Rowan University IT ACQUISITION POLICY
|
|
|
- Quentin Peters
- 9 years ago
- Views:
Transcription
1 Rowan University IT ACQUISITION POLICY Effective: January 2014 Data Governance: IT Acquisition Policy Page 1 of 6
2 IT ACQUISITION POLICY Title: Data Governance: IT Acquisition Policy Subject: Information Resources and Technology Policy No: CIO: 2013:02 Applies: University-wide Issuing Authority: Vice President for Information Resources and Chief Information Officer Responsible Officer: Vice President for Information Resources and Chief Information Officer Date Adopted: Last Revision: Last Review: I. PURPOSE A. This policy sets forth the process for the approval and acquisition of all Information Technology (IT) including, but not limited to software, hardware, IT consulting, and IT services. II. ACCOUNTABILITY A. Under the direction of the Chief Information Officer, Rowan University management shall implement and ensure compliance with this policy. III. APPLICABILITY A. This policy applies to all members of the Rowan community who seek to acquire IT Resources using University funds, including grant funds from contracts and/or transmittal forms between the University and external funding sources (public and private), are covered by this policy. IV. DEFINITIONS A. Academic IT Resources any software, hardware, IT consulting or IT services that is used to support users (faculty and students) in their teaching, learning, and research activities. Academic IT Resources can be distributed and accessed locally or through the cloud. B. Administrative IT Resources any software, hardware, IT consulting or IT services that is used as an ancillary system in support of Rowan University s Enterprise Relationship Management system (Ellucian s Banner System), whether to augment or replace specific functions with best-of-breed niche products. Data Governance: IT Acquisition Policy Page 2 of 6
3 C. Clinical IT Resources any software, hardware, IT consulting or IT services that allows the user to enter patient specific information, and using formulae or other forms of analysis based on clinical information, glean from that information a patient-specific diagnosis or treatment recommendation that is used to assist in making a clinical decision. D. Software computer programs that direct the operation of a computer or processing electronic data. E. Hardware computer devices that use, process, store, or transmit electronic information. F. IT Consulting a third party used to provide IT consulting services including system design, planning, auditing, and/or advisory services. G. IT Services a third party used to provide any other IT services, not classified as IT consulting, including IT management, hosting, repair, installation, maintenance, etc. H. Information Resources and Technology (IRT) the Rowan University department responsible for the governance of all information and technology. I. Rowan University IT Purchasers faculty, staff, non-employees, students, attending physicians, contractors, covered entities, agents, and any other third parties of Rowan. J. FERPA - The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects students' privacy by prohibiting disclosure of education records without adult consent. K. GLBA - The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that institutions deal with the private information of individuals. L. HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is the federal law passed by Congress in 1996 that requires the protection and confidential handling of protected health information V. REFERENCES A. Data Governance Policy VI. POLICY A. Rowan University wants to ensure that we are meeting our responsibilities as IT users by guaranteeing that all IT Resources purchased within Rowan University are compatible with Rowan s information technology (IT) and in compliance with security requirements and regulations. IT purchasing can be an intricate process involving obscure terminology and possible legal or financial obligations for you and the University. Accordingly, prospective purchasers will obtain consultation and approval from Information Resources and Technology personnel who are familiar with these details, and who routinely implement and manage these IT Resources. B. Requirements: Data Governance: IT Acquisition Policy Page 3 of 6
4 1. All IT acquisitions by academic, administrative, and clinical departments will require approval for purchase from the Office of IRT (Information Resources and Technology) since IT Resources: a. May be used by more than a single individual and/or have the likely potential for the same or b. May need to interface with other University IT Resources or c. May be used to process, store, or transmit University data. 2. The IT purchaser is responsible for obtaining all funds needed to purchase, install, and maintain the IT Resource for current and future costs. These funds will be transferred into the IRT budget via yearly DCA transfers (or other means as needed). The transfers will cover all cost, including: C. Responsibilities: D. Procedures a. The internal cost to install the IT Resource(s). b. Any consulting required configuring or maintaining the IT Resource(s). c. Any additional cost for bandwidth and storage. d. Ongoing annual maintenance, licensing, and fees. e. Any additional cost to properly protect University data. 1. IT purchasers will submit IT acquisition requests, and make themselves available during the IT evaluation process to answer questions. IT purchasers are required to notify IRT of any changes and/or cancellations prior to the renewal of IT Resources. IT purchasers are required to complete DCAs within 10 days of notice from ITR so that funds are available to IRT to purchase or maintain IT Resources. 2. IRT functional leaders (or relevant committees) will evaluate each IT acquisition request and recommend approvals to the CIO within a reasonable time frame 1. Requests for the acquisition of IT Resources will be submitted to the Office of IRT via the University s On-line IT Acquisition Form available as an option in the Finance section of Banner Self Service. 2. Academic IT Resources a. IRT functional leaders will review the request based upon the information provided in the on-line form s Justification section along with the following criteria: Can the University: Utilize concurrent licensing to eliminate wasteful per-workstation license costs and only purchase based on actual monitored need. Data Governance: IT Acquisition Policy Page 4 of 6
5 Where concurrent licensing is not available from a necessary vendor, leverage all individual licenses into one master agreement. Utilize existing University-licensed software (or other IT Resources) for the request to achieve similar functionality. Utilize open sources or other lower cost alternatives if they provide similar functionality. b. Office of IRT will complete their section of the University s On-line IT Acquisition Form within 10 business days of its receipt. c. All academic IT purchases must meet security requirements including but not limited to FERPA, GLBA, and HIPAA. 3. Administrative IT Resources a. IRT functional leaders meet with the requesting office to review the request based upon the following criteria: Does this IT Resource provide functionality that currently exists in other administrative IT Resources the University already licenses? Does the proposed IT Resource need to interface to existing administrative IT Resources that the University already supports? Will the proposed IT Resource contain data that the University will need to report upon via the Office of IERP? Area all offices that may be impacted as a result of implementing such IT Resource fully informed of the IT Resource s potential impact on their operations? Assess all cost associated with IRT continuous support of the IT Resource(s). Assess percentage of improvement to current processes in cases where Rowan does not have full capability requested. b. If the CIO determines that it is in the best interest of the University (based upon the recommendations by the IRT leadership team), to purchase the IT Resource requested, the requesting office will be so informed. Prior to actual acquisition, the appropriate staff will work with the requesting office to fully develop an IT Resource implementation and support plan. IRT staff will meet with the requesting office, other impacted offices, and vendor representatives, to develop a proposed implementation and support plan. As part of this IT Resource implementation planning process the IRT staff will assess the maturity of the IT Resource for inclusion within the University s production IT environment. The final plan will take into consideration the vendor s roadmap for updated releases to ensure the IT Resource version purchased is indeed production ready. Only when the Office of IRT has approved the proposed plans will approval be granted for the IT acquisition. These plans will include the proposed project team, which will include the Assistant Director of Enterprise Information Services who will represent IRT on the project team and serve as the technical project lead. Data Governance: IT Acquisition Policy Page 5 of 6
6 c. All administrative IT purchases must meet security and compliance requirements including but not limited to FERPA, GLBA, and HIPAA. 4. Clinical IT Resources a. IRT functional leaders and Clinical System staff will: Review the IT acquisition request and discuss with the requesting office. Complete a Feasibility Analysis to identify current and future operational processes and problems, requirements (business, application, hardware, network, resources, etc.), training, funding, and on-going support needs. Present Feasibility Analysis to RowanSOM Clinical Governance Committee for review. Governance Committee will determine if project should be funded and when the IT Resource will be implemented based on project prioritize criteria. Notify the requesting department of the outcome. b. All clinical IT purchases must meet security requirements including but not limited to FERPA, GLBA, and HIPAA. VII. NON-COMPLIANCE AND SANCTIONS A. Violations of this policy may require the removal of any unapproved IT Resources at the purchaser s expense and possible disciplinary action. By Direction of the CIO: Mira Lalovic-Hand Vice President and CIO Division of Information Resources and Technology Data Governance: IT Acquisition Policy Page 6 of 6
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
Health Sciences Compliance Plan
INDIANA UNIVERSITY Health Sciences Compliance Plan 12.18.2014 approved by University Clinical Affairs Council Table of Contents Health Sciences Compliance Plan I. INTRODUCTION... 2 II. SCOPE... 2 III.
Security Awareness Training Policy
Security Awareness Training Policy I. PURPOSE This policy is intended to set the training standard for several key audiences in Salem State University, including, but not limited to: University executives,
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5
Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises)
NMSU Procedural Guidelines (Policy 2.64 - Security Cameras on University Premises) A. NMSU Entities requesting security cameras will be required to follow the procedures outlined below. 1. Justification
RUTGERS POLICY. Policy Name: Standards for Privacy of Individually Identifiable Health Information
RUTGERS POLICY Section: 100.1.9 Section Title: HIPAA Policies Policy Name: Standards for Privacy of Individually Identifiable Health Information Formerly Book: 00-01-15-05:00 Approval Authority: RBHS Chancellor
MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 5 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: October 19, 2006 Contact for More Information: Chief Privacy Officer 1303 A West Campus
UNIVERSITY HOSPITAL POLICY
SUBJECT: COMPLIANCE AND PRIVACY UNIVERSITY HOSPITAL POLICY TITLE: CODING: 831-200-958 ADOPTED: July 1, 2013 DISCLOSURES OF PERSONALLY IDENTIFIABLE HEALTH INFORMATION TO BUSINESS ASSOCIATES AMENDED/ REVIEWED:
College of DuPage Information Technology. Information Security Plan
College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
SAFEGUARDS FOR PROTECTING PRIVATE DATA - SERVICE PROVIDERS AND CONTRACTORS
SAFEGUARDS FOR PROTECTING PRIVATE DATA - SERVICE PROVIDERS AND CONTRACTORS THE UNIVERSITY OF NEW MEXICO October 17, 2013 Audit Committee Members J.E. Gene Gallegos, Chair Lt. General Bradley Hosmer, Vice
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS
How To Manage Information Security At A University
Data Management & Protection: Roles & Responsibilities Document Version: 1.0 Effective Date: December, 2008 Original Issue Date: December, 2008 Most Recent Revision Date: November 29, 2011 Approval Authority:
HIPAA BUSINESS ASSOCIATE ADDENDUM
HIPAA BUSINESS ASSOCIATE ADDENDUM This Addendum, dated as of, 2007 ( Addendum ), supplements and is made a part of the Services Agreement (as defined below) by and between ( Covered Entity ) and FUJIFILM
SCDA and SCDA Member Benefits Group
SCDA and SCDA Member Benefits Group HIPAA Privacy Policy 1. PURPOSE The purpose of this policy is to protect personal health information (PHI) and other personally identifiable information for all individuals
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
DATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
Document Title: System Administrator Policy
Document Title: System REVISION HISTORY Effective Date:15-Nov-2015 Page 1 of 5 Revision No. Revision Date Author Description of Changes 01 15-Oct-2015 Terry Butcher Populate into Standard Template Updated
Information Security Policy
Information Security Policy Policy Title Responsible Executive Responsible Office Information Security Policy Vice President for Information Technology and CIO, Jay Dominick Office of Information Technology,
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
Vulnerability Management Policy
Vulnerability Management Policy Policy Statement Computing devices storing the University s Sensitive Information (as defined below) or Mission-Critical computing devices (as defined below) must be fully
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) is by and between ( Covered Entity )and CONEX Med Pro Systems ( Business Associate ). This Agreement has been attached to,
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities
Policy Title: Information Security Roles Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles Approval Date: 05/28/2014 Revised Responsible Office:
The Federal Financial Management Improvement Act (C)
Omnibus Consolidated Appropriations Act, 1997. PUBLIC LAW 104 208 SEPT. 30, 1996 110 STAT. 3009 *Public Law 104 208 104th Congress An Act Making omnibus consolidated appropriations for the fiscal year
SOCIAL MEDIA AND EMAIL POLICY FOR SCHOOL OF MEDICINE AND HEALTH SCIENCES
Responsible University Official: Senior Associate Dean, MD Programs Senior Associate Dean, HS Programs Responsible Office: Office of the Dean, SMHS Most Recent Revision: 07/23/2015 SOCIAL MEDIA AND EMAIL
APPROVED BY: DATE: NUMBER: PAGE: 1 of 9
1 of 9 PURPOSE: To define standards for appropriate and secure use of MCG Health electronic systems, specifically e-mail systems, Internet access, phones (static or mobile; including voice mail) wireless
BUSINESS ASSOCIATE AGREEMENT
COLUMBIA AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is entered into as of ( Effective Date ) by and between The Trustees of Columbia University in the City of
INSTITUTIONAL COMPLIANCE PLAN
INSTITUTIONAL COMPLIANCE PLAN Responsible Party: Board of Trustees Contact: Institutional Compliance Office Original Effective Date: 02/16/2012 Last Revised Date: 10/13/2014 Contents I. SCOPE OF THE PLAN...
Cardiology Consultants of Atlanta, P.C. 2801 N. Decatur Rd. Suite 395, Decatur GA, 30033 (404) 298-2220 phone (678) 904-5336 fax
OFFICE POLICIES AND PROCEDURES Thank you for choosing Cardiology Consultants of Atlanta for your cardiovascular care. We realize that you have a choice in medical providers and are pleased that you have
Definitions: Policy: Duties and Responsibilities: The Privacy Officer will have the following responsibilities and duties:
PRIVACY 1.0 FACILITY PRIVACY OFFICER Scope: Purpose: All subsidiaries of Universal Health Services, Inc., including facilities and UHS of Delaware Inc. (collectively, UHS ), including UHS covered entities
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT BUSINESS ASSOCIATE TERMS AND CONDITIONS
COVERYS RRG, INC. HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT BUSINESS ASSOCIATE TERMS AND CONDITIONS WHEREAS, the Administrative Simplification section of the Health Insurance Portability and
Business Associate Agreement Involving the Access to Protected Health Information
School/Unit: Rowan University School of Osteopathic Medicine Vendor: Business Associate Agreement Involving the Access to Protected Health Information This Business Associate Agreement ( BAA ) is entered
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
Information Security Operational Procedures Banner Student Information System Security Policy
Policy No: 803 Area: Information Technology Services Adopted: 8/6/2012 Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides
SUMMARY OF POSITION ROLE/RESPONSIBILITIES:
SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the BAA ) is made and entered into as of the day of, 20, by and between Delta Dental of California (the Covered Entity ) and (the Business
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Agreement ( Agreement ) is made and entered into this day of [Month], [Year] by and between [Business Name] ( Covered Entity ), [Type of Entity], whose business address
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.
Institutional Data Governance Policy
Institutional Data Governance Policy Vanderbilt University and Medical Center Effective Date: 07/09/2014 Revision Date: N/A DOCUMENT CONTROL Document Title Institutional Data Governance Policy Summary:
BUSINESS ASSOCIATE AGREEMENT. Recitals
BUSINESS ASSOCIATE AGREEMENT This Agreement is executed this 8 th day of February, 2013, by BETA Healthcare Group. Recitals BETA Healthcare Group consists of BETA Risk Management Authority (BETARMA) and
COMPLIANCE WITH LAWS AND REGULATIONS (CLR)
Principle: Ensuring compliance with applicable laws, regulations and professional standards of practice implementing systems and processes that prevent fraud and abuse. 91 Compliance with Laws and Regulations
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
Policy and Guidelines for Personal Use of Social Media*
I. Scope: This policy applies to all employees, students, contractors and volunteers as it relates to their employment, academic, or business relationship with the University of Mississippi Medical Center
HIPAA Employee Training Guide. Revision Date: April 11, 2015
HIPAA Employee Training Guide Revision Date: April 11, 2015 What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 (also known as Kennedy- Kassebaum Act ). HIPAA regulations address
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Handheld Mobile Device Security Standard This standard is applicable to all VCU School of Medicine personnel.
HIPAA S BUSINESS ASSOCIATE REQUIREMENTS FOR PATHOLOGISTS AND LABORATORIES
HIPAA S BUSINESS ASSOCIATE REQUIREMENTS FOR PATHOLOGISTS AND LABORATORIES What is HIPAA? The Health Insurance Portability and Accountability Act of 1996 ( HIPAA ) establishes new privacy requirements for
Acceptable Use and Security of UBC Electronic Information and Systems
The University of British Columbia Board of Governors Policy No.: 104 Approval Date: June 2013 Title: Responsible Executive: Vice-President, Academic and Provost Deputy Vice-Chancellor (UBC Okanagan) Acceptable
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
Marist College. Information Security Policy
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
Cal Poly Information Security Program
Policy History Date October 5, 2012 October 5, 2010 October 19, 2004 July 8, 2004 May 11, 2004 January May 2004 December 8, 2003 Action Modified Separation or Change of Employment section to address data
Model Business Associate Agreement
Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model
MSO/IPA Compliance Program
MSO/IPA Compliance Program PROSPECT MEDICAL HOLDINGS, INC. MSO/IPA COMPLIANCE PROGRAM Coverage The terms of the Compliance Program set forth herein shall apply to, and govern, the medical group business
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
HIPAA COMPLIANCE PLAN. For. CHARLES RETINA INSTITUTE (Practice Name)
HIPAA COMPLIANCE PLAN For CHARLES RETINA INSTITUTE (Practice Name) Date of Adoption 1/02/2003 Review/Update 10/25/2012 Review/Update 4/01/2014 I. COMPLIANCE PLAN A. Introduction This HIPAA Compliance Plan
General HIPAA Implementation FAQ
General HIPAA Implementation FAQ What is HIPAA? Signed into law in August 1996, the Health Insurance Portability and Accountability Act ( HIPAA ) was created to provide better access to health insurance,
University of Wisconsin-Madison Policy and Procedure
Page 1 of 14 I. Policy II. A. The, the units of the UW-Madison Health Care Component and each individual or unit within UW-Madison that is a Business Associate of a covered entity (hereafter collectively
Bates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
