CONTROL PROCEDURES FOR UNCLASSIFIED TECHNICAL DATA DISCLOSING MILITARILY CRITICAL TECHNOLOGY
|
|
|
- Luke Lamb
- 10 years ago
- Views:
Transcription
1 (Example) CONTROL PROCEDURES FOR UNCLASSIFIED TECHNICAL DATA DISCLOSING MILITARILY CRITICAL TECHNOLOGY
2 TITLE: Unclassified Technical Data Control Procedures PROC. NUMBER: ISSUE NUMBER: ISSUE DATE: PURPOSE To define the responsibility for requesting and administering company certifications, data requests and data handling for Unclassified Technical Data (UTD) disclosing Military Critical Technology (MCT), obtained as a result of Certification under the U.S.-Canada Joint Certification Program. GENERAL In 1985, the United States and Canada signed a Memorandum of Understanding (MOU) that established the U.S.-Canada Joint Certification Program. As stated in the MOU s Joint Terms of Reference for the Joint Certification Program, the program was established to certify contractors of each country for access, on an equally favourable basis, to unclassified technical data disclosing critical technology. This information is controlled in the U.S. by DoD Directive and, in Canada, by the Technical Data Control Regulations (TDCR). Under each Nations laws, the U.S. Department of Defense and Canada s Department of National Defence may withhold such technical data from public disclosure. To meet the provisions of the U.S. Department of Defense Directive and the Canadian Department of National Defence Technical Data Control Regulations, so that (company name) may have access to certain sensitive information necessary for our business operations, the procedures outlined in this document must be followed. Use and disclosure of unclassified technical data obtained by (company name) under these procedures must be restricted to the purpose identified to the government agency when the data release was requested. If additional uses are identified after receipt of the data, prior approval must be obtained from the appropriate government agency by (company name) using the Supplementary Data Request procedures identified in this document. 2
3 * NOTE * Employees are advised that illicit use or disclosure of this data, especially unauthorized export, may result in criminal prosecution of the individual(s) responsible, including officers of the company. As well, serious penalties for the company may result, such as revocation of certifications and exclusion from the export process. PROCEDURES 1.0 Certification Procedures Certification, as required, shall be sought for each of (company name) scope of activities, i.e., current and planned products and services, which fall within the definition of military critical technology. Each physically separate facility or division shall apply separately for certification. Certification submission requests shall be completed by the Custodian (Technical Data Librarian/Facility Security Officer/Project Administrator) using form DD 2345 Military Critical Technical Data Agreement, and shall be signed by the (Vice-President Contracts and Pricing/Delegated Company Official) prior to submittal to the U.S.-Canada Joint Certification Office in Battle Creek, Michigan. Additional certifications may be required to permit (company name) to obtain unclassified technical data for a proposal or a contract. As soon as such a need becomes apparent, the Custodian should be advised of the new scope of activity requirement so that the Custodian can determine if an amendment to the existing certification is required in the area identified as Description Of Relevant Business Activity on the form DD The Custodian shall be responsible for administering and maintaining a record of both submitted and approved certifications and their respective scopes of activity. The Custodian shall also be responsible for requesting renewal of those certifications that are required at the end of the five year period. 2.0 Data Request Procedures As the need arises for (company name) to obtain unclassified technical data for a proposal or contract, the Custodian shall be advised of the data required and the purpose(s) for which the data will be used. 3
4 The Custodian shall complete the appropriate Data Request and submit it to the government agency which owns or controls the data required. As a minimum, the Data Request should include the following: - A copy of the companies DD 2345; - Detailed information on the data required; - A statement of the intended data use. The request should be made on company letterhead. The Custodian shall be responsible for maintaining a record of both submitted and approved requests for unclassified technical data. Data Requests are reviewed by the government agency which owns or controls the unclassified technical data. Release approvals may be accompanied by additional controls or measures specified by the government agency to safeguard the data. Such additional controls or measures shall be implemented by (company name), and may be subject to audit by the government agency which demanded them, or, by the government Industrial Security Program officials. 3.0 Supplementary Data Requests Should additional business uses be discovered for specific unclassified technical data, after release to (company name), employees shall advise the Custodian so that a Supplementary Data Request can be submitted to the government agency which owns or controls the data. Employees shall not use the unclassified technical data for any other purpose other than that for which the data were released to (company name). 4.0 Data Release Procedures The Custodian shall receive the unclassified technical data when it is released by the government agency. Receipt shall be recorded and restrictive markings shall be checked and recorded by the Custodian prior to release of the data to the division of project which has the primary need for the data. If the unclassified technical data has not been marked as such by the government agency prior to release to (company name), the Custodian shall mark the data appropriately on receipt. 4
5 The Custodian shall release the data to the appropriate division s or project s data handling facility (e.g., Engineering Data Records, Program Data Bank, System Administrator). Any additional controls or restrictions imposed by the releasing agency shall be highlighted by the Custodian to the division or project receiving the data. *WARNING* Technical Data received through the Joint Certification Program cannot be released to any employee of the company who is not a Canadian or U.S. Citizen or an officially designated Permanent Resident of Canada or an Intending Citizen of the United States. 5.0 Data Handling Responsibility The receiving division or project is responsible for implementation and maintenance of the controls and measures appropriate to safeguarding the specific data, as well as any additional controls and measures imposed by the releasing agency. Each employee who uses the unclassified technical data, received through this program, is responsible for its care while in its immediate charge, and for its safe return when use is finished. 6.0 Use and Disclosure of Unclassified Technical Data Employees shall use unclassified technical data only for the purpose for which it was released to (company name). Such purpose is recorded on the Data Request. If additional uses for the data are identified after receipt by (company name), a Supplementary Data Request must be made and agency approval granted prior to any such additional use of the data. Unclassified technical data shall be disclosed by (company name) only for the purpose specified in the Data Request. Such disclosures would include, for example, proposals or contractually -deliverable data. No disclosure of unclassified technical data is permitted other than for the reasons identified to the government agency in the Data Request. Casual requests for unclassified technical data from companies or individuals shall be denied. (Company name) may direct such companies or individuals to the government agency which owns or controls the data and/or to the U.S.-Canada Joint Certification Office. 5
6 *WARNING* Violators of Export Control Laws are subject to criminal prosecution. 7.0 Disposal of Unclassified Technical Data Disposal of unclassified technical data is the responsibility of the division or project that had primary need for the data. Disposal methods may include, for example, return to the government agency or shredding by (company name). Disposal conditions will vary depending on its sensitivity. Employees should contact the Custodian for guidance regarding disposal requirements for the specific data involved. 6
The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004
The USA Patriot Act Government Briefing Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004 Agenda Background Overview of Government Responses and Approach Mitigation
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Integrated Visual and Auditory Continuous Performance Test (IVA-AE) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A PIA
Privacy Act of 1974; Department of Homeland Security <Component Name> - <SORN. AGENCY: Department of Homeland Security, Privacy Office.
DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2014-] Privacy Act of 1974; Department of Homeland Security -
SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Diabetes Health Management System (CoPilot ) US Army Medical Command - DHP Funded Application SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD)
The United States Federal Trade Commission ("FTC") and the Office of the Data Protection Commissioner of Ireland (collectively, "the Participants"),
MEMORANDUM OF UNDERSTANDING BETWEEN THE UNITED STATES FEDERAL TRADE COMMISSION AND THE OFFICE OF THE DATA PROTECTION COMMISSIONER OF IRELAND ON MUTUAL ASSISTANCE IN THE ENFORCEMENT OF LAWS PROTECTING PERSONAL
APPENDIX H SECURITY ADDENDUM
APPENDIX H SECURITY ADDENDUM The following pages contain the legal authority, purpose, and genesis of the Criminal Justice Information Services Security Addendum (H2-H4); the Security Addendum itself (H5-H6);
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Assistance Reporting Tool (ART) Defense Health Agency (DHA) SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or electronic
SUMMARY: The National Guard Bureau proposes to add a new system. of records, INGB 005, entitled Special Investigation Reports
This document is scheduled to be published in the Federal Register on 01/27/2016 and available online at http://federalregister.gov/a/2016-01517, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,
Data Protection Policy
Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Call Management System (Microlog ServiceFirst ) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A PIA REQUIRED? a. Will this
How To Disclose Your Foreign Bank Accounts And Avoid Criminal Prosecution! FIVE STONE. tax advisers
How To Disclose Your Foreign Bank Accounts And Avoid Criminal Prosecution! Do you have or think you may have a foreign bank account that should be disclosed to the United States Government? Have you received
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
HIPAA Employee Training Guide. Revision Date: April 11, 2015
HIPAA Employee Training Guide Revision Date: April 11, 2015 What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 (also known as Kennedy- Kassebaum Act ). HIPAA regulations address
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Directors and Officers Liability Insurance
Directors and Officers Liability Insurance New Zealand Proposal form Completing the Proposal form 1. This application must be completed in full including all required attachments. 2. If more space is needed
FedRAMP Package Access Request Form For Review of FedRAMP Security Package
FedRAMP Package Access Request Form For Review of FedRAMP Security Package INSTRUCTIONS: 1. Please complete this form, then print and sign. 2. Distribute to your Government Supervisor for review and signature.
A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1
A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1 Policy and Procedure Templates Reflects modifications published in the Federal Register
Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
LICENSURE BY EXAMINATION APPLICATION
LICENSURE BY EXAMINATION APPLICATION SEND APPLICATION TO: PSI/Colorado Barber Cosmetology Program PO Box 887 Wheat Ridge, CO 80034 EXAMINATION Please select practical skills examination(s) that you are
SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY
SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY School Board Policy 523.5 The School District of Black River Falls ( District ) is committed to compliance with the health information
Privacy and Cloud Computing for Australian Government Agencies
Privacy and Cloud Computing for Australian Government Agencies Better Practice Guide February 2013 Version 1.1 Introduction Despite common perceptions, cloud computing has the potential to enhance privacy
HIPAA Privacy Summary for Self-insured Employer Groups
I. Overview HIPAA Privacy Summary for Self-insured Employer Groups The Privacy Regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) regulate the uses and disclosures of
white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations
white paper Mitigate Risk in Handling ediscovery Data Subject to the U.S. Export Control Laws and Regulations WWW.EPIQSYSTEMS.COM 800 314 5550 Mitigate Risk in Handling ediscovery Data Subject to the U.S.
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Naval Audit Service Information Management System (NASIMS) Department of the Navy - DON/AA - NAVAUDSVC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense
STATE OF CONNECTICUT REGULATION of the DEPARTMENT OF CONSUMER PROTECTION (NAME OF AGENCY)
STATE OF CONNECTICUT REGULATION of the DEPARTMENT OF CONSUMER PROTECTION (NAME OF AGENCY) Concerning APPRAISAL MANAGEMENT COMPANIES (SUBJECT MATTER OF REGULATION) (NEW) Section 1. The Regulations of Connecticut
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
BUSINESS ASSOCIATE AGREEMENT ( BAA )
BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor
PRIVATE SCHOOL REGISTRATION FOR POSTSECONDARY DEGREE GRANTING EDUCATION INSTITUTIONS. Chapter 30
PRIVATE SCHOOL REGISTRATION FOR POSTSECONDARY DEGREE GRANTING EDUCATION INSTITUTIONS Chapter 30 Section 1. Authority. These rules are promulgated pursuant to W.S. 21-2-401 through 21-2-407 of the Private
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder
Privacy and Management of Health Information: Standards for CARNA s Regulated Members
Privacy and Management of Health Information: Standards for CARNA s Regulated Members September 2011 Permission to reproduce this document is granted; please recognize CARNA. College and Association of
United States Department of State Privacy Impact Assessment Risk Analysis and Management
United States Department of State Privacy Impact Assessment Risk Analysis and Management Bureau of Administration 1. Contact Information Risk Analysis and Management (RAM) PIA Department of State Privacy
a. A person whose sole function in the work is to perform labor under the supervision or direction of a building contractor.
Title: Administrative Policy Building Contractor Licensing Policy Custodian Building Safety Policy No. Part 3, Regulations Chapter 8, Property Section 2 Effective Date January 1, 2014 Adoption/Revision
CHAPTER 277 CERTIFICATION OF ALARM SYSTEM CONTRACTORS AND INSTALLERS. 661 277.1(100C) Establishment of program. There is established within the fire
Adopt the following new chapter: CHAPTER 277 CERTIFICATION OF ALARM SYSTEM CONTRACTORS AND INSTALLERS 661 277.1(100C) Establishment of program. There is established within the fire marshal division an
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
Policies and Procedures SECTION:
PAGE 1 OF 5 I. PURPOSE The purpose of this Policy is to fulfill the requirements of Section 6032 of the Deficit Reduction Act of 2005 by providing to Creighton University employees and employees of contractors
INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection
As amended by P.L.79-2007. INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection IC 5-11-5.5-1 Definitions Sec. 1. The following definitions
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS
SHP-570A 1/14 SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS The goal of this document is to provide adequate security and integrity for criminal history record information (CHRI)
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable
POST-GOVERNMENT EMPLOYMENT ADVICE OPINION REQUEST
POST-GOVERNMENT EMPLOYMENT ADVICE OPINION REQUEST (Read Privacy Act Statement on the last page before completing form.) REPORT CONTROL SYMBOL DD-GC(AR)2412 OMB No. 0704-0467 OMB approval expires Jun 30,
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Data Backup and Protection Solution (Yosemite) US Army Medical Command - DHP Funded Application SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense
MEMORANDUM OF UNDERSTANDING Between COMPANY And MISSOURI STATE UNIVERSITY
MEMORANDUM OF UNDERSTANDING Between COMPANY And MISSOURI STATE UNIVERSITY THIS MEMORANDUM OF UNDERSTANDING (hereinafter referred to as MOU) is by and between COMPANY, LOCATION AND TYPE OF COMPANY (hereinafter
Business Associate Agreement
This Business Associate Agreement Is Related To and a Part of the Following Underlying Agreement: Effective Date of Underlying Agreement: Vendor: Business Associate Agreement This Business Associate Agreement
Nevada Registered Agent Association Proposed Changes to SB 39. February 3, 2015
Nevada Registered Agent Association Proposed Changes to SB 39 February 3, 2015 Submitted By: Nevada Registered Agent Association Matthew Taylor (775) 887-8853 [email protected] Scott Scherer (775) 684-6000
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
ACKNOWLEDGMENT OF RECEIPT OF NOTICE OF PRIVACY PRACTICES
ACKNOWLEDGMENT OF RECEIPT OF NOTICE OF PRIVACY PRACTICES I acknowledge that I have been provided a copy of Fiorillo Cosmetic and General Dentistry s Notice of Privacy Practices, which has an effective
The Health Information Act. Use and Disclosure of Health Information for Research
The Health Information Act Use and Disclosure of Health Information for Research The Health Information Act (HIA) sets out rules respecting the use and disclosure of health information for research purposes
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 5220.22, Volume 3 April 17, 2014 USD(I) SUBJECT: National Industrial Security Program: Procedures for Government Activities Relating to Foreign Ownership, Control, or
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
OFFICIAL. NCC Records Management and Disposal Policy
NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy
Enclosure. Dear Vendor,
Dear Vendor, As you may be aware, the Omnibus Rule was finalized on January 25, 2013 and took effect on March 26, 2013. Under the Health Insurance Portability & Accountability Act (HIPAA) and the Omnibus
BUSINESS ASSOCIATE CONTRACTUAL ADDENDUM
BUSINESS ASSOCIATE CONTRACTUAL ADDENDUM This HIPAA Addendum ("Addendum") is entered into effective this first day of November 1, 2015, by and between "Business Associate" AND COUNTY OF OTTAWA Ottawa County
INSURANCE REGULATION 115 LIFE SETTLEMENTS
Table of Contents State of Rhode Island and Providence Plantations DEPARTMENT OF BUSINESS REGULATION Division of Insurance 1511 Pontiac Avenue, Bldg. 69-2 Cranston, RI 02920 INSURANCE REGULATION 115 LIFE
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service
Outside Director and Proxy Holder Training: Module 1: Intro to DSS and Foreign Ownership, Control, or Influence (FOCI) Defense Security Service February 2014 Training Objectives DSS Agency DSS Mission
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Brain Training Software US Army Medical Command - DHP Funded Applications SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system
HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator
HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title
AN ACT IN THE COUNCIL OF THE DISTRICT OF COLUMBIA
AN ACT IN THE COUNCIL OF THE DISTRICT OF COLUMBIA To amend the District of Columbia Procurement Practices Act of 1985 to make the District s false claims act consistent with federal law and thereby qualify
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Surgery Scheduling System (S3) Defense Health Agency (DHA) SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or electronic
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
Use & Disclosure of Protected Health Information by Business Associates
Applicability: Policy Title: Policy Number: Use & Disclosure of Protected Health Information by Business Associates PP-12 Superseded Policy(ies) or Entity Policy: N/A Date Established: January 31, 2003
INSIDER TRADING POLICY
INSIDER TRADING POLICY NOVEMBER 2014 2 INSIDER TRADING POLICY NOVEMBER 2014 This Policy provides guidelines for directors, officers, executives, employees and consultants (collectively, WSP Team Members
H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
Infinedi HIPAA Business Associate Agreement RECITALS SAMPLE
Infinedi HIPAA Business Associate Agreement This Business Associate Agreement ( Agreement ) is entered into this day of, 20 between ( Company ) and Infinedi, LLC, a Limited Liability Corporation, ( Contractor
8 THINGS YOU MUST KNOW BEFORE THE IRS CALLS YOU
8 THINGS YOU MUST KNOW BEFORE THE IRS CALLS YOU Contact Us Today to Schedule a Free Consultation. Call 866-784-0023 or visit www.mlhorwitzlaw.com 8 Things You Must Know Before the IRS Calls You What is
Standards of. Conduct. Important Phone Number for Reporting Violations
Standards of Conduct It is the policy of Security Health Plan that all its business be conducted honestly, ethically, and with integrity. Security Health Plan s relationships with members, hospitals, clinics,
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Ambulatory Blood Pressure Monitoring Software (AccuWin Pro ) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A PIA REQUIRED?
The Law of the City of Moscow. No. 30 dated the 30 th of June 2010. On the Chamber of Control and Accounts of Moscow
The Law of the City of Moscow No. 30 dated the 30 th of June 2010 On the Chamber of Control and Accounts of Moscow In accordance with the federal legislation and the Moscow City Charter, this Law shall
Business Associate Agreement
Business Associate Agreement This Agreement is entered into as of ("Effective Date"), between ( Covered Entity ), and ( Business Associate ). RECITALS WHEREAS, Business Associate provides services on behalf
Health Information Privacy Refresher Training. March 2013
Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal
MDA Small Business Industry Day
MDA Small Business Industry Day SBIR Proposal Preparation By: John Swan Contracting Officer Missile Defense Agency August 14, 2015 Agenda Introduction - John Swan Accounting System Audits - John Swan Cost
Criminals; Rehabilitation CHAPTER 364 CRIMINAL OFFENDERS; REHABILITATION
1 MINNESOTA STATUTES 2013 364.02 Criminals; Rehabilitation CHAPTER 364 CRIMINAL OFFENDERS; REHABILITATION 364.01 POLICY. 364.02 DEFINITIONS. 364.021 PUBLIC AND PRIVATE EMPLOYMENT; CONSIDERATION OF CRIMINAL
Last Approval Date: May 2008. Page 1 of 12 I. PURPOSE
Page 1 of 12 I. PURPOSE The purpose of this policy is to comply with the requirements in Section 6032 of the Deficit Reduction Act of 2005 (the DRA ), which amends Section 1902(a) of the Social Security
CONTRACTORS STATE LICENSE BOARD Blanket Performance and Payment Bond Approved Final Text
CONTRACTORS STATE LICENSE BOARD Blanket Performance and Payment Bond Approved Final Text California Code of Regulations Title 16, Division 8 Article 6. Bonds 858. Blanket Performance and Payment Bond Defined
BUCKS COUNTY DEPARTMENT OF HEALTH RULES AND REGULATIONS FOR CONDUCTING AND OPERATING FOOD FACILITIES
BUCKS COUNTY DEPARTMENT OF HEALTH RULES AND REGULATIONS FOR CONDUCTING AND OPERATING FOOD FACILITIES EFFECTIVE DATE: October 1, 2014 BUCKS COUNTY DEPARTMENT OF HEALTH RULES AND REGULATIONS FOR CONDUCTING
