT security/uptime as applicable Be prepared to meet reporting obligations/error response times in the event of outages (per SLA)

46 IMPROVING EXISTING VENDOR RELATIONSHIPS Create an inventory of all vendors, partners, others What service are they providing What information can they access Ask current vendors the questions you would now ask a potential new vendor (assess their security measures, etc.) Determine if existing vendors should be audited or if you can obtain copies of annual audits already being done Make sure your company has its own privacy/security policies, procedures, training, risk assessments, remediation measures, communication plans, and monitoring applicable to vendors Collaborate with your company s business unit managers to understand what type of vendor services are required at each stage of the information life cycle

47 THANK YOU! PLEASE CONTACT US WITH QUESTIONS: Deborah Shinbein, CIPP/US Kari Kelly

BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS

BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM This Business Associate Addendum ( Addendum ), effective, 20 ( Effective Date ), is entered into by and between University of Southern California, ( University

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Data Privacy: What your nonprofit needs to know Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015 Overview 2 Data privacy versus data security Privacy polices and best practices Data security

More information

Privacy Law Basics and Best Practices

Privacy Law Basics and Best Practices Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Katherine M. Layman Cozen O Connor 1900 Market Street Philadelphia, PA 19103 (215) 665-2746

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (Hereinafter "Agreement") dated as of, 2013, is made by and between (Hereinafter Covered Entity ) and (Hereinafter Business Associate ). ARTICLE

More information

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting

More information

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information

More information

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of

More information

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM BETWEEN The Division of Health Care Financing and Policy Herein after referred to as the Covered Entity and (Enter Business

More information

A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1

A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1 A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1 Policy and Procedure Templates Reflects modifications published in the Federal Register

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT 1. DEFINITIONS: 1.1 Undefined Terms: Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms defined by the Health Insurance Portability

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S):

UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S): UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S): THIS AGREEMENT is made by and between UNIVERSITY PHYSICIANS OF BROOKLYN, INC., located at 450 Clarkson Ave., Brooklyn,

More information

Managing data security and privacy risk of third-party vendors

Managing data security and privacy risk of third-party vendors Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected

More information

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers How to Effectively Collaborate with Cloud Providers Speaker Bio Chad Kissinger Chad Kissinger Founder OnRamp Chad Kissinger is the Founder of OnRamp, an industry leading high security and hybrid hosting

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,

More information

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES I. Overview / Definitions The Health Insurance Portability and Accountability Act is a federal law

More information

Page 1 of 15. VISC Third Party Guideline

Page 1 of 15. VISC Third Party Guideline Page 1 of 15 VISC Third Party Guideline REVISION CONTROL Document Title: Author: File Reference: VISC Third Party Guidelines Andru Luvisi CSU Information Security Managing Third Parties policy Revision

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

Business Associate Agreement

Business Associate Agreement Business Associate Agreement This Business Associate Agreement (the Agreement ) is made by and between Business Associate, [Name of Business Associate], and Covered Entity, The Connecticut Center for Health,

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

Healthcare Payment Processing: Managing Data Security and Privacy Risks

Healthcare Payment Processing: Managing Data Security and Privacy Risks Moderator: Linda A. Malek Chair, Healthcare Moses & Singer LLP Healthcare Payment Processing: Managing Data Security and Privacy Risks Thursday, September 13, 2012 Panelists: Beth L. Rubin Senior Counsel

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement and is made between BEST Life and Health Insurance Company ( BEST Life ) and ( Business Associate ). RECITALS WHEREAS, the U.S.

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS

More information

BUSINESS ASSOCIATE AGREEMENT. Recitals

BUSINESS ASSOCIATE AGREEMENT. Recitals BUSINESS ASSOCIATE AGREEMENT This Agreement is executed this 8 th day of February, 2013, by BETA Healthcare Group. Recitals BETA Healthcare Group consists of BETA Risk Management Authority (BETARMA) and

More information

Business Associate and Data Use Agreement

Business Associate and Data Use Agreement Business Associate and Data Use Agreement This Business Associate and Data Use Agreement (the Agreement ) is entered into by and between ( Covered Entity ) and HealtHIE Nevada ( Business Associate ). W

More information

www.pwc.com Third Party Risk Management 12 April 2012

www.pwc.com Third Party Risk Management 12 April 2012 www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Agreement ( Agreement ) is made and entered into this day of [Month], [Year] by and between [Business Name] ( Covered Entity ), [Type of Entity], whose business address

More information

University Healthcare Physicians Compliance and Privacy Policy

University Healthcare Physicians Compliance and Privacy Policy Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of

More information

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers How to Effectively Collaborate with Cloud Providers Agenda Overview of Topics Covered Agenda Evolution of the Cloud Comparison of Private vs. Public Clouds Other Regulatory Frameworks Similar to HIPAA

More information

Louisiana State University System

Louisiana State University System PM-36: Attachment 4 Business Associate Contract Addendum On this day of, 20, the undersigned, [Name of Covered Entity] ("Covered Entity") and [Name of Business Associate] ("Business Associate") have entered

More information

BUSINESS ASSOCIATE AGREEMENT ( BAA )

BUSINESS ASSOCIATE AGREEMENT ( BAA ) BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

Overview of Topics Covered

Overview of Topics Covered How to Effectively Collaborate with Cloud Providers Agenda Overview of Topics Covered Agenda Evolution of the Cloud Comparison of Private vs. Public Clouds Other Regulatory Frameworks Similar to HIPAA

More information

White Paper on Financial Institution Vendor Management

White Paper on Financial Institution Vendor Management White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety

More information

BEST PRACTICES FOR COMMERCIAL COMPLIANCE

BEST PRACTICES FOR COMMERCIAL COMPLIANCE BEST PRACTICES FOR COMMERCIAL COMPLIANCE [ BEST PRACTICES FOR COMMERCIAL COMPLIANCE ] 2 Contents OVERVIEW... 3 Health Insurance Portability and Accountability Act (HIPAA) of 1996... 4 Sarbanes-Oxley Act

More information

Health Partners HIPAA Business Associate Agreement

Health Partners HIPAA Business Associate Agreement Health Partners HIPAA Business Associate Agreement This HIPAA Business Associate Agreement ( Agreement ) by and between Health Partners of Philadelphia, Inc., the Covered Entity (herein referred to as

More information

Privacy Legislation and Industry Security Standards

Privacy Legislation and Industry Security Standards Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,

More information

Data Security Standard (DSS) Compliance. SIFMA June 13, 2012

Data Security Standard (DSS) Compliance. SIFMA June 13, 2012 Payment Card Industry (PCI) Data Security Standard (DSS) Compliance SIFMA June 13, 2012 EisnerAmper Consulting Services Group Overview of EisnerAmper Fifth fhlargest accounting firm in the Metro New York

More information

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013 Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He

More information

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know

Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION

BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION This Agreement governs the provision of Protected Health Information ("PHI") (as defined in 45 C.F.R.

More information

Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308)

Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) HIPAA Business Associate Agreement Sample Notice Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) The information provided in this document does not constitute, and is no substitute

More information

SAMPLE BUSINESS ASSOCIATE AGREEMENT

SAMPLE BUSINESS ASSOCIATE AGREEMENT SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT

More information

SaaS. Business Associate Agreement

SaaS. Business Associate Agreement SaaS Business Associate Agreement This Business Associate Agreement ( BA Agreement ) becomes effective pursuant to the terms of Section 5 of the End User Service Agreement ( EUSA ) between Customer ( Covered

More information

VERSION DATED AUGUST 2013/TEXAS AND CALIFORNIA

VERSION DATED AUGUST 2013/TEXAS AND CALIFORNIA VERSION DATED AUGUST 2013/TEXAS AND CALIFORNIA This Business Associate Addendum ("Addendum") supplements and is made a part of the service contract(s) ("Contract") by and between St. Joseph Health System

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its

More information

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations

More information

EXHIBIT C BUSINESS ASSOCIATE AGREEMENT

EXHIBIT C BUSINESS ASSOCIATE AGREEMENT EXHIBIT C BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT is made and entered into by and between ( Covered Entity ) and KHIN ( Business Associate ). This Agreement is effective as of, 20 ( Effective Date

More information

OFFICE OF CONTRACT ADMINISTRATION 60400 PURCHASING DIVISION. Appendix A HEALTHCARE INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA)

OFFICE OF CONTRACT ADMINISTRATION 60400 PURCHASING DIVISION. Appendix A HEALTHCARE INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA) Appendix A HEALTHCARE INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA) BUSINESS ASSOCIATE ADDENDUM This Business Associate Addendum ( Addendum ) supplements and is made a part of the contract ( Contract

More information

BUSINESS ASSOCIATE AGREEMENT TERMS

BUSINESS ASSOCIATE AGREEMENT TERMS BUSINESS ASSOCIATE AGREEMENT TERMS This Addendum ( Addendum ) is incorporated into and made part of the Agreement between SIGNATURE HEALTHCARE CORPORATION ("Covered Entity ) and ( Business Associate"),

More information

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist HIPAA Omnibus Rule Overview Presented by: Crystal Stanton MicroMD Marketing Communication Specialist 1 HIPAA Omnibus Rule - Agenda History of the Omnibus Rule What is the HIPAA Omnibus Rule and its various

More information

Vendor Management Challenge Doing More with Less

Vendor Management Challenge Doing More with Less Vendor Management Challenge Doing More with Less Megan Hertzler Assistant General Counsel Director of Data Privacy Xcel Energy Boris Segalis Partner InfoLawGroup LLP Session ID: GRC-402 Insert presenter

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT ( Agreement ) by and between OUR LADY OF LOURDES HEALTH CARE SERVICES, INC., hereinafter referred to as Covered Entity, and hereinafter referred

More information

Business Associate Agreement

Business Associate Agreement This Business Associate Agreement Is Related To and a Part of the Following Underlying Agreement: Effective Date of Underlying Agreement: Vendor: Business Associate Agreement This Business Associate Agreement

More information

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable Steven J. Fox (sjfox@postschell.com) Peter D. Hardy (phardy@postschell.com) Robert Brandfass (BrandfassR@wvuh.com) (Mr. Brandfass

More information

Risk Management of Outsourced Technology Services. November 28, 2000

Risk Management of Outsourced Technology Services. November 28, 2000 Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the

More information

Infinedi HIPAA Business Associate Agreement RECITALS SAMPLE

Infinedi HIPAA Business Associate Agreement RECITALS SAMPLE Infinedi HIPAA Business Associate Agreement This Business Associate Agreement ( Agreement ) is entered into this day of, 20 between ( Company ) and Infinedi, LLC, a Limited Liability Corporation, ( Contractor

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Addendum is made part of the agreement between Boston Medical Center ("Covered Entity ) and ( Business Associate"), dated [the Underlying Agreement ]. In connection with

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) is by and between ( Covered Entity )and CONEX Med Pro Systems ( Business Associate ). This Agreement has been attached to,

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is by and between ( Covered Entity ) and Xelex Digital, LLC ( Business Associate ), and is effective as of. WHEREAS,

More information

Introduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery

Introduction to Data Privacy & ediscovery Intersection of Data Privacy & ediscovery Today s Topics Introduction to Data Privacy & ediscovery General Overview Data Privacy in the United States Data Privacy in Foreign Countries Intersection of Data Privacy & ediscovery Preservation of Data

More information

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean. BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement is made as of the day of, 2010, by and between Methodist Lebonheur Healthcare, on behalf of itself and all of its affiliates ( Covered Entity

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University

More information

Vendor Management Best Practices

Vendor Management Best Practices 23 rd Annual and One Day Seminar Vendor Management Best Practices Catherine Bruder CPA, CITP, CISA, CISM, CTGA Michigan Texas Florida Insight. Oversight. Foresight. SM Doeren Mayhew Bruder 1 $100 billion

More information

Business Associate Agreement (BAA) Guidance

Business Associate Agreement (BAA) Guidance Business Associate Agreement (BAA) Guidance Introduction The purpose of this document is to provide guidance for creating or updating business associate agreements between your Practice ( Covered Entity

More information

Why Lawyers? Why Now?

Why Lawyers? Why Now? TODAY S PRESENTERS Why Lawyers? Why Now? New HIPAA regulations go into effect September 23, 2013 Expands HIPAA safeguarding and breach liabilities for business associates (BAs) Lawyer is considered a business

More information

HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions

HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions A. Business Associate. Business Associate shall have the meaning given to such term under the Privacy and Security Rules, including,

More information

Security Information Lifecycle

Security Information Lifecycle Security Information Lifecycle By Eric Ogren Security Analyst, April 2006 Copyright 2006. The, Inc. All Rights Reserved. Table of Contents Executive Summary...2 Figure 1... 2 The Compliance Climate...4

More information

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014 IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the "Agreement") is made and entered into this day of,, by and between Quicktate and idictate ("Business Associate") and ("Covered Entity").

More information

Am I a Business Associate?

Am I a Business Associate? Am I a Business Associate? Now What? JENNIFER L. RATHBURN Quarles & Brady LLP KATEA M. RAVEGA Quarles & Brady LLP agenda» Overview of HIPAA / HITECH» Business Associate ( BA ) Basics» What Do BAs Have

More information

Trust in the Cloud Legal and Regulatory Framework

Trust in the Cloud Legal and Regulatory Framework Trust in the Cloud Legal and Regulatory Framework Cloud Security Alliance San Francisco, CA February 26, 2014 Francoise Gilbert, JD, CIPP Managing Director IT Law Group 2014 IT Law Group All Rights Reserved

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

Intelligent Vendor Risk Management

Intelligent Vendor Risk Management Intelligent Vendor Risk Management Cliff Baker, Managing Partner, Meditology Services LeeAnn Foltz, JD Compliance Resource Consultant, WoltersKluwer Law & Business Agenda Why it s Needed Regulatory Breach

More information

Managing Cyber & Privacy Risks

Managing Cyber & Privacy Risks Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past

More information

PII Compliance Guidelines

PII Compliance Guidelines Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last

More information

CFPB Readiness Series: Compliant Vendor Management Overview

CFPB Readiness Series: Compliant Vendor Management Overview CFPB Readiness Series: Compliant Vendor Management Overview Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must be tailored to the

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( the Agreement ) is entered into this day of, 20 by and between the Tennessee Chapter of the American Academy of Pediatrics ( Business Associate

More information

Cloud Computing and HIPAA Privacy and Security

Cloud Computing and HIPAA Privacy and Security Cloud Computing and HIPAA Privacy and Security This is just one example of the many online resources Practical Law Company offers. Christine A. Williams, Perkins Coie LLP, with PLC Employee Benefits &

More information

PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798

PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798 PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798 Updated 12/8/15 PSYBAR, L. L. C. INDEPENDENT CONTRACTOR AGREEMENT PsyBar attempts to

More information

PII Personally Identifiable Information Training and Fraud Prevention

PII Personally Identifiable Information Training and Fraud Prevention PII Personally Identifiable Information Training and Fraud Prevention Topics What is Personally Identifiable Information (PII)? Why are we committed to protecting PII? What laws govern us? How do we comply?

More information

The Institute of Professional Practice, Inc. Business Associate Agreement

The Institute of Professional Practice, Inc. Business Associate Agreement The Institute of Professional Practice, Inc. Business Associate Agreement This Business Associate Agreement ( Agreement ) effective on (the Effective Date ) is entered into by and between The Institute

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ), is made effective as of the sign up date on the login information page of the CarePICS.com website, by and between CarePICS,

More information

BUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc.

BUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc. BUSINESS ASSOCIATE AGREEMENT First Choice Community Healthcare, Inc. THIS BUSINESS ASSOCIATE AGREEMENT (BAA) is entered into by and between First Choice Community Healthcare, with a principal place of

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is entered into as of the day of, 2013 by and between RUTGERS UNIVERSITY, a Hybrid Entity, on behalf and for the

More information

Requirements for Technology Outsourcing

Requirements for Technology Outsourcing Requirements for Technology Outsourcing Table of Contents Revision History... 3 Overview... 4 Service Provider Selection... 5 Service Delivery Models... 5 Legal Considerations... 5 Security Assessments...

More information

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing HIPAA Omnibus Rule Practice Impact Kristen Heffernan MicroMD Director of Prod Mgt and Marketing 1 HIPAA Omnibus Rule Agenda History of the Rule HIPAA Stats Rule Overview Use of Personal Health Information

More information

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms v2.18.11, rev 1 Presenters Joseph DeMarco, Partner DeVore & DeMarco, LLP Lauren Shy, Assistant General Counsel Fragomen,

More information

BUSINESS ASSOCIATE ADDENDUM

BUSINESS ASSOCIATE ADDENDUM BUSINESS ASSOCIATE ADDENDUM This BA Agreement, effective as of the effective date of the Terms of Use, adds to and is made part of the Terms of Use by and between Business Associate and Covered Entity.

More information

It s a New Regulatory Landscape: Do You Know Where Your Business Associates are and What They are Doing?

It s a New Regulatory Landscape: Do You Know Where Your Business Associates are and What They are Doing? It s a New Regulatory Landscape: Do You Know Where Your Business Associates are and What They are Doing? The AMC Privacy & Security Conference Series Securely Connecting Communities for Improved Health

More information

GUIDANCE FOR MANAGING THIRD-PARTY RISK

GUIDANCE FOR MANAGING THIRD-PARTY RISK GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,

More information