Personal Data Security Breach Management Policy

Size: px
Start display at page:

Download "Personal Data Security Breach Management Policy"

Transcription

1 Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner that respects the rights f data subjects (Service Users, families and emplyees) t have their data prcessed fairly. Infrmatin /data is ne f ur mst imprtant assets and each ne f us has a respnsibility t ensure the security f this infrmatin. Accurate, timely, relevant and prperly prtected recrds are essential. Smetimes a breach f infrmatin/data security may ccur because this infrmatin/ data is accidentally disclsed t unauthrized persns r, lst due t a fire r fld r, stlen as result f a targeted attack r the theft f a mbile cmputer device. The purpse f this plicy is t ensure that a natinal standardised management apprach is implemented thrughut the rganisatin in the event f an infrmatin/data breach. This plicy is mandatry and by accessing any f Western Care Assciatin Infrmatin/data, users are agreeing t abide by the terms f this plicy. 2.0 Scpe This plicy applies t all emplyees, service prviders and third parties that access, use, stre r prcess infrmatin n behalf f Western Care Assciatin. This plicy is authrised by the Executive Directr in Western Care Assciatin. 3.0 Legislatin Western Care Assciatin has an bligatin t abide by all relevant Irish legislatin and Eurpean legislatin. The relevant acts, which apply in Irish law t Infrmatin Systems, include but are nt limited t: 4.0 Plicy The Data Prtectin Act (1988/2003) Eurpean Cmmunities Data Prtectin Regulatins, (2001) Eurpean Cmmunities (Data Prtectin and Privacy in Telecmmunicatins) Data Prtectin EU Directive 95/46/EC Criminal Damages Act (1991) It is the plicy f Western Care Assciatin that in the event that an infrmatin/data breach happens, the fllwing breach management plan is strictly adhered t.

2 It is imprtant that each manager puts int place their wn lcal prcedures t enable them t implement the breach management plan shuld such a data breach ccur. There are five elements t any breach management plan: Identificatin and Classificatin Cntainment and Recvery Risk Assessment Ntificatin f Breach Evaluatin and Respnse 5.0 Breach Management Plan 5.1 Identificatin and Classificatin Senir Management must put in place prcedures that will allw any staff member t reprt any infrmatin/data security breach. It is imprtant that all staff are aware t whm they shuld reprt such a breach. Yu must reprt any breach f infrmatin /data t yur manager as sn as yu detect it. Having such a prcedure in place will allw fr early recgnitin f the breach s that it can be dealt with in the mst apprpriate manner. Details f the breach shuld be recrded accurately by the persn wh detected the breach r their manager. Yu must include the date and time the breach ccurred, the date and time it was detected, wh reprted the breach, descriptin f the breach, details f any cmputer systems invlved and frwarded t the apprpriate Manager. (See Frm attached). In this respect, staff need t be made fully aware as t what cnstitutes a breach. In respect f this plicy a breach maybe defined as the unintentinal release f cnfidential r persnal infrmatin/data t unauthrised persns, either thrugh the accidental disclsure, lss r theft f the infrmatin/data. 5.2 Cntainment and Recvery Cntainment invlves limiting the scpe and impact f the breach f data/infrmatin. If a breach ccurs, management shuld: Decide n wh wuld take the lead in investigating the breach and ensure that the apprpriate resurces are made available fr the investigatin. Establish wh in the rganisatin needs t be made aware f the breach and infrm them f what they are expected t d t assist in the cntainment exercise. Fr example, finding a lst file.

3 Establish whether there is anything that can be dne t recver lsses and limit the damage the breach can cause. 5.3 Risk Assessment In assessing the risk arising frm the security breach, managers shuld cnsider what wuld be the ptential adverse cnsequences fr individuals, i.e. hw likely it is that adverse cnsequences will materialise and, in the event f materialising, hw serius r substantial are they likely t be. In assessing the risk, managers shuld cnsider the fllwing pints: What type f Infrmatin/data is invlved? Hw sensitive is the infrmatin/data? Are there any security mechanism s in place (e.g. passwrd, prtected, encryptin)? What culd the infrmatin/data tell a third party abut the individual? Hw many individuals are affected by the breach? 5.4 Ntificatin f Breaches If the data cncerned is prtected by technlgical measures such as t make it unintelligible t any persn wh is nt authrised t access it, the data cntrller may cnclude that there is n risk t the data and therefre n need t infrm data subjects. Such a cnclusin wuld nly be justified where the technlgical measures (such as encryptin) were f a high standard. All incidents f lss f persnal data in manual r electrnic frm by a data prcessr must be reprted t their manager /relevant data cntrller as sn as the data prcessr becmes aware f the incident. All incidents in which persnal data has been put at risk shuld be reprted t the Office f the Data Prtectin Cmmissiner as sn as the data cntrller becmes aware f the incident, except when the full extent and cnsequences f the incident has been reprted withut delay directly t the affected data subject(s) and it affects n mre than 100 data subjects and it des nt include sensitive persnal data r persnal data f a financial nature. Data cntrllers reprting t the Office f the Data Prtectin Cmmissiner in accrdance with this plicy shuld make initial cntact with the Office within tw wrking days f becming aware f the incident, utlining the circumstances surrunding the incident. This initial cntact may be by (preferably), telephne r fax and must nt invlve the cmmunicatin f persnal data. The Office f the Data Prtectin Cmmissiner will make a determinatin regarding the need fr a detailed reprt and/r subsequent investigatin based n the nature f

4 the incident and the presence r therwise f apprpriate physical r technlgical security measures t prtect the data. Shuld the Office f the Data Prtectin Cmmissiner request a data cntrller t prvide a detailed written reprt f the incident, the Office will specify a timeframe fr the delivery f the reprt based n the nature f the incident and the infrmatin required. Such a reprt shuld reflect careful cnsideratin f the fllwing elements: the amunt and nature f the persnal data that has been cmprmised the actin being taken t secure and / r recver the persnal data that has been cmprmised; the actin being taken t infrm thse affected by the incident r reasns fr the decisin nt t d s; the actin being taken t limit damage r distress t thse affected by the incident; a chrnlgy f the events leading up t the lss f cntrl f the persnal data; and the measures being taken t prevent repetitin f the incident. Depending n the nature f the incident, the Office f the Data Prtectin Cmmissiner may investigate the circumstances surrunding the persnal data security breach. Investigatins may include n-site examinatin f systems and prcedures and culd lead t a recmmendatin t infrm data subjects abut a security breach incident where a data cntrller has nt already dne s. If necessary, the Cmmissiner may use his enfrcement pwers t cmpel apprpriate actin t prtect the interests f data subjects. Even where there is n ntificatin t the Office f the Data Prtectin Cmmissiner, the data cntrller shuld keep a summary recrd f each incident which has given rise t a risk f unauthrised disclsure, lss, destructin r alteratin f persnal data. The recrd shuld include a brief descriptin f the nature f the incident and an explanatin f why the data cntrller did nt cnsider it necessary t infrm the Office f the Data Prtectin Cmmissiner. Such recrds shuld be prvided t the Office f the Data Prtectin Cmmissiner upn request. 5.5 Evaluatin and Respnse Subsequent t any infrmatin/data security breach a thrugh review f the incident shuld ccur. The purpse f this review is t ensure that the steps taken during the incident were apprpriate and t identify areas that may need t be imprved.

5 Any recmmended changes t plicies and/r prcedures shuld be dcumented and implemented as sn as pssible thereafter. Senir Management shuld identify a grup f peple within the rganisatin wh will be respnsible fr reacting t reprted breaches f security. 6.0 Rles and Respnsibilities 6.1 Line Managers Managers are respnsible fr: 6.2 Users The implementatin f this plicy. Ensuring that all emplyees wh reprt t them are made aware f and are instructed t cmply with this plicy and all ther related plicies. Agreeing the apprpriate prcedures t fllw when a breach f this plicy has ccurred. Each user is respnsible fr: Cmplying with the terms f this plicy and all ther relevant Western Care plicies, prcedures, regulatins and applicable legislatin; Respecting and prtecting the privacy and cnfidentiality f the infrmatin they prcess at all times; Reprting all misuse and breaches f this plicy t their manager. 7.0 Enfrcement Western Care Assciatin reserves the right t take such actin as it deems apprpriate against users wh breach the cnditins f this plicy. Western Care Assciatin emplyees wh breach this plicy may be denied access t the rganisatins infrmatin technlgy resurces, and maybe subject t disciplinary actin. 8.0 Review & Update This plicy will be reviewed and updated annually r mre frequently if necessary, t ensure that any changes are prperly reflected in the plicy.

6 Details f Data Security Breaches DATE & TIME BREACH OCCURED DATE & TIME BREACH DETECTED WHO REPORTED THE BREACH DESCRIPTION OF THE BREACH DETAILS OF ANY COMPUTER SYSTEMS INVOLVED Signed: Date: Name & Tile f Persn Cmpleting Frm Once cmpleted please frward t yur Manager.

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

Process for Responding to Privacy Breaches

Process for Responding to Privacy Breaches Prcess fr Respnding t Privacy Breaches 1. Purpse 1.1 This dcument sets ut the steps that ministries must fllw when respnding t a privacy breach. It must be read in cnjunctin with the Infrmatin Incident

More information

Privacy and Security Training Policy (PS.Pol.051)

Privacy and Security Training Policy (PS.Pol.051) Privacy and Security Training Plicy (PS.Pl.051) Purpse T define the plicies and prcedures fr prviding privacy and security training in respect f the CnnectingGTA Slutin. Definitins Electrnic Service Prvider

More information

DisplayNote Technologies Limited Data Protection Policy July 2014

DisplayNote Technologies Limited Data Protection Policy July 2014 DisplayNte Technlgies Limited Data Prtectin Plicy July 2014 1. Intrductin This dcument sets ut the bligatins f DisplayNte Technlgies Limited ( the Cmpany ) with regard t data prtectin and the rights f

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy TR340 Malpractice and Maladministratin Plicy This plicy aims t: Define malpractice and maladministratin in the cntext f CIM/CAM studying members, Accredited study centres (ASCs), examinatin centres, invigilatrs

More information

How To Deal With A Data Breach In The European Law

How To Deal With A Data Breach In The European Law Data Prtectin: Regulating Cyber Security Jnathan Bamfrd Head f Strategic Liaisn Hw des DP regulatin affect cyber security? Data Prtectin Act 1998: apprpriate security Privacy and Electrnic Cmmunicatin

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

Employees - recruitment, records and monitoring

Employees - recruitment, records and monitoring Emplyees - recruitment, recrds and mnitring This guidance has been prduced t help rganisatins cmply with the Data Prtectin Act (DPA) when recruiting and emplying wrkers. It is relevant t public sectr emplyers,

More information

nbn is committed to identifying hazards, preventing workplace accidents and minimising dangerous health safety and environment incidents.

nbn is committed to identifying hazards, preventing workplace accidents and minimising dangerous health safety and environment incidents. Incident & Hazard Reprting Overview At nbn we are safe, disciplined and reliable. nbn is cmmitted t preventing injury, illness and envirnmental harm by prviding a safe and healthy wrking envirnment fr

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

Remote Working (Policy & Procedure)

Remote Working (Policy & Procedure) Remte Wrking (Plicy & Prcedure) Publicatin Scheme Y/N Department f Origin Plicy Hlder Authrs Can be published n Frce Website Prfessinal Standards Department (PSD) Ch Supt Head f PSD IT Security Officer

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

How To Ensure Your Health Care Is Safe

How To Ensure Your Health Care Is Safe Guidelines fr Custdians t assess cmpliance with the Persnal Health Infrmatin Privacy and Access Act (PHIPAA) This dcument is designed t help custdians evaluate readiness fr cmpliance with PHIPAA and t

More information

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy WHAT YOU NEED TO KNOW ABOUT Prtecting yur Privacy YOUR PRIVACY IS OUR PRIORITY Credit unins have a histry f respecting the privacy f ur members and custmers. Yur Bard f Directrs has adpted the Credit Unin

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Briefing 4 Inquests and the disclosure of information to the coroner

Briefing 4 Inquests and the disclosure of information to the coroner briefing February 2013 The Francis Reprt Briefing 4 Inquests and the disclsure f infrmatin t the crner Key chapters Key recmmendatins 2, 11, 14, 22 274, 45, 273, 282, 283, 17 There is a requirement nt

More information

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments

University of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department

More information

Internet and E-Mail Policy User s Guide

Internet and E-Mail Policy User s Guide Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

CROPREDY SURGERY Dr J Wright & Dr B Tucker

CROPREDY SURGERY Dr J Wright & Dr B Tucker CROPREDY SURGERY Dr J Wright & Dr B Tucker POLICY - COMPLAINTS Intrductin The bjectives f the cmplaints plicy are as fllws. Any cmplaint is dealt with in an effective and timely manner The cmplainant is

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Serius Infrmatin Gvernance Incidents - OverVIEW

Serius Infrmatin Gvernance Incidents - OverVIEW Serius Infrmatin Gvernance Incident Plicy UNIQUE REF NUMBER: AC/IG/019/V1.2 DOCUMENT STATUS: Apprved by Audit Cmmittee 19 June 2013 DATE ISSUED: June 2013 DATE TO BE REVIEWED: June 2014 1 P age AMENDMENT

More information

Key Steps to Responding to Privacy Breaches. Nova Scotia Freedom of Information and Protection of Privacy Review Office

Key Steps to Responding to Privacy Breaches. Nova Scotia Freedom of Information and Protection of Privacy Review Office Key Steps t Respnding t Privacy Breaches Nva Sctia Freedm f Infrmatin and Prtectin f Privacy Review Office ~ 1 ~ ~ 1 ~ 1 ~ Key Steps t Respnding t Privacy Breaches 1 Key Key Steps Steps t t Respnding

More information

Privacy Breach and Complaint Protocol

Privacy Breach and Complaint Protocol Privacy Breach and Cmplaint Prtcl Effective: December 31, 2012 Apprved by: Le McKenna, CFO 1.0 General Privacy breaches and privacy cmplaints will be handled in accrdance with this prtcl. This prtcl is

More information

First Global Data Corp.

First Global Data Corp. First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First

More information

ensure that all users understand how mobile phones supplied by the council should and should not be used.

ensure that all users understand how mobile phones supplied by the council should and should not be used. Mbile Phne Plicy & Guidance Intrductin This plicy is designed t safeguard bth the cuncil and users f mbile phnes supplied by Angus Cuncil. It aims t ensure that these are used effectively, fr their intended

More information

Internet Banking Agreement and Disclosure Statement

Internet Banking Agreement and Disclosure Statement Internet Banking Agreement and Disclsure Statement This agreement cntains the terms and cnditins that gvern accessing r using Internet Banking (NetTeller), Bill Payment Services, Mbile Banking and On Demand

More information

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company, 2014-2021 Multi-Year Accessibility Plicy and Plan fr NSF Canada and NSF Internatinal Strategic Registratins Canada Cmpany, 2014-2021 This 2014-21 accessibility plan utlines the plicies and actins that NSF Canada

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Letter of Engagement. as instructed from time to time in respect of your/the company/trusts affairs

Letter of Engagement. as instructed from time to time in respect of your/the company/trusts affairs We enclse material which sets ut: Letter f Engagement Infrmatin fr clients which lawyers are required by the New Zealand Law Sciety t prvide; and Our standard terms f engagement. Services t be prvided

More information

National Australia Bank Limited Group Disclosure & External Communications Policy

National Australia Bank Limited Group Disclosure & External Communications Policy Natinal Australia Bank Limited Grup Disclsure & External Cmmunicatins Plicy Grup Disclsure & External Cmmunicatins Plicy Page 2 f 7 Grup Disclsure & External Cmmunicatins Plicy ( the Plicy ) 1. Overview

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE

Columbine Federal Credit Union ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE Clumbine Federal Credit Unin ONLINE BANKING/ BILL PAYMENT AGREEMENT & DISCLOSURES AND PRIV ACY DISCLOSURE 1. Online Banking/Bill Payment 2. Online Banking/ Bill Payment Limitatins 3. Online Bill Payment

More information

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT

FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT FAFSA / DREAM ACT COMPLETION PROGRAM AGREEMENT If using US Pstal Service, please return t: Califrnia Student Aid Cmmissin Prgram Administratin & Services Divisin ATTN: Institutinal Supprt P.O. Bx 419028

More information

CHANGE MANAGEMENT STANDARD

CHANGE MANAGEMENT STANDARD The electrnic versin is current, r when printed and stamped with the green cntrlled dcument stamp. All ther cpies are uncntrlled. DOCUMENT INFORMATION Descriptin Dcument Owner This standard utlines the

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Infrmatin Security Incident Respnse Plan Agency: Date: Cntact: 1 TABLE OF CONTENTS Intrductin... 3 Authrity... 4 Terms and Definitins... 4 Rles and Respnsibilities... 5 Prgram... 6 Educatin and Awareness...

More information

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Department f Health and Human Services OFFICE OF INSPECTOR GENERAL PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK Inquiries abut this reprt may be addressed t the Office f Public Affairs

More information

Accessible Service Policy

Accessible Service Policy Accessible Service Plicy Date Created Revisin Oct. 16, 2012 1 Gal This plicy is intended t meet the requirements f the Accessibility Standards fr Custmer Service, Ontari Regulatin 429/07 under the Accessibility

More information

How To Ensure That The Internet Is Safe For A Health Care Worker

How To Ensure That The Internet Is Safe For A Health Care Worker POLICY Dc. Cde: IS I5 INTERNET - ACCEPTABLE USE Applicable t: MidCentral DHB Including MidCentral Health & Enable NZ Issued by: Infrmatin Systems Cntact: Manager Service Delivery 1. PURPOSE This plicy

More information

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES

Project Open Hand Atlanta. Health Insurance Portability and Accountability Act (HIPAA) NOTICE OF PRIVACY PRACTICES Prject Open Hand Atlanta Effective Date: April 14, 2003 Health Insurance Prtability and Accuntability Act (HIPAA) The Health Insurance Prtability and Accuntability Act f 1996 (HIPAA) directs health care

More information

Draft for consultation

Draft for consultation Draft fr cnsultatin Draft Cde f Practice n discipline and grievance May 2008 Further infrmatin is available frm www.acas.rg.uk CONSULTATION ON REVISED ACAS CODE OF PRACTICE ON DISCIPLINE AND GRIEVANCE

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

Handling professional conduct complaints against doctors

Handling professional conduct complaints against doctors Handling prfessinal cnduct cmplaints against dctrs Handling prfessinal cnduct cmplaints against dctrs Handling prfessinal cnduct cmplaints against dctrs Avant supprts: à a natinally cnsistent apprach t

More information

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM 1. Prgram Adptin The City University f New Yrk (the "University") develped this Identity Theft Preventin Prgram (the "Prgram") pursuant

More information

OUR DISCIPLINARY POLICY

OUR DISCIPLINARY POLICY OUR DISCIPLINARY POLICY WHO is this plicy fr? Channel 4 emplyees wh ve passed their prbatinary perid Channel 4 managers This plicy des nt frm part f any emplyee s cntract f emplyment and we may amend it

More information

Heythrop College Disciplinary Procedure for Support Staff

Heythrop College Disciplinary Procedure for Support Staff Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and

More information

IMPORTANT INFORMATION ABOUT MEDICAL CARE FOR YOUR WORK-RELATED INJURY OR ILLNESS

IMPORTANT INFORMATION ABOUT MEDICAL CARE FOR YOUR WORK-RELATED INJURY OR ILLNESS IMPORTANT INFORMATION ABOUT MEDICAL CARE FOR YOUR WORK-RELATED INJURY OR ILLNESS MEDICAL PROVIDER NETWORK (MPN) NOTIFICATION If yu are injured at wrk, Califrnia Law requires yur emplyer t prvide and pay

More information

Sources of Federal Government and Employee Information

Sources of Federal Government and Employee Information Inf Surce Surces f Federal Gvernment and Emplyee Infrmatin Ridley Terminals Inc. TABLE OF CONTENTS General Infrmatin Intrductin t Inf Surce Backgrund Respnsibilities Institutinal Functins, Prgram and Activities

More information

Public consultation paper

Public consultation paper Public cnsultatin paper Nvember 2012 Public cnsultatin n guidelines fr prfessinal indemnity insurance arrangements fr nurses and nurse practitiners. Please prvide feedback by email t: nmbafeedback@ahpra.gv.au

More information

How To Get A Credit By Examination

How To Get A Credit By Examination LAW ENFORCEMENT TECHNOLOGY CREDIT BY EXAMINATION FACT SHEET Texas Ri Salad Cllege, a Maricpa Cunty Cmmunity Cllege in Tempe, Arizna, is prud t annunce its Credit by Examinatin prgram in Law Enfrcement

More information

CSUSB Containment Guidelines CSUSB, Information Security Office

CSUSB Containment Guidelines CSUSB, Information Security Office CSUSB, Infrmatin Security Office Last Revised: 01/30/2013 Final REVISION CONTROL Dcument Title: Authr: File Reference: CSUSB Cntainment Guidelines Javier Trner Date By Actin Pages 03/30/05 J Trner Created

More information

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013

Cloud-based File Sharing: Privacy and Security Tutorial Institutional Compliance Office July 2013 Clud-based File Sharing: Privacy and Security Tutrial Institutinal Cmpliance Office July 2013 Patient Data in the Clud Prtecting patient privacy is ne f MD Andersn s greatest respnsibilities Technlgies

More information

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre

More information

DATA REQUEST GUIDELINES

DATA REQUEST GUIDELINES DATA REQUEST GUIDELINES This dcument describes prcedures law enfrcement authrities and individuals invlved in civil litigatin shuld fllw t request data frm LinkedIn and its affiliated service prviders.

More information

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer

RUTGERS POLICY. Responsible Executive: Vice President for Information Technology and Chief Information Officer RUTGERS POLICY Sectin: 70.1.1 Sectin Title: Infrmatin Technlgy Plicy Name: Acceptable Use Plicy fr Infrmatin Technlgy Resurces Frmerly Bk: N/A Apprval Authrity: Senir Vice President fr Administratin Respnsible

More information

DRUG, ALCOHOL AND SUBSTANCE MISUSE POLICY FOR THE WORKPLACE

DRUG, ALCOHOL AND SUBSTANCE MISUSE POLICY FOR THE WORKPLACE DRUG, ALCOHOL AND SUBSTANCE MISUSE POLICY FOR THE WORKPLACE Intrductin Write yur business name here recgnises that drug, alchl and substance misuse are grwing scial and medical prblems, which can lead

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Online Banking Agreement

Online Banking Agreement Online Banking Agreement 1. General This Online Banking Agreement, which may be amended frm time t time by us (this "Agreement"), fr accessing yur Clrad Federal Savings Bank accunt(s) via the Internet

More information

Texas Woman's University University Policy Manual

Texas Woman's University University Policy Manual Texas Wman's University University Plicy Manual Plicy Name: Plicy Number: 6.06 Date Passed: July 2004 Health Insurance Prtability& Accuntability Act (HIPAA) Date Reviewed: September 2008 Next Review: September

More information

BUPA DENTAL PLAN A P P L I C AT I O N F O R M

BUPA DENTAL PLAN A P P L I C AT I O N F O R M BUPA DENTAL PLAN A P P L I C AT I O N F O R M Please cmplete all relevant sectins f the frm in BLOCK CAPITALS and BLACK INK and return it t: Cnsumer Partnerships, FPS Dental, Bupa, Willw Huse, Chertsey

More information

Customer Care Policy

Customer Care Policy Custmer Care Plicy Page 1 f 12 CUSTOMER CARE POLICY Keighley & District Vlunteer Centre and Bradfrd Vlunteer Centre are independent charities that wrk in partnership t prmte vlunteering and t supprt lcal

More information

Self- certification Criteria for companies participating in the European Self- Regulatory Programme on OBA. Document version: 1.1

Self- certification Criteria for companies participating in the European Self- Regulatory Programme on OBA. Document version: 1.1 Self- certificatin Criteria fr cmpanies participating in the Eurpean Self- Regulatry Prgramme n OBA Dcument versin: 1.1 Date: 16 Nvember 2012 Table f cntents 1. Intrductin 3 2. Criteria fr self- certificatin

More information

Creating an Ethical Culture and Protecting Your Bottom Line:

Creating an Ethical Culture and Protecting Your Bottom Line: Creating an Ethical Culture and Prtecting Yur Bttm Line: Best Practices fr Crprate Cdes f Cnduct Nte: The infrmatin belw and all infrmatin n this website is nt meant t be taken as legal advice. Please

More information

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service.

FINANCIAL OPTIONS. 2. For non-insured patients, payment is due on the day of service. FINANCIAL OPTIONS 1. Fr thse patients wh carry dental insurance, all c-payments are due n date f service. We will file yur claim as a service t yu, and will d ur very best t maximize yur benefits. We accept

More information

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles

More information

LINCOLNSHIRE POLICE Policy Document

LINCOLNSHIRE POLICE Policy Document LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area

More information

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions

Maryland General Service (MGS) Area 29 Treatment Facilities Committee (TFC) TFC Instructions Maryland General Service (MGS) Area 29 Treatment Facilities Cmmittee (TFC) TFC Instructins Lve And Service Facility Presentatin t Patients We are frm Alchlics Annymus (AA), fr AA, and ur service is fr

More information

67.50. Your child s health is our priority. Bupa schools scheme. bupa.co.uk ONLY PER TERM PER CHILD. Provided by

67.50. Your child s health is our priority. Bupa schools scheme. bupa.co.uk ONLY PER TERM PER CHILD. Provided by Prvided by Bupa schls scheme Yur child s health is ur pririty 67.50 PER TERM PER CHILD * ONLY bupa.c.uk *Thesubscriptinrateappliesfrmembershipyear1September2013 t31august2014.thissubscriptinrateincludesinsurancepremium

More information

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc.

HIPAA Notice of Privacy Practices. Central Ohio Surgical Associates, Inc. HIPAA Ntice f Privacy Practices Central Ohi Surgical Assciates, Inc. THIS NOTICE OF PRIVACY PRACTICES (THE NOTICE ) DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN

More information

Environment Protection Authority

Environment Protection Authority Envirnment Prtectin Authrity EPA Cmplaints Management Plicy Intrductin This plicy sets ut the purpse, principles and prcess fr hw custmer feedback, including cmplaints, will be managed in the EPA t imprve

More information

Accident Investigation

Accident Investigation Accident Investigatin APPLICABLE STANDARD: 1960.29 EMPLOYEES AFFECTED: All emplyees WHAT IS IT? Accident investigatin is the prcess f determining the rt causes f accidents, n-the-jb injuries, prperty damage,

More information

IN-HOUSE OR OUTSOURCED BILLING

IN-HOUSE OR OUTSOURCED BILLING IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability

More information

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative

More information

FAYETTEVILLE STATE UNIVERSITY

FAYETTEVILLE STATE UNIVERSITY FAYETTEVILLE STATE UNIVERSITY IDENTITY THEFT PREVENTION (RED FLAGS RULE) Authrity: Categry: Issued by the Fayetteville State University Bard f Trustees. University-Wide Applies t: Administratrs Faculty

More information

To clarify terms used within these policies, the following definitions are provided:

To clarify terms used within these policies, the following definitions are provided: Baker University Email Plicy E-mail services are prvided t the Baker cmmunity in supprt f the educatinal missin f the University and the administrative functins t carry ut that missin. Users f Baker e-mail

More information

FREQUENTLY ASKED QUESTIONS ON THE EUCOMED ETHICAL BUSINESS LOGO

FREQUENTLY ASKED QUESTIONS ON THE EUCOMED ETHICAL BUSINESS LOGO Rue Jseph II, 40 www.eucmed.rg FREQUENTLY ASKED QUESTIONS ON THE EUCOMED ETHICAL BUSINESS LOGO Q1: What is the Eucmed Ethical Business Lg? A1: The Ethical Business Lg is a Lg licensed by Eucmed, the Eurpean

More information

Finance, Performance and Risk Committee 2014/2015

Finance, Performance and Risk Committee 2014/2015 Finance, Perfrmance and Risk Cmmittee 2014/2015 Date f Meeting: 17 December 2014 Agenda Item: Click here t enter text. Subject: Infrmatin Gvernance Plicy Reprting Officer: Paul Byrne Lead IG Manager Aim

More information

COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS

COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS for STUDY ABROAD PROGRAMS COMPREHENSIVE SAFETY ASSESSMENT INSTRUCTIONS fr STUDY ABROAD PROGRAMS Belw is a list f items t address and questins that need t be addressed in the cmprehensive safety assessment. In additin t the safety

More information

Legal Issues Bulletin

Legal Issues Bulletin Legal Issues Bulletin N. 8 reviewed May 2015 Claims fr lss f r damage t persnal prperty and use f private mtr vehicles by staff, parents and students Legal Issues Bulletin 39 - Preparatin and use f accident

More information

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16

Norwood Public Schools Internet & Cell Phone Use Agreement School Year 2015-16 Yu must read and agree t fllw the netwrk rules belw t use yur netwrk accunt r access the internet. Nrwd Public Schls makes available t students access t cmputers and the Internet. Students are expected

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network

Hillsborough Board of Education Acceptable Use Policy for Using the Hillsborough Township Public Schools Network 2361/Page 1 f 6 Hillsbrugh Bard f Educatin Acceptable Use Plicy fr Using the Hillsbrugh Twnship Public Schls Netwrk It is the gal f the HTPS (Hillsbrugh Twnship Public Schls) Netwrk t prmte educatinal

More information

PADUA COLLEGE LIMITED ACN 072 693 700 ABN 20 072 693 700

PADUA COLLEGE LIMITED ACN 072 693 700 ABN 20 072 693 700 PADUA COLLEGE LIMITED ACN 072 693 700 ABN 20 072 693 700 Plicy Title Versin Number Date Issued Critical Incident Management Plicy 2.0 Nvember 2007 Reviewed April 2010 June 2015 Definitin Critical incidents

More information

UNIVERSITY INCIDENT PLANNING COMMITTEE TERMS OF REFERENCE

UNIVERSITY INCIDENT PLANNING COMMITTEE TERMS OF REFERENCE 1. TITLE OF COMMITTEE UNIVERSITY INCIDENT PLANNING COMMITTEE University Incident Planning Cmmittee (IPC) 2. ESTABLISHMENT TERMS OF REFERENCE The University Incident Planning Cmmittee is established in

More information

New York Institute of Technology Faculty and Staff Email Retention Policy

New York Institute of Technology Faculty and Staff Email Retention Policy New Yrk Institute f Technlgy Faculty and Staff Email Retentin Plicy Nvember 2013 I. PURPOSE As electrnic mail (email) has becme the primary frm f cmmunicatin at NYIT and thrughut the wrld, the vlume f

More information

Purpose Statement. Objectives

Purpose Statement. Objectives Apprved by Academic Affairs Cuncil, June 24, 2014 Faculty Handbk Part VI: Other Plicies and Prcedures Sectin R. Intellectual Prperty Classified Emplyee Handbk Part VI: Other Plicies and Prcedures Sectin

More information

Harborstone Credit Union June 2015 Online Banking and Bill Pay Services Terms and Conditions

Harborstone Credit Union June 2015 Online Banking and Bill Pay Services Terms and Conditions Intrductin This agreement is the cntract that cvers yur and Harbrstne Credit Unin s rights and respnsibilities cncerning Online Banking, Online Bill Pay ( Bill Pay ), and Electrnic Statement ( estatement

More information

POLICIES AND PROCEDURES

POLICIES AND PROCEDURES POLICIES AND PROCEDURES Department: Campus Safety and Security and Welcme Center/Infrmatin Subject: Rental Vehicle Insurance Date Issued: December 16, 2005 Date Revised: March 23, 2009; Octber 1, 2011

More information

Bl$wing the Whistle $n the New Whistlebl$wer Pr$tecti$ns Created by the D$dd-Frank Act. By: Michael James L$mbardin$

Bl$wing the Whistle $n the New Whistlebl$wer Pr$tecti$ns Created by the D$dd-Frank Act. By: Michael James L$mbardin$ Oct$ber 22, 2010 Bl$wing the Whistle $n the New Whistlebl$wer Pr$tecti$ns Created by the D$dd-Frank Act By: Michael James L$mbardin$ The "D&dd-Frank Wall Street Ref&rm and C&nsumer Pr&tecti&n Act" (D&dd-Frank)

More information

0820.02 Workers Disability Compensation Claims Procedures Issued: January 1, 1994 Revised: March 29, 2012

0820.02 Workers Disability Compensation Claims Procedures Issued: January 1, 1994 Revised: March 29, 2012 State f Michigan Administrative Guide t State Gvernment 0820.02 Wrkers Disability Cmpensatin Claims Prcedures Issued: January 1, 1994 Revised: March 29, 2012 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY:

More information

Calling 9-1-1 from a Cell Phone

Calling 9-1-1 from a Cell Phone Calling 9-1-1 frm a Cell Phne When calling 9-1-1 frm a cell phne, yur lcatin may nt autmatically display t the 9-1-1 center as it des when calling frm mst hmes r businesses. Be Prepared t tell the 9-1-1

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

BridgeValley Community and Technical College Financial Aid Office 2015-2016 Maximum Hour Financial Aid Suspension Appeal Process

BridgeValley Community and Technical College Financial Aid Office 2015-2016 Maximum Hour Financial Aid Suspension Appeal Process BridgeValley Cmmunity and Technical Cllege Financial Aid Office 2015-2016 Maximum Hur Financial Aid Suspensin Appeal Prcess T receive financial aid administered by BridgeValley Cmmunity and Technical Cllege,

More information

Professional indemnity insurance arrangements for enrolled nurses, registered nurses and nurse practitioners

Professional indemnity insurance arrangements for enrolled nurses, registered nurses and nurse practitioners Guideline August 2013 Prfessinal indemnity insurance arrangements fr enrlled nurses, registered nurses and nurse practitiners Intrductin This guideline has been develped by the Nursing and Midwifery Bard

More information

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT

FERRIS STATE UNIVERSITY SCHOOL of NURSING CODE of CONDUCT 1 FERRIS STATE UNIVERSITY SCHOOL f NURSING CODE f CONDUCT The Schl f Nursing (SON) at Ferris State University uphlds the University Cde f Student Cnduct and the American Nurses Assciatin Cde f Ethics.

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information