IT SERVICE PROVIDER ASSESSMENT
|
|
- Gabriel Horton
- 7 years ago
- Views:
Transcription
1 IT SERVICE PROVIDER ASSESSMENT PURPOSE The purpose of this document is to provide guidance to assess and evaluate risks related to the engagement of an IT service provider. Refer to the IT Service Provider Policy for additional information. Note: if Brock University Private Information is / will be under the care or control of the IT Service Provider, Brock s Privacy Impact Assessment (PIA) questionnaire may need to be completed. Please check with Brock s Freedom of Information and Privacy Coordinator. If a PIA is completed, portions of this checklist may overlap with the PIA. Where necessary information has already been provided in the PIA, please refer to the section(s) of the PIA as applicable when completing this questionnaire. INSTRUCTIONS The IT Controller, Information Technology Services, will work with the area interested in engaging an IT service provider to complete this document. KEY CONTACT INFORMATION Name Title Extension Area First name, Last name
2 KEY STAKEHOLDERS Name Title Extension Area BACKGROUND INFORMATION RELATED TO IT SERVICE PROVIDER ENGAGEMENT IT Service Provider Purpose Duplication of services Asset evaluation (risk) Data Area(s) Identify the purpose for engaging the IT service provider Will the proposed IT service provider duplicate a similar service / solution / product already provided to or available at the University? Evaluate the importance of the asset for which the IT service provider will be engaged. Consider how Brock would be harmed if: 1. The asset became widely public and / or widely distributed, if applicable 2. An employee of the IT service provider accessed the asset in an unauthorized manner 3. The data / process / function / hardware / software / service were manipulated by an outsider 4. The process / function / hardware / software / service failed to provide expected results 5. The information /data / hardware / software / service were unexpectedly changed 6. The asset was unavailable for a period of time Identify the Brock University data fields that will be stored / processed / controlled or otherwise affected by the IT service provider IT Service Provider Assessment Page 2 of 10
3 BACKGROUND INFORMATION RELATED TO IT SERVICE PROVIDER ENGAGEMENT impacted Number of users Proposed go-live / engagement date [enter if applicable] [enter if applicable] IT Service Provider Assessment Page 3 of 10
4 IT SERVICE PROVIDER ASSESSMENT QUESTIONNAIRE Please complete the questions below. Note that depending on the service for which the IT service provider is contemplated, some questions may not apply. In this case, please state N/A as the response and provide clarification where necessary. 1. IT service provider 1.1 Is the IT service provider an industry leader, small player, niche player or new-comer? 1.2 What is the size of the IT service provider s operations consider number of employees, annual revenues, etc. 1.3 History: how long has the IT service provider been in business? 1.4 Are there current issues of concern, e.g., negative media / press, data breach, etc. 1.5 List the IT service provider s current / prior higher education clients, if known. 2. Terms of service 2.1 Explain the limitations to Brock s use of the IT service provider as outlined in the IT service provider s acceptable usage policies, licensing rights or other IT service provider usage restrictions. 2.2 What advance notice will be provided by the IT service provider for any change of terms? IT Service Provider Assessment Page 4 of 10
5 2. Terms of service 2.3 Does the contract / terms of service outline meaningful liability for the IT service provider in the event that the Brock data centre is harmed and / or Brock s environment / data is breached? 2.4 Is there a cap on liability? 3. Service-level agreement 3.1 Does the IT service provider have an active SLA in place that identifies minimum performance (e.g., up time, etc.)? 3.2 Describe the SLA. 3.3 Describe penalties associated with SLA non-compliance. 4. IT service provider administration 4.1 Who at the IT service provider can access Brock s data centre / environment and/ or data? 4.2 How is their access controlled? 5. IT service provider continuity IT Service Provider Assessment Page 5 of 10
6 5.1 Does the IT service provider have a continuity plan? If so, attach, if possible. 5.2 Does the plan address, at a minimum, critical service failure? 5.3 What service-level guarantee does the IT service provider offer under recovery conditions? 6. Third party 6.1 Does the IT service provider use a third party to provide the required services? If so, explain the services to be provided by the third party and the type of relationship between the IT service provider and the third party. 7. Compliance 7.1 Have all regulatory requirements been identified? If so, by whom? Outline all regulatory requirements. 7.2 Provide / attach evidence of PCI-DSS compliance, if applicable. Does the contract state that the IT service provider will provide evidence of compliance to Brock as soon as finalized? If not, why not? 7.3 Do the proposed services meet current AODA requirements? If so, provide / attach evidence. IT Service Provider Assessment Page 6 of 10
7 8 Maintenance and support 8.1 What are the IT service provider s customer support hours? Do they work for the University area considering the services? 8.2 Does the IT service provider have meaningful problem response and resolution commitments? 8.3 Does the IT service provider give notice of material reductions in service? 9 Pricing 9.1 What are the pricing terms: Pay as you go? Upfront payments? Other? 9.2 When can the IT service provider increase rates? 9.3 Identify all other costs associated with this proposed solution (e.g., consulting / additional hardware / software / training / related services, etc.) 10 Termination 10.1 Describe the process to terminate the IT service provider. IT Service Provider Assessment Page 7 of 10
8 10 Termination 10.2 What happens to Brock data at service termination? 10.3 Can Brock data and the service be moved / transferred to another IT service provider at any time? 10.4 Specify any fees that may be incurred at the end of the service Does Brock have the right to terminate if the IT service provider introduces material modifications to service terms? 10.6 Is there a right of termination for material breach of applicable privacy and security obligations? 11 Application security 11.1 What standards does the IT service provider follow for application development? Do these include rigorous testing and acceptance protocols? 11.2 How is data integrity assured? What controls exist over internal processing? 12 Authentication Note: The proposed solution must integrate with the current Brock University user authentication protocols in order to be considered. IT Service Provider Assessment Page 8 of 10
9 12 Authentication Sign-off by the AVP, ITS is required as evidence that ITS agrees on the integration of the proposed solution with Brock s user authentication protocols Can the IT service provider s user authentication be integrated with the current Brock University user authentication protocols? 13 Data access 13.1 Does the IT service provider have access to Brock data, and if so, what restrictions are there over this level of access? 13.2 Is there secondary uses of the area s account information or Brock data by the IT service provider and / or affiliates without the area s knowledge or consent? 13.3 Does the service provider share Brock s data with other organizations for marketing or other purposes? 13.4 Can any third party access Brock data, and if so, how? 14 Data transmission 14.1 What security features exist for data transmitted back and forth between the area and the IT service provider, e.g., IT Service Provider Assessment Page 9 of 10
10 14 Data transmission encryption? 14.2 Are data transfers manual or automated? 14.3 What are the IT service provider s data leak prevention capabilities? 15 Relationship management 15.1 Will the area assign a Vendor Relations Manager (VRM) to oversee the relationship with the IT service provider? 15.2 Has an internal process been established to formally review the IT service provider s performance at least annually against the contract and Service Level Agreement in collaboration with Information Technology Services? If so, attach the Procedure. 16 Area s business continuity 16.1 Will the area be developing a business continuity plan for when the IT service provider s services are not available? If so, by when? If not, why not? Date submitted: IT Service Provider Assessment Page 10 of 10
What Virginia s Free Clinics Need to Know About HIPAA and HITECH
What Virginia s Free Clinics Need to Know About HIPAA and HITECH This document is one in a series of tools and white papers produced by the Virginia Health Care Foundation to help Virginia s free clinics
More informationTOOLBOX. ABA Financial Privacy
ABA Financial Privacy TOOLBOX This tool will help ensure that privacy remains a core value in all corners of your institution. The success of your privacy program depends upon your board s and your management
More informationUnderstanding changes to the Trust Services Principles for SOC 2 reporting
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting
More informationAttachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
More informationTop Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology
More informationRecommendations for the PIA. Process for Enterprise Services Bus. Development
Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by
More information/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services
/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE By Melbourne IT Enterprise Services CHECKLIST: PCI/ISO COMPLIANCE If your business handles credit card transactions then you ve probably heard of the Payment
More informationHIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
More informationUNIVERSITY OF ROCHESTER INFORMATION TECHNOLOGY POLICY
PURPOSE The University of Rochester recognizes the vital role information technology plays in the University s missions and related administrative activities as well as the importance in an academic environment
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT THIS HIPAA BUSINESS ASSOCIATE AGREEMENT ( BAA ) is entered into effective the day of, 20 ( Effective Date ), by and between the Regents of the University of Michigan,
More information2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationPRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES
PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES TABLE OF CONTENTS A. Overview of HIPAA Compliance Program B. General Policies 1. Glossary of Defined Terms Used in HIPAA Policies and Procedures 2. Privacy
More information12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013
Regulatory Updates Eric M. Wright, CPA, CITP Schneider Downs & Co., Inc. December 5, 2013 Eric M. Wright, CPA, CITP Eric has been involved with Information Technology with Schneider Downs since 1983. He
More information115 th Annual Convention
115 th Annual Convention Date: Saturday, October 12, 2013 Time: 11:00 am 12:00 pm Location: The Walt Disney World Swan and Dolphin Resort, Southern Hemisphere Salon 4-5 Title: Activity Type: Speaker: Data
More informationELKHART COUNTY BOARD OF REALTORS AND MULTIPLE LISTING SERVICE OF ELKHART COUNTY INC. VIRTUAL OFFICE WEBSITE (VOW) LICENSE AGREEMENT
ELKHART COUNTY BOARD OF REALTORS AND MULTIPLE LISTING SERVICE OF ELKHART COUNTY INC. VIRTUAL OFFICE WEBSITE (VOW) LICENSE AGREEMENT This License Agreement (the Agreement) is made and entered into between
More informationCloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
More informationVIRTUAL OFFICE WEBSITE LICENSE AGREEMENT
Florida Keys Multiple Listing Service, Inc. VIRTUAL OFFICE WEBSITE LICENSE AGREEMENT Florida Keys MLS, Inc. 92410 Overseas Hwy, Ste. 11 Tavernier FL 33070 305-852-92940 305-852-0716 (fax) www.flexmls.com
More informationThe potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
More informationSHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE
SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE The Shared Assessments Trust, But Verify Model The Shared Assessments Program Tools are used for managing the vendor risk
More informationLondon LAWN Terms of Service
London LAWN Terms of Service 1. GENERAL This WiFi Service is an Internet access service provided by Downtown London in partnership with Turnstyle Solutions which provides you with access to the Internet
More informationACO Accountable Care Organizations Cooperative Healthcare Requires Cooperative Security It s a Team Sport.
ACO Accountable Care Organizations Cooperative Healthcare Requires Cooperative Security It s a Team Sport. Robby Gulri VP, Product Marketing gulri@echoworx.com 8/28/13 1 Industry leading Educa1on Cer1fied
More informationEAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )
EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder
More informationPRIVACY OF CONSUMERS' FINANCIAL INFORMATION PART 12 501(b) AND BANK MANAGEMENT
PRIVACY OF CONSUMERS' FINANCIAL INFORMATION PART 12 501(b) AND BANK MANAGEMENT RESOURCES PROVIDED THROUGH APRIL 2001 Slides Narration In the last presentation, you learned about some of the general responsibilities
More informationHealth Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
More informationCan SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations
Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More informationA Checklist for Software as a Service (SaaS) Vendors and Application Service Providers
A Checklist for Software as a Service (SaaS) Vendors and Application Service Providers This checklist is a longer version of a SaaS Checklist that appeared in the July 2009 issue of LAWPRO Magazine at
More informationFrequently Asked Questions. Frequently Asked Questions: Prioritizing Trust: Certificate Authority Security Best Practices
FREQUENTLY ASKED QUESTIONS: PRIORITIZING TRUST: CERTIFICATE AUTHORITY SECURITY BEST PRACTICES Frequently Asked Questions Frequently Asked Questions: Prioritizing Trust: Certificate Authority Security Best
More informationEnterprise Architecture Review Checklist
Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish
More informationHealthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
More informationInformation Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
More informationPRIVACY POLICY. The effective date of this Privacy Policy is December 15, 2010. Last Updated September 29, 2014. Overview
PRIVACY POLICY The effective date of this Privacy Policy is December 15, 2010 Last Updated September 29, 2014 Overview The Bay Area Toll Authority (BATA) is committed to ensuring customer privacy and security.
More informationTNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business
TAKING OUR CUSTOMERS BUSINESS FORWARD The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment
More informationMRMLS LISTING INFORMATION LICENSE AGREEMENT
MRMLS LISTING INFORMATION LICENSE AGREEMENT (MRMLS data feed to Affiliated VOW Partner) This Listing Information License Agreement (the Agreement ) is made and entered into by and between MULTI REGIONAL
More informationInformation security due diligence
web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 info@watsonhall.com www.watsonhall.com Identifying information security risk for web applications
More informationBUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
More informationPrivacy and Security Meaningful Use Requirement HIPAA Readiness Review
Privacy and Security Meaningful Use Requirement HIPAA Readiness Review REACH - Achieving - Achieving meaningful meaningful use of your use EHR of your EHR Patti Kritzberger, RHIT, CHPS ND e-health Summit
More informationEmail Compliance in 5 Steps
Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential
More informationProtecting your brand in the cloud Transparency and trust through enhanced reporting
Protecting your brand in the cloud Transparency and trust through enhanced reporting Third-party Assurance November 2011 At a glance Cloud computing has unprecedented potential to deliver greater business
More informationAMERICAN EXPRESS. Merchant Site Terms and Conditions
AMERICAN EXPRESS Merchant Site Terms and Conditions The Merchant Site is provided by American Express Banking Corp (referred to as American Express, our, us or we ). These Merchant Site Terms and Conditions
More informationData Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide
Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide. Four steps for success Implementing a Data Loss Prevention solution to address PCI requirements may be broken into four key
More informationRisk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
More informationThis form may not be modified without prior approval from the Department of Justice.
This form may not be modified without prior approval from the Department of Justice. Delete this header in execution (signature) version of agreement. HIPAA BUSINESS ASSOCIATE AGREEMENT This Business Associate
More informationInformation for Agents and Brokers Regarding the HIPAA Business Associate Agreement
Information for Agents and Brokers Regarding the HIPAA Business Associate Agreement You may be aware that the Health Insurance Portability and Accountability Act of 1996 ( HIPAA ) requires health plans
More informationSERVICE TERMS AND CONDITIONS
SERVICE TERMS AND CONDITIONS Last Updated: April 19th, 2016 These Service Terms and Conditions ( Terms ) are a legal agreement between you ( Customer or you ) and Planday, Inc., a Delaware corporation
More informationPrivacy Policy and Notice of Information Practices
Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values
More informationINITIAL APPROVAL DATE INITIAL EFFECTIVE DATE
TITLE AND INFORMATION TECHNOLOGY RESOURCES DOCUMENT # 1107 APPROVAL LEVEL Alberta Health Services Executive Committee SPONSOR Legal & Privacy / Information Technology CATEGORY Information and Technology
More informationORDER 1370.108. National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:
National Policy ORDER 1370.108 Effective Date 09/21/09 SUBJ: Voice Over Internet Protocol (VoIP) Security Policy 1. Purpose of This Order. This Order establishes the Federal Aviation Administration s (FAA)
More informationPage 1 of 15. VISC Third Party Guideline
Page 1 of 15 VISC Third Party Guideline REVISION CONTROL Document Title: Author: File Reference: VISC Third Party Guidelines Andru Luvisi CSU Information Security Managing Third Parties policy Revision
More informationAUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM
GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups
More informationCHILDREN AND ADULTS SERVICE RESEARCH APPROVAL GROUP
DURHAM COUNTY COUNCIL CHILDREN AND ADULTS SERVICE RESEARCH APPROVAL GROUP INFORMATION PACK Children and Adults Service Version 4 October 2015 Children and Adults Service Research Approval Group Page 1
More informationBEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
More informationWhite Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES
White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate
More informationOCR UPDATE Breach Notification Rule & Business Associates (BA)
OCR UPDATE Breach Notification Rule & Business Associates (BA) Alicia Galan Supervisory Equal Opportunity Specialist March 7, 2014 HITECH OMNIBUS A Reminder of What s Included: Final Modifications of the
More informationHIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
More informationMobile Deposit Policy
Mobile Deposit Policy Mobile Deposit, a deposit transaction delivery system, allows the Credit Union to receive digital information from deposit documents captured at remote locations (i.e., the Credit
More informationPresented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com
Healthcare Compliance: How HiTECH May Affect Relationships with Business Associates Presented by: Leslie Bender, CIPP General Counsel/CPO The ROI Companies www.theroi.com Legal Disclaimer This information
More informationPreparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
More informationHIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help
HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help The Health Information Portability and Accountability Act (HIPAA) Omnibus Rule which will begin to be enforced September 23, 2013,
More informationHIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS
HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS Thank you for taking the time to fill out the privacy & security checklist. Once completed, this checklist will help us get a better
More informationOCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
More informationMYACCLAIM PRIVACY POLICY
MYACCLAIM PRIVACY POLICY 1. Introduction MyAcclaim is an online collaboration tool that allows users to annotate video. MyAcclaim s mission is to allow its users, with ease and simplicity, to unleash the
More informationDeliver Secure, User-Friendly Access to Mobile Business Apps
SAP Brief Extensions SAP Mobile App Protection by Mocana Objectives Deliver Secure, User-Friendly Access to Mobile Business Apps Promote app security for enterprise safety Promote app security for enterprise
More informationHeather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. hhughes@uslegalsupport.com www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
More informationHIPAA: In Plain English
HIPAA: In Plain English Material derived from a presentation by Kris K. Hughes, Esq. Posted with permission from the author. The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Pub.
More informationThe Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development
The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment Card Industry Data Security Standards
More informationYour Compliance Classification Level and What it Means
General Information What are the Payment Card Industry (PCI) Data Security Standards? The PCI Data Security Standards represents a common set of industry tools and measurements to help ensure the safe
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT
HIPAA BUSINESS ASSOCIATE AGREEMENT This Agreement, dated as of, 2015 ("Agreement"), by and between, on its own behalf and on behalf of all entities controlling, under common control with or controlled
More informationLRES Corporation. Best Business Practices for an Appraisal Management Company
LRES Corporation Best Business Practices for an Appraisal Management Company [This document outlines the key principles and characteristics of an appraisal management company. The contents contained within
More informationMICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD
MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SERVER 2008 FOR EMBEDDED SYSTEMS, STANDARD These license terms are an agreement between you and [OEM]. Please read them. They apply to the software included
More informationPolicy Outsourcing and Cloud Based File Sharing
Policy Outsourcing and Cloud Based File Sharing Version 3.1 TABLE OF CONTENTS Outsourcing Policy... 2 Outsourcing Management Standard... 2 Overview... 2 Standard... 2 Outsourcing Policy... 3 Policy Statement...
More informationTO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel
AL 2000 12 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Risk Management of Outsourcing Technology Services TO: Chief Executive Officers of National Banks,
More informationMedical Privacy Version 2015.12.10 - Standard. Business Associate Agreement. 1. Definitions
Medical Privacy Version 2015.12.10 - Standard Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the Lux Scientiae HIPAA Customer signee is a
More informationHIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist. www.riskwatch.com
HIPAA Omnibus & HITECH Rules: Key Provisions and a Simple Checklist www.riskwatch.com Introduction Last year, the federal government published its long awaited final regulations implementing the Health
More informationInformation Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
More informationWHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE
WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE INTRODUCTION The healthcare industry is driven by many specialized documents. Each day, volumes of critical information are sent to and from
More informationPrivacy Legislation and Industry Security Standards
Privacy Legislation and Issue No. 3 01010101 01010101 01010101 Information is generated about and collected from individuals at an unprecedented rate in the ordinary course of business. In most cases,
More informationThe Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations
The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations Jeffrey D. Scott Jeffrey D. Scott, Legal Professional Corporation Practice Advisors
More informationINSTITUTE FOR SAFE MEDICATION PRACTICES CANADA
INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA PRIVACY IMPACT ASSESSMENT (PIA) ON ANALYZE-ERR AND CURRENT DATA HANDLING OPERATIONS VERSION 3.0-2 JULY 11, 2005 PREPARED IN CONJUNCTION WITH: ISMP Canada
More informationPrivacy Impact Assessment for the. Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS)
Privacy Impact Assessment for the Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS) United States Marshals Service Contact Point William E. Bordley Associate
More informationAGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND
AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND THIS AGREEMENT for Access to Protected Health Information ( PHI ) ( Agreement ) is entered
More informationNBT Bank Personal and Business Mobile Banking Terms and Conditions
This NBT Bank Mobile Banking terms and conditions will apply if you use a mobile device to access our Mobile Banking service. When you use NBT Bank s Mobile Banking service, you will remain subject to
More informationAm I a Business Associate?
Am I a Business Associate? Now What? JENNIFER L. RATHBURN Quarles & Brady LLP KATEA M. RAVEGA Quarles & Brady LLP agenda» Overview of HIPAA / HITECH» Business Associate ( BA ) Basics» What Do BAs Have
More informationUW Platteville Credit Card Handling Policy
UW Platteville Credit Card Handling Policy Issued: December 2011 Revision History: November 7, 2013; July 11, 2014; November 1, 2014; August 24, 2015 Overview: In order for UW Platteville to accept credit
More informationAppendix : Business Associate Agreement
I. Authority: Pursuant to 45 C.F.R. 164.502(e), the Indian Health Service (IHS), as a covered entity, is required to enter into an agreement with a business associate, as defined by 45 C.F.R. 160.103,
More informationHIPAA Email Compliance & Privacy. What You Need to Know Now
HIPAA Email Compliance & Privacy What You Need to Know Now Introduction The Health Insurance Portability and Accountability Act of 1996 (HIPAA) places a number of requirements on the healthcare industry
More informationPractice Resource. Cloud computing checklist. Introduction
Practice Resource Cloud computing checklist Cloud computing offers many benefits to lawyers including the ability to access an exploding array of new software services and applications, the offloading
More informationIT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
More informationUniversity Policy Accepting Credit Cards to Conduct University Business
BROWN UNIVERSITY University Policy Accepting Credit Cards to Conduct University Business Purpose Brown University requires all departments that are involved with credit card handling to do so in compliance
More informationSECTION-BY-SECTION ANALYSIS
INTRODUCED BY CONGRESSMAN RANDY NEUGEBAUER (R-TX) AND CONGRESSMAN JOHN CARNEY (D-DE) SECTION-BY-SECTION ANALYSIS Section 1: Short Title The Data Security Act of 2015. Section 2: Purposes The purposes of
More informationHow Managed File Transfer Addresses HIPAA Requirements for ephi
How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts
More informationRESOLUTION AGREEMENT I. RECITALS
RESOLUTION AGREEMENT I. RECITALS 1. Parties. The Parties to this Resolution Agreement ( Agreement ) are the United States Department of Health and Human Services, Office for Civil Rights ( HHS ) and The
More informationProtecting Personal Information in Third Party Hands An Overview of Legal Requirements
Protecting Personal Information in Third Party Hands An Overview of Legal Requirements Margaret P. Eisenhauer 1 6 January 2006 U.S. companies are increasingly subject to fiduciary-like duties with regard
More informationWhite Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
More informationElectronic business conditions of use
Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users
More information2012 Winston & Strawn LLP
2012 Winston & Strawn LLP Top 5 Negotiation Points for Software, SaaS, and Outsourcing Agreements Brought to you by Winston & Strawn s Advertising, Marketing, and Entertainment Law Group 2012 Winston &
More informationData Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
More information