DATA AND USER ACCESS POLICIES

Size: px
Start display at page:

Download "DATA AND USER ACCESS POLICIES"

Transcription

1 Contents UNIVERSITY OF CHICAGO ALUMNI & DEVELOPMENT DATABASE (GRIFFIN) DATA AND USER ACCESS POLICIES Approved by the Griffin Steering Committee 2/1/07 What is Griffin? Griffin Policies & Procedures Your Responsibilities as a User or Supervisor User Responsibilities Supervisor Responsibilities Misuse System Transparency General Approach Data, Privacy, and the Law (HIPAA and FERPA) Data Access in Griffin Data Viewing Privileges Retrieving Data for Mass Mailings Sharing Data with Vendors, Volunteers or Other Non-Employees Data Entry Privileges User Access in Griffin University Classification Granting User Access Rules of Application Exceptions to the Stated Policy Appendix A: Categories of System Users Appendix B: Privileges by User Category Appendix C: Basic Use Agreement for vendors What is Griffin? Griffin is the University of Chicago s campus-wide Development and Alumni database. It is a tool designed to assist Development and Alumni Relations staff, as well as campus administrative and academic offices, to build and track relationships and associated gifts from and with entities (individuals and organizations). Griffin Policies and Procedures The policies and procedures governing use of Griffin comply with the University s Eligibility and Acceptable Use Policy for Information Technology ; these policies will be referenced as 9/24/2008 2:47:00 PM Page 1

2 needed to manage Griffin access and use. Griffin s specific policies and procedures are communicated to users via documents (see below), and via the system s site help (which for ease of use, includes policy items embedded into site help text where applicable). Griffin Documents This document (Data and User Access Policies) sets forth the policies that govern a user s and supervisor s responsibilities when using the Griffin database and the information it contains. In addition, the various levels of data security and user access are covered. Griffin policy and procedure documents include, but are not limited to: Data and User Access Policies (this document) Prospect Management Policies and Protocol Site Help Statement of confidentiality (on Griffin login screen) Personnel Policy Statement Guiding Principles The following overarching themes are the hallmarks of Griffin s policies and procedures: Griffin is the official University-wide database of record for information about donors, prospective donors, and alumni. This database is one of the University s most valuable assets. Privileges to enter information or to maintain records in Griffin come with the responsibility to the integrity of the data therein. System transparency to appropriate fund-raising and alumni relations personnel across units is paramount. Underlying this principle is the belief that both the University and its donors are best served by a culture where information on fund-raising activities, strategies, and goals is shared. As is the case with ADDS, Griffin will follow a distributed data entry model. This means that users across campus will continue to contribute to and bear significant responsibility for the upkeep of data. Access to Griffin must be secure and reliable. In order to do their jobs effectively and efficiently, staff in development and alumni relations must be able to reliably and easily access information stored in Griffin. At the same time, alumni and donors have the right to assume that personal information kept on them by the University is stored and accessed securely. Your Responsibilities as a User or Supervisor User Responsibilities Confidentiality The following Statement of Confidentiality is displayed prominently on the log-on screen of Griffin so that users are reminded regularly of the seriousness of their responsibilities as a user of the system. 9/24/2008 2:47:00 PM Page 2

3 All information, data and reports obtained through the Griffin information system is exclusively for use by authorized University of Chicago staff. All data contained in this system is confidential. Staff authorized to access Griffin must comply with the policies and procedures established for its use. Negligent or intentional misuse is an extremely serious violation of the employee s employment responsibilities and shall result in disciplinary action, which may take the form of immediate dismissal. Personal Access Code and Password As a Griffin user you bear the responsibility for preserving complete confidentiality of your system password to ensure against its use by others. If you negligently or intentionally make your access codes available to others, you shall be held responsible for any resulting misuse of the system and data by others; you will also be subject to disciplinary action. If you suspect that someone else is using your log-on and password, it is your responsibility to notify your supervisor or the Griffin User Administration and Training department. Change in Job Status If you undergo a status change of any kind (e.g., position change, leave of absence) it is your responsibility to notify the Griffin User Administration and Training department so that your user privileges can be assessed and, if necessary, updated or temporarily disabled. Supervisor Responsibilities The responsibility for enforcement of all policies on system use and misuse, system access to information, and individual user system access and privileges resides with all supervisors of employees and sponsors of provisional users (see p. 9 for definition) who work with Griffin and its data. If you are a supervisor and/or sponsor, you will be required to sign the confidentiality statement to show your acceptance of the access, logon, and data use policies. Supervisors and all University employees are prohibited from asking a Griffin user for his/her password. As a supervisor, you must notify the Griffin User Administration and Training department on or prior to a user s last day of authorized use of Griffin so that all system access can be disabled. Misuse Misuse of Griffin includes: Accessing information from the system that is not relevant to the user s task; Making a user password available to unauthorized users; Generating false or misleading information; Deleting or altering information without authorization; Using information viewed or retrieved from the system for personal or any other unauthorized use Thoughtless or intentional misuse by a University employee or a provisional user of Griffin and/or the data it contains is an extremely serious violation of the user s responsibilities. Such misuse shall result in immediate revocation of privileges and, for University employees, 9/24/2008 2:47:00 PM Page 3

4 disciplinary action, which may take the form of immediate dismissal from University of Chicago employment or even criminal charges. System Transparency General Approach As indicated above, one of the goals for Griffin is transparency. For University fundraisers, this means that the system will promote sharing of information and knowledge within the University fundraising community about the relationship between the University and its constituency. At the same time, the University values the privacy of its alumni and donors and serves as a responsible steward of privileged and confidential information. Privileges to access data in Griffin, therefore, are carefully circumscribed so that staff gain access only on a need-to-know basis. Minimally, access to Griffin includes rights to basic biographical information (name, degrees, addresses, etc.; see Appendix B for details) on every entity in the database. On the other end of the spectrum, a small number of appropriately authorized and fully certified users have unlimited access (read, record, delete, query and report) to any and/or all of the following areas in Griffin: All biographic data for any entity All gifts from any donor All actions for any entity All prospects, strategies and solicitations from all units All event data All membership data All reports Creating new reports Most Griffin users fall somewhere in between, with privileges being assigned on a need-to-know basis. The Director of User Access and Training, in coordination with supervisors of alumni and development staff across the University, sets user privileges. Data, Privacy, and the Law HIPAA and FERPA It is important for users to recognize that some information stored in Griffin is protected by federal laws governing the handling of patient and student information. It is the responsibility of users to understand the applicability of the Health Insurance Portability & Accountability Act (HIPAA) and Family Educational Rights and Privacy Act (FERPA) to their work, and to handle this information accordingly. Health Insurance Portability and Accountability Act (HIPAA) The Health Insurance Portability and Accountability Act was created in 1996 to protect the privacy of an individual s personal health information. In Griffin, patients who are donors will be tracked as friends not patients. It is against policy for any user to enter contact information or notes on an individual s record, in text or code, that indicates they are a patient, unless the information is provided by the patient themselves. Furthermore, users entering any data pertaining to patient information must indicate the source of that information, e.g. who provided the information. Griffin will record the ID of the person who entered the data in Griffin. 9/24/2008 2:47:00 PM Page 4

5 Family Educational Rights and Privacy Act (FERPA) Family Educational Rights and Privacy Act of 1974 (FERPA) is a federal law that protects the privacy of student records*. It provides students and parents of minor students the right to review education records, the right to seek to amend those records, and to limit disclosure of information in the records. The law applies to all schools that receive funding from the US Department of Education. FERPA mandates that schools must have written permission from the student, or minor student s parent, before releasing information contained in the student s education record. The school may disclose, without consent, directory information such as student s name, address, telephone number, date and place of birth, honors and awards, and dates of attendance. If the student does not want this information publicly disclosed, the law stipulates he/she can opt-out in writing. Furthermore, unless otherwise indicated, FERPA is in force even after a student graduates, so it is important that Griffin users know that FERPA applies to alumni as well as students. Since student information will be available in Griffin upon matriculation, the system will provide a special handling flag of FERPA Protected to capture students and alumni who requested that their directory information be kept private. The FERPA Protected flag will remain in place until the student or alumnus/alumna requests that it be removed. Because the law does permit school officials with legitimate educational interest access to student records even where there has been a request for FERPA privacy access to this information will be made available to development and alumni relations staff. It is important to note, however, that in cases where a FERPA flag exists on a person s Griffin record, the use of the data on that record is allowed for development and alumni relations staff only and must not be shared under any circumstances with volunteers, vendors, or any other non-development and alumni relations staff or organizations. Reports written in Griffin specifically for use with vendors or volunteers will automatically exclude any entity record that is marked with a FERPA Protected flag. However, since most Griffin reports are intended for internal use only, users must always take special care to exclude any FERPA Protected records from reports and downloads that they could potentially share with any person outside of University development and alumni relations staff. *Note: Parent information received from the Admissions Office before a student matriculates is not covered by FERPA. Data Access in Griffin Access to data in Griffin is based on three major criteria: The type of data viewed, maintained and retrieved. The individuals who can view, maintain and retrieve the data. The relationship between the users and the data maintained on a given prospect. 9/24/2008 2:47:00 PM Page 5

6 Data Viewing Privileges Griffin stores a wide range of data, some of which is of general interest to all areas within the University. This data is general biographical information such as addresses and degrees, and can be viewed by all Development and Alumni Relations staff, as well as staff in related departments (e.g. Comptroller s Office, Career and Placement) and volunteers. Even alumni have access, though it is filtered through the online Alumni Directory, separate from Griffin. Other information - such as prospect and gift data - is more sensitive in nature and can be viewed only by those staff members who input or have a legitimate need to use this information as part of their jobs, and by a very few, select volunteers. Prospect data can be viewed by prospect managers and their managers and support staff across campus who research, cultivate, solicit and steward gifts from prospects, since this represents a legitimate need to use prospect information to do their job. Gift information can be viewed by users in Development and Alumni Relations and executive-level University administrative and financial offices who solicit, receive, process, research or report on gifts, since this represents a legitimate need to use gift information as part of their job. The same holds true whether the data is viewed online or in reports generated from Griffin. Retrieving Data for Mass Mailings Access to data in the form of outputs (reports, spreadsheets, etc.) will follow the same access rules as view privileges for online screens. With Griffin, a program assignment policy more liberal than what we had in ADDS is implemented so that every area or unit can readily maintain its relationships with alumni, donors and prospects. The ADDS concept of automatically removing unassigned records from a unit s output will not be implemented programmatically though the Griffin system, but will instead by emphasized in training and facilitated through the reporting and querying tools. With this new policy and approach, users must be diligent to avoid accidentally contacting individuals that have no relationship to their program. For example, if the College wants to send something to their constituency, they should be sure to only include those people who have a College affiliation. This policy shift has important implications for users and is covered in detail in Griffin training classes and documentation. Sharing Data with Vendors, Volunteers, or Other Non-Employees Donors express their regard and confidence in an institution through philanthropy and as proper stewards, we must assure them that information about their donations will be handled with respect and with confidentiality. Furthermore, we are obligated by federal law to respect the right to privacy indicated by students and alumni (see Family Educational Rights and Privacy Act earlier in this document). Vendors Sharing data with vendors is a necessary part of business. However, if a vendor mishandles data, they only lose a little business the University could lose credibility with its donors. It is imperative, therefore, that vendors be selected with care, that they have access to as little 9/24/2008 2:47:00 PM Page 6

7 information as necessary to do their job, that there is a clear understanding that the data provided to them through Griffin is only to be used to benefit the University of Chicago, and that it is to be treated as confidential and must be kept secure at all times. Additionally, FERPA-protected records must be kept confidential, even to vendors who are doing work for the University, so be sure to exclude FERPA-protected records from any file or report provided to vendors. Appendix C is a Basic Use Agreement that staff using vendors must fill out and have vendors sign before they receive Griffin data. Volunteers To provide maximum confidentiality to our donors, sharing prospect or gift information with volunteers should be avoided. As stewards of our donors gifts and personal information, we as staff must remember that even the most well-meaning volunteers don t sign confidentiality agreements, don t risk losing their jobs when they are indiscreet, and in fact are sometimes rewarded by the cachet of having knowledge of confidential information. However, fundraising volunteers may need gift or other prospect information to do their job for the University. If at all possible, try providing the volunteer with honor roll information, which is published and available to the public. Another option might be to provide volunteers suggested ask amounts or ranges. Finally, if a volunteer insists on having access to specific gift information, you may only do so with express written approval of your department head. Please impress upon the volunteer the privileged nature of this information Provide the volunteer with as little information as possible to get the job done Make sure you aren t giving the volunteer information on anonymous gifts Data Entry Privileges User access that governs the viewing of information is different from user access for updating information. For example, while individual names can be seen by all users, names can only be maintained (as in the case of marriage, for instance) by fully trained, certified users. In general we follow a distributed data entry model for Griffin. This means that users across campus are encouraged to enter and update certain types of data on constituent records. The maintenance of the biographical data is distributed to the six categories of users which have been identified in the user population. (Appendix A identifies specific departments within these categories.) Development Administration University Administration Development and Alumni Support Services Immediate Fundraising Family Alumni Offices Other University Users Examples of data for which entry and maintenance privileges are widely distributed include: Addresses home, business, , faculty exchange, seasonal, etc. Organization Relationships 9/24/2008 2:47:00 PM Page 7

8 Activities student, volunteer, sports, events Affiliations, Committees, Awards and Honors Career information Children Degrees from other institutions (not U of C degrees) Signer specific salutations for administrators, fundraisers, volunteers Interests Mailing lists honor rolls, publications, solicitations, directories Area specific names For data integrity and audit reasons, entry and update privileges for other types of data are more tightly controlled. Some types of biographical data, for instance, can be maintained only by staff certified at the appropriate level. This includes: Adding new records Changing the record name and record type Special Handling types Updating the marital status, former spouse Changing the gender code Maintaining a date of birth/date of death Deceasing an individual University of Chicago degree information ID screen that is home to Student ID numbers For data security reasons, the maintenance of prospect management data is limited to staff (and their assistants) who: Manage prospects Research and manage prospect information Acknowledge and steward gifts Contact alumni, friends and donors With these privileges a user can enter and maintain/update solicitations and actions, rate prospects, and track progress and interactions with their prospects. Finally, due to audit requirements, the entry of gift information is controlled centrally by Gift and Records Services. Exception: Each Development program that manages its own Telefund or outsources the task of phoning their constituent groups has the responsibility to enter their own phone pledges. User Access in Griffin University Classification The University has a number of employee classifications. Three major classifications of employees, Regular, Temporary, and Student, are users of the Griffin database. 9/24/2008 2:47:00 PM Page 8

9 Regular employees will normally have greater access to the database and its information because of the sensitivity and privacy of the information; temporary and student employees generally have less at stake than regular employees if they fail to follow policy, disclose confidential data, or otherwise compromise the data or the University. Temporary or student employees can, however, be given greater access if: the employee s manager can justify the exception, and if the Director of User Access and Training deems that the employee takes the confidentiality policies seriously, based on the employee s resume, recommendations, experience, and behavior during training. Provisional Users are not employees of the University of Chicago, but, because of the University s needs, require access to Griffin. This type of user can be an owner or employee of an organization doing work with or for NSIT, for example. Granting User Access Employees who require access to Griffin will complete an enrollment request located on the Griffin Enrollment and Registration website; alternatively, the employee s supervisor or supervisor s assistant can complete the enrollment request. A CNetID and password are required to access the site. Upon request for access, the new user s specific job-related needs will be assessed by the Director of User Access and Training, who will grant privileges based on those needs. The needs assessment will include Determining in which user category and department the user is employed (See Appendix A) The user type (employee classification) The user s job function (job description) Any training prerequisites Rules of Application Supervisors should be prepared to provide answers to the following questions. In what department/program does the user work? We have users in Development and Alumni Relations offices throughout campus. In addition, we have system users in divisional, academic and affiliated units and University administrative offices. All of these users do not need the same level of access to information in the database. Is the user in a sub-group of the larger department/program? Everyone in the department/program will not have the same access. For example, a user in the Latin American Studies program does not need the same access as a user in Social Science Major Gifts. What is the user s University employee classification? Is the person a regular employee, or a temporary or student employee, or a provisional user? 9/24/2008 2:47:00 PM Page 9

10 What is the user s role based on their title and job description within that department? An up-to-date description of a user s job is critical in matching view/maintain access to system screens and reports to the user s role at the University. For instance, whereas a staff member who puts together informational or publication mailing lists does not need access to gifts or prospect data, another staff member who is responsible for writing acknowledgements needs access to gift details and scanned images of gift documents. (See Appendix B) Exceptions to the Stated Policy From time to time there is a need to adjust the stated policies; thus, exceptions to assigned privileges may be granted. A manager must submit an or memo requesting that a user have specific privileges, with the justification for the exception. This is reviewed and, if necessary, brought to the attention of the AVP of Operations and/or the AVP or VP of University Development and Alumni Relations. If the exception is granted, the manager s request will be placed in the user s file and privileges applied to the user s system access. 9/24/2008 2:47:00 PM Page 10

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security State Fair Community College shall provide a central administrative system for use in data collection and extraction. Any system user

More information

Information Systems Security Policy

Information Systems Security Policy Information Systems Security Policy University of South Alabama Computer Services Center University of South Alabama 5840 USA Drive South 251-460- 6161 5/19/2014 Outline 1 Introduction... 2 Data Retrieval

More information

Kentucky Wesleyan College Policy & Procedure Manuals - Student Information Privacy

Kentucky Wesleyan College Policy & Procedure Manuals - Student Information Privacy Kentucky Wesleyan College Policy & Procedure Manual Student Information Privacy Policy Approval: President Policy Type: College Policy Owner: Registrar Responsible Office: Registrar Revision History Approval

More information

Information Security Awareness Training Family Educational Rights and Privacy Act (FERPA)

Information Security Awareness Training Family Educational Rights and Privacy Act (FERPA) Information Security Awareness Training Family Educational Rights and Privacy Act (FERPA) The FERPA training packet is part of the Information Security Awareness Training that must be completed by employees.

More information

Information Security Policy

Information Security Policy Information Security Policy Introduction The purpose of the is policy is to protect Rider University information resources from accidental or intentional unauthorized access, modification, or damage and

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention

More information

ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY

ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse,

More information

Population Health Management Program Notice of Privacy Practices

Population Health Management Program Notice of Privacy Practices Population Health Management Program Notice of Privacy Practices Premier Health provides population health management services to its health plan members. Services include wellness program tools and technology,

More information

PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS [ABC SCHOOL]

PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS [ABC SCHOOL] [Insert Date of Policy] PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS of [ABC SCHOOL] Address Independent schools in British Columbia are invited to adopt or adapt some or all of this

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

Ivy Tech Community College of Indiana

Ivy Tech Community College of Indiana Ivy Tech Community College of Indiana POLICY TITLE Family Educational Rights and Privacy Act (FERPA) POLICY NUMBER 3.6 (Former APPM 3.4) PRIMARY RESPONSIBILITY Student Affairs CREATION / REVISION / EFFECTIVE

More information

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5 Information Security Policy Type: Administrative Responsible Office: Office of Technology Services Initial Policy Approved: 09/30/2009 Current Revision Approved: 08/10/2015 Policy Statement and Purpose

More information

DETAILED NOTICE OF PRIVACY AND SECURITY PRACTICES OF THE Trustees of the Stevens Institute of Technology Health & Welfare Plan

DETAILED NOTICE OF PRIVACY AND SECURITY PRACTICES OF THE Trustees of the Stevens Institute of Technology Health & Welfare Plan DETAILED NOTICE OF PRIVACY AND SECURITY PRACTICES OF THE Trustees of the Stevens Institute of Technology Health & Welfare Plan THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED

More information

Population Health Management Program Notice of Privacy Practices from Piedmont WellStar HealthPlans, Inc.

Population Health Management Program Notice of Privacy Practices from Piedmont WellStar HealthPlans, Inc. Population Health Management Program Notice of Privacy Practices from Piedmont WellStar HealthPlans, Inc. Piedmont WellStar HealthPlans, Inc. (PWHP) provides population health management services to its

More information

Population Health Management Program Notice of Privacy Practices from Evolent Health

Population Health Management Program Notice of Privacy Practices from Evolent Health Population Health Management Program Notice of Privacy Practices from Evolent Health MedStar Health, Inc., a Maryland not-for-profit corporation, has contracted with Evolent Health, Inc., a Delaware corporation

More information

COLLINS CONSULTING, Inc.

COLLINS CONSULTING, Inc. COLLINS CONSULTING, Inc. TECHNOLOGY PLATFORM USE POLICY 53-R1 COLLINS CONSULTING, INC. TECHNOLOGY PLATFORM USE POLICY Confidential Collins Consulting, Inc. maintains, as part of its technology platform,

More information

College of DuPage Information Technology. Information Security Plan

College of DuPage Information Technology. Information Security Plan College of DuPage Information Technology Information Security Plan April, 2015 TABLE OF CONTENTS Purpose... 3 Information Security Plan (ISP) Coordinator(s)... 4 Identify and assess risks to covered data

More information

Relationship Management Policies and Procedures

Relationship Management Policies and Procedures Relationship Management Policies and Procedures General Concept: The Relationship Management and Tracking System (RMATS) is the process of advancing a current prospect or donor toward a first-time gift,

More information

UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES

UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM NOTICE OF HEALTH INFORMATION PRACTICES 1 Effective Date: January 26, 2015 THIS NOTICE APPLIES TO THE UAB MY HEALTH REWARDS BIOMETRIC SCREENING PROGRAM

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)

Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004) Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative

More information

How To Protect Data At Northeast Alabama Community College

How To Protect Data At Northeast Alabama Community College Information Systems Security Policy Northeast Alabama Community College Center for Information Assurance Northeast Alabama Community College 138 AL Hwy 35, Rainsville, AL 35986 (256) 228-6001 1 5/22/2014

More information

RPM INTERNATIONAL INC. AND ITS SUBSIDIARIES AND OPERATING COMPANIES SAFE HARBOR PRIVACY NOTICE. EFFECTIVE AS OF: August 12, 2015

RPM INTERNATIONAL INC. AND ITS SUBSIDIARIES AND OPERATING COMPANIES SAFE HARBOR PRIVACY NOTICE. EFFECTIVE AS OF: August 12, 2015 RPM INTERNATIONAL INC. AND ITS SUBSIDIARIES AND OPERATING COMPANIES SAFE HARBOR PRIVACY NOTICE EFFECTIVE AS OF: August 12, 2015 This Notice sets forth the principles followed by RPM International Inc.,

More information

Access Control Policy

Access Control Policy Version 3.0 This policy maybe updated at anytime (without notice) to ensure changes to the HSE s organisation structure and/or business practices are properly reflected in the policy. Please ensure you

More information

Bradley D. Powell, PhD NOTICE OF PRIVACY PRACTICES: Effective June 1, 2004

Bradley D. Powell, PhD NOTICE OF PRIVACY PRACTICES: Effective June 1, 2004 Bradley D. Powell, PhD NOTICE OF PRIVACY PRACTICES: Effective June 1, 2004 A Summary of the Provisions of the Health Insurance Portability and Accountability Act ( HIPAA ) Privacy Rule (45 C.F.R. parts

More information

Information Security Policy

Information Security Policy Information Security Policy Policy Title Responsible Executive Responsible Office Information Security Policy Vice President for Information Technology and CIO, Jay Dominick Office of Information Technology,

More information

DEPARTMENTAL POLICY. Northwestern Memorial Hospital

DEPARTMENTAL POLICY. Northwestern Memorial Hospital Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

MEDICAL TRAINEE DATA FORM (This information is required for all medical students)

MEDICAL TRAINEE DATA FORM (This information is required for all medical students) ALEXANDRA MARINE AND GENERAL HOSPITAL 120 Napier Street, GODERICH, ON N7A 1W5 (519) 524-8689 ext. 5712 Fax: (519) 524-5579 Email: amgh.administration@amgh.ca MEDICAL TRAINEE DATA FORM (This information

More information

Contact: Henry Torres, (870) 972-3033

Contact: Henry Torres, (870) 972-3033 Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures

More information

Wellesley College Written Information Security Program

Wellesley College Written Information Security Program Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as

More information

IF YOU HAVE ANY QUESTIONS ABOUT THIS NOTICE OR IF YOU NEED MORE INFORMATION, PLEASE CONTACT OUR PRIVACY OFFICER:

IF YOU HAVE ANY QUESTIONS ABOUT THIS NOTICE OR IF YOU NEED MORE INFORMATION, PLEASE CONTACT OUR PRIVACY OFFICER: NOTICE OF PRIVACY PRACTICES COMPLETE EYE CARE THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED OR DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.

More information

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative

More information

Synapse Privacy Policy

Synapse Privacy Policy Synapse Privacy Policy Last updated: April 10, 2014 Introduction Sage Bionetworks is driving a systems change in data-intensive healthcare research by enabling a collective approach to information sharing

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices Effective September 20, 2013 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW

More information

Rowan University Data Governance Policy

Rowan University Data Governance Policy Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data

More information

STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS

STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act

More information

Protecting Patient Privacy It s Everyone s Responsibility

Protecting Patient Privacy It s Everyone s Responsibility Protecting Patient Privacy It s Everyone s Responsibility Observation & Student Learning Packet 1. Read packet Instructions for Self-Study Module 2. Complete post-test. A score of 80% must be achieved.

More information

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION AP 3723 ELECTRONIC MAIL AND BULK ELECTRONIC DISTRIBUTION 1.0 Purpose Citrus Community College District electronic mail (email) services support the

More information

Authorized. User Agreement

Authorized. User Agreement Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION

More information

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy

Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with

More information

Polk Medical Center Notice of Privacy Practices

Polk Medical Center Notice of Privacy Practices Polk Medical Center Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.

More information

ITS Policy Library. 11.08 - Use of Email. Information Technologies & Services

ITS Policy Library. 11.08 - Use of Email. Information Technologies & Services ITS Policy Library Information Technologies & Services Responsible Executive: Chief Information Officer, WCMC Original Issued: December 15, 2010 Last Updated: September 18, 2015 POLICY STATEMENT... 3 REASON

More information

ICT USER ACCOUNT MANAGEMENT POLICY

ICT USER ACCOUNT MANAGEMENT POLICY ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...

More information

Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320

Chatham County Schools Network Acceptable Use Policy Agreement Policy and Forms 3225/7320 ACCEPTABLE USE OF VOICE, VIDEO AND DATA NETWORK Policy Code: 3225/7320 Chatham County Schools offers electronic network access for students, teachers, and staff within the school system. A component of

More information

Marist College. Information Security Policy

Marist College. Information Security Policy Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...

More information

Floyd Healthcare Management, Inc. Notice of Privacy Practices

Floyd Healthcare Management, Inc. Notice of Privacy Practices Floyd Healthcare Management, Inc. Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW

More information

Virginia Commonwealth University Information Security Standard

Virginia Commonwealth University Information Security Standard Virginia Commonwealth University Information Security Standard Title: Scope: Data Classification Standard This document provides the classification requirements for all data generated, processed, stored,

More information

HIPAA Notice of Privacy Practices

HIPAA Notice of Privacy Practices HIPAA Notice of Privacy Practices Date of Last Revision: 09/20/2013 Effective Date: Immediately THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS

More information

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY - 1 BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY Summary of Acceptable Use Policy Bloomfield College provides technology resources to the College Community, including students, faculty, administration, alumni,

More information

NOTICE OF HEALTH INFORMATION PRACTICES

NOTICE OF HEALTH INFORMATION PRACTICES NOTICE OF HEALTH INFORMATION PRACTICES Effective Date: April 14, 2003 Date Amended: 9/5/13 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO

More information

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320

TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 TECHNOLOGY RESPONSIBLE USE Policy Code: 3225/4312/7320 The Edgecombe County Board of Education (the Board ) provides its students and staff access to a variety of technological resources. These resources

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Protocol for Reviewing Law Graduate Employment Data, and Statement of Procedures for Collecting, Maintaining, and Reporting Law Graduate Employment Data Approved by the Council

More information

HIPAA 101: Privacy and Security Basics

HIPAA 101: Privacy and Security Basics HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually

More information

Patient Privacy and HIPAA/HITECH

Patient Privacy and HIPAA/HITECH Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,

More information

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements

Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements Identity Theft Prevention Program Derived from the FTC Red Flags Rule requirements 1.0 Introduction In 2003, Congress enacted the Fair and Accurate Credit Transactions Act of 2003, 15 U.S.C. Section 1681,

More information

Boys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology

Boys and Girls Clubs of Kawartha Lakes B: Administration B4: Information Management & Policy: Privacy & Consent Technology Effective: Feb 18, 2015 Executive Director Replaces: 2010 Policy Page 1 of 5 REFERENCE: HIGH FIVE 1.4.3, 2.2.4, 2.5.3, PIDEDA POLICY: Our Commitment Boys and Girls Clubs of Kawartha Lakes (BGCKL) and the

More information

Security of Student Information: Family Educational Rights and Privacy Act (FERPA)

Security of Student Information: Family Educational Rights and Privacy Act (FERPA) Security of Student Information: Family Educational Rights and Privacy Act (FERPA) FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT The Family Educational Rights and Privacy Act of 1974, as amended ("FERPA")

More information

TITLE: SCCD ELECTRONIC INFORMATION RESOURCES

TITLE: SCCD ELECTRONIC INFORMATION RESOURCES SEATTLE COMMUNITY COLLEGE DISTRICT PROCEDURE NUMBER: 259.10-40 TITLE: SCCD ELECTRONIC INFORMATION RESOURCES 259.10 Definitions: 259.10.01 Electronic Information Resources (EIRs). All electronic hardware,

More information

Notice of Privacy Practices. Human Resources Division Employees Benefits Section

Notice of Privacy Practices. Human Resources Division Employees Benefits Section Notice of Privacy Practices Human Resources Division Employees Benefits Section THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

More information

Internet & Cell Phone Usage Policy

Internet & Cell Phone Usage Policy Internet & Cell Phone Usage Policy The Internet usage Policy applies to all Internet & Cell phone users (individuals working for the company, including permanent full-time and part-time employees, contract

More information

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy

REVIEWED BY Q&S COMMITTEE ON THE 4 TH JUNE 2015. Social Media Policy Social Media Policy SOCIAL MEDIA POLICY This Policy applies to all academy staff regardless of their employment status. It is to be read in conjunction with the E Safety and Data Security Policy. This

More information

Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft-

Musina Local Municipality. Information and Communication Technology User Account Management Policy -Draft- Musina Local Municipality Information and Communication Technology User Account Management Policy -Draft- Version Control Version Date Author(s) Details V1.0 June2013 Perry Eccleston Draft Policy Page

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

HIPAA POLICIES & PROCEDURES AND ADMINISTRATIVE FORMS TABLE OF CONTENTS

HIPAA POLICIES & PROCEDURES AND ADMINISTRATIVE FORMS TABLE OF CONTENTS HIPAA POLICIES & PROCEDURES AND ADMINISTRATIVE FORMS TABLE OF CONTENTS 1. HIPAA Privacy Policies & Procedures Overview (Policy & Procedure) 2. HIPAA Privacy Officer (Policy & Procedure) 3. Notice of Privacy

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

PII Personally Identifiable Information Training and Fraud Prevention

PII Personally Identifiable Information Training and Fraud Prevention PII Personally Identifiable Information Training and Fraud Prevention Topics What is Personally Identifiable Information (PII)? Why are we committed to protecting PII? What laws govern us? How do we comply?

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Whitefish School District. PERSONNEL 5510 page 1 of 5 HIPAA

Whitefish School District. PERSONNEL 5510 page 1 of 5 HIPAA Whitefish School District R PERSONNEL 5510 page 1 of 5 HIPAA Note: (1) Any school district offering a group health care plan for its employees is affected by HIPAA. School districts offering health plans

More information

Policy No: TITLE: EFFECTIVE DATE: CANCELLATION: REVIEW DATE:

Policy No: TITLE: EFFECTIVE DATE: CANCELLATION: REVIEW DATE: Policy No: TITLE: AP-AA-17.2 Data Classification and Data Security ADMINISTERED BY: Office of Vice President for Academic Affairs PURPOSE EFFECTIVE DATE: CANCELLATION: REVIEW DATE: August 8, 2005 Fall

More information

Preparing to Serve: Online Training Modules

Preparing to Serve: Online Training Modules Preparing to Serve: Online Training Modules MASSEN, A. AND KOWALEWSKI, B. (EDS.) COPYRIGHT 2010. WEBER STATE UNIVERSITY PREPARING TO SERVE: ONLINE TRAINING MODULES PROFESSIONALISM CULTURAL SENSITIVITY

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

University of Lafayette - Policy & Procedure

University of Lafayette - Policy & Procedure Document III UL LAFAYETTE COMPUTER & NETWORK POLICY Purpose & Scope This document sets forth the University's policy with regard to access to and use of computing and network resources by faculty, staff,

More information

Internet usage Policy

Internet usage Policy Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014

SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014 SAFE HARBOR PRIVACY NOTICE EFFECTIVE: July 1, 2005 AMENDED: July 15, 2014 This Notice sets forth the principles followed by United Technologies Corporation and its operating companies, subsidiaries, divisions

More information

UNIVERSITY OF DETROIT MERCY COLLEGE OF HEALTH PROFESSIONS MCAULEY SCHOOL OF NURSING

UNIVERSITY OF DETROIT MERCY COLLEGE OF HEALTH PROFESSIONS MCAULEY SCHOOL OF NURSING UNIVERSITY OF DETROIT MERCY COLLEGE OF HEALTH PROFESSIONS MCAULEY SCHOOL OF NURSING Criminal Background Check Policy and Procedure Approved Aug. 25, 2004, amended (12/5/06, 4/14/09, 3/4/11) Background

More information

Young Scholars of Central Pennsylvania Charter School 1530 Westerly Parkway State College, PA 16801. 2015-2016 School Year

Young Scholars of Central Pennsylvania Charter School 1530 Westerly Parkway State College, PA 16801. 2015-2016 School Year Young Scholars of Central Pennsylvania Charter School 1530 Westerly Parkway State College, PA 16801 2015-2016 School Year Annual Notification of Rights under Family Educational Rights and Privacy Act (FERPA)

More information

PEER-TO-PEER FILE SHARING POLICY

PEER-TO-PEER FILE SHARING POLICY 1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,

More information

Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D

Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D Information Technology Network/E-mail/Internet Acceptable Use Agreement Form IT-D 1. PURPOSE SWC owns and operates a variety of computing systems which are provided for the use of the Sisseton Wahpeton

More information

Pierce County Policy on Computer Use and Information Systems

Pierce County Policy on Computer Use and Information Systems Pierce County Policy on Computer Use and Information Systems Pierce County provides a variety of information technology resources such as computers, software, printers, scanners, copiers, electronic mail

More information

LANDER UNIVERSITY STUDENT INFORMATION SECURITY AND PRIVACY PROCEDURE

LANDER UNIVERSITY STUDENT INFORMATION SECURITY AND PRIVACY PROCEDURE founded in 1872 LANDER UNIVERSITY Office of Information Technology Services LANDER UNIVERSITY STUDENT INFORMATION SECURITY AND PRIVACY PROCEDURE 2012 REVISION TABLE OF CONTENTS I. PRIVACY.....................................................

More information

How To Use A College Computer System Safely

How To Use A College Computer System Safely Claremont Graduate University and The Claremont Colleges Policy Regarding Appropriate Use of Campus Computing and Network Resources An overall guiding mission of The Claremont Colleges is education in

More information

Executive Memorandum No. 27

Executive Memorandum No. 27 OFFICE OF THE PRESIDENT HIPAA Compliance Policy (effective April 14, 2003) Purpose It is the purpose of this Executive Memorandum to set forth the Board of Regents and the University Administration s Policy

More information

Identity Theft and Data Protection

Identity Theft and Data Protection Identity Theft and Data Protection As keepers of student, faculty, and staff information, we as an institution are obligated and regulated by state and federal laws to protect certain pieces of information.

More information

How To Use Social Media At Monmouth University

How To Use Social Media At Monmouth University MONMOUTH UNIVERSITY POLICIES AND PROCEDURES Policy Name: University Social Media Policy Original Issue Date: May 10, 2011 Revision Date: Page 1 of x Pages (Plus One Appendix) Issued By: President s Cabinet

More information

HIPAA Notice of Privacy Practices Effective Date: 09/23/13

HIPAA Notice of Privacy Practices Effective Date: 09/23/13 HIPAA Notice of Privacy Practices Effective Date: 09/23/13 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW

More information

Southern Law Center Law Center Policy #IT0004. Title: Email Policy

Southern Law Center Law Center Policy #IT0004. Title: Email Policy Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of

More information

The Health and Benefit Trust Fund of the International Union of Operating Engineers Local Union No. 94-94A-94B, AFL-CIO. Notice of Privacy Practices

The Health and Benefit Trust Fund of the International Union of Operating Engineers Local Union No. 94-94A-94B, AFL-CIO. Notice of Privacy Practices The Health and Benefit Trust Fund of the International Union of Operating Section 1: Purpose of This Notice Notice of Privacy Practices Effective as of September 23, 2013 THIS NOTICE DESCRIBES HOW MEDICAL

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices THIS NOTICE OF PRIVACY PRACTICES DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.

More information

STANDARD ADMINISTRATIVE PROCEDURE

STANDARD ADMINISTRATIVE PROCEDURE STANDARD ADMINISTRATIVE PROCEDURE 16.99.99.M0.26 Investigation and Response to Breach of Unsecured Protected Health Information (HITECH) Approved October 27, 2014 Next scheduled review: October 27, 2019

More information

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

Covered Areas: Those EVMS departments that have activities with Covered Accounts. I. POLICY Eastern Virginia Medical School (EVMS) establishes the following identity theft program ( Program ) to detect, identify, and mitigate identity theft in its Covered Accounts in accordance with

More information

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health

More information

II-105 Acceptable Use of Information Resources

II-105 Acceptable Use of Information Resources Children's Hospital Medical Center Online Policies II-105 Acceptable Use of Information Resources Original Date: 4/20/2005 Last Review Date: 5/12/2008 Purpose Users must not misuse corporate systems in

More information

The Bureau of the Fiscal Service. Privacy Impact Assessment

The Bureau of the Fiscal Service. Privacy Impact Assessment The Bureau of the Fiscal Service Privacy Impact Assessment The mission of the Bureau of the Fiscal Service (Fiscal Service) is to promote the financial integrity and operational efficiency of the federal

More information

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY

UNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment

More information