SmartCode Availability and Overview

Size: px
Start display at page:

Download "SmartCode Availability and Overview"

Transcription

1 1 of :20 PM Welcome to the SmartCode Report Generator This is a simple online application that helps you 'decode' the DeVilbiss SmartCode and generate sleep therapy data reports for patients. SmartCode Availability and Overview Availability SmartCode is currently available for Standard (DV51), Standard (DV53), AutoAdjust (DV54), Bilevel (DV55/56), and AutoBilevel (DV57). The most recent firmware update released on 01/21/2009 includes enhanced SmartCode features for both the Standard and AutoAdjust models. Units that were shipped prior to this release date can be upgraded in the field with a firmware update. For more information on the firmware update, please visit the following page: SmartCodes and Timeframes - Standard Plus, AutoAdjust, Bilevel, and AutoBilevel There are five SmartCodes available for Standard Plus, AutoAdjust, AutoBilevel, and Bilevel, each representing a 'rolling window' of usage based on different time frames: 1-day: provides data for the last day of usage 7-day: provides a summary of the past 7 days of usage 30-day: provides a summary of the last 30 days of usage 90-day: provides a summary of the last 90 days of usage SmartCode Usage: provides cumulative data since the start of therapy SmartCodes and Timeframes - Standard There are two codes available for Standard, one code that includes data for the 1, 7, 30 and 90-day timeframes, as well as one cumulative code. SmartCode: provides a summary of the past 1, 7, 30, and 90-day timeframes SmartCode Usage: provides cumulative data since the start of therapy Generating Reports with the Report Generator To use this report generator, you must first contact the patient and ask them to retrieve the SmartCode from their DV51, DV53, DV54, DV55/56 or DV57 CPAP. Simply call the patient and ask them to to turn on their device and press the left arrow once. Once you have collected the desired code(s) they can be de-coded using this report generator. Most of the information in the report generator is optional -- use it only if you want the information to display on the final report. A note about serial numbers: you can optionally include the device serial number in the patient's report. If you include a serial number, the SmartCode report generator will validate the collected codes to make sure that they match the device that the patient has. Once you have completed all of the desired fields and included at least one SmartCode, you click on 'generate report' to display the report. From there, you will be able to save the report as a PDF on your hard drive and distribute it. A note about privacy: The SmartCode report

2 2 of :20 PM generator does not store any information about the patient. Once the report is generated, the only way to save information is to save it locally as a PDF. Sample Codes If you would like to take the SmartCode Report Generator for a test drive, please feel free to use the following sample codes: AutoAdjust Codes Serial Number: HD Day: F6CD-39F Day: 3CCC-379D-7D75 30-Day DXY4-3D97-DJ7Y 90-Day: 7MTJT-47D9-7DT7L SmartCode Usage: ZD7-79FK-K7X Bilevel Codes Serial Number: LD Day: 46MQ-39F-3AAF 7-Day: ACCP-979D-73AP 30-Day 5XYW-AD97-D6A6 90-Day: H82JT-L1D9-7DRAB SmartCode Usage: ZD7-79FK-KA6 Standard Codes Serial Number: ID SmartCode: 16J-TCX8-2FL SmartCode Usage: ZD7-79FK-KFJ Standard Plus Codes Serial Number: JA Day: FJ4F-3B3-3P2Q 7-Day: 3CCC-379D-7C20 30-Day D0Y4-3D97-DP2L 90-Day: 7MTJT DV2P SmartCode Usage: ZD3-79FK-K2V AutoBilevel Codes Serial Number: MD Day: B6CD-39F-35M1 7-Day: 9CCC-379D-7DM3 30-Day EXY4-3D97-DJMN 90-Day: CMTJT-47D9-7DTM4 SmartCode Usage: ZD7-79FK-KMJ SmartCode Report Definitions Minimum Use Threshold Determines the minimum amount of time that the patient must use the device to be logged as a compliant day. Device settings allow for 4 or 5 hours, with 4 hours being the default setting. This

3 3 of :20 PM setting can be changed in the device clinical set-up menu. Adherence Score Shows the maximum adherence achieved for any period of thirty consecutive days of use within a ninety-day time frame. The score represents the percentage of days, within thirty consecutive days, where usage met or exceeded the Usage Threshold. This reports the best consecutive thirty days of usage. For example, if the best 30 out of the last 90 days show 22 days used above the usage threshold and 8 days below the threshold, then the Adherence Score would show 73% (22/30). For this calculation, the usage must be continuous hours and longer than the Usage Threshold. Days at Least X Hours Shows the number of days in the timeframe where the total usage within each day is at least X hours. X represents the Usage Threshold setting in the patient s device. For this calculation, all usage within a 24-hour period is recorded. % Days at Least X Hours Shows the percentage of days in the timeframe where the total usage within each day is at least X hours. X represents the Usage Threshold setting in the patient s device. For this calculation, all usage within a 24-hour period is recorded. Day Count Shows a count of days for each timeframe. If, for example, the 90-day code is collected at day 45 of therapy. The Day Count for this code will be 45 days. In most cases, however, the day count is equal to the days in the code s timeframe(s). While Breathing Hours While breathing hours are only available within the last-day timeframe and with the cumulative code. This measurement shows the total hours of use. 95th Percentile Pressure AutoAdjust or AutoBilevel pressure was at or below this pressure 95-percent of the time it is in use. 90th Percentile Pressure AutoAdjust or AutoBilevel pressure was at or below this pressure 90-percent of the time it is in use. AHI Apnea/Hypopnea Index (AHI) represents the average number of apneas and hypopneas per hour for the timeframe. Pressure Plateau Time Represents the percentage of time the AutoAdjust or AutoBilevel spent at the upper pressure setting. A value of 10% or more indicates a possible need to raise the upper pressure setting to allow higher pressures. High Leak Flow Time Shows the percentage of time where leak was above 95 liters per minute. A value of 10% or more indicates that the mask fit should be checked. NRI Non-Responding Event Index (NRI) represents the average number of non-responding events per hour.

4 4 of :20 PM A non-responding event is a respiratory event that is detected but by design does not result in a pressure change during AutoAdjust or AutoBilevel therapy. EPI The Exhale Puff Index (EPI) is the number of exhale puff events detected per hour. Exhale puffing is caused by inhaling through the patient circuit and exhaling through the mouth. % Machine Inspiration % Machine Inspiration indicates the percentage of breaths in which the timed backup feature of the Bilevel ST has initiated an inspiration trigger. % Machine Expiration % Machine Expiration indicates the percentage of breaths in which the timed backup feature of the Bilevel ST has initiated an expiration cycle. How SmartCode Supports HIPAA Compliance Confidentiality HIPAA Security Rule (Electronic Protected Health Information) Authentication Authentication: Verify person / entity has access to electronic protected health information is the one claimed Access Control Automatic logoff: Terminate an electronic session after a predetermined time of inactivity Encryption and decryption: Encrypt/decrypt electronic protected health information How SmartCode Supports Compliance Unique administrator IDs All administrator passwords are encrypted Administrator password protocol in place Administrative SoD (Separation of Duties) with multiple levels of access control and administrator privileges Administrators cannot access accounts of other administrators All temporary files are purged after a short time period an encrypted Secure Socket Layer (SSL) connection Privacy Standard: Transmission Security Encryption: Encrypt electronic protected health information (that is being transmitted) an encrypted SSL connection

5 5 of :20 PM Integrity Availability Audit Integrity: Protect electronic health information from improper alteration or destruction Implementation specifications: Mechanism to authenticate electronic protected information Integrity controls: Ensure that electronically transmitted data is protected Administrative Safeguards Data backup plan: Establish and implement procedures to create and maintain retrievable exact copies of electronic protected health information Disaster recovery plan: Establish (and implement as needed) procedures to restore any loss of data Audit controls: Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information Administrative Safeguards Log-in monitoring: Procedures for monitoring log-in attempts and reporting discrepancies All SmartCodes are protected by built in integrity checks All access to the system is captured in detailed logs and is monitored Physical access to hardware is restricted an encrypted SSL connection Data exists for a session. Data is not retained to protect privacy Hardware is monitored to ensure service availability Web browser access logging Logs are protected Detailed reporting is available of all system activity

Effective Treatment for Obstructive Sleep Apnoea

Effective Treatment for Obstructive Sleep Apnoea Effective Treatment for Obstructive Sleep Apnoea The Series of Positive Airway Pressure devices from DeVilbiss Healthcare is designed to meet the varied needs of people suffering from Obstructive Sleep

More information

HIPAA Information Security Overview

HIPAA Information Security Overview HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is

More information

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...

More information

HIPAA Compliance Guide

HIPAA Compliance Guide HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based

More information

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information

More information

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

VMware vcloud Air HIPAA Matrix

VMware vcloud Air HIPAA Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory

More information

itrust Medical Records System: Requirements for Technical Safeguards

itrust Medical Records System: Requirements for Technical Safeguards itrust Medical Records System: Requirements for Technical Safeguards Physicians and healthcare practitioners use Electronic Health Records (EHR) systems to obtain, manage, and share patient information.

More information

HIPAA. considerations with LogMeIn

HIPAA. considerations with LogMeIn HIPAA considerations with LogMeIn Introduction The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in 1996, requires all organizations that maintain or transmit electronic

More information

icode TM Software USER MANUAL

icode TM Software USER MANUAL icode TM Software USER MANUAL Table of Contents 1. Overview...1 2. icode Availability...1 3. icode and String of Code Frames...1 4. Generating Reports with the icode Software...1 4.1. How to get the string

More information

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich HIPAA Audit Processes Erik Hafkey Rainer Waedlich 1 Policies for all HIPAA relevant Requirements and Regulations Checklist for an internal Audit Process Documentation of the compliance as Preparation for

More information

Healthcare Compliance Solutions

Healthcare Compliance Solutions Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

REGULATIONS COMPLIANCE ASSESSMENT

REGULATIONS COMPLIANCE ASSESSMENT ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

HIPAA Security Checklist

HIPAA Security Checklist HIPAA Security Checklist The following checklist summarizes HIPAA Security Rule requirements that should be implemented by covered entities and business associates. The citations are to 45 CFR 164.300

More information

Datto Compliance 101 1

Datto Compliance 101 1 Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)

More information

How Managed File Transfer Addresses HIPAA Requirements for ephi

How Managed File Transfer Addresses HIPAA Requirements for ephi How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts

More information

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

LogMeIn HIPAA Considerations

LogMeIn HIPAA Considerations LogMeIn HIPAA Considerations Contents Introduction LogMeIn HIPAA Considerations...3 General HIPAA Information...4 Section A Background information on HIPAA Rules...4 Technical Safeguards Overview...5 Section

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0 WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of

More information

White Paper. Support for the HIPAA Security Rule PowerScribe 360

White Paper. Support for the HIPAA Security Rule PowerScribe 360 White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as

More information

Zmanda Cloud Backup Frequently Asked Questions

Zmanda Cloud Backup Frequently Asked Questions Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.

More information

TRUST Online u s e r g u i d e v e r s i o n 8. 4 O c t o b e r 2 0 1 3

TRUST Online u s e r g u i d e v e r s i o n 8. 4 O c t o b e r 2 0 1 3 TRUSTOnline u s e r g u i d e version 8.4 October 2013 TABLE of CONTENTS Access Trust Online... 1 Login to Trust Online... 1 Enhanced Authentication Login... 3 Select an Account... 5 Locate an Account...

More information

Logging In You must log in to the system before you can begin exchanging files with UMB. To log in to the system, follow the steps below.

Logging In You must log in to the system before you can begin exchanging files with UMB. To log in to the system, follow the steps below. Using UMB Secure File Transfer UMB Secure File Transfer is a Java-based interface that you can use to upload and download your files through a secure SSL connection using a Javasupported web browser such

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS Thank you for taking the time to fill out the privacy & security checklist. Once completed, this checklist will help us get a better

More information

Welcome to Business Internet Banking

Welcome to Business Internet Banking Welcome to Business Internet Banking Member FDIC Table of Contents Logging On to Business Internet Banking. 3 Viewing Balances. 6 Viewing Transaction Information. 7 Issuing Stop Payments. 9 Viewing estatements.

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

Background Information

Background Information User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system

More information

A QUICK AND EASY GUIDE TO CITY NATIONAL BUSINESS ONLINE

A QUICK AND EASY GUIDE TO CITY NATIONAL BUSINESS ONLINE A QUICK AND EASY GUIDE TO CITY NATIONAL BUSINESS ONLINE WELCOME Welcome to City National Business Online, available to you 24 hours a day, seven days a week. This guide will help you navigate the Business

More information

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook Introduction Per UCSC's HIPAA Security Rule Compliance Policy 1, all UCSC entities subject to the HIPAA Security Rule ( HIPAA entities ) must implement the UCSC Practices for HIPAA Security Rule Compliance

More information

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive. SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,

More information

Health Services provider user guide

Health Services provider user guide Health Services provider user guide online claims submission... convenient service, delivered through an easy-to-use secure web site http://provider.ab.bluecross.ca/health... convenient service, delivered

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually

More information

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC. White Paper ezcac: HIPAA Compliant Cloud Solution Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1 Copyright 2014, ezdi, LLC. TECHNICAL SAFEGUARDS Access Control 164.312 (a) (1)

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Healthcare Security and HIPAA Compliance with A10

Healthcare Security and HIPAA Compliance with A10 WHITE PAPER Healthcare Security and HIPAA Compliance with A10 Contents Moving Medicine to the Cloud: the HIPAA Challenge...3 HIPAA History and Standards...3 HIPAA Compliance and the A10 Solution...4 164.308

More information

HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices

More information

An Effective MSP Approach Towards HIPAA Compliance

An Effective MSP Approach Towards HIPAA Compliance MAX Insight Whitepaper An Effective MSP Approach Towards HIPAA Compliance An independent review of HIPAA requirements, detailed recommendations and vital resources to aid in achieving compliance. Table

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

The Health Insurance Portability and Accountability Act - HIPAA - Using BeAnywhere on a HIPAA context

The Health Insurance Portability and Accountability Act - HIPAA - Using BeAnywhere on a HIPAA context The Health Insurance Portability and Accountability Act - HIPAA - Using BeAnywhere on a HIPAA context About HIPAA The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in

More information

Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance

Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance RADSpa HIPAA Compliance 1. Introduction 3 1.1. Scope and Field of Application 3 1.2. HIPAA 3 2. Security Architecture 4 2.1 Authentication 4 2.2 Authorization 4 2.3 Confidentiality 4 2.3.1 Secure Communication

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

Personal and Small Business Login Guide

Personal and Small Business Login Guide Personal and Small Business Login Guide Let s Get Started: 1. From our home page at www.americanbusinessbank.com, in the upper left hand corner under the heading PERSONAL & SMALL BUSINESS, enter your current

More information

Online account access

Online account access User guide Online account access The best way to manage your accounts, pay bills and stay connected to your finances. osufederal.com 800-732-0173 A quick and easy guide to online account access Table of

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

Develop HIPAA-Compliant Mobile Apps with Verivo Akula

Develop HIPAA-Compliant Mobile Apps with Verivo Akula Develop HIPAA-Compliant Mobile Apps with Verivo Akula Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200 [email protected] Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

HealthInfoNet HELP DESK REFERENCE GUIDE. Revised on 10.16.2014 Page 1 of 26

HealthInfoNet HELP DESK REFERENCE GUIDE. Revised on 10.16.2014 Page 1 of 26 HealthInfoNet HELP DESK REFERENCE GUIDE Revised on 10.16.2014 Page 1 of 26 INSIDE: HealthInfoNet Help Desk Reference Guide Contacting HealthInfoNet (HIN) Determining Priority How to Reach HIN Account Management

More information

Online Giving User Guide for Church Members

Online Giving User Guide for Church Members User Guide for Church Members Pub 111, February 2011 2009-2011 ParishSOFT LLC, all rights reserved. ParishSOFT grants licensed users the right to unlimited duplication of this publication for internal

More information

Cathay Business Online Banking

Cathay Business Online Banking Cathay Business Online Banking A QUICK GUIDE TO CATHAY BUSINESS ONLINE BANKING R6119 CATHAY 8_5x11 Cover V2.indd 1 6/11/13 5:50 PM Welcome Welcome to Cathay Business Online Banking (formerly known as Cathay

More information

HIPAA Security Matrix

HIPAA Security Matrix HIPAA Matrix Hardware : 164.308(a)(1) Management Process =Required, =Addressable Risk Analysis The Covered Entity (CE) can store its Risk Analysis document encrypted and offsite using EVault managed software

More information

tell you about products and services and provide information to our third party marketing partners, subject to this policy;

tell you about products and services and provide information to our third party marketing partners, subject to this policy; WEBSITE PRIVACY POLICY FOR RUBE GOLDBERG As of 09-25-2012 Rube Goldberg has created this Privacy Policy in order to demonstrate our firm commitment to protecting personal information. The following discloses

More information

B. KTT Web-based File Transfer

B. KTT Web-based File Transfer B. KTT Web-based File Transfer The Key Total Treasury Internet File Transfer module allows clients to upload or download data files to/from KeyBank s transmission platform using a PC and Internet browser.

More information

Online Banking & Bill Pay. Quick Start Guide. Step-by-step instructions PLUS easy-to-read screen shots and helpful tips.

Online Banking & Bill Pay. Quick Start Guide. Step-by-step instructions PLUS easy-to-read screen shots and helpful tips. Online Banking & Bill Pay Quick Start Guide Step-by-step instructions PLUS easy-to-read screen shots and helpful tips. Welcome -- Online System Security Welcome to Online Banking and Bill Pay! Whether

More information

Training Guide for Delaware Practitioners and Pharmacists Delaware Division of Professional Regulation Prescription Monitoring Program

Training Guide for Delaware Practitioners and Pharmacists Delaware Division of Professional Regulation Prescription Monitoring Program Training Guide for Delaware Practitioners and Pharmacists Delaware Division of Professional Regulation Prescription Monitoring Program August 2014 v1.7 Contents Contents 1 Document Overview... 1 Purpose

More information

Security, Audit, and e-signature Administrator Console v1.2.x

Security, Audit, and e-signature Administrator Console v1.2.x Security, Audit, and e-signature Administrator Console v1.2.x USER GUIDE SAE Admin Console for use with: QuantStudio Design and Analysis desktop Software Publication Number MAN0010410 Revision A.0 For

More information

HIPAA Security and HITECH Compliance Checklist

HIPAA Security and HITECH Compliance Checklist HIPAA Security and HITECH Compliance Checklist A Compliance Self-Assessment Tool HIPAA SECURITY AND HITECH CHECKLIST The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires physicians

More information

Keyfort Cloud Services (KCS)

Keyfort Cloud Services (KCS) Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

Paladin Computers Privacy Policy Last Updated on April 26, 2006

Paladin Computers Privacy Policy Last Updated on April 26, 2006 Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

Personal Internet Online Banking Frequently Asked Questions

Personal Internet Online Banking Frequently Asked Questions Personal Internet Online Banking Frequently Asked Questions What is First National Bank s Internet Online Banking? With First National Bank s Online Banking, you can conduct through your personal computer

More information

Perceptive Content Security

Perceptive Content Security Perceptive Content Security Best Practices Perceptive Content, Version: 7.1.x Written by: Product Knowledge, R&D Date: June 2015 2015 Perceptive Software. All rights reserved. Perceptive Software is a

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

Krengel Technology HIPAA Policies and Documentation

Krengel Technology HIPAA Policies and Documentation Krengel Technology HIPAA Policies and Documentation Purpose and Scope What is Protected Health Information (PHI) and What is Not What is PHI? What is not PHI? The List of 18 Protected Health Information

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12. Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON

More information

UC Irvine Health Secure Mail Message Center

UC Irvine Health Secure Mail Message Center UC Irvine Health Secure Mail Message Center UC Irvine Health is committed to protecting the privacy of its member s information, especially their protected health information (PHI). UC Irvine Health is

More information

Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures

Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures Welcome to Online Banking with Security First. This Online Banking Agreement and Disclosure (Agreement) discusses

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service

Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service http://docs.oracle.com Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service Configuration Guide 2015 Oracle Corporation. All rights reserved 05/11/2015 Contents 1 HIPAA 3 1.0.1 What is HIPAA?

More information