Request for Proposal HIPAA Security Risk and Vulnerability Assessment
|
|
|
- Angelina Clark
- 9 years ago
- Views:
Transcription
1 Request for Proposal HIPAA Security Risk and Vulnerability Assessment May 1, 2016 First Choice Community Healthcare
2 Timeline The following Timeline has been defined to efficiently solicit multiple competitive proposals, select the most qualified vendor, and start the project within a short time period. 1. RFP Released t o Vendors May 16 th, Written Confirmation of Vendors intent to bid May 30 th, Questions from Vendors About Scope or Approach June 3 rd, Responses to Vendors about Scope or Approach June 10th, Proposal Due Date June, 24 th, Finali Review June 30th, Anticipated Decision and Selection of Vendor July 1 st, Expected Project Start Date August 1 st, Expected Deliverable Date August 26 th, 2016 All proposals must remain valid for up to 30 days following the proposal due date. Any costs incurred during the development of this proposal or associated work will not be reimbursed. Introduction First Choice Community Healthcare is looking for a qualified information security assessment firm to perform a Security Risk Analysis (RA) as defined in the HIPAA Security Rule 45 CFR (a)(1)(A) and NIST SP 800 Special Publication 53. The RA will consist of both technical and compliance analysis of First Choice Community Healthcare IT infrastructure and security compliance program. A. Definitions Analysis means the HIPAA Act Security and Privacy and NIST SP Gap Analysis requested through this RFP Compliance means meeting the requirements of the HIPAA Security and Privacy Rules and NIST SP guidelines. Contract means a written agreement between First Choice Community Healthcare and Responder selected to provide a HIPAA Security Risk and Vulnerability Assessment. Consultant means the successful Responder selected to provide a HIPAA Security Risk and Vulnerability Assessment contract to First Choice Community Healthcare. ephi means electronic Protected Health Information Gap Analysis means an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by a covered entity. For the purposes of this RFP, gap analysis will also include a written report of analysis findings with short term and long term remediation necessary to ensure technical vulnerability findings are remediated or addressed, compliance with HIPAA Security and Privacy Rules and NIST SP , preparation of HIPAA Security and Privacy policies and procedures, staff and clinical areas have sufficient security training and knowledge and assistance in identifying covered components for an appropriate hybrid entity designation, HIPAA means the Health Insurance portability and Accountability Act of 1996 HIPAA Privacy Rule means the provisions regarding the privacy of individually identifiable health information located in 45 CFR Part 160 and Subparts A and E of Part 164 as well as any amendments. HIPAA Security Rule means the provisions regarding security standards for the protection of electronic protected health information located in 45 CFR Part 160 and Subparts A and C of Part 164 as well as any amendments. 5/18/2016 First Choice Community Healthcare Page 2 of 9
3 PHI means Protected Health Information Proposal means a formal written response to this RFP submitted by a Responder. Requesfor Proposal ( RFP ) means all documents, including those attached or incorporated by reference, used for soliciting proposals to provide a HIPAA Security Risk and Vulnerability Assessment. Responder means any person or organization who submits a Proposal in response to this RFP. B. The goals of this engagement are to: 1. Meet HIPAA Security Rule testing requirements. 2. Satisfy the Meaningful Use Core Objective to Protect Electronic Health Information. 3. Guide First Choice Community Healtcare Management team, specifically in Information Technology and Compliance, to more effectively prevent, detect, contain, and correct security violations. 4. Identify and detail areas of security risk within the First Choice Community Healthcare IT infrastructure, staff and the physical security of clinical and administrative facilities. 5. Gauge the effectiveness of First Choice Community Healthcare policies and procedures, including the execution of policies and response of staff and clinicians to a security event. 6. Develop a long term security partner relationship. First Choice Community Healthcare is a community health system serving members in a three-county area of Albuquerque, New Mexico. This health center is a Health Center Program grantee under 42 U.S.C. 254b, and a deemed Public Health Service employee under 42 U.S.C. 233(g)-(n), and is accredited by the Joint Commission. All proposals will be reviewed using the following criteria: Completeness of proposal Proven technical analysis capability Ability of deliverable to clearly communicate findings and recommendations Ability to identify the cause and effect of security risks across both compliance and IT, as well as specific training and response of First Choice Community Healthcare employees should a security event occur Demonstrated and verifiable information security experience in healthcare Vendor object ivit y Proposal cost Ability of deliverable to satisfy timeline Proposal bids should be submitted as a firm fixed price and an estimate for travel costs should be provided. First Choice Community Healthcare reserves the right to not select the lowest cost proposal and to not select a vendor if none sufficiently meet the goals of this RFP. First Choice Community Healthcare will not be liable for any costs incurred by the vendor in preparing a response to this RFP. Vendors submit proposals at their own risk and expense. First Choice Community Healthcare makes no guarantee that any products or services will be purchased as a result of this RFP, and reserves the right to reject any and all proposals. 5/18/2016 First Choice Community Healthcare Page 3 of 9
4 Proposal Requirements A. Background In 1996, the United States Congress passed the Health Insurance Portability and Accountability Act (HIPAA), one of the purposes of which was to simplify and standardize the administrative functions of healthcare. The Administrative Simplification provisions (Title II) of this law require an adaptation and implementation of standards for the privacy, security and arrangement of electronic healthcare transactions. The Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH Act) of the American Recovery and Reinvestment Act of 2009 (ARRA) contains provisions that significantly affected the HIPAA Security and Privacy Rules. The HIPAA Privacy Rule and e HIPAA Securiy Rule (collecively, e HIPAA Rul e ) were issued by the United Sates Department of Health and Human Services in 2002 and 2003, respectively. B. Purpose In order to ensure compliance with the HIPAA Rules and NIST SP , First Choice Community Healthcare is requesting proposals for a Consultant to perform a HIPAA Security and Privacy Gap Analyi( Analyi ) for all First Choice Communit y Healt hcare entities. The purpose of this RFP is to select a qualified Consultant to perform the gap assessment for all First Choice Community Healthcare infrastructure and facilities, identify problem areas and make specific recommendations for remediation to ensure HIPAA Security and Privacy compliance and compliance with NIST guidelines. C. Summary of Scope of Work The scope of work shall consist of visiting different First Choice Community Healthcare facilities and programs, including headquarters, to perform the compliance assessment, a technical vulnerability analysis of the internal and external IT infrastructure (including all servers, workstations, routers, switches and firewalls) and a remote social engineering assessment. A written summary of all problem areas shall include specific remediation recommendations for HIPAA Security and Privacy, and NIST SP compliance. Additional deliverables, at First Choice Community Healthcare direction, may include a detailed project plan and support for remediating and addressing all findings, the drafting of organization-wide HIPAA Privacy and/ or Security policies and procedures, and the development of a HIPAA Privacy and/ or Security training program. The Consultant shall have the staff and resources to implement and complete the requirements of this RFP for the audit including the written summary due by [DATE TBD]. The timeframes for the additional deliverables may be negotiated. Proposal Structure The following sections will be included in the proposal, in this order: 1. Executive Summary This section will present a high-level synopsis of te vendor repone o e RFP. Te Executive Summary should be a brief overview of the engagement, and should identify the main features and benefits of the proposed work and describe how the vendor solution addresses stated high level business and technical goals. 2. Company Overview Provide a description of te company i ory, culure, number of years performing security assessments, relevant engagement experience, and key differentiators. 3. Fees Itemize all fees associated with the project. 5/18/2016 First Choice Community Healthcare Page 4 of 9
5 4. Deliverables Include descriptions of the types of reports used to summarize and provide detailed information on security risk, vulnerabilities, and the necessary countermeasures and recommended corrective actions. Include sample reports as attachments to the proposal to provide an example of the types of reports that will be provided for this engagement. 5. Schedule Include the method and approach used to manage the overall project and client correspondence. Briefly describe how the engagement proceeds from beginning to end and include payment terms. The vendor may propose a number of options for scheduling of the individual service options, including concurrent assessments where more accurate results may be generated. 6. Contact Information Key sales and project management contact information including: name, title, address, direct telephone and fax numbers. 7. References At least three healthcare clients where a similar scope of work was performed, within the past (18) eighteen months. References must include: Organization name Contact person and contact information ( , phone, address) Services provided or performed for this client and length of service 8. Team Member Biographies Include biographies and relevant experience of key staff and management personnel that will be involved with this project. Indicate if resources are employees of or sub-contracted by your organization. 9. Scope and Methodology Detail specific objectives this scope will answer and reference frameworks, standards and/or guidelines used to develop scope. Also provide a detailed description of the methodology applied to complete the scope of work. 10. Project Management a description and detail of the Vendor project management processes for facilitation of the engagement. 11. Sample Reports Include as a separate attachment, sample reports of services to be provided. It is required for each proposal to completely address each section in this order to ensure a fair and accurate comparison of vendors. Mandatory Requirements A. Conduct HIPAA Security and Privacy and NIST gap analysis and prepare a written report of analysis findings for each branch/ program that includes short and long-term remediation necessary to ensure HIPAA Security and Privacy compliance, compliance with NIST SP guidelines, and generally-accepted security best practices. The Responder shall: 1. Conduct a thorough Security Risk Analysis. The Analysis will specifically evaluate the current standing First Choice Community Healthcare business and clinical practices in relation to HIPAA Security and Privacy rules and NIST security guidelines. This will include current First Choice Community Healthcare operations and policy status as compared to HIPAA Security and Privacy Rule standard, NIST guidelines and generally-accepted security best practices, and specific remediation steps to correct potential violations. The Analysis will include all HIPAA connected First Choice Community Healthcare branch- 5/18/2016 First Choice Community Healthcare Page 5 of 9
6 es/ programs and related administrative policies and procedures, physical plant and office conditions, and information technologies in use by First Choice Community Healthcare. 2. Conduct a comprehensive technical vulnerability of the First Choice Community Healthcare IT infrastructure, to include both an internal technical vulnerability analysis and an external vulnerability and penetration assessment. a. The internal IT infrastructure vulnerability analysis should include: i. Systems analysis on the configuration of all servers and workstations ii. Network analysis for vulnerabilities with the network infrastructure, routers, switches and firewalls iii. Data security, including encryption of sensitive information, access and identity management to First Choice Community Healthcare network resources b. The external security vulnerability and penetration analysis should include: i. Network reconnaissance, employing passive and active gathering of data, to identify the network topology and potential areas of weakness ii. Enumeration of the network for analysis and identification of operating systems, services, protocols and configurations iii. Penetration analysis to attempt exploitation of identified and suspected vulnerabilities. The analysis should utilize both automated and manual processes. 3. Conduct onsite visits of various locations - to be determined by First Choice Community Healthcare - and programs in order to evaluate physical structures to determine if building or space modifications are required to comply with HIPAA Security and Privacy regulations or other state Security and Privacy statutes. 4. Interview selected management and staff members regarding common Security and Privacy related practices within branches/programs and between branches/ programs to include, but not be limited to, disposal, storage, and encryption practices or procedures. 5. Identify all information systems and communication networks that store, maintain, or transmit ephi and determine compliance with HIPAA Security and Privacy regulations or other state Security and Privacy statutes. 6. Evaluate the potential risks associated with how the different branches/programs collect, use, manage, house, disclose and dispose of information and evaluate options or changes to current practices in order to meet HIPAA Security and Privacy regulations or best practices for security of sensitive information. 7. Evaluate risks related to management, investigation and remediation of Security and Privacy breaches. 8. Assess and report on the response of selected First Choice Community Healthcare staff members to a simulated remote and telephone phishing attack. The number of, and contact information for, the randomly selected employees will only be provided upon project initiation with the chosen vendor. The simulated phishing attack may be conducted concurrent to the external vulnerability analysis at the discretion of First Choice Community Healthcare IT management, or via recommendation for scheduling by the selected vendor. Information on assessment attack vectors and methodology will be disclosed to First Choice Community Healthcare employees only by the CIO or designate, and on a strict need-to-know basis in order to maintain objectivity. 9. Analyze the current First Choice Community Healthcare physical and electronic PHI-handling and monitoring practices against the requirements of HIPAA Security and Privacy regulations and NIST SP guidelines, and identify gaps between current practices and required practices under HIPAA Security and Privacy regulations and NIST SP /18/2016 First Choice Community Healthcare Page 6 of 9
7 10. Review First Choice Communiy Healcare procedures for release, disclosure and recording of health information for compliance with each of the following HIPAA Security and Privacy standards: i. a Administrative Safeguards ii. b Physical Safeguards iii. c Technical Safeguards iv. d (b) Standard: Minimum Use and Disclosure of PHI v. e (a) Standard: Personnel Designations vi. f (b) Standard: Training vii. g (c) Standard: Safeguards viii. h (d) Standard: Complaints to the Covered Entity ix. i (e) Standard: Sanctions x. j (f) Standard: Mitigation xi. k (g) Standard: Refraining from Intimidating and Retaliatory Acts xii. l (h) Standard: Waiver Rights xiii. m (i) Standard: Policies and Procedures xiv. n (j) Standard: Documentation 11. Review the First Choice Community Healthcare HIPAA Breach incident reporting and response practices, procedures and policies for sufficiency. 12. Review a sampling of First Choice Community Healthcare contracts, Business Associate Agreements and other organizational relationships for HIPAA Security and Privacy compliance. 13. Review First Choice Community Healthcare HIPAA Security and Privacy training modules currently used by the organization to determine if there are gaps between training content and HIPAA Security and Privacy standards or state Security and Privacy statutes. Evaluate training module to determine appropriate changes to improve training efficacy. Identify training requirements for staff, management, and executive levels to include determination if some training should be procured externally. 14. Review First Choice Community Healthcare Human Resources policies, procedures and practices for HIPAA Security and Privacy compliance, including the review of all HIPAA-related agreements for new hires (employees, contracted employees, temporary employees, volunteers, etc.), onboarding and termination procedures, the sufficiency of the HIPAA Security and Privacy Officer job decripionand job assessments, employee disciplinary process and the protocol for addressing breach-related infractions. 15. Describe in detail a proposed analysis process to be followed for each branch/program including a work plan documenting tasks to be accomplished, timeframes and the responsible party. 16. Commence Analysis within thirty (30) calendar days of Contract award and complete Analysis within one hundred twenty (120) calendar days of the Contract award. Submit to First Choice Community Healthcare a comprehensive report detailing the findings of the Analysis, due within fifteen (15) calendar days (timeframe negotiable) of completing the field analysis. 17. Suggest specific short and long-term projects and remediation for each individual branch/ program audited, including a tentative timeframe and budget, for the correction of identified discrepancies in HIPAA Security and Privacy compliance. 5/18/2016 First Choice Community Healthcare Page 7 of 9
8 Deliverable As a result of this project, First Choice Community Healthcare requests a documented and prioritized list of risks, each defined by a specific vulnerability, its impact, the asset affected, a rating of overall relative risk and criticality, references where applicable to specific regulations within the HIPAA Security and Privacy Rules and NIST SP , and a recommendation to mitigate the risk. The final report will consist of the following sections: 1. Executive Summary appropriate for senior management to review and understand the current level of risk. 2. Introduction including the scope and methodology used for this assessment. 3. Findings and Recommendations: a. Providing sufficient technical detail for the IT team to understand, replicate and remediate the issue. b. The findings for any compliance issues with HIPAA Security and Privacy Rules, NIST SP and generally-accepted security best practices will include sufficient detail on remediation within First Choice business practices, workflows, policies and procedures. 4. Analysis Work Notes documenting all control and/or vulnerability categories tested and the results of the testing. The deliverable will be both concise and comprehensive, free from false positives and false negatives, and provide sufficient technical and compliance narrative detail to support all findings. Deliverable must be in PDF format and shall be delivered encrypted or via another secure method. In addition, a presentation of findings to executive management and the technical team may be required. Assessment follow-up access to the security engineering team for questions and clarifications is desired for a period of up to 12 months. Cont act Inf ormat i on Proposal submission and all questions concerning this RFP, including technical and contractual, should be directed to the following person: Name Title Jeffrey Cangialosi Chief Information Officer Phone Physical Address [email protected] 2001 N. Centro Familiar SW. Albuquerque, NM Soliciting information about this RFP after the release date, from anyone within First Choice Community Healthcare (FCCH) other than the above listed person may forfeit the vendor. Vendors shall not contact any FCCH personnel during the proposal process without express permission of the FCCH representative listed above. FCCH may disqualify any vendor who has made site visits, contacted FCCH personnel or distributed any literature without authorization from the owner of this process. 5/18/2016 First Choice Community Healthcare Page 8 of 9
9 All questions regarding this proposal and process should be directed in writing to: Jeffrey Cangialosi (Chief Information Officer) at: Any proposal received after the required time and date specified for shall be considered late and non-responsive. Any late proposals will not be evaluated. 5/18/2016 First Choice Community Healthcare Page 9 of 9
Request for Quote HIPAA Security Risk Analysis
Request for Quote Security Risk Analysis 4/26/13 Florida Department of Children and Families Purpose The Florida Department of Children and Families (DCF or the Department) is looking for a qualified information
2016 OCR AUDIT E-BOOK
!! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
The HIPAA Audit Program
The HIPAA Audit Program Anna C. Watterson Davis Wright Tremaine LLP The U.S. Department of Health and Human Services (HHS) was given authority, and a mandate, to conduct periodic audits of HIPAA 1 compliance
BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE
BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE Lewis & Clark College and Allegiance Benefit Plan Management, Inc., (jointly the Parties
Definitions: Policy: Duties and Responsibilities: The Privacy Officer will have the following responsibilities and duties:
PRIVACY 1.0 FACILITY PRIVACY OFFICER Scope: Purpose: All subsidiaries of Universal Health Services, Inc., including facilities and UHS of Delaware Inc. (collectively, UHS ), including UHS covered entities
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
CORPORATION FOR PUBLIC BROADCASTING Request for Proposals Moderated Online Focus Groups and Data Analysis
CORPORATION FOR PUBLIC BROADCASTING Request for Proposals Moderated Online Focus Groups and Data Analysis I. OVERVIEW The Corporation for Public Broadcasting ( CPB ) is seeking proposals to conduct moderated
ELKIN & ASSOCIATES, LLC. HIPAA Privacy Policy and Procedures INTRODUCTION
ELKIN & ASSOCIATES, LLC HIPAA Privacy Policy and Procedures INTRODUCTION The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implementing regulations restrict a Covered Entity
HIPAA Compliance Review Analysis and Summary of Results
HIPAA Compliance Review Analysis and Summary of Results Centers for Medicare & Medicaid Services (CMS) Office of E-Health Standards and Services (OESS) Reviews 2008 Table of Contents Introduction 1 Risk
HIPAA SECURITY RISK ANALYSIS FORMAL RFP
HIPAA SECURITY RISK ANALYSIS FORMAL RFP ADDENDUM NUMBER: (2) August 1, 2012 THIS ADDENDUM IS ISSUED PRIOR TO THE ACCEPTANCE OF THE FORMAL RFPS. THE FOLLOWING CLARIFICATIONS, AMENDMENTS, ADDITIONS, DELETIONS,
How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment
4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,
Appendix : Business Associate Agreement
I. Authority: Pursuant to 45 C.F.R. 164.502(e), the Indian Health Service (IHS), as a covered entity, is required to enter into an agreement with a business associate, as defined by 45 C.F.R. 160.103,
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This Agreement, dated as of, 2015 ("Agreement"), by and between, on its own behalf and on behalf of all entities controlling, under common control with or controlled
University Healthcare Physicians Compliance and Privacy Policy
Page 1 of 11 POLICY University Healthcare Physicians (UHP) will enter into business associate agreements in compliance with the provisions of the Health Insurance Portability and Accountability Act of
University of Wisconsin-Madison Policy and Procedure
Page 1 of 14 I. Policy II. A. The, the units of the UW-Madison Health Care Component and each individual or unit within UW-Madison that is a Business Associate of a covered entity (hereafter collectively
Healthcare Management Service Organization Accreditation Program (MSOAP)
ELECTRONIC HEALTHCARE NETWORK ACCREDITATION COMMISSION (EHNAC) Healthcare Management Service Organization Accreditation Program (MSOAP) For The HEALTHCARE INDUSTRY Version 1.0 Released: January 2011 Lee
Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review DCF Answers to Vendor Questions
Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review s to Vendor Questions Questions as Submitted by Vendors (Duplicates omitted) 1. Have controls
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ("Agreement") is made and is effective as of the date of electronic signature("effective Date") between Name of Organization ("Covered
Montclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
Authorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3
INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS I. Introduction 2 II. Definitions 3 III. Program Oversight and Responsibilities 4 A. Structure B. Compliance Committee C.
BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information
BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information I. PREAMBLE ( Covered Entity ) and ( Business Associate ) (jointly the Parties ) wish to enter into an Agreement to comply with the requirements
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,
COVERMYMEDS BUSINESS ASSOCIATE AGREEMENT
COVERMYMEDS BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (the Agreement ) is entered into between Covered Entity and CoverMyMeds LLC, a Delaware limited liability company ( Business Associate
LCD SOLUTIONS and CLICKTATE.COM BUSINESS ASSOCIATE AGREEMENT and DISCLOSURE of RIGHTS to COVERED ENTITIES
LCD SOLUTIONS and CLICKTATE.COM BUSINESS ASSOCIATE AGREEMENT and DISCLOSURE of RIGHTS to COVERED ENTITIES This agreement ("Agreement") is effective upon its execution and delivery to LCD SOLUTIONS, INC.
HIPAA Security Rule Compliance
HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA
Nine Network Considerations in the New HIPAA Landscape
Guide Nine Network Considerations in the New HIPAA Landscape The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Omnibus Final Rule, released January 2013, introduced some significant
Model Business Associate Agreement
Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model
HIPAA and Mental Health Privacy:
HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) by and between (hereinafter known as Covered Entity ) and Office Ally, LLC. (hereinafter known as Business Associate ), and
HIPAA BUSINESS ASSOCIATE SUBCONTRACTOR AGREEMENT
This HIPAA Sub Business Associate Agreement ("Sub Agreement") is entered into by and between HR Simplified, Inc. ( Business Associate ) and [Vendor Name] on behalf of itself and its Affiliates ( Subcontractor
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT 1. DEFINITIONS: 1.1 Undefined Terms: Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms defined by the Health Insurance Portability
Introduction and Background
Request for Bid Network Security Assessment March 28, 2016 Introduction and Background Purpose of the Request for Proposal The Library Network operates a wide area telecommunications network for 70 public
BUSINESS ASSOCIATE AGREEMENT ( BAA )
BUSINESS ASSOCIATE AGREEMENT ( BAA ) Pursuant to the terms and conditions specified in Exhibit B of the Agreement (as defined in Section 1.1 below) between EMC (as defined in the Agreement) and Subcontractor
HIPAA Compliance: Are you prepared for the new regulatory changes?
HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed
Four Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
BUSINESS ASSOCIATE AGREEMENT
COLUMBIA AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is entered into as of ( Effective Date ) by and between The Trustees of Columbia University in the City of
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
Business Associate Agreement
Business Associate Agreement This Business Associate Agreement (this "Agreement") is made as of, 201_ (the Effective Date ), and is entered into between ( Covered Entity ) and Delta Business System, Inc.
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
Terms and Conditions Relating to Protected Health Information ( City PHI Terms ) Revised and Effective as of September 23, 2013
Terms and Conditions Relating to Protected Health Information ( City PHI Terms ) Revised and Effective as of September 23, 2013 The City of Philadelphia is a Covered Entity as defined in the regulations
Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307
Leader Dogs for the Blind 1039 South Rochester Road Rochester Hills, MI 48307 REQUEST FOR PROPOSAL Information Security Assessment/External Penetration Testing PROPOSALS MUST BE RECEIVED VIA EMAIL BEFORE:
Request for Proposal Environmental Management Software
Request for Proposal Date Issued: November 4, 2010 Due Date: December 1, 2010 @ 2:00:00 p.m. (local time), Contact Information: Jeff Yanew Planning & Engineering Telephone: (780) 418-6615 Fax: (780) 458-1974
HIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( BAA ) is effective ( Effective Date ) by and between ( Covered Entity ) and Egnyte, Inc. ( Egnyte or Business Associate ). RECITALS
Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology
l Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology Overview The final privacy rules for securing electronic health care became effective April 14th, 2003. These regulations require
BUSINESS ASSOCIATES AND BUSINESS ASSOCIATE AGREEMENTS
PRIVACY 27.0 BUSINESS ASSOCIATES AND BUSINESS ASSOCIATE AGREEMENTS Scope: Purpose: All subsidiaries of Universal Health Services, Inc., including facilities and UHS of Delaware Inc. (collectively, UHS
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
UNIVERSITY OF CENTRAL ARKANSAS PURCHASING OFFICE 2125 COLLEGE AVENUE SUITE 2 CONWAY, AR 72034
UNIVERSITY OF CENTRAL ARKANSAS PURCHASING OFFICE 2125 COLLEGE AVENUE SUITE 2 CONWAY, AR 72034 REQUEST FOR PROPOSAL Information Technology Security Audit RFP#UCA-15-072 PROPOSALS MUST BE RECEIVED BEFORE:
Business Associate Agreement
This Business Associate Agreement Is Related To and a Part of the Following Underlying Agreement: Effective Date of Underlying Agreement: Vendor: Business Associate Agreement This Business Associate Agreement
District of Columbia Health Information Exchange Policy and Procedure Manual
District of Columbia Health Information Exchange Policy and Procedure Manual HIPAA Privacy & Direct Privacy Policies (Version 1 November 27, 2012) Table of Contents Policy # Policy/Procedure Description
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
REQUEST FOR PROPOSALS. 403(b) Retirement Plan Investment Analysis and Consulting. July 2012
REQUEST FOR PROPOSALS 403(b) Retirement Plan Investment Analysis and Consulting July 2012 I. Investment Analysis and Consulting The Corporation for Public Broadcasting ( CPB ) is seeking proposals for
ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151
ADDENDUM #1 REQUEST FOR PROPOSALS 2015-151 HIPAA/HITECH/OMNIBUS Act Compliance Consulting Services TO: FROM: CLOSING DATE: SUBJECT: All Potential Responders Angie Williams, RFP Coordinator September 24,
HIPAA Business Associate Agreement
HIPAA Business Associate Agreement If Customer is a Covered Entity or a Business Associate and includes Protected Health Information in Customer Data (as such terms are defined below), execution of a license
Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know
Health Care Information Privacy The HIPAA Regulations What Has Changed and What You Need to Know Note: Information provided to NCRA by Melodi Gates, Associate with Patton Boggs, LLC Privacy and data protection
SCDA and SCDA Member Benefits Group
SCDA and SCDA Member Benefits Group HIPAA Privacy Policy 1. PURPOSE The purpose of this policy is to protect personal health information (PHI) and other personally identifiable information for all individuals
FACT SHEET: Ransomware and HIPAA
FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000
Infinedi HIPAA Business Associate Agreement RECITALS SAMPLE
Infinedi HIPAA Business Associate Agreement This Business Associate Agreement ( Agreement ) is entered into this day of, 20 between ( Company ) and Infinedi, LLC, a Limited Liability Corporation, ( Contractor
Policy Title: HIPAA Security Awareness and Training
Policy Title: HIPAA Security Awareness and Training Number: TD-QMP-7011 Subject: HIPAA Security Awareness and Training Primary Department: TennDent/Quality Monitoring/Improvement Effective Date of Policy:
OFFICE OF CONTRACT ADMINISTRATION 60400 PURCHASING DIVISION. Appendix A HEALTHCARE INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA)
Appendix A HEALTHCARE INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA) BUSINESS ASSOCIATE ADDENDUM This Business Associate Addendum ( Addendum ) supplements and is made a part of the contract ( Contract
Please print the attached document, sign and return to [email protected] or contact Erica Van Treese, Account Manager, Provider Relations &
Please print the attached document, sign and return to [email protected] or contact Erica Van Treese, Account Manager, Provider Relations & Solutions. Office: 866-452-5017, Fax: 615-379-2541, [email protected]
BUSINESS ASSOCIATE AGREEMENT
BUSINESS ASSOCIATE AGREEMENT This BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into as of ( Effective Date ) by and between ( Covered Entity ) and American Academy of Sleep Medicine ( Business Associate
STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM
STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM BETWEEN The Division of Health Care Financing and Policy Herein after referred to as the Covered Entity and (Enter Business
Business Associate Agreement Involving the Access to Protected Health Information
School/Unit: Rowan University School of Osteopathic Medicine Vendor: Business Associate Agreement Involving the Access to Protected Health Information This Business Associate Agreement ( BAA ) is entered
HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate?
HIPAA Information Who does HIPAA apply to? HIPAA applies to all Covered Entities (entities that collect, access, use and/or disclose Protected Health Data (PHI) and are subject to HIPAA regulations). What
COMPLIANCE ALERT 10-12
HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment
REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS
REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS Issued: TABLE OF CONTENTS 1. Introduction...3 1.1 Purpose...3 1.2 Background...3 1.3 Scope of Work...3 1.4 Current Infrastructure...3
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION
BUSINESS ASSOCIATE AGREEMENT BETWEEN AND COMMISSION ON ACCREDITATION, AMERICAN PSYCHOLOGICAL ASSOCIATION This Agreement governs the provision of Protected Health Information ("PHI") (as defined in 45 C.F.R.
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology
WHITE PAPER Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology Table of Contents Overview 3 HIPAA & Retina Enterprise Edition 3 Six Steps of Vulnerability Assessment & Remediation
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
HIPAA Privacy Rule Policies
DRAFT - Policies and Procedures PRIVACY OFFICE ASSIGNMENT AND RESPONSIBILITIES APPROVED BY: SUPERCEDES POLICY: Policy #1 ADOPTED: REVISED: REVIEWED: Purpose This policy is designed to assure the establishment
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
RUTGERS POLICY. Policy Name: Standards for Privacy of Individually Identifiable Health Information
RUTGERS POLICY Section: 100.1.9 Section Title: HIPAA Policies Policy Name: Standards for Privacy of Individually Identifiable Health Information Formerly Book: 00-01-15-05:00 Approval Authority: RBHS Chancellor
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions
HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions A. Business Associate. Business Associate shall have the meaning given to such term under the Privacy and Security Rules, including,
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS
BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM This Business Associate Addendum ( Addendum ), effective, 20 ( Effective Date ), is entered into by and between University of Southern California, ( University
General HIPAA Implementation FAQ
General HIPAA Implementation FAQ What is HIPAA? Signed into law in August 1996, the Health Insurance Portability and Accountability Act ( HIPAA ) was created to provide better access to health insurance,
Business Associate Agreement
Business Associate Agreement This Business Associate Agreement (this Agreement ) is entered into as of _September 23_, 2013, (the Effective Date ) by and between Denise T. Nguyen, DDS, PC ( Dental Practice
PARTICIPATION AGREEMENT For ELECTRONIC HEALTH RECORD TECHNICAL ASSISTANCE
PARTICIPATION AGREEMENT For ELECTRONIC HEALTH RECORD TECHNICAL ASSISTANCE THIS AGREEMENT, effective, 2011, is between ( Provider Organization ), on behalf of itself and its participating providers ( Providers
M E M O R A N D U M. Revised Information Technology Security Procedures INFORMATION TECHNOLOGY SECURITY PROCEDURES. I. General
M E M O R A N D U M To: From: IT Steering Committee Brian Cohen Date: March 26, 2009 Subject: Revised Information Technology Security Procedures The following is a revised version of the Information Technology
