DEPARTMENTAL POLICY. Northwestern Memorial Hospital
|
|
|
- Kelley Haynes
- 9 years ago
- Views:
Transcription
1 Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines to safeguard and control the dissemination of patient information and defines procedures for access and use of electronic patient information contained in our Clinical Information Systems (CIS) and, specifically, the Electronic Medical Record (EMR). This policy outlines appropriate behaviors and expectations for use of patient information contained in any CIS application at Northwestern Memorial Hospital (NMH) and provides specific procedures on how to access to electronic patient information contained in our Cerner PowerChart Electronic Medical Record (EMR). II. DEFINITIONS: A. Appropriate Access: Providing an Eligible User timely access to patient specific information that is necessary to perform his or her professional responsibilities. B. CIS: A collection of Clinical Information System (CIS) applications that maintain patient health information at Northwestern Memorial Hospital (NMH). Currently our CIS includes the PowerChart application. The CIS Department is an entity within Information Services which develops and maintains the Electronic Medical Record (EMR). C. Consultants: External Consultants to NMH will be granted access to the CIS/EMR based on Need to Know as determined by a Manager or Director in the NMH department that is responsible for the work performed. For Consultants providing patient care services, access will be granted and managed by the appropriate Patient Care Department. For Information Services Consultants who provide systems and technical support to our CIS, access will be granted and managed by the CIS Department in Information Services. D. Eligible Individual of the EMR: Access to the Clinical Information Systems is limited to individuals performing specific patient care processes that require a Need to Know. E. EMR: Electronic Medical Record. The electronic medical record is defined as any form of patient information that is maintained electronically by our Clinical Information System Applications (CIS). F. Patient information: Any patient identifiable medical data that can be viewed through an application within the Clinical Information Systems. Patient identifiable medical data includes: clinical results, patient demographics, procedures, and encounter information. G. Position: An application system term, the position defines the type and amount of access a user has within the CIS. H. Need to Know: Information needed to provide and/or support quality patient care processes that are directed at the provision of health care to an individual; the past, present, or future payment for the provision of health care to an individual; or health care operational activities, as defined by an individual s professional responsibilities to the patient and/or the facility. Health care operational activities would include compliance, accreditation, licensing, certification and all other administrative activities. I. Regulatory Reviewers: Regulatory reviewers will be granted access to the CIS based on Need to Know as determined by a Manager or Director in the Medical Records Department. The Medical Records Department will grant and manage access for regulatory reviewers performing or supporting health care operational activities.
2 2 of 11 J. Remote Access: Application used to provide access to clinical applications through external Internet connections outside of the organization. Data viewed through Remote Access is 128 bit encrypted, complying with current industry best practices and legal standards. K. Secure ID: Secure Identification (ID) is a physical token used for access authentication in the Remote Access application. Secure ID is changed every 60 seconds with a randomly selected 6-digit number. L. Security Model: The technical structure which provides ease and timely access to patient health information, through the EMR, without compromising patient s privacy or care through inappropriate use or inadequate information. M. Vendors: Any organization providing goods or services to NMH, not in a consultative capacity, will be granted access to the CIS based on Need to Know as determined by a Manager or Director in the Medical Records Department. Access will be granted based on the specific job function defined in the signed NMH Purchase Order or Vendor Agreement. III. POLICY: A. Security of Electronic Patient Information: Data security is an important consideration for everyone who utilizes the Clinical Information Systems at NMH. The electronic patient information access policy, standards and procedures specifically address confidentiality, security and protection of our clinical information. This policy applies to any individual that is granted electronic access (including remote access) to our clinical information systems and EMR at Northwestern Memorial Hospital. NMH has a legal and ethical obligation to ensure the confidentiality and security of Patient Information and individuals granted access to patient information are personally responsible for ensuring that the privacy of our patients is always protected. B. Individual Responsibilities to Ensure Confidentiality and Security: To ensure protection of our patient s privacy, individuals granted access to electronic patient information are required to demonstrate behavior that supports patient confidentiality at all times. Many of these behaviors are outlined in the Confidentiality Policy 1.46, our NMH Confidentiality Agreement as well as the Patient Care Policy Medical Records Personal obligations in this area are explained below and individuals are required to read and to abide by these duties. The violation of any of these duties will subject an individual to discipline or termination from NMH. Disciplinary action may include, but is not limited to, loss of privileges to remote access of patient information, loss of privileges at NMH, and to civil fines, penalties, judgments, and/or criminal sanctions, including imprisonment. 1. The medical record is the property of the Hospital and is maintained for the benefit of the patient, the Medical Staff and the Hospital. The information contained within the record, including all forms of electronic patient information, is the property of the patient and cannot be released to individuals not otherwise authorized, without the written consent of the patient, a subpoena, court order or statute. 2. Only authorized users with a Need to Know should access clinical data on an individual patient. 3. Individuals will not misuse or carelessly care for confidential patient information or in any way use, divulge, copy, release, sell, loan, review, alter or destroy any confidential patient information. This includes, but is not limited to, non-irb approved research or third party marketing activities, except as authorized within the scope of their professional activities as a member of the NMH medical staff for patient treatment, billing or healthcare operations; as authorized by the patient or his or her legal representative; or as required or permitted by law.
3 3 of Individuals will safeguard and will not disclose their personal access code or any other access device that permits access to confidential patient information, e.g., never share personal access codes, passwords or devices with any other person; or allow anyone else to access or alter confidential patient information under their identity. To report any lost or stolen access code or device contact the Help Desk at HELP so it may be deactivated. Individuals accept personal responsibility for all activities undertaken using assigned access codes or devices and will be responsible for misuse or wrongful disclosure of confidential patient information and for failure to safeguard access codes or devices. 5. For individuals who are Non-NMH personnel that directly support Physicians, the Physician or the Physician s Practice assumes responsibility for ensuring their support staff fully comply with this policy and the behaviors specifically outlined in this policy. 6. NMH has the right to monitor and audit the activities undertaken through the use of personal access codes or devices and users agree to cooperate with any investigations regarding unauthorized or improper use of confidential patient information accessed using personal access codes or devices. 7. Activities by any individual or entity that are suspected of compromising the confidentiality or security of confidential patient information must be reported. Reports made in good faith about suspect activities will be held in confidence to the extent permitted by law, including the name of the individual reporting the activities. 8. Personal obligations to protect our confidential information under this Agreement will continue after termination of privileges to access of patient information or loss of privileges as a member of the NMH medical staff. Access privileges hereunder are subject to periodic review, revision and if appropriate renewal. 9. Individuals have no right or ownership interest in any confidential patient information referred to in this Agreement. NMH may at any time revoke personal access codes, devices, or access to confidential patient information. At all times while exercising privileges individuals will safeguard and maintain the confidentiality of all patient information. C. Eligibility: Access to electronic patient information will be granted to an individual on a Need to Know basis. Eligible Users must only access/view information that they have a legitimate Need to Know, regardless of the extent of access provided. Need to Know is information needed to provide and/or support quality patient care processes that are directed at the provision of health care to an individual or the past, present, or future payment for the provision of health care to an individual. These processes are defined by an individual s professional responsibilities to the patient and the facility as noted below: 1. Northwestern Memorial Hospital Employees 2. Volunteers, Students, Nursing, Allied Health 3. Physicians (Attendings, Resident/House staff and Medical 3 rd or 4 th year Students) 4. Non-NMH Personnel (For Physician Staff support, Physicians must determine eligibility for their support staff) 5. Patient Care Consultants 6. Information System Consultants
4 4 of Regulatory Reviewers 8. Vendors For individuals not listed above who do require access to meet specific job requirements such as research, a specific patient authorization or IRB waiver must be obtained in order to establish a Need to Know and obtain access to the EMR. Refer to the Approval to Conduct Research patient care policy 5.43 for further information. For our patients and legal guardians of patients who have the right to review their own Medical Record, these groups may access the paper Medical Record in accordance with the Patient Care D. Right to Audit NMH believes auditing is an essential function of safeguarding the confidential patient data from inappropriate use. Through the use of system tools and technical functionality NMH has the right, without prior notice, to conduct system audits to ensure a secure environment in which patient information is stored. The CIS Department within Information Services is responsible for the technical and physical aspects of securing patient information. NMH Medical Leadership and the Medical Records Committee are responsible for the management of processes related to auditing the EMR and reporting violations to the appropriate parties as necessary. E. Reporting Breaches of Security It is every employee s duty to report suspected or known instances of wrongdoing. Prompt, accurate and thorough disclosure of these occurrences is not only an expectation of employees but is an obligation and a requirement of any employed position. Below are the two methods by which an instance of wrongdoing may be reported: 1. An individual may report an instance of wrongdoing by contacting and reporting full details to their immediate Manager in accordance with the NMH Corporate Integrity Reporting Wrongdoing Policy Managers will then assess the report and contact Corporate Integrity and other appropriate departments for assistance as outlined in the Reporting Wrongdoing policy. 2. To anonymously report a breach in security and confidentially at any time, an individual may contact Corporate Integrity Action Line at F. Sanctions for Breach of Security Disciplinary action will occur in accordance to Human Resources 4.65 or the Medical Staff bylaws. Corporate Integrity may involve Senior Management, Office of the General Counsel and the Director of Human Resources if necessary to facilitate an investigation. IV. ACCESS PROCEDURE: A. Granting Access (for Cerner Powerchart EMR): 1. Sign Appropriate Access and Confidentiality Agreement. The review and signature of an agreement outlining the basic principles of this policy and key confidentiality statements will be required in order to obtain access to NMH s clinical information systems as well as remote access. The form necessary will depend upon the individual s function or job responsibility (See instructions in #3-7 below). Agreement Applicable Party/ Responsibility NMH Confidentiality Agreement All individuals granted CIS/EMR access NMH Remote Access and Confidentiality Physicians
5 5 of 11 Agreement Confidentiality Contract Regarding Access to Patient Information Vendor Access and Confidentiality Agreement Non-NMH Personnel who support Physicians. Note: Physicians will be required to sign this agreement on behalf of their staff. Vendors, Patient Care and Information System Consultants, Regulatory Reviewers 2. Complete Training. In general, there are two avenues through which an individual (user) may receive EMR Access. All eligible users are able to utilize either of these options: a) Training Course: This course would be available after signing the NMH Confidentiality Agreement. (Refer to General Administration Confidentiality policy #1.46.) This course will teach the new user how to use the Clinical Information System as well as the importance of viewing patient data on a Need to Know basis only. After completing the course the user will need to pass Competency Test. b) Computer Based Training: This will be available to the user after signing the NMH Confidentiality Agreement. This CBT will teach the user how to use the Clinical Information System as well as the importance of viewing patient data on a Need to Know basis only. After completing the course the user will be required to pass a Competency Test. 3. Departmental User Access to CIS: Submit Computer Access Request Form. The department manager (Level one or above) is the data gatekeeper for his/her department and is responsible for ensuring this policy is applied to all individuals in the department using Clinical Information Systems. Therefore, it is the responsibility of Management to determine what kind of access the employees will granted. Once an access need is identified by the department Manager, the attached Computer Access Request Form must be completed and sent to the IS Customer Response Unit (CRU) System Administrator by the Manager. This form is also located on the NMH Intranet in the Forms folder. Access to specific system functions will then be provided based on a predefined role-based security access model. 4. Physician Access to CIS: Physicians will obtain, from the Medical Staff Office (MSO), a standard NMH Confidentiality Agreement and the Computer Access Request Form to review and sign. Both signed forms be completed and sent to the CRU System Administrator. The CRU will then contact the Physician with the user login name and password. 5. Medical Students and Residents Access to CIS: Medical Students will gain access to NMH s CIS through submission of a student list generated annually by the Associate Dean. A list of all students requiring access for the year is submitted to NMH s Customer Response Unit (CRU) for ID generation and the access codes are then distributed to all students. For Residents, Medical Affairs obtains a list of Fellows and Residents requiring access to the CIS from the University Office of Graduate Medical Education. This list is submitted to NMH s Customer Response Unit (CRU) for ID generation and the final list of access codes is distributed during Resident s Orientation or PowerChart Training Class.
6 6 of Physician Remote Access: Submit Physician Remote Access Request Form (for SecureID). Remote Access will provide the ability for a selected group of NMH clinical personnel to access patient information contained in the CIS through external Internet connections. To gain access to the applications, a Secure ID card is required. The username and PIN provide the first level of security. The Secure ID attached to the PIN to create the password for logging into Remote Access is a second level of security. The Medical Staff Office will distribute the Secure ID after a signed Remote Access and Confidentiality Agreement and Physician Remote Access Request Form has been obtained. The Secure ID card can only be obtained in person. 7. Physician Staff Remote Access: Physician will obtain, from the Medical Staff Office (MSO), a packet of information including the NMH Confidentiality Contract Regarding Access to Patient Information, NMH Confidentiality Policy and the SecureID Card. The Physician will complete the NMH Confidentiality Contract along with a list of each staff person s name, social security number and position required and return the documents to the MSO. The Medical Staff Office will then send the Powerchart ID information with the Contract to the IS CRU ( address name: CRU System Admin ) for processing and will send the SecureID card information to IS Security Administration ( address name: Secure ID Admin ). The CRU will the Physician requesting access for his/her staff the individual staff passwords. Each staff member will then read and sign the NMH Confidentiality Contract and the Physician will file and maintain this information in individual personnel files. B. Termination of User In the event that a user either leaves NMH, or a job change occurs where it is determined that the individual no longer needs access to electronic patient information it is the employee s Manager Responsibility to assure the user will be inactivated from all clinical information systems. (Refer to Human Resources Policy 4.77). For Physicians, the Medical Staff Office will assure that access to all clinical information systems is no longer available. C. Transferring of NMH Roles If a user obtains a different Human Resource position within NMH, it is the responsibility of the user s manager to verify he/she has the appropriate access needed to perform the job function.
7 7 of 11 RESPONSIBLE PARTY: Jody Arnoult Project Director, Clinical Information Systems Electronically Approved: October 30, 2002 REVIEWERS: Information Services Vice President and Directors Corporate Integrity Executive Medical Affairs Medical Records Director Office of the General Counsel COMMITTEES IT Policy Committee APPROVAL PARTIES: Tim Zoph Vice President, Information Services Electronically Approved: October 30, 3002 Dean M. Harrison President & CEO, Northwestern Memorial Hospital Electronically Approved: January 9, 2003
8 8 of 11 REMOTE ACCESS AND CONFIDENTIALITY AGREEMENT Security and confidentiality is a matter of concern for all persons who have access to Northwestern Memorial Hospital s ( NMH ) information systems. Each person accessing NMH data and resources holds a position of trust relative to this information and must recognize the responsibilities entrusted in preserving the security and confidentiality of this information. Therefore, all persons who are authorized to access data and resources, both through enterprise information systems and through individual department local area networks and databases, must read and comply with NMH policies. Patient information is valuable and sensitive and is protected by federal and state laws and by strict NMH policies. The intent of these laws and policies is to assure that patient information will remain confidential - that is, that it will be used only as necessary to accomplish the organization's mission. In that you have requested that NMH permit you to have remote access to confidential patient information for the purpose of patient care, you agree to conduct yourself in strict conformance to applicable state and federal laws and NMH policies governing confidential patient information. Your principal obligations in this area are explained below. You are required to read and to abide by these duties. The violation of any of these duties will subject you to discipline, which might include, but is not limited to, loss of privileges to remote access of patient information, loss of privileges at NMH, and to civil fines, penalties, judgments, and/or criminal sanctions, including imprisonment. Accordingly, as a condition of and in consideration of NMH s provision of your remote access to confidential patient information, you promise that: 1. You will use confidential information only as needed to perform your legitimate duties as a physician of patients or a clinician in direct support of a physician affiliated with NMH. This means, among other things, that: A. You will only access confidential patient information for which you have a need to know; and B. You will not in any way use, divulge, copy, release, sell, loan, review, alter or destroy any confidential patient information, including but not limited to third party marketing activities, except as authorized within the scope of your professional activities as a member of the NMH medical staff for patient treatment, billing or healthcare operations; as authorized by the patient or his or her legal representative; or as required or permitted by law; and C. You will only use confidential patient information for research purposes in accordance with an IRB waiver or with prior written patient authorization. D. You will not misuse or carelessly care for confidential patient information. 2. You will safeguard and will not disclose your access code or any other access device that allows you to access confidential patient information, e.g., never share your access code or device with any other person; or allow anyone else to access or alter confidential patient information under your identity. You accept responsibility for all activities undertaken using your access code or device. You agree to report any lost or stolen access code or device to the Help Desk at HELP so it may be deactivated. 3. You understand and acknowledge that NMH has the right to monitor and audit the activities undertaken through the use of your access code or device and agree to cooperate with any investigations regarding unauthorized or improper use of confidential patient information accessed using your access code or device 4. You will report activities by any individual or entity that you suspect may compromise the confidentiality or security of confidential patient information. Reports made in good faith about suspect activities will be held in confidence to the extent permitted by law, including the name of the individual reporting the activities. 5. You understand that your obligations under this Agreement will continue after termination of your privileges to remote access of patient information or loss of privileges as a member of the NMH medical staff. You understand that your remote access privileges hereunder are subject to periodic review, revision and if appropriate renewal. Initial
9 9 of You understand that you have no right or ownership interest in any confidential patient information referred to in this Agreement. NMH may at any time revoke your access code, device, or access to confidential patient information. At all times during your privileges as a member of the NMH medical staff, you will safeguard and maintain the confidentiality of all patient information. 7. You will be responsible for your misuse or wrongful disclosure of confidential patient information and for your failure to safeguard your access code or device. You understand that your failure to comply with this Agreement may also result in loss of privileges to remote access of confidential patient information, loss of privileges, legal liability and disciplinary action or corrective action with accordance to hospital and Medical Staff policies. Physician Signature Date Printed Name
10 10 of 11 NORTHWESTERN MEMORIAL HOSPITAL CONFIDENTIALITY CONTRACT REGARDING ACCESS TO PATIENT INFORMATION INTRODUCTION: This Confidentiality Contract has been established to ensure that access by non-nmh employees to patient information is protected and is in compliance with NMH policies, state and federal laws, and accrediting agencies. This contract is to ensure that individuals requesting access to information have been authorized and need access in order to perform their duties for patient care, continuity of care and/or administrative review. CONTRACT PROVISIONS: In that I have requested that NMH permit the designated staff members listed in Exhibit A to have access to patient information for the purpose of (please check all that apply): ρ ρ ρ Patient care/continuing care Benefits/utilization/quality review Billing ρ Other (Specify) 1. I agree to maintain the confidentiality of patient information in accordance with the NMH Confidentiality Policy, as amended from time to time, attached hereto as Exhibit B. I agree to keep a copy of such polices available to my staff at all times. 2. I agree to review the NMH patient information policies with my staff and instruct them as follows: υ υ They are to access information only as necessary to carry out the responsibilities of their employment. They are to maintain the confidentiality of patient information in accordance with the NMH Confidentiality Policy. υ Violation of patient confidentiality may be subject to corrective action up to and including termination of employment and/or suspension and loss of privileges. 3. I agree to obtain from each one of my staff members who uses or has access to patient information a signed NM Confidentiality Statement, in the same form as that of Exhibit C, stating that he or she has been informed and understands the NMH Confidentiality Policy and will comply with such policy. I will maintain that statement in the employee s file and update it annually. 4. I agree that NMH may, at its sole discretion, revoke access to patient information at any time. I understand that access may be revoked in the event of a breach of patient confidentiality by me or any of my employees. I agree to immediately suspend or terminate further access to information by any employee if so requested. 5. I agree to adopt policies and procedures that meet the NMH standard with regard to maintaining patient information in a secure manner and properly disposing of any information which is no longer needed and which has been converted to another media, e.g., paper, tape, etc. 6. I agree that NMH may audit access to and use of its patient information by me and my staff at any time or on an ongoing basis and may ask for and receive copies of the signed employee confidentiality statement described in paragraph 3, above. 7. Special condition(s) that apply to this contract, if any, are described here: 8. This contract is effective as of the date signed and shall continue in effect for ( ) year(s) subject to earlier revocation as described above or replacement by a revised contract.
11 11 of I understand and agree that I shall be responsible for any violations of this Agreement by a staff member listed in Exhibit A and that I may be subject to disciplinary or corrective action in accordance with Hospital or Medical Staff policies. 10. My signature below indicates that I have read, understand and agree to the above provisions. Northwestern Memorial Hospital Signed By: Signed By: Title: Title: Date: Date:
12 12 of 11 NORTHWESTERN MEMORIAL HOSPITAL COMPUTER ACCESS REQUEST FORM FORM INSTRUCTIONS 1. Complete the Employee Information Section. 2. Complete any other sections for which the staff member will need access. (I.e. if a Powerchart account is needed complete the Powerchart section otherwise leave this section blank.) 3. Cut and the paste the completed form into the message. The form should not be ed as an attachment or sent from the Intranet. 4. the completed form to "CRU System Admin" ([email protected]). The form must be ed by the staff member s Level One Manager. If the staff member is a Level One Manager the Key Manager must e- mail the form. If the staff member is a Key Manager, the Senior Manager must the form. 5. For help in completing the form, please call the Customer Response Unit at 6-HELP. EMPLOYEE INFORMATION 1. Employee's Name (Name should match Human Resource File) 2. Employee's Social Security Number (Social Security Number should match Human Resource File) 3. Employee's Cost Center Number (Cost Center Should match Human Resource File) 4. Employee's Job Title (Job Title should match Human Resource File) 5. Employee's Campus Address (Building, Room, Suite or Office Number and Floor) 6. Employee's Campus Phone Number (If number not yet known enter Manager s Phone Number) 7. Employee s Start Date (The Date the Employee will start in the Department) NETWORK ACCOUNT INFORMATION 1. Server Name (i.e. Prentice. Enter the Name of a person in your department with an account to refer to if the server is not known) 2. Directory or file access (Enter the entire path name, i.e. (Passavant/Sys2:/Common/Bloodflow, if not known enter the name of a person in your department who has this access to refer to) Drive letters are not valid. The form may be returned if the path is not included. ACCESS 1. Please indicate the type of this staff member will be use: Web Mail (NMCONNECT) or Regular Mail (Users that have their own PC) 2. Distribution List: ( Group(s) Employee should be a member of)
13 13 of 11 APPLICATION ACCESS (USERS WHO USE MY APPLICATIONS ONLY) 1. Microsoft Office (Enter Yes or No) 2. MAR (Enter Yes or No) 3. MSMEDS (Enter Yes or No) POWERCHART ACCESS 1. Computer Based Training Score (This is a requirement) 2. Name of Powerchart Position (Refer to the position chart for your Cost Center)
Building a Culture of Health Care Privacy Compliance
Building a Culture of Health Care Privacy Compliance September 10, 2014 Presented by: Gerry Hinkley, Partner, Pillsbury Greg Radinsky, VP & Chief Corporate Compliance, North Shore - LIJ Wendy Maneval,
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security
INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user
AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND
AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND THIS AGREEMENT for Access to Protected Health Information ( PHI ) ( Agreement ) is entered
COMPREHENSIVE REMOTE ACCESS AGREEMENT FOR PRIVATE MEDICAL PRACTICES OR NURSING HOMES
COMPREHENSIVE REMOTE ACCESS AGREEMENT FOR PRIVATE MEDICAL PRACTICES OR NURSING HOMES THIS COMPREHENSIVE REMOTE ACCESS AGREEMENT ("Agreement") between MAIN LINE HEALTH, INC. ("MLH") in its own capacity
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
Evergreen Solar, Inc. Code of Business Conduct and Ethics
Evergreen Solar, Inc. Code of Business Conduct and Ethics A MESSAGE FROM THE BOARD At Evergreen Solar, Inc. (the Company or Evergreen Solar ), we believe that conducting business ethically is critical
Authorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
HIPAA Privacy & Security Training for Clinicians
HIPAA Privacy & Security Training for Clinicians Agenda This training will cover the following information: Overview of Privacy Rule and Security Rules Using and disclosing Protected Health Information
UMDNJ COMPLIANCE PLAN
UMDNJ COMPLIANCE PLAN INTRODUCTION...2 COMPLIANCE OVERSIGHT 3 COMPLIANCE COMMITTEE STRUCTURE...4 CHIEF COMPLIANCE OFFICER S RESPONSIBILITIES...5 RESEARCH COMPLIANCE.5 UNIT IMPLEMENTATION.6 COMPLIANCE POLICIES
UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
Oregon Prescription Drug Monitoring Program. Terms & Conditions of Account Use Agreement. Statutory Authority:
Oregon Prescription Drug Monitoring Program Terms & Conditions of Account Use Agreement Statutory Authority: The Oregon Health Authority (OHA) was given authority under ORS 431.962 to establish and maintain
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder
BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY
- 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,
Wellesley College Whistleblower Policy Adopted April 2009
Wellesley College Whistleblower Policy Adopted April 2009 1. General Wellesley College (the "College") requires all employees (including faculty) to observe high standards of business and personal ethics
Document Title: System Administrator Policy
Document Title: System REVISION HISTORY Effective Date:15-Nov-2015 Page 1 of 5 Revision No. Revision Date Author Description of Changes 01 15-Oct-2015 Terry Butcher Populate into Standard Template Updated
PC CONNECTION, INC. CODE OF BUSINESS CONDUCT AND ETHICS
I. Purpose. PC CONNECTION, INC. CODE OF BUSINESS CONDUCT AND ETHICS Applicable to All Subsidiaries To establish uniform standards of conduct under which each of the PC Connection, Inc. family of companies
DATA ACCESS POLICY. Attached is a policy statement regarding data access at the New Jersey Institute of Technology.
DATA ACCESS POLICY As NJIT has moved to a distributed data access environment, policy has been established to protect the computer-based institutional data from unauthorized (c.q. other improprietary)
PHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
Clinical Observership Program
Clinical Observership Program PROGRAM APPLICATION (Please type or print) Please place a checkmark (X) indicating the primary campus you prefer to spend your clinical observership experience: Weill Cornell
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
INTEGRITY IN ACTION - HEALTH CARE COMPLIANCE
A PASSION FOR INTEGRITY INTEGRITY IN ACTION - HEALTH CARE COMPLIANCE HEALTH CARE COMPLIANCE IS EVERYONE S RESPONSIBILITY DePuy Synthes is known the world over for innovative, life enhancing orthopedic
M&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
HIPAA Orientation. Health Insurance Portability and Accountability Act
HIPAA Orientation Health Insurance Portability and Accountability Act HIPAA Federal legislation enacted in 1996 to improve the efficiency and effectiveness of electronic information transfers used in the
HIPAA COMPLIANCE PLAN. For. CHARLES RETINA INSTITUTE (Practice Name)
HIPAA COMPLIANCE PLAN For CHARLES RETINA INSTITUTE (Practice Name) Date of Adoption 1/02/2003 Review/Update 10/25/2012 Review/Update 4/01/2014 I. COMPLIANCE PLAN A. Introduction This HIPAA Compliance Plan
HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012
HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: To introduce the staff of Munson Healthcare to the concepts
HPC Healthcare, Inc. Administrative/Operational Policy and Procedure Manual
Operational and Procedure Manual 1 of 7 Subject: Corporate Compliance Plan Originating Department Quality & Compliance Effective Date 1/99 Administrative Approval Review/Revision Date(s) 6/00, 11/99, 2/02,
Denver Public Schools - East High School
Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student
MYACCLAIM PRIVACY POLICY
MYACCLAIM PRIVACY POLICY 1. Introduction MyAcclaim is an online collaboration tool that allows users to annotate video. MyAcclaim s mission is to allow its users, with ease and simplicity, to unleash the
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.
University Healthcare Physicians Compliance and Privacy Policy
Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of
Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan
Mental Health Resources, Inc. Mental Health Resources, Inc. Corporate Compliance Plan Corporate Compliance Plan Adopted: January 2, 2007 Revised by Board of Directors on September 4, 2007 Revised and Amended
8.03 Health Insurance Portability and Accountability Act (HIPAA)
Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of
2. Begin gathering necessary documents for student (refer to Record Acknowledgement Form)
Dear Colleague, This notice is to share some recent changes we ve made with our Student Onboarding Process. Effective October 1, 2014, our onboarding process is migrating from Public Safety to our Human
Delaware State University Policy
Delaware State University Policy Title: Delaware State University Acceptable Use Policy Board approval date: TBD Related Policies and Procedures: Delaware State University Acceptable Use Policy A Message
CUBIC ENERGY, INC. Code of Business Conduct and Ethics
CUBIC ENERGY, INC. Code of Business Conduct and Ethics Introduction Our Company s reputation for honesty and integrity is the sum of the personal reputations of our directors, officers and employees. To
Information Security Policy
Information Security Policy Policy Title Responsible Executive Responsible Office Information Security Policy Vice President for Information Technology and CIO, Jay Dominick Office of Information Technology,
How To Use The Health Information System Of Michigan Health Insurance Company (Umhs)
UMHS Electronic Health Information Access Agreement Made effective the of, by and between The Regents of the University of Michigan, on behalf of the University of Michigan Health System, ( UMHS ) and
Information Technology Services Guidelines
Page 1 of 10 Table of Contents 1. Purpose... 2 2. Entities Affected by This Guideline... 2 3. Definitions... 2 4. Guidelines... 3 4.1 Requesting Data Center or... 3 4.2 Requirements for Data Center or...
Fiscal Policies and Procedures Fraud, Waste & Abuse
DORCHESTER COUNTY, MARYLAND Fiscal Policies and Procedures Fraud, Waste & Abuse Adopted August 11, 2009 SECTION I - INTRODUCTION The County Council of Dorchester County, Maryland approved on August 11,
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
MEDICAL TRAINEE DATA FORM (This information is required for all medical students)
ALEXANDRA MARINE AND GENERAL HOSPITAL 120 Napier Street, GODERICH, ON N7A 1W5 (519) 524-8689 ext. 5712 Fax: (519) 524-5579 Email: [email protected] MEDICAL TRAINEE DATA FORM (This information
Ur-Energy Inc. Code of Business Conduct and Ethics
Ur-Energy Inc. Code of Business Conduct and Ethics As Amended Effective February 5, 2014 2957409.2 TABLE OF CONTENTS INTRODUCTION... 3 CONFLICTS OF INTEREST... 3 GIFTS, INVITATIONS AND ENTERTAINMENT GUIDELINES...
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
HIPAA Compliance. 2013 Annual Mandatory Education
HIPAA Compliance 2013 Annual Mandatory Education What is HIPAA? Health Insurance Portability and Accountability Act Federal Law enacted in 1996 that mandates adoption of Privacy protections for health
STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM
STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM BETWEEN The Division of Health Care Financing and Policy Herein after referred to as the Covered Entity and (Enter Business
College of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
Technology Department 1350 Main Street Cambria, CA 93428
Technology Department 1350 Main Street Cambria, CA 93428 Technology Acceptable Use and Security Policy The Technology Acceptable Use and Security Policy ( policy ) applies to all CUSD employees and any
Online Account Management Broker s User Guide
Online Account Management Broker s User Guide TABLE OF CONTENTS BROKER SINGLE SIGN-ON ACTIVATION ------------------------------------------------------------------- 3 BROKER SINGLE SIGN-ON REQUEST FORM
Bossier Parish Community College
Bossier Parish Community College Department of Cyber Information Technology Welcome to the Program! Network Security & Networking Tracks Code of Conduct This marks the beginning of your journey through
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting
NOTICE OF PRIVACY PRACTICES TEMPLATE. Sections highlighted in yellow are optional sections, depending on if applicable
NOTICE OF PRIVACY PRACTICES TEMPLATE Sections highlighted in yellow are optional sections, depending on if applicable Original Date: ##/##/#### Revised per HIPAA Omnibus Rule ##/##/#### Revised Date Implementation:
SUBJECT: INFORMATION TECHNOLOGY RESOURCES I. PURPOSE
Page 1 of 8 I. PURPOSE To outline the University's policies for students, faculty, staff and others, concerning the use of the University's computing and communication resources, including those dealing
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA
TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE
California Mutual Insurance Company Code of Business Conduct and Ethics
California Mutual Insurance Company Code of Business Conduct and Ethics This Code of Business Conduct and Ethics (the Code ) applies to all officers, employees, and directors of California Mutual Insurance
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Protecting Patient Privacy It s Everyone s Responsibility
Protecting Patient Privacy It s Everyone s Responsibility Observation & Student Learning Packet 1. Read packet Instructions for Self-Study Module 2. Complete post-test. A score of 80% must be achieved.
M E M O R A N D U M. The Policy provides for blackout periods during which you are prohibited from buying or selling Company securities.
M E M O R A N D U M TO: FROM: All Directors, Officers and Covered Persons of Power Solutions International, Inc. and its Subsidiaries Catherine Andrews General Counsel and Insider Trading Compliance Officer
SM ENERGY COMPANY CODE OF BUSINESS CONDUCT AND CONFLICT OF INTEREST POLICY
SM ENERGY COMPANY CODE OF BUSINESS CONDUCT AND CONFLICT OF INTEREST POLICY We at SM Energy Company are committed to compliance with applicable laws, rules and regulations and to conducting our business
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
Internet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Our vision. A company where the best people want to work.
Code of Conduct Our vision A company where the best people want to work. The world leader in chemical distribution, providing unparalleled connectivity between customers and suppliers. 2 Univar s guiding
HIPAA PRIVACY OVERVIEW
HIPAA PRIVACY OVERVIEW OBJECTIVES At the completion of this course, the learner will be able to: Define the Purpose of HIPAA Define Business Associate Identify Patients Rights Understand the Consequences
Standards of. Conduct. Important Phone Number for Reporting Violations
Standards of Conduct It is the policy of Security Health Plan that all its business be conducted honestly, ethically, and with integrity. Security Health Plan s relationships with members, hospitals, clinics,
SAMPLE BUSINESS ASSOCIATE AGREEMENT
SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT
Patient Privacy and HIPAA/HITECH
Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,
HIPAA Compliance for Students
HIPAA Compliance for Students The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 by the United States Congress. It s intent was to help people obtain health insurance benefits
Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
Memo. Professional Accounts, LLC. Corporate Compliance Program
Professional Accounts, LLC Memo To: All Employees and Vendors From: Lee Frans, Executive Director Date: April 2, 2012 Re: Corporate Compliance Program Our mission as an organization has been to deliver
BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS
BERKSHIRE HATHAWAY INC. CODE OF BUSINESS CONDUCT AND ETHICS A. Scope. This Code of Business Conduct and Ethics applies to all Berkshire Hathaway directors, officers and employees, as well as to directors,
Hyatt Hotels Corporation. Code of Business Conduct and Ethics
INTRODUCTION This (this Code ) is designed to reaffirm and promote Hyatt Hotels Corporation s compliance with laws and ethical standards applicable in all jurisdictions in which Hyatt Hotels Corporation
CORPORATE COMPLIANCE PROGRAM
CORPORATE COMPLIANCE PROGRAM BACKGROUND AND POLICY: The Oakwood Accountable Care Organization, LLC. ( ACO ) corporate policy relating to compliance with applicable laws and regulations is embodied in this
WHISTLEBLOWING POLICY NUS policies adopted and adapted by Yale-NUS College
WHISTLEBLOWING POLICY NUS policies adopted and adapted by Yale-NUS College Introduction 1. The University and Yale-NUS College (the College) are not-for-profit organizations that rely largely on public
