REQUEST FOR QUOTE Department of Children and Families Office of Child Welfare National Youth in Transition Database Survey Tool January 27, 2014

Size: px
Start display at page:

Download "REQUEST FOR QUOTE Department of Children and Families Office of Child Welfare National Youth in Transition Database Survey Tool January 27, 2014"

Transcription

1 REQUEST FOR QUOTE SUBJECT: Request for Quotes, State Term Contract # , Information Technology Consulting Services TITLE: National Youth in Transition Database (NYTD) Survey Tool Proposal Software Hosting and Development 1) PURPOSE The (hereinafter Department ), Office of Child Welfare, is seeking quotes from interested vendors to provide a secure environment in which the NYTD Survey Tool for Youth in Foster Care and Youth aging out of Foster Care can be hosted, maintained, customized and available to the Department s user community. 2) BACKGROUND Public Law established the John H. Chaffee Foster Care Independence Program in section 477 of the Social Security Act and subsequent federal rule released on February 26, 2008, establishes the NYTD. The federal rule requires that States engage in data collection activities, one being a youth survey. Florida has adopted a more robust survey tool, NYTD Plus. The Department has partnered with Connectedby25 to assist in the administration of all youth surveys to meet federal requirements and to survey additional youth. 3) SCOPE OF WORK a) The project will include, but not necessarily be limited to: 1. Hosting & Security including all hardware, software, data center, bandwidth, etc. 2. Software Bug fixes 3. Help ticket system with communication from the Department s contracted vendor 4. Ongoing Development of the NYTD Survey Tool 5. Maintenance of data export to the Florida Safe Families Network (FSFN) system (which is controlled by the Department) b) Specifications: 1. Web applications must be housed on a secure server. 2. The server must be hosted in a secure hosting facility that allows for instantaneous failover in case of a routing failure and located in a secured server room that is monitored 24/7 for intrusion, fire, and other hazards. 3. The application must be supplied with enough bandwidth for optimum performance for the use of the NYTD Survey Tool system for the Department s user community. 4. The application must have its own name space on the server. 5. The selected vendor must take care of ongoing bug fixes and be available for small application fixes. 1

2 6. The selected vendor must continue development on the system to customize the Survey Tool for Florida and work with the Department to maintain the data interface to the FSFN system. 7. The system must be cross-platform compatible to work in all browsers and on smart phones. 8. The selected vendor must set up a username and password for each youth in the survey population to login. 9. The selected vendor must provide technical assistance and trouble-shooting via , chat, and phone to youth taking the survey, CBy25 staff, and Department staff. 10. The selected vendor must create and maintain a password protected online reporting system that will allow the Community Based Care agencies to run reports on their own kids and compare them to statewide data. This includes responses to each question in the My Services Survey with programming to protect the youth s anonymity such that if the pool of youth for a given county or circuit is too small the data is not provided. 11. The selected vendor must provide a complete extract of all completed surveys to the Department so that ad hoc reporting and analysis of the survey data can be done for all surveys which includes My Services (all 3 age-specific sub-types), Florida NYTD, and Federal NYTD. 12. The selected vendor must work with the Department s contracted vendor and the Department to continue on-going development on the NYTD Survey Tool. c) Staff Security Obligations 1. The vendor staff having access to Department information shall have background screening consistent with their duties and access to data. 2. The vendor shall maintain a file with the Department s Contract Manager of all vendors staff background investigation reports. Vendor background investigations needed to confirm acceptability for the "level one" screening described in s , F.S. of all staff assigned to access client data shall be conducted at the vendor s expense. If, in the discretion of the Department, further inquiry is warranted and authorized as to any person on the list beyond the "level one" screening described at s , F.S., including a national criminal history records check conducted through the Federal Bureau of Investigation, the Department may, at its expense, conduct further inquiry before the Department s contract manager approves the vendor proposed staff person to be granted access to client data. If, in the opinion of the Department s contract manager, following a review of such vendor staff s complete background investigation report or of such portion of the report as is made available to the Department, vendor staff s background poses an unacceptable risk of improper handling or dissemination of sensitive client information, the Department s contract manager may refuse or limit such vendor staff s access to client data. 3. The Department shall have the right to conduct all or any portion of the background investigation of any of the vendor s present or prospective employees or volunteers at its own cost, without making the contents or copies of the records generated as a result of the investigation available to the vendor if such access poses an 2

3 unacceptable risk of improper handling or dissemination of sensitive client information. 4. The Department shall have the right to investigate any error attributable to the vendor relating to access or dissemination of client records, as well as any instance of lost or missing data affecting client records. The investigation may include, without limitation, auditing the vendor s performance and financial information. The Department may take any appropriate legal action as a result of such investigation. d) Security 1. The vendor shall comply with all applicable laws and procedures pertaining to security and confidentiality including, but not limited to, those listed in the CF114 form. Each individual having access to Department information shall be required to read and sign agreement to the CF The vendor s own systems and premises shall be subject to inspection by the Department s representatives at any time to verify compliance with security requirements. 3. Any data communications involving the Department may also be monitored by Department security or systems personnel for compliance with these requirements or misuse of the systems. 4. In the event that the vendor is allowed to electronically connect to any of the Department s facilities, the Department may suspend or revoke that connection at any time without notice if the Department has reason to believe that the security of the Department s systems may be compromised by a continuation of that connection. 5. In the event the vendor purchases, develops or maintains its own electronic information systems to support services provided through this contract, the Department must have access to all information necessary to audit and examine such information in its native format, using access devices (scanners, personal computers, or other devices required) made available for this purpose by the vendor. The vendor must provide the Department s representatives with the necessary system user accounts and passwords to access all information related to this contract which may be stored in the vendor s systems. 6. The Department may require the vendor to accurately complete a self-audit questionnaire relating to the electronic information systems the vendor and any subcontractors or affiliates participating under this contract use. 7. Material security violations or improper information disclosures shall constitute sufficient grounds for a determination that the contract has been breached. 8. The following summary of key security standards are applicable to all data covered by federal or state laws or regulations (Covered Data). The following list is not intended to be, and is not, exhaustive. The vendor must comply with all security requirements related to Covered Data and any other State of Florida data provided to, or collected by, the vendor acting on behalf of the Department as its contractor. Further, the vendor's employees, subcontractors, agents, or other affiliated third party persons or entities, as well as contracted third parties, must meet the same requirements of the vendor under this contract and all agreements with the vendor's employees, subcontractors, agents, contractors or other affiliated persons or 3

4 entities shall incorporate the terms and conditions of data security into any contractual relationships established. a. Access Controls: i. Viewing and modification of Covered Data must be restricted to authorized individuals as need for business related use. ii. Unique authorization is required for each person permitted access to Covered Data and access must be properly authenticated and recorded for audit purposes, including HIPAA audit requirements. iii. Access to all Covered Data provided to the vendor's employees, subcontractors, contractors, agents, or other affiliated persons or entities must meet the same requirements of the vendor under this contract and all agreements with same shall incorporate the terms and conditions of data security in the access authorization. b. Copying/Printing (applies to both paper and electronic forms): i. Covered Data should only be printed when there is a legitimate need. ii. Copies must be limited to individuals authorized to access the Covered Data and have a signed CF114 on file with the Department. iii. Covered Data must not be left unattended. c. Network Security: i. All electronic communication including, but not limited to, Covered Data between the vendor and the Department shall use compatible, industry standard File Transfer Protocol software, using data encryption or a Virtual Private Network connection to ensure a secure file transfer at no additional cost to the Department. ii. Covered Data must be protected with a network firewall using default deny rule set required. iii. Servers hosting the Covered Data cannot be visible to the entire Internet, nor to unprotected subnets. d. Physical Security (Servers, laptops and remote devices on which Covered Data is stored (For purposes of these standards, mobile devices must be interpreted broadly to incorporate current and future devices which may contain or collect Covered Data): i. The computing device must be locked or logged out when unattended. ii. Servers must be hosted in a secure data center hardened according to relevant security standards, industry best practices and Department security policies. iii. Physical access to servers containing Covered Data must ensure physical access is monitored, logged and limited to authorized individuals 24 hours a day, 7 days a week. 4

5 iv. Routine back of Covered Data is required and backed up Covered Data must be stored in a secure off-site location. e. Remote access to systems hosting Covered Data: i. Remote access to Covered Data must be restricted to the local network or a secure virtual private network. ii. Unsupervised remote access to Covered Data by third parties is not allowed. iii. Access to Covered Data by all third parties must adhere to the requirements of this contract. f. Data Storage: i. Storage of Covered Data on a secure server in a secure data center according to relevant security standards, industry best practices and Department security policies is required. ii. Covered Data stored on individual workstations or mobile devices must use whole disk encryption. Encryption of backup media is similarly required to be encrypted. iii. Covered Data is not to be transmitted through or social networking sites unless encrypted and secured with a digital signature. 9. The vendor must meet all of the Department and State requirements for individual employee security, information security, and physical security of all non-public data in the possession of the vendor. 10. The vendor acknowledges that all Covered Data, other data and Department content uploaded to the vendor s servers, workstations or mobile devices from the Department, or made accessible to the vendor s servers, workstations or mobile devices or personnel remains the property of the Department. 11. Termination provisions related to Data: a. Within 30 days after the termination or expiration of this contract for any reason, the vendor shall either: return or physically or electronically destroy, as applicable, all Covered Data provided to the vendor by the Department, including all Covered Data provided to the vendor's employees, subcontractors, agents, or other affiliated persons or entities according to the standards enumerated in D.O.D ; or in the event that returning or destroying the Covered Data is not feasible, provide notification of the conditions that make return or destruction not feasible, in which case, the vendor must continue to protect all Covered Data that it retains and agree to limit further uses and disclosures of such Covered Data to those purposes that make the return or destruction not feasible as the vendor maintains such Covered Data. This includes any and all copies of the data such as backup copies created at any vendor site. Upon request by the Department, made before or within sixty (60) days after the effective date of termination, the vendor will make available to the Department for a complete and secure (i.e. encrypted and appropriated authenticated) download file of Department Covered Data in XML format 5

6 including all schema and transformation definitions and/or delimited text files with documented, detailed schema definitions along with attachments in their native format. The downloaded file shall include all Covered Data provided to the vendor's employees, subcontractors, agents, or other affiliated persons or entities must also comply with this requirement. The vendor's employees, subcontractors, agents, or other affiliated persons or entities must be available throughout this period to answer questions about data schema, transformations, and other elements required to fully understand and utilize the Department's data file. 4) RFQ PROCESS The Department will use the following Request for Quote process: 1) prequalify existing information technology consulting service state term contract vendors; 2) meet with one or more of the prequalified vendors to determine which of the vendors best meets the curriculum development needs of the Office of Child Welfare; 3) select the vendor that is most qualified to meet the Department s needs; and 4) issue monthly purchase orders to the selected vendor for services delivered. The following schedule has been defined to efficiently solicit multiple competitive quotes, select the most qualified vendor, and start development projects within a short time period. Event Date Release of Request For Quotes Submittal of quotes February 10, 2014 Anticipated selection of vendor February 14, ) DELIVERABLES Each month the successful vendor will provide a report to include a summary of the following activities: 1. Hosting & Security (Ex. accessibility, down time, problems, etc.) 2. Software Bug fixes (if needed) 3. Help ticket system 4. Ongoing Development of the NYTD Survey Tool (if any) 5. Data export to the Florida Safe Families Network (FSFN) system The successful vendor will be responsible for providing all administrative and physical support for vendor s employees performing the work, including but not limited to, office space, telephones, computer, office supplies, fax machines, etc. The Department will pay no additional compensation for such support. 6) HOW TO SUBMIT A QUOTE 6

7 a) Contact Person. The sole point of contact for this RFQ is: Dwight Williams 1317 Winewood Blvd., Bldg. 1, Room 307 Tallahassee, Florida Phone: (850) All questions or inquiries regarding this RFQ should be directed to the Contact Person, listed above, in writing. b) Format of the Quote. One (1) copy of the quote must be submitted electronically (Microsoft Word Format) via a CD or ed to the Contact Person listed in Section 6) a. by 5:00 PM on February 10, 2014, Eastern Standard Time. c) Quote Requirements 1. Contact Information. The vendor quote must include the following information: a. Vendor s name; b. Name, title, phone number and address of person who can respond to inquiries regarding the vendor s quote; and c. Vendor s Federal Employer Identification Number. 2. Approach to Completing Tasks and Deliverables. The vendor quote must describe the vendor s overall approach to meet the Department s stated Scope of Work within the specified timeframes. Specifically, the quote must address the following: a. The vendor quote must document the vendor s capability and capacity to meet the Scope of Work defined in this RFQ. b. The vendor quote must describe a specific approach proposed to address all of the issues, concerns, and requirements in this RFQ. c. The vendor quote must describe a specific approach proposed which either meets or exceeds the stated Scope of Work. 3. Vendor Experience. The vendor quote must describe the vendor s knowledge and experience in performing services similar to those outlined in the Scope of Work. 4. Pricing. The vendor quote must clearly outline the costs involved with the performance of the services outlined in this RFQ document, in accordance with the following: a. The vendor quote must outline the vendor s cost in providing the services outlined in this RFQ. Pricing should demonstrate the vendor s anticipated costs, including job title for each person working on the project, anticipated number of hours to complete each deliverable outlined in the Scope of Work, and the hourly rate (in accordance with the pricing at least as favorable to the Department 7

8 7) VENDOR SELECTION REQUEST FOR QUOTE FOR SERVICES as that outlined in the State Term Contract # , Information Technology Consulting Services). a) A Task Order will be issued based on cost and ability to deliver services in the requisite timeframe. The Department is using the Department of Management Services State Term Contract # , Management Consulting Services, for this procurement. Vendors who are not an awardee to this contract shall be considered non-responsive and are not eligible for award. b) Per section (2), Florida Statutes, the use of, or a selection pursuant to, a Request for Quote does not constitute a decision or intended decision that is subject to protest under section (3), Florida Statutes. 8

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

Wellesley College Written Information Security Program

Wellesley College Written Information Security Program Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as

More information

OIT OPERATIONAL PROCEDURE

OIT OPERATIONAL PROCEDURE OIT OPERATIONAL PROCEDURE Title: DATA CLASSIFICATION GUIDELINES Identification: OIT 1 Page: 1 of 5 Effective Date: 3/31/2014 Signature/Approval: Guidelines and Handling Procedure (9 10 ) specifies that

More information

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Supplier IT Security Guide

Supplier IT Security Guide Revision Date: 28 November 2012 TABLE OF CONTENT 1. INTRODUCTION... 3 2. PURPOSE... 3 3. GENERAL ACCESS REQUIREMENTS... 3 4. SECURITY RULES FOR SUPPLIER WORKPLACES AT AN INFINEON LOCATION... 3 5. DATA

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

HIPAA Information Security Overview

HIPAA Information Security Overview HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE

SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This

More information

www.neelb.org.uk Web Site Download Carol Johnston

www.neelb.org.uk Web Site Download Carol Johnston What I need to know about data protection and information security when purchasing a service that requires access to my information by a third party. www.neelb.org.uk Web Site Download Carol Johnston Corporate

More information

State HIPAA Security Policy State of Connecticut

State HIPAA Security Policy State of Connecticut Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

Information Security Plan effective March 1, 2010

Information Security Plan effective March 1, 2010 Information Security Plan effective March 1, 2010 Section Coverage pages I. Objective 1 II. Purpose 1 III. Action Plans 1 IV. Action Steps 1-5 Internal threats 3 External threats 3-4 Addenda A. Document

More information

City of Pittsburgh Operating Policies. Policy: HIPAA Privacy Policies Original Date: 1/2005 and Procedures Revised Date: 3/22/2010

City of Pittsburgh Operating Policies. Policy: HIPAA Privacy Policies Original Date: 1/2005 and Procedures Revised Date: 3/22/2010 City of Pittsburgh Operating Policies Policy: HIPAA Privacy Policies Original Date: 1/2005 and Procedures Revised Date: 3/22/2010 PURPOSE: To establish internal policies and procedures to ensure compliance

More information

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

Electronic business conditions of use

Electronic business conditions of use Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users

More information

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND THIS AGREEMENT for Access to Protected Health Information ( PHI ) ( Agreement ) is entered

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014 Tenth Judicial Circuit of Florida Information Systems Acceptable Use s Polk, Hardee and Highlands Counties as of January 2014 The following guidelines define the acceptable use of information technology

More information

ARTICLE 14 INFORMATION PRIVACY AND SECURITY PROVISIONS

ARTICLE 14 INFORMATION PRIVACY AND SECURITY PROVISIONS A. This Article is intended to protect the privacy and security of specified County information that Contractor may receive, access, or transmit, under this Agreement. The County information covered under

More information

HIPAA: Bigger and More Annoying

HIPAA: Bigger and More Annoying HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) laney@laneykay.com www.laneykay.com OFFICIAL

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129 Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the

More information

Office 365 Data Processing Agreement with Model Clauses

Office 365 Data Processing Agreement with Model Clauses Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081

More information

HIPAA RISK ASSESSMENT

HIPAA RISK ASSESSMENT HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation

More information

BUSINESS ONLINE BANKING AGREEMENT

BUSINESS ONLINE BANKING AGREEMENT BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank

More information

FDOH Information and Privacy Awareness Training Learner Course Guide

FDOH Information and Privacy Awareness Training Learner Course Guide Florida Department of Health FDOH Information and Privacy Awareness Training Learner Course Guide To protect, promote & improve the health of all people in Florida through integrated state, county, & community

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

Healthcare Management Service Organization Accreditation Program (MSOAP)

Healthcare Management Service Organization Accreditation Program (MSOAP) ELECTRONIC HEALTHCARE NETWORK ACCREDITATION COMMISSION (EHNAC) Healthcare Management Service Organization Accreditation Program (MSOAP) For The HEALTHCARE INDUSTRY Version 1.0 Released: January 2011 Lee

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

The Parties agree to amend the contract, effective July 1, 2014, as follows:

The Parties agree to amend the contract, effective July 1, 2014, as follows: AMENDMENT #9 CONTRACT OMS 08/09-076 OPERATIONS AND MANAGEMENT SERVICE CONTRACT BETWEEN THE STATE OF FLORIDA DEPARTMENT OF MANAGEMENT SERVICES AND CORRECTIONS CORPORATION OF AMERICA FOR THE LAKE CITY CORRECTIONAL

More information

How To Protect A Hampden County Hmis From Being Hacked

How To Protect A Hampden County Hmis From Being Hacked Hampden County HMIS Springfield Office of Housing SECURITY PLAN Security Officers The Springfield Office of Housing has designated an HMIS Security Officer whose duties include: Review of the Security

More information

How To Protect Research Data From Being Compromised

How To Protect Research Data From Being Compromised University of Northern Colorado Data Security Policy for Research Projects Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope... 1 4.0 Definitions, Roles, and Requirements... 1 5.0 Sources of Data...

More information

Justice Information Sharing Division ( ND CJIS ), and

Justice Information Sharing Division ( ND CJIS ), and Criminal Justice Information Sharing Division (ND CJIS) Office of the Attorney General 600 E Blvd Ave, Dept 125 Bismarck ND 58505 Office: (701) 328-1110 Fax: (701) 328-2226 P1 LERMS AGENCY AGREEMENT This

More information

BUSINESS ASSOCIATE AGREEMENT. (Contractor name and address), hereinafter referred to as Business Associate;

BUSINESS ASSOCIATE AGREEMENT. (Contractor name and address), hereinafter referred to as Business Associate; BUSINESS ASSOCIATE AGREEMENT (Agreement #) THIS DOCUMENT CONSTITUTES AN AGREEMENT BETWEEN: AND (Contractor name and address), hereinafter referred to as Business Associate; The Department of Behavioral

More information

Private Runtime Environment

Private Runtime Environment Private Runtime Environment 1. Principles A Private Runtime Environment (PRE) is an environment which enables Contractors to locate their resources in a segregated environment within premises provided

More information

HIPAA. considerations with LogMeIn

HIPAA. considerations with LogMeIn HIPAA considerations with LogMeIn Introduction The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in 1996, requires all organizations that maintain or transmit electronic

More information

8.03 Health Insurance Portability and Accountability Act (HIPAA)

8.03 Health Insurance Portability and Accountability Act (HIPAA) Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of

More information

C.T. Hellmuth & Associates, Inc.

C.T. Hellmuth & Associates, Inc. Technical Monograph C.T. Hellmuth & Associates, Inc. Technical Monographs usually are limited to only one subject which is treated in considerably more depth than is possible in our Executive Newsletter.

More information

Solicitation 1210-014. Web Hosting Services for the Disaster Volunteer Network. State of California

Solicitation 1210-014. Web Hosting Services for the Disaster Volunteer Network. State of California Solicitation 1210-014 Web Hosting Services for the Disaster Volunteer Network State of California Oct 12, 2012 4:28:36 PM PDT p. 1 Bid 1210-014 Web Hosting Services for the Disaster Volunteer Network Bid

More information

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...

1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network... Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information

MCOLES Information and Tracking Network. Security Policy. Version 2.0

MCOLES Information and Tracking Network. Security Policy. Version 2.0 MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on

More information

Information Technology Services Guidelines

Information Technology Services Guidelines Page 1 of 10 Table of Contents 1. Purpose... 2 2. Entities Affected by This Guideline... 2 3. Definitions... 2 4. Guidelines... 3 4.1 Requesting Data Center or... 3 4.2 Requirements for Data Center or...

More information

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy June 10, 2015 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT

More information

Authorized. User Agreement

Authorized. User Agreement Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION

More information

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user

More information

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology

More information

DEPARTMENTAL POLICY. Northwestern Memorial Hospital

DEPARTMENTAL POLICY. Northwestern Memorial Hospital Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines

More information

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY

SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY School Board Policy 523.5 The School District of Black River Falls ( District ) is committed to compliance with the health information

More information

Request for Proposal. Contract Management Software

Request for Proposal. Contract Management Software Request for Proposal Contract Management Software Ogden City Information Technology Division RETURN TO: Ogden City Purchasing Agent 2549 Washington Blvd., Suite 510 Ogden, Utah 84401 Attn: Sandy Poll 1

More information

Page 1. Copyright 2009. MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved.

Page 1. Copyright 2009. MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved. Page 1 Page 2 Page 3 Agenda Defining the Massachusetts Personal Data Security Law Becoming Compliant Page 4 Massachusetts Privacy Law Defining the Massachusetts Personal Data Security Law - 201 CMR 17.00

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,

More information

DATA SECURITY AGREEMENT. Addendum # to Contract #

DATA SECURITY AGREEMENT. Addendum # to Contract # DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the

More information

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10 Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between

More information

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate

More information

UNIVERSITY HOSPITAL POLICY

UNIVERSITY HOSPITAL POLICY UNIVERSITY HOSPITAL POLICY SUBJECT: PURCHASING SERVICES TITLE: PURCHASING PROCESS Responsible Executive: Executive Director, Supply Chain Management Responsible Office: Supply Chain Management CODING:

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

LogMeIn HIPAA Considerations

LogMeIn HIPAA Considerations LogMeIn HIPAA Considerations Contents Introduction LogMeIn HIPAA Considerations...3 General HIPAA Information...4 Section A Background information on HIPAA Rules...4 Technical Safeguards Overview...5 Section

More information

CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS

CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS CITY OF MILTON REQUEST FOR PROPOSAL #09-001-ITS to provide INFORMATION TECHNOLOGY SUPPORT SERVICES Issued: November 2, 2009 Submit completed application to: City of Milton 1000 Laurel Street Milton, WA

More information

Request for Quote HIPAA Security Risk Analysis

Request for Quote HIPAA Security Risk Analysis Request for Quote Security Risk Analysis 4/26/13 Florida Department of Children and Families Purpose The Florida Department of Children and Families (DCF or the Department) is looking for a qualified information

More information

INFORMATION SECURITY PROGRAM

INFORMATION SECURITY PROGRAM Approved 1/30/15 by Dr. MaryLou Apple, President MSCC Policy No. 1:08:00:02 MSCC Gramm-Leach-Bliley INFORMATION SECURITY PROGRAM January, 2015 Version 1 Table of Contents A. Introduction Page 1 B. Security

More information

Service Schedule for CLOUD SERVICES

Service Schedule for CLOUD SERVICES Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this

More information

DHHS Information Technology (IT) Access Control Standard

DHHS Information Technology (IT) Access Control Standard DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of

More information

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

The George Washington University Hospital

The George Washington University Hospital GWUH INFORMATION ACCESS MANAGEMENT and CLINICAL RESEARCH December 14, 2011 The George Washington University Hospital Information Access Management to support clinical Research Protocol Specification Effective

More information

Credit Card Security

Credit Card Security Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015

EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure

More information

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted

More information

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

REQUEST FOR INFORMATION DEBIT CARD PROCESSING FOR FLORIDA RETIREMENT SYSTEM (FRS) PENSION PLAN PAYMENTS RFI NO.: DMS 12/13-036

REQUEST FOR INFORMATION DEBIT CARD PROCESSING FOR FLORIDA RETIREMENT SYSTEM (FRS) PENSION PLAN PAYMENTS RFI NO.: DMS 12/13-036 REQUEST FOR INFORMATION DEBIT CARD PROCESSING FOR FLORIDA RETIREMENT SYSTEM (FRS) PENSION PLAN PAYMENTS RFI NO.: DMS 12/13-036 I. DEFINITIONS Payee A retiree or beneficiary of a retiree who has received

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...

More information

CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9.

CITY OF SAN DIEGO ADMINISTRATIVE REGULATION Number 95.51 PAYMENT CARD INDUSTRY (PCI) COMPLIANCE POLICY. Page 1 of 9. 95.5 of 9. PURPOSE.. To establish a policy that outlines the requirements for compliance to the Payment Card Industry Data Security Standards (PCI-DSS). Compliance with this standard is a condition of

More information

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology

More information