Volume 2 Compliance Process
|
|
|
- Bryan Austin
- 9 years ago
- Views:
Transcription
1 Ministry of Health Services Professional and Software Compliance Standards Volume 2 Compliance Process Version 2.1 November 21, 2003
2 Author: healthnetbc Creation Date: September 30, Last Updated: December 11, 2003 Document Number: Version: 2.1 Approvals: Project Sponsor Signature Date Kathy Hill healthnetbc Access Services Compliance Process Standards Approval Reviewer Signature: Signature: Name: Kathy Hill Name: Tony Stehle Title: Manager Title: SSO Coordinator healthnetbc Access Services healthnetbc Access Services Date: Date:
3 Professional and Software Compliance Standards Volume 2 - Compliance Process Contents 1 General Information What are the volumes in this set? Corrections and updates Who is the audience? Contacting Technical Support Technical Support Connections Support Help Desk Compliance Parameters Release Management Version Control Emergency Upgrades Compliance Evaluation Process Charges And Penalties Compliance Evaluations Penalties Compliance Audits/Inspections Client Sites Requirements To Connect To healthnetbc Implementation Requirements Hospital Admitting Agreements Software and Training Connections Hospital Emergency Department Agreements Software and Training Connections Medical Practice Agreements Software and Training Connections MSP Direct for Employers Agreements Software and Training Connections HNSecure Software and Training Connections Ministry Support The Ministry maintains: Ministry SSO Coordinator November 21, 2003 Version 2.1 Page 1
4 Volume 2 - Compliance Process Professional and Software Compliance Standards 4.3 Available documentation healthnetbc BC Web Site healthnetbc Compliance Standards Web Services User Support Documentation Document Attribute Dictionary (DAD) Confidentiality Undertaking Professional and Software Compliance Tests HNSecure Documentation HNSecure Developers Toolkit Page 2 Version 2.1 November 21, 2003
5 Professional and Software Compliance Standards Volume 2 - Compliance Process General Information 1 General Information This document and its companion volumes contain the Professional and Software Compliance Standards for HL7 Messaging between the BC Ministry of Health and external clients. These standards are used for the exchange of information with various business areas within the Ministry including: the Client Registry (patient/client demographics), MSP (beneficiary coverage), MSP Employer Services (enrolment of employees and dependants), Primary Health Care (patient rostering) and Continuing Care (client demographics and history). 1.1 What are the volumes in this set? The HL7 Standards for messaging to and from BC Ministry of Health applications are described in a series of business and technical volumes. Volume 1 Introduction to the Professional and Software Compliance Standards. A general introduction to the specifications along with tabular listings of all supported messages and message interactions. Volume 2 The evaluation process to determine if software is compliant with the Ministry s standards, as described in these documents Volume 3 Separate publications containing the business rules for each particular business area. (3a Client Registry, 3b MSP Direct are available to date) Volume 4 HL7 Message Specifications. A series of standalone documents for each of the transactions used by the BC Ministry of Health. Volume 5 Network Transmissions Volume 6 Security Volume 7 Glossary All documentation is available on the healthnetbc Products and Services Catalogue web site Corrections and updates Corrections and update notes can be found at the end of this document. A vertical line in the outside border denotes corrections within the document. 1 November 21, 2003 Version 2.1 Page 1
6 Volume 2 - Compliance Process General Information Professional and Software Compliance Standards 1.3 Who is the audience? This document is intended for use by: a) Software Support Organizations (SSO) who wish to develop software that is compliant with the BC standard for the exchange of Client Registry data and other Ministry supported transactions. b) Providers, administrators, health care professionals and MSP Benefits administrators (public and private employers) who are responsible for the implementation of compliant software in their organizations. 1.4 Contacting Technical Support Technical Support a) Software Compliance Standards b) Compliance Evaluation Scheduling; c) Access to software development, testing, production & training databases; d) Business Development Team e) Requests for documentation, bulletins, etc. f) Technical support for HNSecure/Infrastructure g) Post-implementation support The Software Support Organization Coordinator is the first point of contact in the Ministry of Health for technical software development support. [email protected] Telephone: (250) Connections Support A healthnetbc Access Services Connections Coordinator will assist with connecting healthnetbc compliant software to access healthnetbc data. [email protected] Page 2 Version 2.1 November 21, 2003
7 Professional and Software Compliance Standards Volume 2 - Compliance Process General Information Help Desk Reference is made in some transaction business rules that participants are required to contact the healthnetbc Help Desk to resolve issues. The healthnetbc Help Desk line is NOT the first contact point for Vendors. The healthnetbc Help Desk is available 24 hours per day, 7 days per week to accept, log and resolve problems. The level of support may be limited outside of regular business hours. If calling from Vancouver / lower mainland: (604) If calling from Victoria: (250) If calling from elsewhere in BC: Toll Free November 21, 2003 Version 2.1 Page 3
8 Volume 2 - Compliance Process Compliance Parameters Professional and Software Compliance Standards 2 Compliance Parameters The Ministry s Software Support Organizations (SSO) Coordinator and the Quality Assurance Staff perform compliance evaluation where appropriate. The evaluation is to determine that the sending system software complies with all the requirements stated in this document and that all functions and processes of the sending system provide accurate results. Both constructive and destructive testing is performed. All aspects of healthnetbc functionality available on the sending system software will be tested regardless of use at the testing location. This volume is the basis for establishing evaluation parameters. Compliance testing documentation is available on the healthnetbc web site. 2.1 Release Management The following requirements for release management apply to all healthnetbc compliant software, including the HNSecure security toolkit if an SSO has recompiled and/or altered the HNSecure toolkit as supplied by the Ministry. Written notification to the SSO Coordinator describing changes or upgrades to the sending system software is required before SSOs may release the changes to production clients. The SSO Coordinator will have the option of evaluating any release of sending system software before it is put in a production environment on healthnetbc. Evaluation facilities will be provided by the SSO for all compliance evaluations. Evaluation dates will be scheduled by mutual agreement. An SSO may be exempted from a compliance evaluation at the discretion of the SSO Coordinator if functionality accessing healthnetbc is not affected. The SSO must submit written documentation identifying the following information before exemption will be considered. a) Purpose of the change b) Description of change and/or functionality c) Anticipated impact on healthnetbc data and/or transactions d) Version number e) Anticipated release date Page 4 Version 2.1 November 21, 2003
9 Professional and Software Compliance Standards Volume 2 - Compliance Process Compliance Parameters Requests for changing software version numbers will be accepted from either the manager at the client site or the SSO and must be in writing (fax or ). A telephone request will require a follow-up fax or . Quality Assurance will keep the Help Desk advised of all compliant versions for each SSO. 2.2 Version Control A version number must uniquely identify each version of the sending system software that has been proven compliant. This version number must be in each transaction on the ZHD segment for all inbound transactions. Audits will be done to ensure that the version number being transmitted correlates to the version that was approved during the compliance evaluation. The sending system software version number must increment when a major new release is issued. 2.3 Emergency Upgrades If emergency changes to compliant software must be performed to sending system software, notification of the changes must be provided in writing to the SSO Coordinator by the following working day. The notification must identify: a) Installation date b) Affected sites c) Reason d) Description of software changes e) Impact assessment. The SSO Coordinator will determine the need for a compliance evaluation. 2.4 Compliance Evaluation Process The following is a general description of the compliance evaluation process and may be subject to change. 1. After an SSO has successfully tested their software and is satisfied their program is working according to specifications, they must contact the SSO Coordinator to schedule a compliance evaluation. A mutually agreeable evaluation date will be scheduled. Questions regarding the compliance evaluation process should be directed to the SSO Coordinator. November 21, 2003 Version 2.1 Page 5
10 Volume 2 - Compliance Process Compliance Parameters Professional and Software Compliance Standards 2. All compliance evaluations will be held in British Columbia at a mutually agreed location. If an SSO wants a compliance evaluation held at an out of province location a written request must be submitted to the SSO Coordinator at least one month prior to the anticipated evaluation date. 3. Unless specifically requested and agreed to, all requirements as outlined in the Compliance Specifications document will be evaluated. 4. The compliance team will supply the SSO with a list of data required for the evaluation. It is recommended that the SSO incorporate this data on their sending system prior to the evaluation. 5. The healthnetbc compliance team will instruct and observe the transmission of transactions to the Ministry test databases. Each transaction will be verified against a set of expected results. Where applicable, the compliance team may examine the sending system to determine what healthnetbc data is being stored on the sending system. 6. When the evaluation has been successfully completed, the compliance team will record details of the SSO software including version, date, and file size(s). 7. If a sending/receiving system fails, the evaluation may be halted. If the compliance testing team is on-site, they may depart and a new evaluation will be scheduled when the SSO believes the problem rectified. The compliance testing team is not required to remain on site while debugging is undertaken. 8. A written evaluation report will be provided to the SSO no more than five business days following the evaluation. This report will detail all deficiencies and corrective actions required or provide approval for distribution to clients. 9. The compliance evaluation process may take up to 3 consecutive days. Evaluations will take place during normal business hours, Monday through Friday. 10. Sending/receiving system software that includes HNSecure, the healthnetbc security protocol, will be tested to determine if HNSecure has been altered or compiled for a different environment. If it has, there will be compliance tests performed specific to HNSecure. 11. Prior to compliant software being installed for production use, the SSO must sign a Service Level Agreement with the Ministry and a confidentiality agreement with the client. Page 6 Version 2.1 November 21, 2003
11 Professional and Software Compliance Standards Volume 2 - Compliance Process Compliance Parameters 2.5 Charges And Penalties Compliance Evaluations For each software release, the compliance team will be available at no cost to the SSO to a maximum of one compliance evaluation (3 days) and one follow up evaluation (3 days), otherwise, the SSO will be responsible for wage and travel costs of the compliance team. When additional evaluation dates are required, the SSO must provide a written request to the SSO Coordinator. Requests are subject to Ministry management approval. Travel costs, wages and other out-of-pocket expenses for members of the compliance team may be the responsibility of the SSO for additional evaluations. Out of province compliance evaluations must be funded by the SSO. For SSO funded compliance evaluations, statements of expenses and receipts will be provided for the amount payable; if required. Payment must be received no more than 2 weeks following the completion of the compliance evaluation Penalties If non-compliant software is released for production use, SSOs may be instructed to remove the non-compliant version. If the installation of non-compliant software results in a system error or failure (i.e. time-outs, table corruption, etc.), the SSO will be responsible for the cost of resources required to rectify the situation. Other penalties include the immediate termination of access to healthnetbc services and telecommunications facilities and, where applicable, referral to the appropriate regulatory body for investigation and disciplinary action. 2.6 Compliance Audits/Inspections A team with representatives from the Ministry reserve the right to perform random, unannounced audits/inspections at client sites. The purpose of an audit / inspection is to determine if the client is in compliance with the software and professional standards as described in this document Client Sites The manager at the client site will be given a deficiency report by the audit team and will be required to have the software and procedural deficiencies corrected within a specified period of time. In situations where the deficiencies are not corrected by the deadline, a report may be forwarded to the Ministry and/or the regulatory body for review. November 21, 2003 Version 2.1 Page 7
12 Volume 2 - Compliance Process Compliance Parameters Professional and Software Compliance Standards 2.7 Requirements To Connect To healthnetbc It is the responsibility of the client or the SSO to ensure the sending system including cabling, hardware, software and local area network is working properly. Services such as firewall schemes, network connections, modems, monitors, and registered IP must be arranged and paid for by the client or SSO. In order to communicate with the Ministry, each transmitting PC must be connected to the Internet. The PC must have TCP/IP software and a connection to a router which itself is connected to the Internet. This may be achieved by connecting the PC to the local area network (LAN) that has a connection to the router, or by dial-up access. If the router being used is not an approved B.C. Government router, the sub-domain name or the IP address range for the site must be communicated to the SSO Coordinator to ensure site access is enabled. If the ISP does not assign the IP address, it must be registered with the Internet Assigned Number Authority at Refer to Volume 6 Security for additional information about connecting with the Ministry. Workstations must have access to the World Wide Web and have the following level of browsers: Internet Explorer Version 5.5 (or later) with 128-bit encryption. Netscape Navigator Version 4.5 (or later) with 128-bit encryption The Ministry supports test and training environments during business hours (8 a.m 4:30 pm, Pacific Time, Monday to Friday). The Testing environment is reserved for software compliance testing only. The Training environment is used for training clients and end users after the software has successfully passed the compliance evaluation. Page 8 Version 2.1 November 21, 2003
13 Professional and Software Compliance Standards Volume 2 - Compliance Process Implementation Requirements 3 Implementation Requirements 3.1 Hospital Admitting In order for healthnetbc participants to obtain access to healthnetbc data: Agreements 1. For hospitals, the CEO (or designate) of the Health Authority must sign and submit a Data Access Agreement and a Confidentiality Undertaking Agreement with the Ministry. These agreements include items such as: Permission to conduct spot audits/inspections by the healthnetbc compliance team; Administration and maintenance of operator Ids; Penalties for misuse of information; Problem escalation procedures (i.e., identification of key personnel); Contact information. 2. healthnetbc participants must obtain signed confidentiality undertakings from all employees accessing confidential healthnetbc data and maintain a copy with the personnel files Software and Training 1. healthnetbc participants must install healthnetbc compliant software. A list of compliant SSOs is available from the SSO Coordinator. See Contacting Technical Support. 2. Designated staff must receive training/education on use of sending system software from the SSO supplying the software Connections 1. Questions regarding specific connection requirements and procedures can be directed to the Connections Coordinator. See Contacting Technical Support. 3.2 Hospital Emergency Department In order for physicians in emergency departments to obtain access to healthnetbc data: November 21, 2003 Version 2.1 Page 9
14 Volume 2 - Compliance Process Implementation Requirements Professional and Software Compliance Standards Agreements 1. The CEO (or designate) of the Health Authority must sign and submit a Data Access agreement and a Confidentiality Undertaking agreement with the Ministry. These agreements include items such as: Permission to conduct spot audits/inspections by the healthnetbc compliance team; administration and maintenance of operator Ids; Penalties for misuse of information; Problem escalation procedures (i.e., identification of key personnel); Contact information. 2. The hospital CEO and the Chief of the hospital ED must sign an undertaking acknowledging responsibilities related to confidentiality for ED physicians and hospital staff. 3. Hospital administration must obtain signed confidentiality undertakings or pledges from all employees accessing confidential healthnetbc data and maintain a copy on file. Refer to Available documentation Software and Training 1. Hospitals must install healthnetbc compliant software. A list of compliant SSOs is available from the SSO Coordinator. See Contacting Technical Support. 2. Physicians and/or designated support staff must receive training/education on use of sending system software from the SSO supplying the software Connections 1. Questions regarding specific connection requirements and procedures can be directed to the Connections Coordinator. See Contacting Technical Support. 3.3 Medical Practice In order for a medical practice to obtain access to healthnetbc data: Agreements 1. The designated physician in the medical practice must complete a Data Access agreement and a Confidentiality Undertaking agreement with the Ministry. Page 10 Version 2.1 November 21, 2003
15 Professional and Software Compliance Standards Volume 2 - Compliance Process Implementation Requirements 2. The designated physician must complete an undertaking that confirms that all security and confidentiality provisions of healthnetbc and the CPSBC have been satisfied. 3. Each individual (including physicians, locum physicians, nurses and medical office assistants) in the medical practice authorized to access healthnetbc must sign a confidentiality undertaking or pledge. Refer to Available documentation. 4. The designated physician must complete a confidentiality agreement with the SSO providing the software Software and Training 1. The medical practice must install healthnetbc compliant software. A list of compliant SSOs is available from the SSO Coordinator. See Contacting Technical Support. 2. Individuals in the medical practice who are authorized to access healthnetbc must receive training/education on the use of the sending system software, the business, privacy and confidentiality standards and the policy and procedures developed by the medical practice for access to healthnetbc Connections 1. Questions regarding specific connection requirements and procedures can be directed to the Connections Coordinator. See Contacting Technical Support. 3.4 MSP Direct for Employers In order for an employer to obtain access to MSP Services: Agreements 1. The CEO of the healthnetbc participant must sign and submit a Data Access agreement and a Confidentiality Undertaking agreement with the Ministry. 2. When the sending system software is supplied by an SSO other than the Ministry, the CEO must sign a confidentiality agreement with the SSO. 3. The healthnetbc participant must designate an individual to be responsible for ensuring all security and confidentiality provisions of healthnetbc are satisfied on an ongoing basis. November 21, 2003 Version 2.1 Page 11
16 Volume 2 - Compliance Process Implementation Requirements Professional and Software Compliance Standards 4. If applicable, the participant must inform the Ministry of changes in staff authorized to access healthnetbc data, and their related user ID. 5. Each employee authorized to access healthnetbc services must sign a confidentiality undertaking. Copies of these undertakings must be available for inspection by the healthnetbc compliance team. Refer to Available documentation Software and Training 1. The healthnetbc participant must install healthnetbc compliant software. A list of compliant SSOs is available from the SSO Coordinator. See Contacting Technical Support. 2. Each employee authorized to access healthnetbc services must receive training/education on the use of the sending system software as well as the functions and features pertaining to the messaging standard, from the SSO supplying the software Connections 1. Questions regarding specific connection requirements and procedures can be directed to the Connections Coordinator. See Contacting Technical Support. 3.5 HNSecure In order for healthnetbc participants to use HNSecure to access healthnetbc data the participant must: Software and Training 1. Install healthnetbc compliant software. A list of compliant SSOs is available from the SSO Coordinator. See Contacting Technical Support. 2. Receive training/education on use of features relating to HNSecure security. The pertinent details can be found in Volume 6 - Security Connections 1. Register a public key with healthnetbc for each Network-Facility-ID, and; 2. Password protect the matching local "private key" in the sending system. Page 12 Version 2.1 November 21, 2003
17 Professional and Software Compliance Standards Volume 2 - Compliance Process Ministry Support 4 Ministry Support 4.1 The Ministry maintains: a) Ongoing application test environment b) HNSecure test environment c) Ongoing training environment d) Network management e) Compliance standards and evaluation schedule f) Transaction structure definitions g) SSO Coordinator support 4.2 Ministry SSO Coordinator The Software Support Organization Coordinator is the first point of contact in the Ministry of Health for technical software development support. [email protected] Telephone: (250) Available documentation healthnetbc BC Web Site Access the healthnetbc web site at: The healthnetbc BC web site includes an Overview to healthnetbc BC, its Mission Statement and Objectives healthnetbc Compliance Standards Copies of this and related volumes for the Professional and Software Compliance Standards are available on the web site Note that there are also compliance documents for the PharmaNet Standard. These standards are similar but not interchangeable. November 21, 2003 Version 2.1 Page 13
18 Volume 2 - Compliance Process Ministry Support Professional and Software Compliance Standards Web Services User Support Documentation The following downloadable documents are on the Health Registration Website: Access Administrators Guide This document provides information and procedures for coordinating all user access to healthnetbc/bc Web Business Services. Working on the Web A Guide for New Users This guide has been developed to show new users how to access and work with the healthnetbc/bc Web Business Services. Introduction to healthnetbc/bc Web Business Services Demonstration Package This demonstration package provides a quick overview of the functionality offered by healthnetbc/bc Web Business Services. This sample set is intended for prospective new clients interested in getting a look and feel of the business services and assumes familiarity with web browsers. Health Authority User Guide This document is intended for Health Authorities authorized to use healthnetbc/bc Web Business Services. This user guide outlines the Eligibility, Demographics and PHN Assignment business services, describes the processing requirements of each business service, provides business rules, and describes results. MSP Direct Employers User Guide This document is intended for Employers authorized to use MSP Direct Web Business Services. This user guide outlines new Employer Business Services, describes the processing requirements of each business service, provides business rules, and describes results. This guide is available on This guide is to be used in conjunction with the Health Authority user Guide Document Attribute Dictionary (DAD) For each type of document used for recording information in Maintain/Trusted Evidence Transactions, the DAD contains details for mandatory and optional data entry. Information on the structure of the DAD is in Appendix E of these documents. The DAD file (MS Word document) can be down loaded from the Compliance Standards Documentation website, Confidentiality Undertaking Private and public organizations wishing to access healthnetbc must have in place a policy regarding security safeguards for patient/client information Page 14 Version 2.1 November 21, 2003
19 Professional and Software Compliance Standards Volume 2 - Compliance Process Ministry Support obtained/used by employees. Only those individuals who sign a Confidentiality Undertaking will be allowed access to healthnetbc products and services. The policy/confidentiality undertaking refers to the authority on which the pledge is based: Public organizations must adhere to the Freedom of Information and Protection of Privacy Act and the organization s (e.g. hospital) policy; Private organizations must adhere to the Medicare Protection Act and/or the Medical Practice policies Professional and Software Compliance Tests The following downloadable files are on the Compliance Standards Website: Software Support Organizations Development Test Scenarios for Health Service Providers Software Support Organizations Development Test Scenarios for Employers HNSecure Documentation The following documents are available on the HNSecure website: HNClient & HNServer Technical Specifications HNClient sends HL7 messages to a server facility for processing and waits for a response. In order to facilitate this there are three major client application interface methods: HNAPI, HNClient, and HNLLI. The first section of this document describes the HNAPI portion of the library, followed by HNClient, and then HNLLI. While applications may use any one of these for secure communications, the HNClient and HNAPI interfaces are the easiest and the most flexible. HNClient & HNServer Business Specifications This document describes the functional characteristics of the facilities a client application may make use of and how to go about using them when communicating with HNGATE or other Ministry of Health application servers/databases. It includes specifications for HNAPI, HNClient, HNLLI, HNSETUP, HNServer and HL7XFER. The sample applications provided to demonstrate use of these facilities are also described. Application Services Professional and Software Compliance Standards HNSecure - healthnetbc/bc Security Protocol Refer to Volume 6 - Security for the latest Security standards. HNSecure Application Developer's Guide November 21, 2003 Version 2.1 Page 15
20 Volume 2 - Compliance Process Ministry Support Professional and Software Compliance Standards This document was written to assist software developers involved in developing healthnetbc/bc client applications using the libraries and routines provided in the HNAPI/HNClient/HNServer Toolkit and sample programs. How To Set Up and Use HNSecure (for Software Developers) This document is a quick reference guide for application developers using HNSecure. It provides a step-by-step guide for setting up HNCLIENT. HNSecure Compliance Tests This document is found on the Compliance website It describes the compliance evaluation for the standards and rules that pertain to the Ministry s security protocol, HNSecure. This document assists Software Support Organizations (SSOs) to understand and pass an HNSecure compliance evaluation. Each compliance test that will be performed to ensure that the HNSecure portion of an SSO s application conforms to the Ministry s security standard is described HNSecure Developers Toolkit The HNSecure Developers Toolkit is available from healthnetbc s to either incorporate into sending system software, or to use as sample code. The HNSecure Toolkit contains executable programs, source code and sample programs that can be used as templates as well as Certicom Libraries. The toolkit consists of sample programs that provide sending system software with an interface routine, a network gateway and security services, including transaction encryption/decryption and authentication of network end points. Registration is required as part of the licensing agreement for distribution of the Certicom Libraries. The HNSecure ToolKit Registration website is Page 16 Version 2.1 November 21, 2003
21 Professional and Software Compliance Standards Volume 2 - Compliance Process Ministry Support Document History DOCUMENT MODIFICATION HISTORY Version Release Date Description 2.0 September 1999 Original single document 2.1 November 21, 2003 New publication as single volume. Added new General Information and Updated contacts, links and documentation resources. 1 02/Nov/27 example of correction 2 The Health Registry Procedure Guide from HRS v2.0 has been discontinued. November 21, 2003 Version 2.1 Page 17
APPENDIX D PHN CHECK DIGIT NUMBER ROUTINE
Ministry of Health Services Professional and Software Compliance Standards For HL7 Messaging APPENDIX D PHN CHECK DIGIT NUMBER ROUTINE Version 2.1 November 21, 2003 Professional and Software Compliance
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
HIPAA Transaction ANSI X12 835 Companion Guide
HIPAA Transaction ANSI X12 835 Companion Guide HIPAA ASC x12 V5010X279A1 Version: 1.0 11/1/2013 Document History DOCUMENT VERSION HISTORY TABLE Version Sections Revised Description Revised By Date 2 Table
Electronic Data Transfer. Guidebook
Electronic Data Transfer Guidebook All possible measures are exerted to ensure accuracy of the contents of this manual; however, the guidebook may contain typographical or printing errors. The public is
11 Contacts for Health Care Practitioners & Providers
11 Contacts for Health Care Practitioners & Providers 11.1 PharmaNet Help Desk... 2 Functions... 2 Contact information... 2 Information Required by the Help Desk... 2 Reporting Problems to the Help Desk...
DOCUMENT MODIFICATION HISTORY
COLLEGE OF PHARMACISTS OF BRITISH COLUMBIA PharmaNet Professional and Software Compliance Standards Version 4.5 April 2010 DOCUMENT MODIFICATION HISTORY VERSION RELEASE DATE DESCRIPTION 2.5 Previous single
Accessing the Ministry Web Business Services
Ministry of Health Services Accessing the Ministry Web Business Services Web Business Services Eligibility, Demographics & PHN Assignment An introduction for new users March 000 Version.0 Scenario Summary
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
Internet usage Policy
Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance
RADSpa HIPAA Compliance 1. Introduction 3 1.1. Scope and Field of Application 3 1.2. HIPAA 3 2. Security Architecture 4 2.1 Authentication 4 2.2 Authorization 4 2.3 Confidentiality 4 2.3.1 Secure Communication
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
Georgia Immunization Registry (GRITS)
Georgia Immunization Registry (GRITS) Frequently Asked Questions How do I... Obtain a copy of my immunization records? To request an immunization record from GRITS: Please use the Immunization Record Request
What Virginia s Free Clinics Need to Know About HIPAA and HITECH
What Virginia s Free Clinics Need to Know About HIPAA and HITECH This document is one in a series of tools and white papers produced by the Virginia Health Care Foundation to help Virginia s free clinics
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Online (Internet) Banking Agreement and Disclosure
Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services
Combined Insurance Company of America
Combined Insurance Company of America Companion Guide Combined Insurance Company of America HIPAA Transaction Standard Companion Guide Refers to the Implementation Guides Based on X12 version 004010 Companion
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY
State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services
PHARMACARE CLAIMS FOR INSULIN PUMP VENDORS
PHARMACARE CLAIMS FOR INSULIN PUMP VENDORS Published by: Medical Beneficiary and Pharmaceutical Services Division Ministry of Health Updated: April 1, 2014 Contents 1. Introduction... 1 2. Insulin Pumps
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
Lawrence Police Department Administrative Policy. August 2013. A. Access to CJIS sensitive data is only available to authorized users.
Lawrence Police Department Administrative Policy SUBJECT Criminal Justice Information System (CJIS) APPLIES TO All Personnel EFFECTIVE DATE REVISED DATE August 2013 APPROVED BY Chief of Police TOTAL PAGES
HIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
Authorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
Virtual Private Networks (VPN) Connectivity and Management Policy
Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections
HOSTEDMIDEX.CO.UK. Additional services are also available according to Client specific plan configuration.
HOSTEDMIDEX.CO.UK THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO CLIENT BY THE SUPPLIER. I. Service Definition Lanmark Technical Services Ltd trading as mailhosted.co.uk
H.I.P.A.A. Compliance Made Easy Products and Services
H.I.P.A.A Compliance Made Easy Products and Services Provided by: Prevare IT Solutions 100 Cummings Center Suite 225D Beverly, MA 01915 [email protected] 877-232-9191 Dear Health Care Professional,
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
Architecture, Implementations, Integrations, and Technical Overview
Architecture, Implementations, Integrations, and Technical Overview Introduction System Architecture & Infrastructure Implementation Parent Portal Medical Center Strategy Integrations SIS Immunization
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Connecticut Justice Information System Security Compliance Assessment Form
The Connecticut Justice Information System (CJIS-2) is used as a mechanism for municipalities, State and Federal agencies to assess their compliance with the CJIS Security Requirements & Recommendations
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)
BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) 1. Introduction This Statement of Work (SOW) is an appendix to the existing Master Services Agreement between
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES
NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES 1. Definitions. The definitions below shall apply to this Schedule. All capitalized terms not otherwise defined herein
How to Claim. Child Care Subsidy
How to Claim Child Care Subsidy Child Care Subsidy Service Centre Contact Information Mailing Address Child Care Subsidy Service Centre PO Box 9953 Stn Prov Govt Victoria BC V8W 9R3 Telephone Toll free
Information Security Network Connectivity Process
Information Security Network Connectivity Process Handbook AS-805-D September 2009 Transmittal Letter A. Purpose It is more important than ever that each of us be aware of the latest policies, regulations,
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data Storage Version
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
RECORDS MANAGEMENT POLICY
RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
Connectivity and Communications
Chapter 5 Connectivity and Communications This chapter provides information to establish an electronic communications session with Anthem and to submit and receive files. Important: Do not send duplicate
APPENDIX 8 TO SCHEDULE 3.3
EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Health Care Provider Guide
Health Care Provider Guide Diagnostic Imaging Common Service Project, Release 1 Version: 1.4 Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document may be reproduced
WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery
WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights
National Government Services, Inc. Durable Medical Equipment Common Electronic Data Interchange. Vendor and Trading Partner Frequently Asked Questions
National Government Services, Inc. Durable Medical Equipment Common Electronic Data Interchange Vendor and Trading Partner National Government Services, Inc. was awarded the Durable Medical Equipment (DME)
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications
PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications PC/POLL SYSTEMS supports native TCP/IP polling for the SPS2000 cash register. It is recommended users have the register updated
Greenway Customer Support SUPPORT POLICIES. To deliver world class client experiences that delight each and every time we interact with our clients.
Greenway Customer Support SUPPORT POLICIES To deliver world class client experiences that delight each and every time we interact with our clients. INTRODUCTION Customer Support Our Technical Support Center,
Global Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)
Managed Communications JPMorgan - Global Client Access Managed Internet (EC Gateway) Managed Communications Overview JPMorgan offers a variety of electronic communications services that are reliable and
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)
Functional Area 3 Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Description: Supervises activities of all applications systems analysis and programming
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Online Banking Service Agreement
Online Banking Service Agreement AGREEMENT AND DISCLOSURES Before using Zions Bank's online banking services, you must consent to receive disclosures electronically, either online or via E Mail, and read
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
Vanderbilt University
Vanderbilt University Payment Card Processing and PCI Compliance Policy and Procedures Manual PCI Compliance Office Information Technology Treasury VUMC Finance Table of Contents Policy... 2 I. Purpose...
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
BC OnLine. Introduction to BC OnLine. Last Updated January 20, 2015
BC OnLine Introduction to BC OnLine Last Updated January 20, 2015 Copyright 2015 Province of British Columbia. All rights reserved. This user s guide is for users of the BC OnLine services who have accepted
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
Schedule A Support and Maintenance Agreement
Page 1 of 5 During the Term and upon SSN s acceptance of an executed Order Form that specifies the Customer s designated support plan for the applicable Software (the Covered Services ), SSN shall provide
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Welcome to Highlands State Bank Internet Banking Center. Important Information for New Users. System Security and Browser Information
Welcome to Highlands State Bank Internet Banking Center You must have a deposit account, loan account or a Highlands State Bank ATM/Debit Card to enroll in Internet Banking. We are sure you will find Internet
Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-
Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page
HIPAA: Compliance Essentials
HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
Datto Compliance 101 1
Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)
Medical Claims Electronic Data Transfer Reference Manual. Ministry of Health and Long-Term Care
Medical Claims Electronic Data Transfer Reference Manual Ministry of Health and Long-Term Care Version 1.0 September 2012 Medical Claims Electronic Data Transfer Reference Manual Table of Contents Table
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Agent Registration. Program Guide. (For use in Asia Pacific, Central Europe, Middle East, Africa)
Agent Registration Program Guide (For use in Asia Pacific, Central Europe, Middle East, Africa) Version 1 April 2014 Contents 1 INTRODUCTION... 3 1.1 ABOUT THIS GUIDE... 3 1.2 WHO NEEDS TO BE REGISTERED?...
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update. April 2015
Foreign Account Tax Compliance Act (FATCA) IDES Implementation Update April 2015 IDES Implementation Developments 2 The IRS has made significant progress in developing and deploying technology capabilities
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Remote Deposit Terms of Use and Procedures
Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
ICT USER ACCOUNT MANAGEMENT POLICY
ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...
