HIPAA SECURITY RISK ANALYSIS FORMAL RFP

Size: px
Start display at page:

Download "HIPAA SECURITY RISK ANALYSIS FORMAL RFP"

Transcription

1 HIPAA SECURITY RISK ANALYSIS FORMAL RFP ADDENDUM NUMBER: (2) August 1, 2012 THIS ADDENDUM IS ISSUED PRIOR TO THE ACCEPTANCE OF THE FORMAL RFPS. THE FOLLOWING CLARIFICATIONS, AMENDMENTS, ADDITIONS, DELETIONS, REVISIONS, AND MODIFICATION FORM A PART OF THE CONTRACT DOCUMENTS ONLY IN THE MANNER AND TO THE EXTENT STATED. Please note that the following clarification: 1. In reference to Addendum #1, please note that Broward Health will not require the successful Contractor to include 10% Diverse Subcontracting in their response to this RFP. However, if the RFP respondent chooses to offer subcontracting in their proposal, then this vendor subcontracting solution shall be evaluated based upon all appropriate documentation included in the Contractor s response. Broward Health will not necessarily reject any proposal to this RFP should the respondent choose to subcontract for this engagement. 2. Does this RFP ask us to perform a broad based HIPAA risk assessment or conduct an OCR mock audit? As stated in the RFP a HIPAA Risk Analysis, Broward Health is not requesting a mock audit however; the OCR Guidelines should be followed to complete the required Risk Analysis. 2. Has a risk assessment been performed to-date? If not, how have the controls been implemented and scoped to meet the safeguards and implementation specifications? 3. Does a current HIPAA program exist? How many resources are devoted to HIPAA? Where does the responsibility lie for HIPAA? Have the HIPAA controls been tested in the past?, Broward Health has a seasoned HIPAA program. Broward Health has 2 employees in the Corporate Compliance Department responsible for HIPAA compliance., controls have been tested. 4. What will this report be used for? Yearly Risk Analysis as per the OCR Guidelines. 5. Has Broward Health been notified of an upcoming OCR audit? Page 1 of 14

2 6. Are the HIPAA controls centralized or distributed over the Broward Health environment? Centralized 7. Are processes and systems consistent across of all Broward Health's operations? Processes, yes systems can vary. 8. Does Broward Health have a defined time frame for execution of the assessment and presentation of deliverable reports? As stated in the RFP Broward Health is looking at an aggressive timeline and would start this project upon award and contract completion. 9. What are the key IT risks/concerns that Broward Health is currently facing? Broward Health is constantly monitoring and remediation is a continuous process. 10. Does Broward Health expect any significant change in operations/information technology in the upcoming future that would impact our approach?. 11. Is IT centralized with respect to core processes (change management, software development, application/system support) across the 112 applications or is it decentralized? Centralized 12. Are the business processes or formalized policies at hospitals, clinics and doctors offices aligned across all facilities or does each facility have separate processes and policies? Aligned 13. Please describe the level of centralization of key processes such as patient or non-patient billing. Billing is centralized for the Hospitals and clinics and employed physician offices, one home health care site has individualized billing. 14. Are all 112 applications in scope or are we looking at the top number based on the risk assessment of the 112? Is a risk based sampling approach acceptable? All PHI associated applications are in scope. Broward Health has requested the vendor provide a solution to the approach being proposed that will align with the regulations. 15. Is there a mapping of applications to facilities? Or do all 112 applications apply to all facilities? All 16. What the breakdown of the 112 applications between packaged/purchased applications is vs. in-house developed? Approximately 80% vendor 20% in-house 17. What steps have you taken so far to address the Privacy and Security Rules, including the Breach tification Process? Page 2 of 14

3 This area is covered within our Corporate Compliance Department and upon award of the contract will be discussed in detail. 18. Please briefly describe how your organization achieves a culture of compliance? This area is covered within our Corporate Compliance Department and upon award of the contract will be discussed in detail. 19. Were any unresolved findings related to HIPAA compliance identified in previous financial audits or risk assessments? 20. Will there be a compliance officer and department providing coordination for the engagement? All coordination of Broward Health s resources will be the Healthcare Information Security Administrator s responsibility. All necessary resources will be available, scheduled and engaged to create a successful engagement. 21. Please describe any recent or planned IT system or other process changes that would affect HIPAA compliance. 22. Would all locations and practices be considered in scope, or would a test sample of the locations be expected? As stated in the RFP, vendor should provide recommendation in solution being submitted. 23. External IT infrastructure: a. How many websites are running from Broward Health s infrastructure? Three (3) b. Please describe the Internet facing systems/applications run by Broward Health that are hosted on in-house systems. Outward facing portals. c. Please describe any in-house managed, Internet facing systems that are conducting some form of e-commerce. d. Please describe any in-house managed, Internet facing systems that are providing access some form of EPHI. e. Please describe each form of remote access provided to staff, IT, and/or vendors. Provided in RFP f. Are there any hosted applications (not on Broward Health infrastructure) that should be considered in-scope for this assessment? Provided in RFP 24. Please list the number of active directory domains in operation. Provided in RFP Page 3 of 14

4 25. Please describe any (centralized) authentication mechanisms in place. Microsoft AD 26. Please describe the number of in-house servers, including their operating systems. Microsoft/count provided in RFP 27. How many are virtualized? Approximately What is the virtualization technology in use? VMware 29. Does Broward Health have an accurate, up to date inventory of which servers contain PHI? 30. Is any of the sensitive data contained on workstations/laptops/mobile devices? These devices are included in scope. 32. Does Broward Health allow staff to use personally owned devices (laptops, tablets, smart phones) to access Broward Health resources?, through VPN 33. Has Broward Health adopted a governance framework (i.e. COBIT, ISO, etc )? 34. Does the scope include printed documents as well as electronic data?, as stated in the RFP all forms of media. 35. What third-party service providers are currently being utilized by Broward Health from an IT Perspective? Infrastructure only providers? Data storage/processing/management providers? 36. Has Broward Health made a determination as to whether it needs to be PCI-DSS compliant? not requested in scope of this RFP. a. If yes, how long has Broward Health been engaged in PCI compliance activities? b. What portion/percentage of the infrastructure is in-scope for PCI compliance? Page 4 of 14

5 37. Is there a pre-established budget for this project? Could Broward Health provide the budget figure? Broward Health has the proper budget for this project; Broward Health will review the vendor RFP for value added and savings. 38. Is this the first time that Broward Health will contract a vendor for a project with this (or similar) scope? If no, could you please name the previous successful contractor and the amount of the last successful bid? Broward Health is performing this project based on the new HITECH/HIPAA requirements. 39. Further, if there is an incumbent, what is the reason that Broward Health is looking to contract a new vendor for this requirement (e.g. poor performance by previous vendor, conflict of interest issues, etc.)?. 40. Please provide a high-level overview of the entire technical environment in scope. Please elaborate on the various platforms (operating system names, database names, software names, etc.) employed in the Broward Health environment. Broward Health has included a High Level Overview in the current RFP and addendums. 41. Please describe how comprehensive the security policies and procedures documentation to be reviewed is (number of policies, number of procedures, number of pages per policy/procedures, etc.). Broward Health has approximately of 50 policies for review in addition would expect the Analysis to determine any weaknesses or improvements in the security policies that could be made to be included in this analysis. 42. For server configuration reviews, while the RFP document provides the number of servers within scope, please provide the various operating system types (e.g. Windows, HP UX, AS/400, etc.). Also, please include a high-level description of purposes that the servers perform. Microsoft Platform Any server that contains EPHI should be considered clinical in nature and in scope. 43. For the Application Threats Assessment, please provide a high-level description of the applications in scope and their purpose. How many of these applications are web-based and how many internal? Also, is Broward Health also looking for a detailed application security assessment that includes intrusive hacking methods? - Network Infrastructure (Penetration Testing) is excluded from this RFP as stated in the RFP and application security assessment should not include intrusive hacking methods. Applications in scope would be the applications pertaining to ephi or as required in the HIPAA regulations and should be evaluated based on risk and security. 44. For the interrogation of the Broward Health clinical hosted system connectivity could Broward Health elaborate on what it is specifically looking for the vendor to do? Is it a combination of a network and application based penetration test? Broward Health is requesting that the clinical hosted systems be reviewed for best practice and identification of strengths and weakness in the security processes and identification of any weaknesses and risks. Applications in scope would be the applications pertaining to ephi or as required in the HIPAA regulations and should be evaluated based on risk and security. Page 5 of 14

6 45. For the physical security reviews, could you please provide the number of locations within the scope of review and their physical proximity to each other (e.g. x locations with a y mile radius of each other). All locations are in Broward County Florida and no more than 25 miles from the main headquarters and are referred to in the RFP 46. What level of overall sampling is acceptable to Broward Health? A percentage estimate (e.g. 10%, 15%, etc.) is what we are looking for at this time. Broward Health has requested the vendor provide a solution to the approach being proposed that will align with the regulations. 47. Our company is responding to the Broward Health HIPAA Security Risk Analysis RFP. We do not qualify as a Certified Diverse Vendor ; however, the solicitation evaluation criteria provides for 10% of the allotted points Diverse Vendor Participation. Broward Health also issued an addendum prohibiting the use of subcontractors. Please see answer to question #1. 1. How can a non-certified Diverse Vendor respond with a potential of receiving more than 90% of the allotted points? Please read the RFP carefully and respond to the Diverse Participation questions. Points are awarded based upon Vendor response 2. Given that the use of subcontractors is disallowed, are we required to respond to Section IV? See answer #1. Subcontractors will be allowed for this engagement. 48. Please provide a copy of the Broward Health General Administration and Procedures Manual so we can review the travel reimbursement policy and insure we can comply. 49. Broward Health indicates all EPHI to be included within the Risk Analysis portion of the assessment including all storage mediums; are care devices (imaging, monitoring, diagnostic, etc.) included as well? If so, is the number included or different than the provided number of applications and workstations? 50. Is a risk-based sampling approach acceptable when it comes to the 4 hospitals, 13 clinics, and 37 doctors offices from an overall project perspective including physical security, risk analysis, etc? Broward Health has requested the vendor provide a solution to the approach being proposed that will align with the regulations. 51. In-depth penetration testing is noted as not in scope for this RFP however, is a vulnerability scan/assessment considered an expected component? Page 6 of 14

7 52. Databases were not specifically listed under the Technical Safeguards area with the other security assessments; are database security reviews a desired component?, 53. If so, provide database types and quantities considered in scope. Oracle, SQL and Access are to be considered in scope. Approximately Is it appropriate to propose other technologies not specifically listed under the Technical Safeguards such as mobile devices, architecture, etc. to be reviewed from a security perspective as well?, Broward Health has requested the vendor provide a solution to the approach being proposed that will align with the regulations and provide the best value to Broward Health. 55. The RFP states Guide Broward Health in conducting an inventory of protected health information (PHI); both electronic and non-electronic. Confirm whether this component is to assist with creation of a data inventory or is there a completed inventory to rely upon and enhance? Broward Health has an inventory of ephi and would want to review the inventory. 56. If creation of inventory is required, provide a description of the organization structure including estimated number of departments/units, number of employees to interview or other pertinent information to help understand the effort to create a data inventory. 57. We understand goals as noted to evaluate the confidentiality, integrity and availability EPHI leveraging guidance of OCR Risk Analysis and Audit Protocol. Are you looking for assessments for detailed evaluation of individual systems storing or transmitting EPHI (i.e. individual applications, databases, mobile devices, etc.) based upon risk? 58. Requesting a copy of the General Administration and Procedures Manual in effect to review expense policies. See Attachment 59. This is a substantial scope of work, and an aggressive timeline is mentioned. Can you please define aggressive in terms of this project (Start date, length of project, etc.)? As stated in the RFP Broward Health is looking at an aggressive timeline and would start this project upon award and contract process completion. Vendor is responsible to determine an aggressive timeline that will allow Broward Health to complete this project in a prompt manner. 60. A fixed price bid is required within Section IX. Is this fixed price for the first year of the three-year term, or all three years of the three-year term? First Year - The term of this Agreement shall be three years, unless otherwise agreed to in writing ("Initial Term"). Broward Health, in its sole discretion, may renew this Agreement for two- (2) additional one- (1) year terms upon giving Contractor written notice of its intent to renew at least (90) days prior to the expiration of the current term ("Renewal Term"). Any Renewal Term shall be on the same terms and conditions of the Initial Term, including all payment and pricing provisions. 61. Briefly describe your timeline for implementation of EHR. Completed Page 7 of 14

8 62. The phrases Security Risk Analysis and Vulnerability Assessment appear to be used interchangeably in Section C: Scope of Work. Can you confirm that the phrase Vulnerability Assessment used in this section is synonymous with Security Risk Analysis, and does not mean that vulnerability scans will be performed on systems in the environment? The Vulnerability Assessment in the context of a penetration level test is excluded from this RFP. Assessments for detailed evaluation of individual systems storing or transmitting EPHI (i.e. individual applications, databases, mobile devices, etc.) based upon risk should be considered in scope. 63. Network penetration testing is not included in this scope of work. Should web application and / or physical penetration testing be considered? Should social engineering be considered?. Vendor should in addition utilize the HIPAA Audit program protocol recently established by OCR, providing a comprehensive audit protocol that contains the requirements to be assessed through the performance audits. The entire audit protocol is organized around modules, representing separate elements of privacy, security, and breach notification. 64. What is the total number of assets to be included in the risk analysis? Refer to the RFP 65. Are both the physical and logical (databases, file shares, etc.) locations of ephi documented? 66. Do documented data-flows exist for how ephi is transmitted or moved within Broward Health and to Broward Health s business associates? 67. Describe current security policies and procedures? If possible, provide an estimated page count of policies and procedures. Approximately 50 policies or 150 pages 68. Are there multiple IT departments or one central department? Are there multiple Information Security departments? One central IT, compliance and security, are all located in one location. 69. Approximately how many individuals from Broward Health would be involved in being interviewed, relative to HIPAA controls? This would need to be determined and agreed upon based on the recommended solution. 70. It is understood that Penetration Testing is out of scope, but is basic External /Internal Vulnerability a part of the scope? If so, please provide the number of externally visible systems. 71. How many applications would be in scope for the item called "Application Threats Assessment"? Please describe. As stated in the RFP (112) ephi applications. Page 8 of 14

9 72. What are Broward s expectations and desired results for the Assessment, relative to the HIPAA Privacy Rule Compliance? Completion of a third party Risk Analysis as required and within the HIPAA / HITECH regulations. Vendor should in addition utilize the HIPAA Audit program protocol recently established by OCR, providing a comprehensive audit protocol that contains the requirements to be assessed through the performance audits. The entire audit protocol is organized around modules, representing separate elements of privacy, security, and breach notification. 73. Does Broward expect the breach notification process assessment to include privacy breaches and notification requirements in its policies to include key Privacy Rule tenets such as: Impermissible Use, Disclosure, Exceptions to tification, and Risk of harm to affected individuals Broward Health expects the OCR Audit Protocol and regulations to be followed. 74. What are Broward s expectations relative to Legal requirements of the Assessment? Is Legal review of Privacy Rule compliance or other aspects of the assessment, considered a part of the intended scope? 75. For the specific area of Privacy, what is the scope of this initiative beyond what is covered in the OCR Audit protocol? Broward Health expects the OCR Audit Protocol and regulations to be followed. 76. Based upon the clarification provided in Addendum 1, specific to sub-contracting, please clarify the language in regards to There is NO Sub-contracting approved. See response to #1 of this addendum 77. Specifically, does this language disqualify, or provide scoring penalties, for vendor s inclusion of a sub-contractor as part of the proposed approach? See response to #1 of this addendum 78. Does the phrase There is no Sub-contracting approved extend only to the a vendor s eligibility for issuance of the 10 Diverse Vendor Enhancement Points or shall it be construed to prohibit use of a sub-contractor (regardless of Diverse Vendor classification) by the proposed vendor. See response to #1 of this addendum Page 9 of 14

10 79. For purposes of this RFP, does the joint partnership and proposal by two organizations constitute a vendor / sub-vendor relationship if both are equally and severally responsible for the delivery of services specified. A response shall be evaluated as a joint partnership, only if that partnership has already been established as a partnership prior to the RFP response; that partnership shall be reviewed with references having done business with that partnership. If not a true partnership, then one firm will be primary and accountable for all guarantees of this engagement. 80. Is the Client s expectation that the assessment is conducted through interviews with staff or that data discovery tools are used to scan the network for ephi? Broward Health s expectation is to have a combination of both. 81. What types of media will be in scope in PHI discovery? Referred to in the RFP 82. Has Broward Health met requirements for Meaningful Use Stage 1 attestation? 83. What is the target date for starting / completing the engagement once vendor has been selected and contracts negotiated? As stated in the RFP Broward Health is looking at an aggressive timeline and would start this project upon award and contract process completion. Vendor is responsible to determine an aggressive timeline that will allow Broward Health to complete this project in a prompt manner. 84. How many IT resources are focused on security? Two (2) 85. Is Privacy managed by the HIM or Compliance department? Compliance 86. How many data centers does Broward Health have? One (1) 87. Are mobile devices used in Broward Health to transmit, store, handle ephi? Broward Health does not allow ephi to be stored on mobile devices. 88. If yes, are personally-owned devices allowed? Page 10 of 14

11 89. Is a sampling of applications acceptable to Broward Health or is it the desire that all 112 applications be reviewed? AT&T Consulting typically takes a sampling approach using judgmental sampling. All 112 applications are in scope and should be reviewed. 90. Please characterize the types and approximate number of each application type. For example: Web Applications 15, AS400 applications 25, Thick Client Applications 30, etc. The applications are approximately 75% client and 25% web based. 91. For the Application Threats Assessment, what approach does rth Broward prefer: an interview and documentation review approach to identifying threats, in depth technical testing to identify security impacting application flaws, or a combination of both? Combination of both. 92. Will the assessment team have access to application developers and administrators for each application in-scope for review? 93. Approximately what percentage of in-scope applications are externally facing (ie: reachable from the Internet) vs internal to the organization? Based on the rights of the individual any of the applications by be accessible. 94. Will the assessment team be provided test accounts to the applications? Test accounts allow the team to conducted authenticated testing and look for issues within the application (such as logic flaws and privilege escalation issues) and not just at the efficacy of the login page. 95. Have the applications in-scope undergone technical security testing in the past 12 months? 96. Are BAAs managed centrally or by each department or practice? Centrally 97. Do departments, clinics, and practices have their own policies and/or procedures? 98. Has Broward Health used other regulatory requirements or industry standards in which to base its security and privacy program / policy upon?, Industry standards 99. Please explain what is meant by interrogation in section VI.C.4.a. Is this intended to mean an assessment, as in Conduct an assessment of security software or Conduct an interrogation of Broward Health s clinical hosted system connectivity? If so, are these assessments intended to be network-based vulnerability assessments? Goals to this projected should include to evaluate the confidentiality, integrity and availability EPHI leveraging guidance of OCR Risk Analysis and Audit Protocol. Assessments and detailed evaluation of individual systems storing or transmitting EPHI (i.e. individual applications, databases, mobile devices, etc.) based upon risk are to be in scope For the Virtual Infrastructure Security Assessment, is this intended to be an assessment of virtual machines, or virtual DMZs? Page 11 of 14

12 Assessments and detailed evaluation of virtual systems storing or transmitting EPHI (i.e. individual applications, databases, mobile devices, etc.) based upon risk are to be in scope Out of the 800 servers, can you please expand on how many of these are Windows, Unix, Linux, etc.? Are any of these running in a virtual environment? Windows 95% 102. Does each facility have a server room or the like? Each of the 4 main hospitals and 6 clinics each has a secure server room. OUT OF SCOPE FOR THIS PROJECT 103. For the VPN Configuration Review, please provide a high-level description of the VPN technical environment. - Network Infrastructure (Penetration Testing) is excluded from this RFP as stated in the RFP. Broward Health utilizes a two factor solution review should be limited to the requirements of the Risk Analysis as stated Does Broward Health s internal IT/Security staff perform periodic penetration testing and/or vulnerability scanning as part of their administrative maintenance procedures? 105. Will Broward Health provide us with network diagrams? 106. For the VoIP Assessment, please provide a high-level description of the VoIP technical environment. - Network Infrastructure (Penetration Testing) is excluded from this RFP as stated in the RFP. Broward Health utilizes VoIP in the delivery of the phone system How many wireless nodes are in operation (infrastructure AND client/end points)? 108. What are the relative sizes of the networks (small branch, data center, main backbone, large points of presence, etc.)? 109. What are the locations of each network and will travel be required to each location, or are all networks centrally managed? Page 12 of 14

13 110. For the Cisco firewalls in scope, are any of these devices FWSMs and do any of the firewalls contain virtual firewalls? 111. How many total rules exist across all firewalls (a sum of all firewalls rules)? 112. How many VPN devices are in scope, and what type of devices are these? The remote access process should be reviewed not the individual devices How many SoftSwitches are in place (i.e., Call Manager)? 114. How many Voice Mail systems are in place (i.e., Unity)? 115. Number of presence and contact servers (i.e., UCCX servers)? 116. Number of Phone CPEs? 117. Number of SoftPhones? 118. How many facilities will be assessed as part of the VoIP assessment? 119. Do you have any based Wireless VoIP CPEs? 120. Is the network segregated for data and voice? 121. How many media gateways are present? Page 13 of 14

14 122. Are there any POTS lines at each location in scope, or are all calls forwarded out a central gateway? END Page 14 of 14

REQUEST FOR PROPOSAL (RFP) #021-14 HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014

REQUEST FOR PROPOSAL (RFP) #021-14 HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014 REQUEST FOR PROPOSAL (RFP) #021-14 HIPAA SECURITY ASSESSMENT VENDOR QUESTIONS & ANSWERS ~ MAY 29, 2014 Q1) Page 2, Section A and Page 5, Section H --- Does the County desire only an assessment of compliance

More information

ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151

ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 HIPAA/HITECH/OMNIBUS Act Compliance Consulting Services TO: FROM: CLOSING DATE: SUBJECT: All Potential Responders Angie Williams, RFP Coordinator September 24,

More information

Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Addendum #1 - Q&A

Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Addendum #1 - Q&A Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Request for Proposals (RFP) for PCI DSS COMPLIANCE SERVICES Project # 15-49-9999-016 Addendum #1 - Q&A May 29,

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

Overview of the HIPAA Security Rule

Overview of the HIPAA Security Rule Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this

More information

Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review DCF Answers to Vendor Questions

Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review DCF Answers to Vendor Questions Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review s to Vendor Questions Questions as Submitted by Vendors (Duplicates omitted) 1. Have controls

More information

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement

More information

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

After reviewing all the questions, the most common and relevant questions were chosen and the answers are below:

After reviewing all the questions, the most common and relevant questions were chosen and the answers are below: 2015 007 After reviewing all the questions, the most common and relevant questions were chosen and the answers are below: 1. Is there a proposed budget for this RFP? No 2. What is the expect duration for

More information

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives

Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. What would you do? Session Objectives Are You Ready for an OCR Audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? Your organization received a certified letter sent from the Office for Civil Rights (OCR)

More information

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information about HIPAA, the HITECH-HIPAA Omnibus Privacy Act, how

More information

RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST

RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST RFP No. 1-15-C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST Questions and Answers Notice: Questions may have been edited for clarity and relevance. 1. How many desktops,

More information

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015 QUESTIONS ANSWERS Q1 What is the goal of testing? A1 We engage in this type of testing to promote our own best practices and ensure our security posture is as it should be. Q2 No of active IP s (internal):

More information

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004. Addendum 1.0

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004. Addendum 1.0 Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP #12-680-004 Addendum 1.0 ISSUE DATE: February 23, 2012 Receipt of this addendum should be acknowledged on the Proposal Form. Inquiries

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP

Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP Ready for an OCR Audit? Will you pass or fail an OCR security audit? Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS What would you do? You receive a phone call from your CEO. They just received

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

University Healthcare Physicians Compliance and Privacy Policy

University Healthcare Physicians Compliance and Privacy Policy Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of

More information

Response to Questions CML 15-018 Managed Information Security

Response to Questions CML 15-018 Managed Information Security Response to Questions CML 15-018 Managed Information Security 1. What are the most critical aspects that need to be provided for this RFP, in light of the comment that multiple awards might be provided?

More information

HIPAA: Compliance Essentials

HIPAA: Compliance Essentials HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change

More information

Authorized. User Agreement

Authorized. User Agreement Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION

More information

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased

More information

About This Document. Response to Questions. Security Sytems Assessment RFQ

About This Document. Response to Questions. Security Sytems Assessment RFQ Response to Questions Security Sytems Assessment RFQ Posted October 1, 2015 Q: Which specific security assessment processes are sought for this engagement? The RFQ mentions several kinds of analysis and

More information

DATA SECURITY AGREEMENT. Addendum # to Contract #

DATA SECURITY AGREEMENT. Addendum # to Contract # DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the

More information

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014

HIPAA Update. Presented by: Melissa M. Zambri. June 25, 2014 HIPAA Update Presented by: Melissa M. Zambri June 25, 2014 Timeline of New Rules 2/17/09 - Stimulus Package Enacted 8/24/09 - Interim Final Rule on Breach Notification 10/7/09 - Proposed Rule Regarding

More information

Request for Proposal HIPAA Security Risk and Vulnerability Assessment

Request for Proposal HIPAA Security Risk and Vulnerability Assessment Request for Proposal HIPAA Security Risk and Vulnerability Assessment May 1, 2016 First Choice Community Healthcare Timeline The following Timeline has been defined to efficiently solicit multiple competitive

More information

Business Associates, HITECH & the Omnibus HIPAA Final Rule

Business Associates, HITECH & the Omnibus HIPAA Final Rule Business Associates, HITECH & the Omnibus HIPAA Final Rule HIPAA Omnibus Final Rule Changes Business Associates Marissa Gordon-Nguyen, JD, MPH Health Information Privacy Specialist Office for Civil Rights/HHS

More information

BUSINESS ASSOCIATE AND DATA USE AGREEMENT NAME OF COVERED ENTITY: COVERED ENTITY FEIN/TAX ID: COVERED ENTITY ADDRESS:

BUSINESS ASSOCIATE AND DATA USE AGREEMENT NAME OF COVERED ENTITY: COVERED ENTITY FEIN/TAX ID: COVERED ENTITY ADDRESS: BUSINESS ASSOCIATE AND DATA USE AGREEMENT NAME OF COVERED ENTITY: COVERED ENTITY FEIN/TAX ID: COVERED ENTITY ADDRESS:, City State Zip This Business Associate and Data Use Agreement ( Agreement ) is effective

More information

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201 Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...

More information

BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS

BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM This Business Associate Addendum ( Addendum ), effective, 20 ( Effective Date ), is entered into by and between University of Southern California, ( University

More information

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use

Securing Patient Portals. What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use Securing Patient Portals What You Need to Know to Comply With HIPAA Omnibus and Meaningful Use September 2013 Table of Contents Abstract... 3 The Carrot and the Stick: Incentives and Penalties for Securing

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Nine Network Considerations in the New HIPAA Landscape

Nine Network Considerations in the New HIPAA Landscape Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

Penetration Testing. Request for Proposal

Penetration Testing. Request for Proposal Penetration Testing Request for Proposal Head Office: 24 - The Mall, Peshawar Cantt, 25000 Khyber Pakhtunkhwa, Islamic Republic of Pakistan UAN: +92-91-111-265-265, Fax: +92-91-5278146 Website: www.bok.com.pk

More information

OFFICE OF CONTRACT ADMINISTRATION 60400 PURCHASING DIVISION. Appendix A HEALTHCARE INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA)

OFFICE OF CONTRACT ADMINISTRATION 60400 PURCHASING DIVISION. Appendix A HEALTHCARE INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA) Appendix A HEALTHCARE INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA) BUSINESS ASSOCIATE ADDENDUM This Business Associate Addendum ( Addendum ) supplements and is made a part of the contract ( Contract

More information

QUESTIONS & RESPONSES #2

QUESTIONS & RESPONSES #2 QUESTIONS & RESPONSES #2 RFP / TITLE 070076 IT Cybersecurity Assessment and Plan CONTACT Michael Keim, CPPB, Sr. Contract Adminstrator EMAIL [email protected] PHONE NUMBER 253-428-8608 SUBMITTAL

More information

Request for Proposal RFP No. IT-2015-101. Phone System Replacement

Request for Proposal RFP No. IT-2015-101. Phone System Replacement Request for Proposal RFP No. IT-2015-101 November 23 rd 2015 Phone System Replacement Deadline for Receipt of Proposals: January 18 th, 2016 at 4:30pm Proposals to be submitted by e-mail to Morgan Calvert

More information

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) by and between (hereinafter known as Covered Entity ) and Office Ally, LLC. (hereinafter known as Business Associate ), and

More information

HIPAA and HITECH Compliance for Cloud Applications

HIPAA and HITECH Compliance for Cloud Applications What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health

More information

Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon

Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon Request for Proposal For: PCD-DSS Level 1 Service Provider St. Andrew's Parish Parks & Playground Commission Bid Deadline: August 17, 2015 at 12 Noon Request for Proposal P a g e 2 Table of Contents 1.

More information

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC Why Does Privacy and Security Matter? Trust Who Must Comply with HIPAA Rules? Covered Entities (CE)

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925

REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925 I. PURPOSE REQUEST FOR INFORMATION FLORIDA AGENCY FOR STATE TECHNOLOGY CLOUD SERVICES AND SOLUTIONS RFI NO.: 150925 The State of Florida, Agency for State Technology (AST), hereby issues this Request for

More information

New HIPAA regulations require action. Are you in compliance?

New HIPAA regulations require action. Are you in compliance? New HIPAA regulations require action. Are you in compliance? Mary Harrison, JD Tami Simon, JD May 22, 2013 Discussion topics Introduction Remembering the HIPAA Basics HIPAA Privacy Rules HIPAA Security

More information

III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services:

III. Services Required The following details the services to be provided to the Town of North Haven in the area of information services: TOWN OF NORTH HAVEN REQUEST FOR PROPOSALS INFORMATION TECHNOLOGY NETWORK SUPPORT SERVICES Issue Date: March 7, 2016 Due Date: 10:00 AM, Monday, March 28, 2016 I. Introduction The Town of North Haven is

More information

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS Ebook YOUR HIPAA RISK ANALYSIS IN FIVE STEPS A HOW-TO GUIDE FOR YOUR HIPAA RISK ANALYSIS AND MANAGEMENT PLAN 2015 SecurityMetrics YOUR HIPAA RISK ANALYSIS IN FIVE STEPS 1 YOUR HIPAA RISK ANALYSIS IN FIVE

More information

REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS

REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS Issued: TABLE OF CONTENTS 1. Introduction...3 1.1 Purpose...3 1.2 Background...3 1.3 Scope of Work...3 1.4 Current Infrastructure...3

More information

REQUEST FOR PROPOSAL

REQUEST FOR PROPOSAL CITY OF MUKILTEO 11930 Cyrus Way Mukilteo, Washington 98275 425-263-8030 www.ci.mukilteo.wa.us REQUEST FOR PROPOSAL IT SERVICES ACQUISTION SCHEDULE The Acquisition Schedule is as follows, with all times

More information

Business Associate Agreement

Business Associate Agreement Business Associate Agreement This Business Associate Agreement (this Agreement ) is entered into as of _September 23_, 2013, (the Effective Date ) by and between Denise T. Nguyen, DDS, PC ( Dental Practice

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE

More information

Request for Proposal Environmental Management Software

Request for Proposal Environmental Management Software Request for Proposal Date Issued: November 4, 2010 Due Date: December 1, 2010 @ 2:00:00 p.m. (local time), Contact Information: Jeff Yanew Planning & Engineering Telephone: (780) 418-6615 Fax: (780) 458-1974

More information

PARTICIPATION AGREEMENT For ELECTRONIC HEALTH RECORD TECHNICAL ASSISTANCE

PARTICIPATION AGREEMENT For ELECTRONIC HEALTH RECORD TECHNICAL ASSISTANCE PARTICIPATION AGREEMENT For ELECTRONIC HEALTH RECORD TECHNICAL ASSISTANCE THIS AGREEMENT, effective, 2011, is between ( Provider Organization ), on behalf of itself and its participating providers ( Providers

More information

Network Security Assessment

Network Security Assessment CITY AUDITOR'S OFFICE Network Security Assessment June 12, 2015 AUDIT REPORT NO. 1504 CITY COUNCIL Mayor W.J. Jim Lane Suzanne Klapp Virginia Korte Kathy Littlefield Vice Mayor Linda Milhaven Guy Phillips

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security... WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014

Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014 QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

HIPAA Business Associate Agreement

HIPAA Business Associate Agreement HIPAA Business Associate Agreement If Customer is a Covered Entity or a Business Associate and includes Protected Health Information in Customer Data (as such terms are defined below), execution of a license

More information

This form may not be modified without prior approval from the Department of Justice.

This form may not be modified without prior approval from the Department of Justice. This form may not be modified without prior approval from the Department of Justice. Delete this header in execution (signature) version of agreement. HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate

More information

HITRUST CSF Assurance Program

HITRUST CSF Assurance Program HITRUST CSF Assurance Program Simplifying the Meaningful Use Privacy and Security Risk Assessment September 2010 Table of Contents Regulatory Background CSF Assurance Program Simplifying the Risk Assessment

More information

CITY OF CORONA RFP 15-005SB. ADDENDUM No. 2

CITY OF CORONA RFP 15-005SB. ADDENDUM No. 2 CITY OF CORONA ADDENDUM No. 2 Purchasing Division (951) 736-2272 400 S. Vicentia Ave., Ste. 320 [email protected] Corona, CA 92882 09/22/2014 Scott Briggs Addendum No. 2 for the Evaluation

More information

Dissecting New HIPAA Rules and What Compliance Means For You

Dissecting New HIPAA Rules and What Compliance Means For You Dissecting New HIPAA Rules and What Compliance Means For You A White Paper by Cindy Phillips of CMIT Solutions and Kelly McClendon of CompliancePro Solutions TABLE OF CONTENTS Introduction 3 What Are the

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology

More information

ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT

ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT ACCESS TO ELECTRONIC HEALTH RECORDS AGREEMENT THIS AGREEMENT ( Agreement ) is made and entered into this day of, 20, by and between Franciscan Health System ( Hospital ), and ( Community Partner ). RECITALS

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate?

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate? HIPAA Information Who does HIPAA apply to? HIPAA applies to all Covered Entities (entities that collect, access, use and/or disclose Protected Health Data (PHI) and are subject to HIPAA regulations). What

More information

PII Compliance Guidelines

PII Compliance Guidelines Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last

More information

Model Business Associate Agreement

Model Business Associate Agreement Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model

More information

HIPAA in an Omnibus World. Presented by

HIPAA in an Omnibus World. Presented by HIPAA in an Omnibus World Presented by HITECH COMPLIANCE ASSOCIATES IS NOT A LAW FIRM The information given is not intended to be a substitute for legal advice or consultation. As always in legal matters

More information

HIPAA and Mental Health Privacy:

HIPAA and Mental Health Privacy: HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association

More information

SAMPLE BUSINESS ASSOCIATE AGREEMENT

SAMPLE BUSINESS ASSOCIATE AGREEMENT SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT

More information

Request for Proposal Managed IT Services 7 December 2009

Request for Proposal Managed IT Services 7 December 2009 Request for Proposal Managed IT Services 7 December 2009 BuzzBack, LLC 25 West 45 th Street Suite 202 New York, NY 10036 Table of Contents 1 Summary... 1 2 Proposal Guidelines and Requirements... 1 2.1

More information

The HIPAA Audit Program

The HIPAA Audit Program The HIPAA Audit Program Anna C. Watterson Davis Wright Tremaine LLP The U.S. Department of Health and Human Services (HHS) was given authority, and a mandate, to conduct periodic audits of HIPAA 1 compliance

More information

IOWA LOTTERY AUTHORITY BID 16-03 Security Assessment Services

IOWA LOTTERY AUTHORITY BID 16-03 Security Assessment Services IOWA LOTTERY AUTHORITY BID 16-03 Security Assessment Services SECTION 1. OVERVIEW AND BID PROCEDURES. 1.0 Introduction and Background. The purpose of this Request for Bid is to solicit proposals from qualified

More information

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, 2014 2:15pm 3:30pm Electronic Health Records: Data Security and Integrity of e-phi Worcester, MA Wednesday, 2:15pm 3:30pm Agenda Introduction Learning Objectives Overview of HIPAA HIPAA: Privacy and Security HIPAA: The Security

More information