ehealth Ontario Site Support Guide
|
|
|
- Justin Hubbard
- 10 years ago
- Views:
Transcription
1 ehealth Ontario Site Support Guide Version 8.0 Reference Guide This guide will assist the electronic Child Health Network with information around processes and contacting ehealth Ontario for support. 0
2 Version Date By Comments /07/12 Marcia Bailey Draft /07/12 Marcia Bailey Added updates for Service Ontario contact numbers from MOHLTC /7/12 Arshia Raafat Revised, re-structured and edited document and incorporated feedback from Privacy and Security /10/12 Arshia Raafat Incorporated changes based on discussions amongst ehealth Ontario, echn and SickKids /05/13 Marcia Bailey Added the client profile form at the end /10/13 Arshia Raafat and Carla Murphy Incorporated input and updates from ehealth Privacy and Security and OLIS Business John Kellenberger Incorporated updates from echn John Kellenberger Minor updates incorporated John Kellenberger Minor updates incorporated John Kellenberger Minor wording updates John Kellenberger Minor wording updates 1
3 Contents Introduction 5 A. electronic Child Health Network (echn) 5 1. Support Contacting the Service Desk for Support How to reach ehealth Ontario service desk Creating a service request Checklist to help expedite your service request Service request and technical escalation process Progress of your service request Client satisfaction Support Processes High level depiction of the service desk model echn support accountabilities When should you call ehealth Ontario service desk? When does ehealth Ontario service desk contact you? When does the ehealth Ontario privacy office contact you? Data quality assurance echn Operational Responsibilities for OLIS Data Submitting Data Audit Logs to ehealth Ontario Content Timeline Process OLIS Data in echn - Retention Schedule Logical Deletion of OLIS Data in echn Consent Override Reporting Process Responding to Access Requests (Tactical Privacy Audit Solution Reports) Processing of access requests Types of logs Privacy and Security Patient Consent Background Overriding a consent directive from within the echn WebChart Applying consent directives to OLIS data Access Requests Access requests made by patients for OLIS data Requests from echn sites for OLIS audit logs (for their site) Inquiries and Complaints Received by echn in Respect of ehealth Ontario or OLIS Data
4 3.4 Privacy-Related Questions from echn Privacy and Security Incident Management Legal Agreements and Access to OLIS Who can access OLIS data and for what purpose Agreements Structure Agreements Tracking Additional Information B. echn Users and Sites OLIS Setup Requirements Health Care Provider Guide 22 Appendix A: Retention Schedule for OLIS Data 23 Appendix B: Procedures for Communicating Sensitive Files Over 26 Appendix C: Sample Incident Report Form 30 Appendix D: Client Site Profile Form 34 3
5 NOTICE AND DISCLAIMER All rights reserved. No part of this document may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without prior written permission of ehealth Ontario. ehealth Ontario and all persons involved in the preparation of this document disclaim any warranty as to accuracy or currency of the document. This document is provided on the understanding and basis that none of ehealth Ontario, the author(s) or other persons involved in the creation of this document shall be responsible for the accuracy or currency of the contents, or for the results of any action taken on the basis of the information contained in this document or for any errors or omissions contained herein. No one involved in this document is attempting herein to render legal, privacy, security, or other professional advice. 4
6 Introduction The site support guide is a comprehensive document outlining various processes which were created to assist the electronic Child Health Network (echn) with facilitating access to the Ontario laboratories information system (OLIS). The guide provides information regarding support and maintenance as well as privacy and security procedures and obligations. The guide includes information for echn as well as information to be shared with echn users and sites and has been structured accordingly. A. electronic Child Health Network (echn) 1. Support ehealth Ontario will be providing echn with support in the various forms that have been outlined below: 1.1 Contacting the Service Desk for Support The ehealth Ontario service desk is the single point of contact for making service requests for OLIS related issues. The ehealth Ontario service desk is staffed 24/7 to respond to and service any requests made How to reach ehealth Ontario service desk Service Desk open 7 days per week 24hrs per day Tel: (905) Toll Free: Option 1 Technical Support Option 2 Registration Support [email protected] [email protected] For a list of other contact numbers within ehealth Ontario, please visit 5
7 7/24 hr service request support flow Start - Client detects an issue with OLIS or has a question Contact ehealth Ontario Service Desk Dial Make Language Selection Make a service selection (1 for Technical Support) (2 for Registration Support) Call routes to an agent (24/7 Support) Provide details of your request Support teams work to resolve the issue END 6
8 1.1.2 Creating a service request Phone - The fastest way to report a High severity issue/incident (e.g. production is down or environment is severely degraded) is to contact ehealth Ontario service desk via the phone Option 1 - is best for Medium and Low severity issues. [email protected] Checklist to help expedite your service request Your name Your site location Your contact information, include backup contacts where applicable Indicate what ehealth Ontario service you are calling about e.g. OLIS Web Viewer Indicate the ehealth Ontario service environment affected e.g. production or conformance self- testing (CST) Description of issue <include date and time the issue occurred, the number of users impacted if known> Steps to reproduce issue and troubleshooting diagnostic steps taken Service request and technical escalation process Step 1 Service request Step 2 Engagement with frontline Service Desk team You contact ehealth Ontario to open a service request Choose service desk option from phone prompt A service desk agent works with you to identify issues and commences troubleshooting steps - A service desk agent may engage with an ehealth Ontario Technical Lead as necessary - The support agent may request additional information from you to assist in troubleshooting process Once all action items have been completed, if the service desk agent cannot resolve the problem and no progress is being made on the incident, it may be transferred to ehealth Ontario s next level of support team 7
9 Step 3 Issue transferred to ehealth Ontario next level of support team Incident is assigned to the next level of support Assigned next level of support contacts you The next level of support reviews incident and continues troubleshooting activities where required, other support teams are engaged to continue efforts to resolve your issue Progress of your service request Updates - To review the progress of your service request please contact the service desk. Additionally, automated updates are provided as the service request is escalated among teams. Service request priority - The incident priority is determined mutually by the support agent and you the client. Service request closure - Your service request will be closed fifteen (15) days after the service request ticket is resolved, no further troubleshooting is possible, or you authorize the ehealth Ontario support team to close the request. Your request will be closed if no feedback has been received after three (3) attempts to contact you. During this time, you will receive three (3) reminders with the final reminder stating that your request will be closed the next day Client satisfaction ehealth Ontario service desk values and promotes client satisfaction. We welcome client feedback and encourage you to get involved through the following channels: Client satisfaction survey Upon closing a service request, ehealth Ontario randomly selects incidents to be surveyed. For that reason you might receive a request to fill in an online questionnaire. We would very much appreciate it if you would help us ensure the quality of our service by taking a short, five (5)- minute survey. General feedback If you wish to provide us your comments or suggestions, please contact the ehealth Ontario service desk by [email protected]. 8
10 1.2 Support Processes High level depiction of the service desk model Triage End User Local/Site Help Desk Tier 1 echn Support Tier 2 ehealth Ontario Service Desk Tier echn support accountabilities When any issues with the echn interface are detected, echn provides support for sites and users and will assist in: troubleshooting the issues; providing a resolution where possible; determining potential impact of the issues; and escalating to the appropriate echn support groups and/or ehealth Ontario service desk When should you call ehealth Ontario service desk? Contact the ehealth Ontario service desk when you have information on/questions regarding the following issues: Requesting assistance with troubleshooting OLIS PKI certificate issues Requesting assistance with troubleshooting OLIS related interface issues Reporting missing laboratory results in OLIS Reporting data quality issues with laboratory results in OLIS Reporting a privacy breach When requesting information from ehealth Ontario, for example when you have questions about OLIS: Questions about OLIS functionality Questions about test codes found in OLIS 9
11 Questions about privacy and security of personal health information When does ehealth Ontario service desk contact you? For clarification regarding an incident or request you have reported To notify you of maintenance activities at our site that may impact service To report a failure in the OLIS application To provide information around our release dates and application improvement activities When does the ehealth Ontario privacy office contact you? For requesting additional information and/or data audit logs to fulfill OLIS access requests For incident management purposes Data quality assurance Sites are required to perform regular data quality checks to ensure that data being sent to OLIS is accurate and complete. The accuracy of data within OLIS is important to ehealth Ontario. Should echn find missing lab reports or incorrect data, for example missing units of measure in the OLIS reports viewed; please notify us by contacting the service desk. The following information should be supplied to assist us with the investigation for missing or incorrect data: Your contact information <Phone #> < Address> The name of your organization <hospital, lab, department> The name of the lab that submitted the result The lab report # The date and time that the specimen was collected If the lab information is incorrect provide details around why you feel this information is incorrect - do not provide any personal health information (PHI) 2. echn Operational Responsibilities for OLIS Data 2.1 Submitting Data Audit Logs to ehealth Ontario Under the Personal Health Information Protection Act, 2004 (PHIPA), ehealth Ontario is responsible for keeping an electronic record of all accesses to OLIS data whether held in an ehealth Ontario system or a third party system such as echn s. Due to this legislative requirement, ehealth Ontario must obtain a copy of the OLIS audit logs from echn on a weekly basis. ehealth Ontario may require additional information from echn to interpret the logs. 10
12 2.1.1 Content At a minimum the log must include: the user ID (first name, last name, regulatory college licence number, if applicable) location (organization ID) audit event time of access audit event date of access Patient ID (including name, health card number or medical record number, date of birth, and gender) audit event ID (from echn s WebChart logs) event type (e.g. view doc) application (e.g. WebChart) document name (name of lab result accessed) document facility (e.g. lifelabs) document (i.e. lab result) date & time additional info (from echn s audit logs) if delegate access is permitted (future state), the user on whose behalf the query is submitted Additionally, ehealth requires logs showing consent overrides that have been implemented in echn s system for OLIS data, including: the user ID (first name, last name, regulatory college licence number) location (organization ID) time of access (i.e. time consent was overridden) audit event date of access (i.e. date consent was overridden) Patient ID (including name, health card number or medical record number, date of birth, and gender) audit event ID (from echn s WebChart logs) application (this should always be WebChart) event type (e.g. override of consent directive) type of override (should always be express consent from the patient on a temporary basis Z ) if substitute decision maker (SDM) provided express consent for the override, then SDM name and relationship to patient must be provided if applicable, document facility from which document came if applicable, document (i.e. lab result) date & time In addition to the above, echn is to provide ehealth Ontario with any paper or electronic documents that are required to translate an identifier (ID) used in the audit logs to a real-world ID. For example, if an organization ID is used in the audit logs to identify an echn site, then 11
13 echn is to provide ehealth Ontario with the organization ID in the logs, along with the full name and location of the organization from which the user accessed the information Timeline For every weekly log transfer, echn should include the period of the report (e.g. April 1, 2012 to April 7, 2012), and the date the report was created Process echn to supply OLIS Access logs weekly to the OLIS Business Support Delivery (BSD) team every Friday by 2 pm, by to : [email protected] OLIS BSD team will communicate with the echn identified contact to obtain the password to decrypt the file OLIS BSD will store files under OLIS consent folder in the echn Audit Log folder Please refer to Appendix B for instructions on how to encrypt files and securely transfer them to ehealth Ontario. 2.2 OLIS Data in echn - Retention Schedule ehealth Ontario is responsible for establishing the retention schedule for OLIS data as well as for any copies of the data which remain in its control, such as the echn sub-copy of the OLIS data and log data. Additionally, as echn will be acting as a PHIPA Sub-Agent of ehealth Ontario for the purpose of consent management and producing reports to respond to Individual Access Requests, any personal health information (PHI), or related information, created or received by echn in its Sub-Agent role will have to follow the retention schedule set out by the Ministry of Health and Long Term Care (MOHLTC). The retention schedule for all OLIS data, including OLIS-related logs, as well as PHI held by ehealth Ontario as Sub-Agent is included in Appendix A. Under agreement with ehealth Ontario, echn is required to follow this retention schedule for the OLIS data and related documentation. echn must adhere to the retention schedule in Appendix A in respect of the following: OLIS data in echn s data repository; OLIS-related audit logs including SDM information; Any paper or electronic documents that are required to translate an identifier (ID) used in the audit logs to a real-world ID; and 12
14 TPAS (tactical privacy audit solution) reports, the consent override reports, incident management reports, and any other reports or related documentation produced by echn in its Sub-Agent role. echn has advised that it retains the PHI in its data repository until the Health Information Custodian (HIC) advises the PHI to be removed. Appendix A of this guide sets out the retention period for each type of OLIS data and related documentation. For any type of OLIS-related documentation excluded from this retention schedule the retention period is indefinite unless otherwise notified in writing by ehealth Ontario. 2.3 Logical Deletion of OLIS Data in echn ehealth Ontario has the ability to logically delete corrupted lab records. Each time this occurs, ehealth Ontario will provide to echn the following information: Submitter the laboratory identifier Order ID this unique ID identifies a lab report Assigning Authority identifies type of facility: lab, hospital,... Corresponding ID Number unique DN or Laboratory Identifier Insert date date and timestamp that lab report inserted into OLIS Include or exclude flag Deletion date echn will identify the OLIS logically deleted record, based on information provided by ehealth Ontario, and logically delete the record from the echn repository within five (5) business days 2.4 Consent Override Reporting Process Patients have the option to restrict access to their data in OLIS through consent directives (see section 3.1 below). echn users can only override a patient s consent directive with the express consent of the patient or their substitute decision maker. Each time this occurs, ehealth Ontario will send a report directly to each patient detailing the override activity that was performed on their OLIS record. To facilitate the process, echn will send reports to ehealth Ontario at [email protected] on a weekly basis. The reports will detail patient express consent overrides to OLIS data within its system. The legal agreements signed by both organizations include details on this activity and highlight the following data elements that are to be shared with ehealth Ontario. echn to share for any patient whose OLIS consent directive was overridden: date and time consent was overridden (YYYY/MM/DD); 13
15 action performed (i.e. consent override with express consent); last, first name and middle name if available or substitute decision maker name and the relationship to the patient; Ontario health card number and version code and/or medical record number; gender; date of birth (YYYY/MM/DD); language preference; and mailing address of patient including street name, suite or apt. number, city, province or equivalent, postal code or equivalent The consent override report will be produced by echn via an automated process that will run on a weekly basis. The output of the automated process will be a list of patient IDs and types that have had an override on their blocked OLIS data. The output will also include the health care provider that initiated the override along with the date and time of each override. This output file will be used by ehealth Ontario to generate individual patient reports that will be embedded in a letter addressed to the patient, explaining the purpose of the report. 2.5 Responding to Access Requests (Tactical Privacy Audit Solution Reports) ehealth Ontario will require echn to produce OLIS logs to assist ehealth Ontario in fulfilling access requests. There are two forms of access request with respect to OLIS: Access requests from individuals to the MOHLTC as the HIC of OLIS (discussed at section 3.2.1); and Access request from HIC organizations connected to OLIS (discussed at 3.2.2) echn is not to respond directly to access requests but will assist ehealth Ontario in accordance with the process described below. The ehealth Ontario Privacy Office will contact the echn Help Desk to request logs and echn will provide the logs requested within two (2) business days Processing of access requests ehealth Ontario refers to logs or reports produced to assist in responding to access requests as Tactical Privacy Audit Solution (TPAS) logs or alternatively, as TPAS Reports. If the processing of a patient or HIC access request requires logs from echn, the ehealth Ontario privacy office will contact the echn help desk at from Monday through Friday from nine (9) to five (5) and at at all other times to request logs. echn is to provide the TPAS logs requested by ehealth within two (2) business days. echn business help desk will encrypt the TPAS logs with WinZip as noted in Appendix B and send the logs to the address provided by ehealth Ontario privacy office at the time of placing the request for logs. 14
16 echn to provide mapping of organization IDs noted in the logs as well as provide data field definitions as noted in the TPAS logs. ehealth Ontario privacy office is to notify echn when request is closed. echn is to retain the COPY (i.e. excerpt) of the TPAS logs produced for ehealth to respond to the access request until they are successfully transferred to ehealth Ontario. As described in Appendix A of this document, echn is to permanently delete the TPAS report/logs transferred to ehealth Ontario after confirmation from ehealth Ontario is received by echn that the transfer of the report(s) to ehealth was successful Types of logs echn will be required to provide the following types of TPAS logs to assist ehealth Ontario in fulfilling access requests. Access to patient Y s OLIS records by all echn users o This log should include information on access to a particular patient s ( patient Y ) OLIS records by all echn users. o This log should include the following information: Patient ID (including name, HCN or MRN, date of birth), date of access, access type, OLIS data accessed, the organization the individual accessed the record from, the user who accessed the information and the time period during which the access occurred. Access at a particular facility to patient Y s OLIS records o This log should include information on access to patient Y s OLIS records by echn users at a particular echn site ( facility X ). The log should include the following information: Patient ID, date of access, OLIS data accessed, access type, the user who accessed the information, the facility where access occurred and the time period during which the access occurred. Access by user A, at facility X, to OLIS records of patients o This log should contain information on access by user A at facility X of record of patients. The log should contain information on the date of access, access type, OLIS data accessed, patients whose information was accessed (Patient ID), the facility where access occurred and the time period during which the access occurred. Access to OLIS data by all users at Facility X o This log should contain information on access to OLIS data by all users at facility X. The log should contain information on the date of access, access type, patients whose information was accessed (Patient ID), users who accessed the information, OLIS data accessed, the facility where access occurred and the time period during which the access occurred. 15
17 3. Privacy and Security 3.1 Patient Consent Background As custodians of patient PHI, echn sites and health care providers working at sites have obligations under the PHIPA and Ontario Regulation 329/04. The site obligations are set out in the Health Care Provider Guide embedded in section B.2. echn, for the OLIS-eCHN initiative is acting as a PHIPA Sub-Agent to ehealth Ontario, as well as a service provider to ehealth Ontario. This means that echn has certain obligations in respect of consent management for OLIS data in echn s system. Patient Consent Model for OLIS-eCHN OLIS data in echn has a consent directive capability, which gives patients or their substitute decision maker(s) the option to restrict access to patient data in OLIS. A patient may restrict access to either: All of his/her laboratory test results in OLIS or A particular test (to be specified at the time the test is conducted) In other words, if a patient restricts access to his/her results in OLIS, health care providers querying echn for OLIS data will not be able to access any patient information that has been, or will be, submitted into OLIS. When an echn user queries OLIS lab results for this patient, the echn WebChart will notify him/her that the result is blocked when returning the results of a patient query Overriding a consent directive from within the echn WebChart In special cases (with consent from the patient or the patient s SDM) the consent directive restricting access to OLIS data can be overridden by a provider, from within the echn WebChart. Such an override is logged in the echn Audit Manager, along with the identity of the overriding health care provider. As detailed in section 2.4, echn provides ehealth Ontario with a weekly report of the consent directive overrides, for OLIS data. The echn WebChart application enables users to override a consent directive applied to data within echn s system where; (a) there is a clinical/emergency requirement; or (b) access has been granted directly by patient or the patient s SDM (express consent). The MOHLTC, as the 16
18 health information custodian of OLIS, does not permit authorized users who access OLIS to override a consent directive applied to OLIS data without the patient s express consent. Therefore, echn s users are permitted to override a consent directive applied to OLIS data within echn s system only where permission to do so has been expressly authorized by the patient or the patient s SDM prior to performing the consent directive override. echn has modified its WebChart user interface to permit echn users to override the patient s consent directive, for OLIS data, only with the express consent of the patient or SDM, and not for reasons of clinical emergency (echn has technically disabled the clinical/emergency override option for OLIS data). Overriding a patient s consent directive for OLIS data without express consent from the patient or the patient s SDM constitutes a breach of the user s (or echn site s) agreement with ehealth Ontario, and will be subject to the remedies available under the agreement. If a user inquires to echn about the consent management features of OLIS, including the consent override function, please advise the user to contact ehealth Ontario s privacy office at [email protected]. Please advise the user to indicate in the that they are an echn user Applying consent directives to OLIS data If a patient contacts echn and wishes to place a restriction on access to his/her information in OLIS, or wishes to reinstate access (remove the restriction), echn is not permitted to access OLIS data for this purpose. echn is to advise the patient to call Service Ontario at (TTY )) to apply/change the consent directive. 3.2 Access Requests Access requests made by patients for OLIS data Under PHIPA, patients or their SDMs have a right to access the patient s data held by a Health Information Custodian (HIC or custodian) about the patient. There are two types of access requests that a patient can make to the MOHLTC, as custodian of the OLIS data: What information is contained in OLIS about me?, and/or Who has accessed my information in OLIS (i) in general; or (ii) from a particular facility? As the MOHLTC is the custodian of OLIS data (including the OLIS data in echn s system), only the MOHLTC can respond to an individual s access request. As stated in the agreement between ehealth Ontario and echn, echn is not to provide OLIS data or OLIS audit logs directly to patients. 17
19 Instead, if a patient requests OLIS data from echn, or inquires as to who has viewed the patient s OLIS data in echn, then echn is to refer the individual to the MOHLTC Access and Privacy Office at the following address: Attention: Freedom of Information and Privacy Coordinator Access and Privacy Office Ministry of Health and Long-Term Care 6th Floor, 5700 Yonge Street Toronto ON, M2M 4K5 If ehealth Ontario determines that it requires echn s assistance in fulfilling an individual s access request for OLIS data, then ehealth Ontario will contact echn and the parties will follow the process set out in section 2.5 above Requests from echn sites for OLIS audit logs (for their site) echn sites (lead physician or privacy officer at an echn site) may require a record of who from their organization accessed OLIS data via echn s WebChart. The site may request an audit log from ehealth Ontario which will provide them with a record of the following: By facility request a log of all users at the echn site who have accessed OLIS data in the timeframe set out in the request. By user request a log of all accesses to OLIS data by a particular user from the echn site, within the timeframe set out in the request. If echn receives a request from an echn site for OLIS audit logs, echn is to advise the site to contact ehealth Ontario s service desk at to make the request for the audit logs for the echn site. The ehealth Ontario service desk will open a ticket to fulfill the request. A representative from ehealth Ontario s privacy office will call the contact person listed on the OLIS-eCHN Site Profile Form to confirm the type of report requested. ehealth Ontario will then contact echn to assist with fulfilling the site s request for OLIS audit logs, in accordance with the log/report transfer processes described in section 2.5 above. echn is not to release OLIS audit logs to echn sites directly, unless expressly permitted by ehealth Ontario in writing. However, echn may make available to a site the online audit tool via the echn Audit Reporter to review access to its patients records. 3.3 Inquiries and Complaints Received by echn in Respect of ehealth Ontario or OLIS Data If echn receives any complaints or inquiries from users or patients with respect to OLIS data in echn s system, echn must report the inquiry or complaint to ehealth Ontario s service desk (at the contact information below) as soon as reasonably possible after receipt, and work with 18
20 ehealth Ontario to investigate and respond to complaints that arise with respect to how echn manages the OLIS data on behalf of ehealth Ontario. The contact information for ehealth Ontario s service desk is: Tel [email protected] If echn receives a complaint or inquiry relating to ehealth Ontario in general (i.e. not related to OLIS data in echn s system), or related to ehealth Ontario s privacy policies and procedures, echn should advise the individual to submit their complaint, concerns or inquiry by telephone, , fax or mail to the Chief Privacy Officer: ehealth Ontario Privacy Office P.O. Box Bay Street, Suite 701 Toronto, ON M5G 2C8 Fax: (416) [email protected] Telephone: (416) Privacy-Related Questions from echn If echn has any questions regarding the privacy-related processes described above, including how to respond to individual access requests, retention periods, consent obligations of echn or incident/breach management processes, please contact the ehealth Ontario privacy operations department, at [email protected]. Please ensure that you do not include any personal information or personal health information in any s to ehealth Ontario. 3.5 Privacy and Security Incident Management A joint ehealth Ontario/eCHN privacy and security incident management process was created for this initiative. The process describes the responsibilities of echn in the event that a privacy or security incident as defined in the embedded document below is discovered by echn or is reported by a patient or a site. The sites privacy and security incident management responsibilities are detailed in the Health Care Provider Guide which is referenced in section B.2. 19
21 echn ehealth Privacy Breach Management Procedure.pdf 4. Legal Agreements and Access to OLIS ehealth Ontario and echn have entered into a legal partnership for the purpose of providing authorised echn users with access to OLIS data. The agreements structure for the project has been defined in the document embedded below. ehealth Ontario, in addition to entering into agreements with echn, will be directly signing legal agreements with echn sites including hospitals, CCACs and practitioner offices. 4.1 Who can access OLIS data and for what purpose echn must only provide OLIS access to users that are Ontario regulated health professionals for which echn records in its audit logs the name and Regulatory College # of the user. echn must only provide access to OLIS to echn users for the purpose of providing health care or assisting in the provision of health care to patients. echn must not use or allow the use of OLIS or OLIS data for any research purposes or any other secondary uses unless authorised to do so in writing by the MOHLTC, a copy of which authorisation is to be provided to ehealth Ontario prior to any such use. In addition, echn must ensure that it will only provide access to OLIS data to those users that have signed the applicable agreements as outlined in the agreements structure embedded below. 4.2 Agreements Structure OLIS echn Final Agreements Structure.pdf 4.3 Agreements Tracking As agreed upon by echn and ehealth Ontario, ehealth Ontario is to facilitate the signing of agreements between ehealth Ontario and echn sites. ehealth Ontario will be distributing the agreements to echn sites and users and monitoring the agreement execution progress by recording the progress and sharing with echn on a weekly basis (every Friday). 20
22 4.4 Additional Information In addition to the legal agreements, ehealth Ontario will distribute the following documents to each site and all users: Health Care Provider Guide (included in section B.2) Client Site Profile Form (included in section B.1). Instructions for completing the form are also included in this section. 21
23 B. echn Users and Sites 1. OLIS Setup Requirements A privacy officer/contact person will be assigned by each echn site that has access to OLIS data, to liaise with ehealth Ontario for incident management purposes. ehealth Ontario will be distributing the Client Site Profile Form, referenced in Appendix D, to each site. 1. All sites provisioned to access OLIS must fill out a Client Site Profile Form and send it to the ehealth Ontario service desk through at: [email protected] a. The form captures contact Information (i.e. name, site/organization, contact number/ ) of the designated individual. b. ehealth Ontario will distribute the Client Site Profile form to each site and advise the contact person at the site to complete the form and it to the ehealth Ontario service desk at the address included above. 2. The privacy officer/contact person at echn and preferably all sites will have WinZip installed to securely transfer sensitive information including PI/PHI via to ehealth Ontario. Instructions for using WinZip are included in Appendix B of this guide. 2. Health Care Provider Guide The Health Care Provider Guide was developed to inform users and sites of all processes related to the use of OLIS data via echn s WebChart. ehealth Ontario will distribute this guide to each site (physician offices, hospitals, CCACs, ) that is registered to access OLIS via echn. Each echn user and the privacy officer at each site should be provided with a copy of the guide. The Health Care Provider Guide to be distributed is embedded below. echn Health Care Provider Guide.pdf 22
24 Appendix A: Retention Schedule for OLIS Data Category of Data Description Retention Period Notes OLIS data in echn s data repository OLIS-related audit logs and supporting materials OLIS data means any personal health information (as defined in s.4 of PHIPA) about Patients in OLIS, including name, health number, laboratory test result history and related personal information of a patient. OLIS data does not include OLIS access and system logs, or information about consent directive overrides for OLIS data, including substitute decision maker (SDM) information. File Format: Electronic This Category includes OLIS access and system logs in echn s system which detail, for each OLIS record accessed, the name/id of the user that has accessed the OLIS data, location of access (Organization ID), time/date of access, patient ID and the user on whose behalf the query is submitted. Indefinitely, unless otherwise instructed by ehealth Ontario in writing. Indefinitely, unless otherwise instructed by ehealth Ontario in writing. echn to permanently destroy the relevant OLIS data when instructed by ehealth Ontario in writing in accordance with the definition of destroy in the PHIPA Sub-Agent Agreement entered into between ehealth Ontario and echn. The definition of destroy is reproduced below this table. Upon secure destruction of the OLIS data, echn will provide ehealth Ontario with a certificate of destruction if directed to do so by ehealth Ontario. echn to transfer to ehealth Ontario on a weekly basis a copy of the OLIS-related audit logs and supporting materials. Please see section A.2.1 for more information on the transfer process. This Category of data also includes records of consent overrides for OLIS data performed by echn users, including, where applicable, the name of the substitute decision maker (SDM) that provided express consent and relationship of the SDM to the patient. This category additionally includes supporting materials such as any paper or electronic documentation that is required to translate an identifier (ID) used in the audit logs into a real-world ID (for example, if a 23
25 form is required to identify an user or organization by name/licence number/location rather than by the ID used in the logs, then echn to retain such forms). Consent override reports File Format: electronic/paper Weekly reports provided by echn to ehealth Ontario with details of overrides performed in echn s system on blocked OLIS data. These reports may include information about the SDM and the relationship to the patient. File Format: paper/electronic Up to 5 days - echn to permanently delete the consent override report(s), immediately or no later than 5 calendar days, once confirmation from ehealth Ontario is received that the transfer of the report(s) to ehealth Ontario was successful. echn to permanently destroy the relevant consent override reports, at the expiry of the retention period in accordance with the definition of destroy in the PHIPA Sub-Agent Agreement entered into between ehealth Ontario and echn. The definition of destroy is reproduced in the Appendix of this document for reference. Privacy and Security Incident Management Investigation Reports and related documentation TPAS reports This category includes any privacy or security incident investigation materials that contain personal information or personal health information, including investigation notes, copies of logs to support incident investigation, investigation reports and other incident management documentation, that echn produces for ehealth Ontario to assist ehealth Ontario with Incident management or investigation. File Format: electronic/paper Tactical Privacy Audit Solution (TPAS) reports include copies of logs/reports produced by echn to assist ehealth Ontario in responding to patient and health care provider requests regarding access to OLIS patient health records in echn s system. Up to 5 days - echn to permanently delete the report(s), immediately or no later than 5 calendar days, once confirmation from ehealth Ontario is received that the transfer of the report(s) to ehealth Ontario was successful. Up to 5 days - echn to permanently delete the report(s), immediately or no later than 5 calendar days, once confirmation from ehealth Ontario is received that the transfer of the report(s) to Upon secure destruction of the consent override reports, echn will provide ehealth Ontario with a certificate of destruction if directed to do so by ehealth Ontario. echn to permanently destroy the relevant incident management documentation, at the expiry of the retention period in accordance with the definition of destroy in the PHIPA Sub-Agent Agreement entered into between ehealth Ontario and echn. The definition of destroy is reproduced below this table for reference. Upon secure destruction of the incident management documentation, echn will provide ehealth Ontario with a certificate of destruction if directed to do so by ehealth Ontario echn to permanently destroy the relevant TPAS documentation, at the expiry of the retention period in accordance with the definition of destroy in the PHIPA Sub-Agent Agreement entered into between ehealth Ontario and echn. The definition of destroy is reproduced below 24
26 This includes any paper or electronic documents that are received or produced by echn (such as access request forms with patient identification information, copies of access logs about a particular patient or provider) to assist ehealth Ontario in responding to an access request. File Format: electronic/paper ehealth Ontario was successful. this table for reference. Upon secure destruction of the TPAS documentation, echn will provide ehealth Ontario with a certificate of destruction if directed to do so by ehealth Ontario Destroy means, with respect to the Relevant PHI in the possession or control of the Contracting PHIPA Agent or of any PHIPA Sub-Agent, to: (a) physically destroy all print and other hard copies of it; (b) erase, scrub, or otherwise remove all electronic, digital or other versions of it from every item of equipment and all media (including disks, tapes, computers, servers, and related peripheral equipment such as disk arrays, tapes or disk backup units) that it has been installed, downloaded, or otherwise put, onto; and (c) otherwise obliterate it, or to ensure that the foregoing is done, and Destroying and Destroyed have corresponding meaning. Return means for echn to return the data (paper or electronic) to ehealth Ontario, using secure means as directed by ehealth Ontario, when the retention period is complete. 25
27 Appendix B: Procedures for Communicating Sensitive Files Over Overview ehealth Ontario policies require that adequate safeguards be applied every time a sensitive document or file is stored or transferred through communication channels that are not considered safe and secure such as regular internet , CDs, DVDs, USB sticks and/or flash memory card. This document provides the instructions on how to apply a strong level of protection to sensitive files and reports, using WinZip, a commercially available application that can be used both to reduce the size of a document and to apply strong protection. It is important to keep in mind that the encryption tool described in this document is a password based cryptosystem. The protection of file encryption could be broken if the associated password is compromised. Therefore, it is required that the password protection guidelines described in section four be applied by anyone who uses the tool and is involved in the file encryption process. Authorized Uses This process can be used whenever there is an occasional need for any sensitive information to be transferred over as part of regular business processes, including documents that contain personal information (PI) and/or personal health information (PHI). If sending sensitive information over is an ongoing business process, considerations should be made to automate the process and use an enterprise mechanism to securely transfer the information other than outlined in this guide. The limit on attachments has been predetermined at 10 MB per at ehealth Ontario. For further assistance please contact ehealth Ontario security services. Instructions to file encryption and password creation Use of WinZip Encryption Software This guide has been written for WinZip 11.2 standard versions and is the suggested encryption tool. Sensitivity Level: LOW HIGH when completed Page 26 of 36
28 Step 1. Open the Application. Create a new archive* and save in a working folder. Add files to an archive: Navigate to the folder where the sensitive files are. Choose to add files to an archive rather than move files to an encrypted archive. When a file is moved to an archive, it appears that the original copy of the file is deleted, but the contents of the file still exist in the computer s memory. Adding files to an archive is safer because this leaves the original file intact, making it obvious to the user that the contents of the plain file still exist on the computer. Encrypting Files using WinZip Fig.1 Add files to an archive *An archive is a file document. Step 2. Encrypt the entire archive: Encrypt the entire archive after all files have been added. Click on the Encrypt icon. Fig.2 Encrypt the archive Sensitivity Level: LOW HIGH when completed Page 27 of 36
29 Step 3. Choose a stronger encryption mechanism: Use 256-bit AES encryption. Do not use Zip 2.0 compatible encryption. Step 4. Create a strong password: (See section 4.1 below for details) Enter a strong password when the Encrypt dialog displays and choose to mask the password as shown in Fig.3. Fig.3 Choose an encryption mechanism Step 5. Temporarily save the encrypted extract in a folder on your computer or a network share drive. Note: Once the recipient confirms they are able to open the file, the local file can then be deleted. The file must be encrypted and password protected before the sender transfers it to the requester as an attachment to an message. WinZip, described in this document, supports symmetric encryption. This requires the exchange of a shared secret (password in this case). In other words, the sender of the encrypted file must communicate the password to the intended recipient of the file. WinZip does not provide a method for retrieving files from an encrypted archive if a password is forgotten. The problem of password creation and sharing therefore requires special attention. File transfer, and sharing Once the file has been encrypted and password protected it is temporarily saved to the network share or local hard drive share, the password should be communicated by phone to the file recipient or by using an out of band method (e.g. if ing document, send password by phone, fax or mail). In other words, the password should not be sent at the same time using the same method as the encrypted file. The following requirements apply to password management: Password creation It is important to create a strong password with which to protect encrypted files. - Create and use a different password for each different WinZip archive. - Use 8 characters or more. Sensitivity Level: LOW HIGH when completed Page 28 of 36
30 - Passwords must contain characters from three of the following four categories: uppercase characters (A-Z); lowercase characters (a-z); numeric (0-9); and special characters (e.g.!, $, #, _, ~, %, ^). - Example of a bad password is 1234Password! - Example of a good password is it_is_a_warm_day22 File transfer Once a password has been created, the sender will transfer the file to the requester by . It is important to make sure that the has been sent to the correct recipient. When the is received, the requester should call the sender to acquire the password. Password sharing Passwords must be securely shared when being sent to ehealth Ontario from a health information custodian. The procedures are as follows: - Determine the authorized recipient of the information. - Make the encrypted file available to the recipient using agreed process (e.g. SFTP, ). - The requestor calls the sender at their telephone number. - The sender verbally verifies the recipient s identity: Name Title, Business Unit, Organization Name of received / retrieved encrypted file. - Verbally provide the verified recipient with the password to open the encrypted file. - Request and obtain verbal confirmation that the recipient has been able to extract the file(s). - The sender securely destroys the written copy (if any) of the password and deletes any copies of the file from any local or network drives. Password Recovery WinZip does not provide a mechanism for password recovery. Therefore, in the case of long term storage of encrypted files, a method of password recovery must be in place to access these files (e.g. if an employee leaves and their files need to be accessed for the business needs). An example of a password recovery method is storing the password in a sealed envelope to which only upper management have access to and will only be accessed for password recovery purposes. File deletion Once a file has been decrypted and used, it must be deleted by both the sender and the requester of the file. Sensitivity Level: LOW HIGH when completed Page 29 of 36
31 Appendix C: Sample Incident Report Form Part I - Identification and Reporting 1. Background Information Privacy Incident/Breach Management Report Incident/Breach Summary Click here to enter text. Name of reporting organization Click here to enter text. Point of contact and contact details Click here to enter text. 2) Incident/Breach Details Date & time incident/breach reported Date & time Incident/breach discovered Date & time incident/breach occurred Place of incident/breach Name and title of person who discovered incident/breach How the incident/breach was discovered Organization(s) or individual(s) affected by the incident/breach (e.g., employees, service providers) 3. Type of Privacy Breach Type of Privacy Incident/Breach? Privacy breach - Yes No Privacy Incident - Yes No N/A Policy infraction Agreement infraction Unauthorized collection Unauthorized use Unauthorized disclosure Unauthorized disposal Other details Sensitivity Level: LOW HIGH when completed Page 30 of 36
32 4. Information Assets Involved Please identify the information assets involved in the breach (e.g. server, USB devices, EHR application) and its location (e.g. IT Department, remote location) 5. Information Involved Please identify the type of information involved in the incident/breach Type of data (e.g. personal information, personal health information) Example of data elements (e.g. name, health card information, SIN, diagnoses information) Format of data Encrypted Identifiable De-identified Statistical Aggregated Part II Containment 6. Incident/Breach Containment Date & Time Please describe the immediate steps taken to contain the incident/breach (e.g. recovery of information, computer system shut down, locks changed). Activities Sensitivity Level: LOW HIGH when completed Page 31 of 36
33 Part III Notification 9. Individuals and Organizations Notified Name of Organization Date & Time Activities Please identify the individuals or organizations notified Internal Communications Please identify the individuals/departments notified of the privacy incident/breach Name/Title of the Individual/Department Date & Time Activities Part IV Investigation 11. Breach investigation Investigation Summary Outocme of the Investigation Root cause of the breach (if known) Estimated number of individuals affected (e.g., patients, employees, external stakeholders) Potential harm to individuals & the Agency resulting from the breach. (e.g., security risk, identity theft, financial loss, reputational damage) Risk of ongoing or further exposure Part V Remediation and Prevention 12. Please identify the remediation activities to prevent the incident from occurring again. Remediation Recommendation Recommendations/Actions items are captured in the attached document. Schedule Date Owner Progress Complete Date Click here to enter text. YYYY/MM/DD Sensitivity Level: LOW HIGH when completed Page 32 of 36
34 Report completion and approval Report completed by: Report reviewed by: Report approved by: Click here to enter text. Date 2013/07/10 Date YYYY/MM/DD Date YYYY/MM/DD Sensitivity Level: LOW HIGH when completed Page 33 of 36
35 Appendix D: Client Site Profile Form ehealth Ontario Client Site Profile Form Form Completion Instructions 1. This form must be completed with all contacts that ehealth Ontario will use to provide ongoing support. 2. All fields must be completed as specified. Mandatory fields are marked with an asterisk. Indicate N/A if a field is not applicable. 3. completed form to the ehealth Ontario Service desk at [email protected]. 1A Practice Group Information (Please provide information about the Practice Group) Organization Legal Name * (e.g., Mytown Family Health Team) Location Name (e.g., Main Street Site) Primary Business Address * (Number and Street) Suite/Unit/Floor City/Town * Province * ON Postal Code * Business Telephone * Hours of Operation If after-hours support is available, please provide contact instructions Other Locations - If site has other locations please indicate them here Location Location Name Name Business Telephone Business Telephone 1B Helpdesk Support Contact Information (Please provide information for the lead contact at the Practice) Salutation Dr. First Name * Last Name * Mr. Miss Mrs. Ms. Business Telephone * (incl. Extension) Is voic available (Yes/No) Alternate telephone or pager number Business * 1C Privacy Officer Contact (Please provide the name of a privacy contact who provides support for this service at the Practice Location, where different from above) Salutation Dr. First Name * Last Name * Mr. Miss Mrs. Ms. Business Telephone * (incl. Extension) Is voic available (Yes/No) Alternate telephone number Business 1D Notification Contact (Please provide the name of a contact who provides support for this service at the Practice Location, where different from above) Salutation Dr. First Name * Last Name * Mr. Miss Mrs. Ms. Business Telephone * (incl. Extension) Is voic available (Yes/No) Alternate telephone number Business 1E System Security Contact (Please provide the name of a technical contact who provides support for this service at the Practice Location, where different from above) Salutation Dr. First Name * Last Name * Mr. Miss Mrs. Ms. Business Telephone * (incl. Extension) Is voic available (Yes/No) Alternate telephone number Business Sensitivity Level: LOW HIGH when completed Page 34 of 36
36 Part 1 Practice Information 1A Organization Details Organization Legal Indicate the legal name of the organization that is eligible for the service. Name* Primary Business Enter the address of the site identified in the Location Name field. Include the street number, Address* street name, and street suffix (if any). For example, 123 Your Street North. Suite/Unit/Floor Enter the suite, unit, or floor number of the address identified in the Business Address field. City/Town* Enter the city or town associated with the address identified in the Business Address field. Province* This field always indicates Ontario and completion is therefore not necessary. Postal Code* Enter the postal code associated with the address identified in the Business Address field. Business Telephone* Enter the business main telephone number for the organization. Hours of operation Indicate your business hours in this field. If after-hours support If your indicated contacts are available for contact outside of normal business hours indicate is available, please instructions around their availability. provide contact instructions Other Locations Enter the names and addresses of any additional practice locations; you may use a separate sheet to capture additional sites as required. 1B Helpdesk Support Contact Information Salutation Enter title used before the surname or full name, or the professional title. First Name* Enter the contact s full first name. Last Name* Enter the contact s full last name. Business Telephone (including Extension)* Enter the business telephone number and extension where the helpdesk support contact can be reached. Alternate telephone or pager number Enter any available alternate numbers where the contact can be reached. Business Enter the business address where the contact can be reached. 1C Privacy Officer Contact Salutation Enter title used before the surname or full name, or the professional title. First Name* Enter the service support contact s full first name. Last Name* Enter the service support contact s full last name. Business Telephone (including Extension)* Enter the business telephone number where the privacy officer t can be reached. Please list an extension number if applicable. Alternate telephone or pager number Business Enter any available alternate numbers where the contact can be reached. Enter the business address where the privacy officer can be reached. Please do not indicate personal addresses. 1D Notification Contact Salutation Enter title used before the surname or full name, or the professional title. First Name* Enter the service support contact s full first name. Last Name* Enter the service support contact s full last name. Business Telephone (including Extension)* Enter the business telephone number where the notification contact can be reached. Please list an extension number if applicable. Business Enter the business address where the notification contact can be reached. Please do not indicate personal addresses. 1E System Security Contact Salutation Enter title used before the surname or full name, or the professional title. First Name* Enter the service support contact s full first name. Last Name* Enter the service support contact s full last name. Business Telephone (including Extension)* Enter the business telephone number where the system security contact can be reached. Please list an extension number if applicable. Business Enter the business address where the system security contact can be reached. Please do not indicate personal addresses. Sensitivity Level: LOW HIGH when completed Page 35 of 36
Health Care Provider Guide
Health Care Provider Guide Diagnostic Imaging Common Service Project, Release 1 Version: 1.4 Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document may be reproduced
ehealth Ontario Ontario Lab Data and Your EMR
ehealth Ontario Ontario Lab Data and Your EMR 2012 ehealth Ontario NOTICE AND DISCLAIMER All rights reserved. No part of this document may be reproduced, stored in a retrieval system, or transmitted, in
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
Personal Health Information Privacy Policy
Personal Health Information Privacy Policy Privacy Office Document ID: 2478 Version: 6.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights
EHR Contributor Agreement
This EHR Contributor Agreement (this Agreement ) is made effective (the Effective Date ) and sets out certain terms and conditions that apply to the sharing of Personal
Ontario Laboratories Information System Electronic Medical Records Initiative. Privacy Impact Assessment Summary
Ontario Laboratories Information System Electronic Medical Records Initiative Privacy Impact Assessment Summary Copyright Notice Copyright 2011, ehealth Ontario All rights reserved Trademarks No part of
Electronic Health Record Privacy Policies
Electronic Health Record Privacy Policies Table of Contents 1. Access and Correction Policy v1.1 2. Assurance Policy v1.1 3. Consent Management Policy v1.2 4. Inquiries and Complaints Policy v1.1 5. Logging
Privacy Incident and Breach Management Policy
Privacy Incident and Breach Management Policy Privacy Office Document ID: 2480 Version: 2.1 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights
Policy Document Control Page
Policy Document Control Page Title Title: Policy for the electronic transfer of Person Identifiable Data - harmonised Version: 5 Reference Number: CO51 Supersedes Supersedes: 4 Description of Amendment(s):
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
ONE Mail Direct for Desktop Software
ONE Mail Direct for Desktop Software Version: 1 Document ID: 3931 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document may
PDMP User s Guide. Oregon Health Authority Prescription Drug Monitoring Program
Oregon Health Authority Prescription Drug Monitoring Program December 2015 Contents Contents 1 Document Overview... 1 Purpose and Contents... 1 RxSentry Update... 1 2 System Overview... 3 About the RxSentry
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
PRIVACY BREACH POLICY
Approved By Last Reviewed Responsible Role Responsible Department Executive Management Team March 20, 2014 (next review to be done within two years) Chief Privacy Officer Quality & Customer Service SECTION
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Privacy Policy on the Responsibilities of Third Party Service Providers
Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Office Document ID: 2489 Version: 3.1 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014,
Taking care of what s important to you
A v i v a C a n a d a I n c. P r i v a c y P o l i c y Taking care of what s important to you Table of Contents Introduction Privacy in Canada Definition of Personal Information Privacy Policy: the ten
ONE Mail Direct. Privacy Impact Assessment Summary
ONE Mail Direct Privacy Impact Assessment Summary Copyright Notice Copyright 2010, ehealth Ontario All rights reserved No part of this document may be reproduced in any form, including photocopying or
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Mohawk DI-r: Privacy Breach Management Procedure Version 2.0. April 2011
Mohawk DI-r: Privacy Breach Management Procedure Version 2.0 April 2011 Table of Contents 1 Purpose... 3 2 Terminology... 5 3 Identifying a Privacy Breach... 5 4 Monitoring for Privacy Breaches... 6 5
How To Use Adobe Software For A Business
EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed
All Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as
HIPAA Compliance (DSHS and HCA) Preamble: This section of the Contract is the Business Associate Agreement as required by HIPAA. 1. Definitions. a. Business Associate, as used in this Contract, means the
What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER
What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER/ONTARIO Table of Contents What is a privacy breach?...1
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
Telstra Wholesale Digital Certificates
Telstra Wholesale Digital Certificates LinxOnline User Guide Issue Number 2, 31 July 2007 Version 2, 31 July 2007 TW Digital Certificate Management User Guide Copyright 2007, Telstra Corporation Limited.
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
CA Clarity PPM. Demand Management User Guide. v13.0.00
CA Clarity PPM Demand Management User Guide v13.0.00 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention
State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other
ScreenMaster RVG200 Paperless recorder FDA-approved record keeping. Measurement made easy
Information INF13/147 EN ScreenMaster RVG200 Paperless recorder FDA-approved record keeping Measurement made easy Guidance on the use of the RVG200 paperless recorder for electronic record keeping in FDA-approved
SafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines
(This document supersedes the document previously entitled MCFD Contractor Records Guidelines) Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines November
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
Best Practices for Protecting Individual Privacy in Conducting Survey Research
Best Practices for Protecting Individual Privacy in Conducting Survey Research CONTENTS Foreword... 1 Introduction... 2 Privacy Considerations at Each Stage of a Survey Research Project... 5 Stage 1: Issue
User Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011
SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.
CITY UNIVERSITY OF HONG KONG. Information Classification and
CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification
Medical Claims Electronic Data Transfer Reference Manual. Ministry of Health and Long-Term Care
Medical Claims Electronic Data Transfer Reference Manual Ministry of Health and Long-Term Care Version 1.0 September 2012 Medical Claims Electronic Data Transfer Reference Manual Table of Contents Table
Service Level Agreement for Database Hosting Services
Service Level Agreement for Database Hosting Services Objective Global Service Levels include the general areas of support that are applicable to every ITS service. The purpose of the Service Level Agreement
WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery
WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed
ConnectingGTA Provider Portal User Guide for Site Trainers and Site Help Desks
ConnectingGTA Provider Portal User Guide for Site Trainers and Site Help Desks Version: 1.0 Date: July 2015 Table of Contents Getting Started... 9 Introduction... 9 Accessing the ConnectingGTA Provider
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
HIPAA Audit Risk Assessment - Risk Factors
I II Compliance Compliance I Compliance II SECTION ONE COVERED ENTITY RESPONSIBILITIES AREA ONE Notice of Privacy Practices 1 Is your full notice of privacy practices given to every new patient in your
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK REVISED August 2004 PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK Introduction
ONLINE EXPRESS INTERNET BANKING CUSTOMER AGREEMENT
ONLINE EXPRESS INTERNET BANKING CUSTOMER AGREEMENT This Agreement is entered into between Farmers Trust & Savings Bank (the "Bank") and any customer of the Bank who subscribes to the Bank s Online Express
Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates. Reference Manual
Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates Guidelines on Requirements and Good Practices For Protecting Personal Health Information Disclaimer
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems
Procedure P309 - Proofpoint Encryption - Decrypting Secure Messages Business systems P309 - Page: Page 1 of 12 Date of Release: 23 February 2011 Status: Final Document Reference: Title: P309 Release Number:
Information Security Classification
i Information Management Information Security Classification February 2005 Produced by Information Management Branch Government and Program Support Services Division Alberta Government Services 3 rd Floor,
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT
FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is made and entered into to be effective as of, 20 (the Effective Date ), by and between ( Covered Entity ) and
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies
INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies REMOVABLE MEDIA: NSW MoH are currently undergoing review with a state-wide working party developing the Draft NSW
HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Application Setup help topics for printing
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Application Setup help topics for printing Document Release Date: December 2014 Software Release Date: December
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
ChangeIt Privacy Policy - Canada
ChangeIt Privacy Policy - Canada 1. Policy on Privacy of Personal Information Formulating Change Inc. ( FCI, we, us or our ) is committed to protecting the privacy and security of your Personal Information
CONTROLLED DOCUMENT. Uncontrolled Copy. RDS014 Research Related Archiving. University Hospitals Birmingham NHS Foundation Trust
University Hospitals Birmingham NHS Foundation Trust CONTROLLED DOCUMENT RDS014 Research Related Archiving CATEGORY: CLASSIFICATION: PURPOSE Controlled Document Number: Version Number: 1 Controlled Document
Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:
Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by
Provider OnLine. Log-In Guide
Provider OnLine Log-In Guide Table of Contents 1 LOG-IN ACCESS... 3 1.1 ENTERING THE USER ID AND PASSWORD... 4 1.2 OVERVIEW AND PURPOSE OF TRICIPHER... 5 1.2.1 Log-in for Users Who Are Active, But Not
Greenway Customer Support SUPPORT POLICIES. To deliver world class client experiences that delight each and every time we interact with our clients.
Greenway Customer Support SUPPORT POLICIES To deliver world class client experiences that delight each and every time we interact with our clients. INTRODUCTION Customer Support Our Technical Support Center,
Customer Portal User Guide
Customer Portal User Guide COPYRIGHT NOTICE ViaWest Customer Portal User Guide is published and copyrighted 2012 by ViaWest Inc. All rights reserved. No part of this manual may be reproduced in any form,
CUSTOMER GUIDE. Support Services
CUSTOMER GUIDE Support Services Table of Contents Nexenta Support Overview... 4 Support Contract Levels... 4 Support terminology... 5 Support Services Provided... 6 Technical Account Manager (TAM)... 6
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
Release Two. For School Boards and School Authorities. November 2005 (Version 1.1)
MINISTRY OF EDUCATION Information Management Branch Ontario School Information System (OnSIS) User Guide: FIRST TIME USERS Release Two For School Boards and School Authorities November 2005 (Version 1.1)
DSS Electronic Facility Clearance System (e-fcl) Submission Site User Guide
U. S. Department of Defense Defense Security Service Industrial Security Program DSS Electronic Facility Clearance System (e-fcl) Submission Site User Guide June 2013 Version 7.2 1 e-fcl Submission Site
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
Statement of Service Enterprise Services - AID Microsoft IIS
Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
Privacy Impact Assessment
AUGUST 16, 2013 Privacy Impact Assessment CIVIL PENALTY FUND AND BUREAU-ADMINISTERED REDRESS PROGRAM Contact Point: Claire Stapleton Chief Privacy Officer 1700 G Street, NW Washington, DC 20552 202-435-7220
Training Guide for Government Agencies and Healthcare Administration
Training Guide for Government Agencies and Healthcare Administration Pharmacy Examining Board Wisconsin Department of Safety and Professional Services May 2013 Contents Contents 1 Document Overview...
Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII)
Policies and Procedures for Electronic Protected Health Information (ephi) and Personally Identifiable Information (PII) Effective Date: April 10, 2012 Prepared by: Joe Raschke (IT) Table of Contents Purpose
ADOBE PSLT - ADOBE EXPERIENCE MANAGER: MANAGED SERVICES BASIC (2015V2.1)
1. Development Consultant. Any Development Consultant(s) appointed by Customer under this PSLT work expressly and exclusively at Customer s direction and Customer is responsible for any acts or omissions
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information
Credit Union Board of Directors Introduction, Resolution and Code for the Protection of Personal Information INTRODUCTION Privacy legislation establishes legal privacy rights for individuals and sets enforceable
U.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
Frequently Asked Questions Ver 1.0
Frequently Asked Questions Ver 1.0 1) How do I create my online account? A: To create your own online account for the policy owned by you with company visit https://customerlogin.maxlifeinsurance.com click
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES 1. Definitions. The definitions below shall apply to this Schedule. All capitalized terms not otherwise defined herein
Order. Directive Number: IM 10-3. Stephen E. Barber Chief Management Officer
Pension Benefit Guaranty Corporation Order Subject: Protecting Sensitive Information Directive Number: IM 10-3 Effective Date: 4/23/08 Originator: OGC Stephen E. Barber Chief Management Officer 1. PURPOSE:
Encrypting Files Using AxCrypt
Encrypting Files Using AxCrypt Documents, spreadsheets, databases, and other files that contain personal information or other sensitive information MUST BE encrypted when being transmitted to someone else
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
