CHAPTER Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033
|
|
|
- Evan Manning
- 9 years ago
- Views:
Transcription
1 CHAPTER Committee Substitute for Committee Substitute for Committee Substitute for House Bill No An act relating to information technology security; amending s , F.S.; revising the membership of the Technology Advisory Council to include a cybersecurity expert; amending s , F.S.; revising the duties of the Agency for State Technology; providing that risk assessments and security audits may be completed by a private vendor; providing for the establishment of computer security incident response teams within state agencies; providing for the establishment of an information technology security incident reporting process; providing for information technology security and cybersecurity awareness training; revising duties of state agency heads; establishing computer security incident response team responsibilities; establishing notification procedures and reporting timelines for an information technology security incident or breach; amending s , F.S.; requiring the agency to establish an information technology policy for certain state contracts; providing policy requirements; providing an effective date. Be It Enacted by the Legislature of the State of Florida: Section 1. Subsection(3) of section 20.61, Florida Statutes, is amended to read: Agency for State Technology. The Agency for State Technology is created within the Department of Management Services. The agency is a separate budget program and is not subject to control, supervision, or direction by the Department of Management Services, including, but not limited to, purchasing, transactions involving real or personal property, personnel, or budgetary matters. (3) The Technology Advisory Council, consisting of seven members, is established within the Agency for State Technology and shall be maintained pursuanttos fourmembersofthecouncilshallbeappointedbythe Governor, two of whom must be from the private sector and one of whom must be a cybersecurity expert. The President of the Senate and the Speaker of the House of Representatives shall each appoint one member of the council. The Attorney General, the Commissioner of Agriculture and Consumer Services, and the Chief Financial Officer shall jointly appoint one member by agreement of a majority of these officers. Upon initial establishment of the council, two of the Governor s appointments shall be for 2-year terms. Thereafter, all appointments shall be for 4-year terms. (a) The council shall consider and make recommendations to the executive director on such matters as enterprise information technology policies, standards, services, and architecture. The council may also identify and recommend opportunities for the establishment of public-private 1
2 partnerships when considering technology infrastructure and services in order to accelerate project delivery and provide a source of new or increased project funding. (b) The executive director shall consult with the council with regard to executing the duties and responsibilities of the agency related to statewide information technology strategic planning and policy. (c) The council shall be governed by the Code of Ethics for Public Officers andemployeesassetforthinpartiiiofchapter112,andeachmembermust file a statement of financial interests pursuant to s Section 2. Subsections (3) and (4) of section , Florida Statutes, are amended to read: Security of data and information technology. (3) The Agency for State Technology is responsible for establishing standards and processes consistent with generally accepted best practices for information technology security, to include cybersecurity, and adopting rules that safeguard an agency s data, information, and information technology resources to ensure availability, confidentiality, and integrity and to mitigate risks. The agency shall also: (a) Develop, and annually update by February 1, a statewide information technology security strategic plan that includes security goals and objectives for the strategic issues of information technology security policy, risk management, training, incident management, and disaster recovery planning. (b) Develop and publish for use by state agencies an information technology security framework that, at a minimum, includes guidelines and processes for: 1. Establishing asset management procedures to ensure that an agency s information technology resources are identified and managed consistent with their relative importance to the agency s business objectives. 2. Using a standard risk assessment methodology that includes the identification of an agency s priorities, constraints, risk tolerances, and assumptions necessary to support operational risk decisions. 3. Completing comprehensive risk assessments and information technology security audits, which may be completed by a private sector vendor, and submitting completed assessments and audits to the Agency for State Technology. 4. Identifying protection procedures to manage the protection of an agency s information, data, and information technology resources. 2
3 5. Establishing procedures for accessing information and data to ensure the confidentiality, integrity, and availability of such information and data. 6. Detecting threats through proactive monitoring of events, continuous security monitoring, and defined detection processes. 7. Establishing agency computer security incident response teams and describing their responsibilities for responding to information technology security incidents, including breaches of personal information containing confidential or exempt data. 8. Recovering information and data in response to an information technology security incident. The recovery may include recommended improvements to the agency processes, policies, or guidelines. 9. Establishing an information technology security incident reporting process that includes procedures and tiered reporting timeframes for notifying the Agency for State Technology and the Department of Law Enforcement of information technology security incidents. The tiered reporting timeframes shall be based upon the level of severity of the information technology security incidents being reported. 10. Incorporating information obtained through detection and response activities into the agency s information technology security incident response plans Developing agency strategic and operational information technology security plans required pursuant to this section Establishing the managerial, operational, and technical safeguards for protecting state government data and information technology resources that align with the state agency risk management strategy and that protect the confidentiality, integrity, and availability of information and data. (c) Assist state agencies in complying with this section. (d) In collaboration with the Cybercrime Office of the Department of Law Enforcement, annually provide training for state agency information security managers and computer security incident response team members that contains training on information technology security, including cybersecurity, threats, trends, and best practices. (e) Annually review the strategic and operational information technology security plans of executive branch agencies. (4) Each state agency head shall, at a minimum: (a) Designate an information security manager to administer the information technology security program of the state agency. This designation must be provided annually in writing to the Agency for State Technology 3
4 by January 1. A state agency s information security manager, for purposes of these information security duties, shall report directly to the agency head. (b) In consultation with the Agency for State Technology and the Cybercrime Office of the Department of Law Enforcement, establish an agency computer security incident response team to respond to an information technology security incident. The agency computer security incident response team shall convene upon notification of an information technology security incident and must comply with all applicable guidelines and processes established pursuant to paragraph (3)(b). (c)(b) Submit to the Agency for State Technology annually by July 31, the state agency s strategic and operational information technology security plans developed pursuant to rules and guidelines established by the Agency for State Technology. 1. The state agency strategic information technology security plan must cover a 3-year period and, at a minimum, define security goals, intermediate objectives, and projected agency costs for the strategic issues of agency information security policy, risk management, security training, security incident response, and disaster recovery. The plan must be based on the statewide information technology security strategic plan created by the Agency for State Technology and include performance metrics that can be objectively measured to reflect the status of the state agency s progress in meeting security goals and objectives identified in the agency s strategic information security plan. 2. The state agency operational information technology security plan must include a progress report that objectively measures progress made towards the prior operational information technology security plan and a project plan that includes activities, timelines, and deliverables for security objectives that the state agency will implement during the current fiscal year. (d)(c) Conduct, and update every 3 years, a comprehensive risk assessment, which may be completed by a private sector vendor, to determine the security threats to the data, information, and information technology resources, including mobile devices and print environments, of the agency. The risk assessment must comply with the risk assessment methodology developed by the Agency for State Technology and is confidential and exempt from s (1), except that such information shall be available to the Auditor General, the Agency for State Technology, the Cybercrime Office of the Department of Law Enforcement, and, for state agencies under the jurisdiction of the Governor, the Chief Inspector General. (e)(d) Develop, and periodically update, written internal policies and procedures, which include procedures for reporting information technology security incidents and breaches to the Cybercrime Office of the Department of Law Enforcement and the Agency for State Technology. Such policies and procedures must be consistent with the rules, guidelines, and processes 4
5 established by the Agency for State Technology to ensure the security of the data, information, and information technology resources of the agency. The internal policies and procedures that, if disclosed, could facilitate the unauthorized modification, disclosure, or destruction of data or information technology resources are confidential information and exempt from s (1), except that such information shall be available to the Auditor General, the Cybercrime Office of the Department of Law Enforcement, the Agency for State Technology, and, for state agencies under the jurisdiction of the Governor, the Chief Inspector General. (f)(e) Implement managerial, operational, and technical safeguards and risk assessment remediation plans recommended established by the Agency for State Technology to address identified risks to the data, information, and information technology resources of the agency. (g)(f) Ensure that periodic internal audits and evaluations of the agency s information technology security program for the data, information, and information technology resources of the agency are conducted. The results of such audits and evaluations are confidential information and exempt from s (1), except that such information shall be available to the Auditor General, the Cybercrime Office of the Department of Law Enforcement, the Agency for State Technology, and, for agencies under the jurisdiction of the Governor, the Chief Inspector General. (h)(g) Include appropriate information technology security requirements in the written specifications for the solicitation of information technology and information technology resources and services, which are consistent with the rules and guidelines established by the Agency for State Technology in collaboration with the Department of Management Services. (i)(h) Provide information technology security and cybersecurity awareness training to all state agency employees in the first 30 days after commencing employment concerning information technology security risks and the responsibility of employees to comply with policies, standards, guidelines, and operating procedures adopted by the state agency to reduce those risks. The training may be provided in collaboration with the Cybercrime Office of the Department of Law Enforcement. (j)(i) Develop a process for detecting, reporting, and responding to threats, breaches, or information technology security incidents that are consistent with the security rules, guidelines, and processes established by the Agency for State Technology. 1. All information technology security incidents and breaches must be reported to the Agency for State Technology and the Cybercrime Office of the Department of Law Enforcement and must comply with the notification procedures and reporting timeframes established pursuant to paragraph (3)(b). 5
6 2. For information technology security breaches, state agencies shall provide notice in accordance with s Section 3. Subsection (18) of section , Florida Statutes, is renumbered as subsection (19), and a new subsection (18) is added to that section to read: Agency for State Technology; powers, duties, and functions. The Agency for State Technology shall have the following powers, duties, and functions: (18) In collaboration with the Department of Management Services: (a) Establish an information technology policy for all information technology-related state contracts, including state term contracts for information technology commodities, consultant services, and staff augmentation services. The information technology policy must include: 1. Identification of the information technology product and service categories to be included in state term contracts. 2. Requirements to be included in solicitations for state term contracts. 3. Evaluation criteria for the award of information technology-related state term contracts. 4. The term of each information technology-related state term contract. 5. The maximum number of vendors authorized on each state term contract. (b) Evaluate vendor responses for state term contract solicitations and invitations to negotiate. (c) Answer vendor questions on state term contract solicitations. (d) Ensure that the information technology policy established pursuant to paragraph (a) is included in all solicitations and contracts which are administratively executed by the department. Section 4. This act shall take effect July 1, Approved by the Governor March 25, Filed in Office Secretary of State March 25,
Governmental Oversight and Accountability Committee
The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) Prepared By: The Professional Staff
CHAPTER 2008-52. Committee Substitute for Committee Substitute for Senate Bill No. 1716
CHAPTER 2008-52 Committee Substitute for Committee Substitute for Senate Bill No. 1716 An act relating to postsecondary education; amending s. 1000.21, F.S.; redesignating the names of certain community
BUSINESS ASSOCIATE AGREEMENT ( BAA )
BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor
How To Make Nursing A Nursing Program A Nursing Degree
CHAPTER 2014-92 Committee Substitute for Committee Substitute for Senate Bill No. 1036 An act relating to nursing education programs; amending s. 464.003, F.S.; revising definitions; conforming a cross-reference;
Information Security Program CHARTER
State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information
Information Technology Operational Audit DEPARTMENT OF STATE. Florida Voter Registration System (FVRS) Report No. 2016-002 July 2015
July 2015 Information Technology Operational Audit DEPARTMENT OF STATE Florida Voter Registration System (FVRS) Sherrill F. Norman, CPA Auditor General Secretary of State Section 20.10, Florida Statutes,
Business Associate Agreement
Business Associate Agreement This Business Associate Agreement (the Agreement ) is made by and between Business Associate, [Name of Business Associate], and Covered Entity, The Connecticut Center for Health,
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
HIPAA Privacy and Business Associate Agreement
HR 2011-07 ATTACHMENT D HIPAA Privacy and Business Associate Agreement This Agreement is entered into this day of,, between [Employer] ( Employer ), acting on behalf of [Name of covered entity/plan(s)
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
CHAPTER 2013-225. Committee Substitute for House Bill No. 7029
CHAPTER 2013-225 Committee Substitute for House Bill No. 7029 An act relating to education; amending s. 1002.321, F.S.; requiring the Department of Education to develop an online catalog of digital learning
Sample Business Associate Agreement Provisions
Sample Business Associate Agreement Provisions Words or phrases contained in brackets are intended as either optional language or as instructions to the users of these sample provisions. Definitions Catch-all
Florida Senate - 2016 SB 146
By Senator Ring 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 A bill to be entitled An act relating to federal student loan default rates; amending s. 1005.04, F.S.; requiring
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Agreement ( Agreement ) is made and entered into this day of [Month], [Year] by and between [Business Name] ( Covered Entity ), [Type of Entity], whose business address
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT is made and entered into as of the day of, 2013 ( Effective Date ), by and between [Physician Practice] on behalf of itself and each of its
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) PURPOSE: The purpose of this procedure is to establish the roles, responsibilities, and communication procedures for the Computer Security Incident
CODING: Words stricken are deletions; words underlined are additions. hb7029-03-er
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 An act relating to education; amending s. 1002.321, F.S.; requiring the Department of Education to develop an online catalog of
HIPAA Business Associate Contract. Definitions
HIPAA Business Associate Contract Definitions Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the Privacy Rule. Examples of specific definitions:
CHAPTER 2013-163. Committee Substitute for Committee Substitute for Senate Bill No. 166
CHAPTER 2013-163 Committee Substitute for Committee Substitute for Senate Bill No. 166 An act relating to annuities; amending s. 627.4554, F.S.; providing that recommendations relating to annuities made
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement is effective September 1, 2013 and made between Community Health Solutions of America, Inc., a Florida corporation ( CHS ) and ( Company ).
CHAPTER 2014-86. Committee Substitute for Committee Substitute for Senate Bill No. 708
CHAPTER 2014-86 Committee Substitute for Committee Substitute for Senate Bill No. 708 An act relating to insurance claims; amending s. 627.3518, F.S.; conforming a cross-reference; amending s. 627.409,
REQUEST FOR INFORMATION (RFI) RFI No. 16-0012 FOR INFORMATION TECHNOLOGY DISASTER RECOVERY AND COLOCATION DATA CENTER SOLUTIONS
REQUEST FOR INFORMATION (RFI) RFI No. 16-0012 FOR INFORMATION TECHNOLOGY DISASTER RECOVERY AND COLOCATION DATA CENTER SOLUTIONS Refer ALL Inquiries to: Michael Talbot, Procurement Officer Purchasing Department
One Hundred Twelfth Congress of the United States of America
S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,
SaaS. Business Associate Agreement
SaaS Business Associate Agreement This Business Associate Agreement ( BA Agreement ) becomes effective pursuant to the terms of Section 5 of the End User Service Agreement ( EUSA ) between Customer ( Covered
PART I ARTICLE. apply to all insurers domiciled in this State unless exempt. (b) The purposes of this article shall be to:
THE SENATE TWENTY-EIGHTH LEGISLATURE, 0 STATE OF HAWAII A BILL FOR AN ACT RELATING TO INSURANCE BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII: PART I SECTION. Chapter, Hawaii Revised Statutes,
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) BUSINESS ASSOCIATE AGREEMENT
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( BAA ) is by and between the National Association of Boards of Pharmacy
Florida Senate - 2011 SB 1908
By Senator Smith 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 A bill to be entitled An act relating to insurance; amending s. 501.212, F.S.; removing an exemption from
CHAPTER 2014-80. Committee Substitute for Committee Substitute for Committee Substitute for Senate Bill No. 542
CHAPTER 2014-80 Committee Substitute for Committee Substitute for Committee Substitute for Senate Bill No. 542 An act relating to flood insurance; amending s. 627.062, F.S.; adding projected flood losses
CHAPTER 58. BE IT ENACTED by the Senate and General Assembly of the State of New Jersey:
CHAPTER 58 AN ACT establishing an Office of the Medicaid Inspector General, supplementing Title 30 of the Revised Statutes, amending P.L.1999, c.162, and making an appropriation. BE IT ENACTED by the Senate
FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT
FORM OF HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is made and entered into to be effective as of, 20 (the Effective Date ), by and between ( Covered Entity ) and
Please print the attached document, sign and return to [email protected] or contact Erica Van Treese, Account Manager, Provider Relations &
Please print the attached document, sign and return to [email protected] or contact Erica Van Treese, Account Manager, Provider Relations & Solutions. Office: 866-452-5017, Fax: 615-379-2541, [email protected]
CHAPTER 2011-71. Committee Substitute for Committee Substitute for Senate Bill No. 1316
CHAPTER 2011-71 Committee Substitute for Committee Substitute for Senate Bill No. 1316 An act relating to loan processing; amending s. 494.001, F.S.; creating and revising definitions; deleting a redundant
HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions
HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions A. Business Associate. Business Associate shall have the meaning given to such term under the Privacy and Security Rules, including,
Business Associate Agreement
Business Associate Agreement This Business Associate Agreement (this "Agreement") is made as of, 201_ (the Effective Date ), and is entered into between ( Covered Entity ) and Delta Business System, Inc.
COVERMYMEDS BUSINESS ASSOCIATE AGREEMENT
COVERMYMEDS BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (the Agreement ) is entered into between Covered Entity and CoverMyMeds LLC, a Delaware limited liability company ( Business Associate
SENATE DOCKET, NO. 176 FILED ON: 1/14/2015. SENATE... No. 226. The Commonwealth of Massachusetts PRESENTED BY: Marc R. Pacheco
SENATE DOCKET, NO. 176 FILED ON: 1/14/2015 SENATE.............. No. 226 The Commonwealth of Massachusetts PRESENTED BY: Marc R. Pacheco To the Honorable Senate and House of Representatives of the Commonwealth
BILL ANALYSIS. Senate Research Center S.B. 20 By: Nelson Finance 3/9/2015 As Filed
BILL ANALYSIS Senate Research Center S.B. 20 By: Nelson Finance 3/9/2015 As Filed AUTHOR'S / SPONSOR'S STATEMENT OF INTENT The purpose of this bill is to reform state agency contracting by clarifying accountability,
OFFICE OF FINANCIAL REGULATION COLLECTION AGENCY REGISTRATIONS MORTGAGE-RELATED AND CONSUMER COLLECTION AGENCY COMPLAINTS PRIOR AUDIT FOLLOW-UP
REPORT NO. 2013-031 OCTOBER 2012 OFFICE OF FINANCIAL REGULATION COLLECTION AGENCY REGISTRATIONS MORTGAGE-RELATED AND CONSUMER COLLECTION AGENCY COMPLAINTS PRIOR AUDIT FOLLOW-UP Operational Audit COMMISSIONER
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT 1. DEFINITIONS: 1.1 Undefined Terms: Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms defined by the Health Insurance Portability
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT 1. The terms and conditions of this document entitled Business Associate Agreement ( Business Associate Agreement ), shall be attached to and incorporated by reference in the
FLORIDA DEPARTMENT OF EDUCATION
Executive Summary FLORIDA DEPARTMENT OF EDUCATION On September 23, 2013, following the Governor's Education Summit, Governor Rick Scott released an Executive Order announcing a plan for policy improvements
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is effective as of, 200 ( Effective Date ), and entered into by and between, whose address is ( Business Associate ) and THE
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES I. Overview / Definitions The Health Insurance Portability and Accountability Act is a federal law
NATIONAL CYBERSECURITY PROTECTION ACT OF 2014
PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128
BUSINESS ASSOCIATE AGREEMENT. (Contractor name and address), hereinafter referred to as Business Associate;
BUSINESS ASSOCIATE AGREEMENT (Agreement #) THIS DOCUMENT CONSTITUTES AN AGREEMENT BETWEEN: AND (Contractor name and address), hereinafter referred to as Business Associate; The Department of Behavioral
H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
Chief Clerk of the Assembly. Secretary of the Senate. Private Secretary of the Governor
Assembly Bill No. 22 Passed the Assembly September 8, 2011 Chief Clerk of the Assembly Passed the Senate September 8, 2011 Secretary of the Senate This bill was received by the Governor this day of, 2011,
MMA SAMPLE FORM *REVIEW CAREFULLY & ADAPT TO YOUR PRACTICE*
This is only sample language. The language should be changed to accurately reflect business arrangements between a covered entity and business associate or business associate and subcontractor. In addition,
CHAPTER 2016-197. Committee Substitute for Committee Substitute for Senate Bill No. 1274
CHAPTER 2016-197 Committee Substitute for Committee Substitute for Senate Bill No. 1274 An act relating to limited sinkhole coverage insurance; amending s. 624.407, F.S.; specifying the amount of surplus
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
Louisiana State University System
PM-36: Attachment 4 Business Associate Contract Addendum On this day of, 20, the undersigned, [Name of Covered Entity] ("Covered Entity") and [Name of Business Associate] ("Business Associate") have entered
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is entered into as of the day of, 2013 by and between RUTGERS UNIVERSITY, a Hybrid Entity, on behalf and for the
Schedule 13 - NHS Counter Fraud and Security
1. In this Schedule 13: Schedule 13 - NHS Counter Fraud and Security 1.1 CFSMS means the Special Health Authority established by the Counter Fraud and Security Management Service (Establishment and Constitution
CHAPTER 2007-18. Committee Substitute for Senate Bill No. 1328
CHAPTER 2007-18 Committee Substitute for Senate Bill No. 1328 An act relating to trust funds; terminating specified trust funds within the Board of Governors of the State University System; providing for
Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know
Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Electronic Health Record Privacy Policies
Electronic Health Record Privacy Policies Table of Contents 1. Access and Correction Policy v1.1 2. Assurance Policy v1.1 3. Consent Management Policy v1.2 4. Inquiries and Complaints Policy v1.1 5. Logging
THE PEOPLE OF THE STATE OF MICHIGAN ENACT:
State financing and management; authorities; Michigan financial review commission; expand to include certain school districts. State financing and management: authorities; Retirement: pension oversight;
Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308)
HIPAA Business Associate Agreement Sample Notice Disclaimer: Template Business Associate Agreement (45 C.F.R. 164.308) The information provided in this document does not constitute, and is no substitute
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) is entered into by and between Professional Office Services, Inc., with principal place of business at PO Box 450, Waterloo,
2015 -- S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D
0 -- S 01 SUBSTITUTE B LC000/SUB B/ S T A T E O F R H O D E I S L A N D IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 0 A N A C T RELATING TO CRIMINAL OFFENSES - IDENTITY THEFT PROTECTION Introduced By: Senators
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT ( Agreement ) by and between OUR LADY OF LOURDES HEALTH CARE SERVICES, INC., hereinafter referred to as Covered Entity, and hereinafter referred
Overview of State Procurement and
Overview of State Procurement and Contract Management PRESENTED TO THE HOUSE COMMITTEE ON GENERAL INVESTIGATING AND ETHICS LEGISLATIVE BUDGET BOARD STAFF MARCH 2015 Procurement Overview Central management
Financial Advisers (Amendment) Bill
Financial Advisers (Amendment) Bill Bill No. 15/2015. Read the first time on 11 May 2015. A BILL intituled An Act to amend the Financial Advisers Act (Chapter 110 of the 2007 Revised Edition). Be it enacted
KRS Chapter 61. Personal Information Security and Breach Investigations
KRS Chapter 61 Personal Information Security and Breach Investigations.931 Definitions for KRS 61.931 to 61.934. (Effective January 1, 2015).932 Personal information security and breach investigation procedures
CHAPTER 2016-46. Committee Substitute for Committee Substitute for Senate Bill No. 494
CHAPTER 2016-46 Committee Substitute for Committee Substitute for Senate Bill No. 494 An act relating to digital assets; providing a directive to the Division of Law Revision and Information; creating
Model Business Associate Agreement
Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model
CLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
Business Associate Agreement Involving the Access to Protected Health Information
School/Unit: Rowan University School of Osteopathic Medicine Vendor: Business Associate Agreement Involving the Access to Protected Health Information This Business Associate Agreement ( BAA ) is entered
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS
MEDICAL CAPTIVE INSURANCE COMPANY PROCUREMENT POLICIES AND PROCEDURES
MEDICAL CAPTIVE INSURANCE COMPANY PROCUREMENT POLICIES AND PROCEDURES GOVERNMENT OF THE DISTRICT OF COLUMBIA OFFICE OF RISK MANAGEMENT 441 Fourth Street, NW Suite 800 South Washington, DC 20001 Phone:
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the "Agreement") is made and entered into this day of,, by and between Quicktate and idictate ("Business Associate") and ("Covered Entity").
1. LIMITATIONS ON ACCESS TO, OR DISCLOSURE OF, PERSONALLY IDENTIFIABLE INFORMATION.
MODEL MASSACHUSETTS PRIVACY LEGISLATION 1 1. LIMITATIONS ON ACCESS TO, OR DISCLOSURE OF, PERSONALLY IDENTIFIABLE INFORMATION. (A) AUTHORIZED REPRESENTATIVES. 2 The Department of Elementary and Secondary
Business Associate Agreement (BAA) Guidance
Business Associate Agreement (BAA) Guidance Introduction The purpose of this document is to provide guidance for creating or updating business associate agreements between your Practice ( Covered Entity
Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:
PLEASE NOTE: THIS DOCUMENT IS SUBMITTED AS A SAMPLE, FOR INFORMATIONAL PURPOSES ONLY TO ABC ORGANIZATION. HIPAA SOLUTIONS LC IS NOT ENGAGED IN THE PRACTICE OF LAW IN ANY STATE, JURISDICTION, OR VENUE OF
