User Name: [insert facility name]grids (for example, lomitagrids or villagrids)
|
|
|
- Darcy Flynn
- 10 years ago
- Views:
Transcription
1 Appendix A010 Page 1 User Name: [insert facility name]grids (for example, lomitagrids or villagrids) Password: If access is authorized and currently have no password, contact Director of Nurses or Rehab Department. Blue OT Purple ST Green PT 1. Reports 2. Service Matrix Log 3. View FYI THE COLORS ABOVE VARIES PER FACILITY =============================================================== 1.0 POLICY: GENERAL GUIDELINES The system is an all inclusive scheduling, billing, documentation, and business management software program that will be used in all North American Health Care, Inc. facilities. 2.0 PROCEDURE 1. Logins Every rehabilitation employee has a unique login. Every therapist and assistant providing treatment must enter their treatments and charges under their own unique login. This login provides your electronic signature to the treatment provided. Login and passwords should never be shared. Violation of this will result in disciplinary action. 2. Log Out Click on the red X in the upper right corner, or click on Suspend Session and choose Log Out 3. System auto logout the system will auto close after fifteen (15) minutes of inactivity. 3.0 POLICY: ELECTRONIC SIGNATURE 4.0 DEFINITION Electronic signature: any method of establishing authorship to a statement or document by the use of electricity.
2 Appendix A010 Page POLICIES 1. The facility shall authorize the use of electronic signatures by responsible health care personnel to authenticate his/her own entries in the electronic health record of specific applications by using a unique signature/assess code that shall verify the identity of the signer. 2. A signed confidentiality statement and agreement not to share the signature/access code with anyone shall be on file attesting the authorized user is the only individual using the code. This shall be filed in his/her employee/business associate file. 3. The following documents are acceptable for electronic signatures: Daily Activity Logs Labor Logs Initial Evaluations Re-Evaluations Daily Notes Weekly Summaries Discharge Summaries Therapy Treatment Addendums 4. A list of login and access codes shall be readily available and maintained under appropriate safeguards by the System Administrator. 5. Employees using the Electronic Records System shall receive training in the operation, data protection/confidentiality, storage, and system security. 6. Sanctions shall be imposed for improper or unauthorized use of electronic signatures. 6.0 PROCEDURES 1. Signature/access code: a. Assign a unique identifying number to the authorized user (should contain at least six (6) alphanumeric characters, with at least one
3 Appendix A010 Page 3 capital letter, and at least one number) to be his/her signature/access code (password). b. Maintain a confidential log with these signature/access codes. This log shall be maintained within the system and shall be accessed by the System Administrator. c. Provide the individual who accepts responsibility for the signature/access code with the Confidentiality Statement for signature. This signed document and agreement not to share the code with anyone shall be on file attesting the authorized user is the only individual using the signature/access code. This is done at the time of training. File this in his/her employee/business associate files. d. Change the password randomly to offset predictability and reduce the likelihood of detection. e. Initiate immediate cancellation/inactivation procedures when the individual is terminated, takes a leave of absence, is transferred, or is no longer a valid user. 2. Authenticating entries: a. Data Requirements Electronic signatures are to include: Printed name of the signer Date/time stamp when signed Any action taken to create, modify, of inactivate b. Review the document online for completeness and accuracy and correct or modify them as needed before signing it electronically. These entries shall be date/time stamped by the computer at the time the entry is electronically signed. NOTE: Once an entry has been signed electronically, the computer system must track any deletions or alterations. c. Multiple signatures or Co-signatures: Application allows multiple or co-signatures when appropriate as in the case of shared treatment or supervision or therapy assistants.
4 Appendix A010 Page 4 3. Correction to signed documents: is allowed when the edits needed are substantive or minor issues, by the original author, or Director of Rehabilitation, or Area Rehab Service Manager, only in order to ensure a complete and accurate document and to preserve the integrity of the legal record. a. Make an addendum to the signed document. This shall be date/time stamped by the computer at the time the entry is electronically signed. b. Retain all signed versions of documents. 4. Document Printing a. Service Log Matrix grids from shall be printed only on an as-needed basis. Nursing station staff shall have the ability to access the Service Log Matrix on using a facility-specific username and password. b. Initial evaluations, Weekly Progress Notes, Discharge Summaries, and Therapy Treatment Addendums shall be printed and filed in the appropriate section of the patient s medical record. 5. Document Access a. Service Log Matrix Nursing station staff shall have access to the Service Log Matrix therapy billing grids on utilizing a facility-specific username and password. The username and password shall be generic and specific to the facility, and shall grant the user read-only access to the Service Log Matrix. b. Initial Evaluations, Weekly Progress Notes, Discharge Summaries Documents shall only be accessed on the system by the Rehabilitation staff. These documents shall be printed and filed in the appropriate section of the patient s medical record 6. Contingency Plan (computer downtime) See Disaster Recovery: Electronic Records 7.0 POLICY: DAILY CHARGES
5 Appendix A010 Page 5 On a daily basis, prior to leaving the facility for the day, all rehabilitation department staff members are required to enter the daily therapy charges into the system via the Daily Activity Log. If a therapist does not enter the daily charges on the day the services were delivered, charges should be input first thing the following day by the treating therapist. In addition, each therapist is required to input their labor time in the facility into the system via the Labor Log. 8.0 PROCEDURES 1. Daily Charges On a daily basis, prior to leaving the facility for the day, all therapists and assistants are required to enter the daily therapy charges into the system via the Daily Activity Log. If a therapist does not enter the daily charges on the day the services were delivered, charges should be input first thing the following day by the treating therapist or assistant. 2. Daily Labor Hours On a daily basis, prior to leaving the facility for the day, all therapists and assistants are required to enter their daily labor hours into the system via the Labor Log. If a therapist does not enter their labor hours on a specific day, labor hours should be entered first thing the following day by the therapist or assistant. 9.0 POLICY: DIASTER RECOVERY - ELECTRONIC RECORDS 1. The System Administrators shall be responsible for the creation, evaluation, and transportation of back-up media. 2. Critical documents, those required to maintain the residents current level of care, shall be distributed to the appropriate personnel, in the event of an emergency serious enough to render the electronic system inoperable. Staff shall use the printed documents to resume manual, paper-based operations. This shall be monitored by the Director of Rehabilitation. 3. The electronic system shall be back on-line no later than hours after the incident, in all but the most severe emergencies, in accordance to the Rehab Optima guidelines. Staff shall continue to operate under this manual method until the system is returned to use. 4. Orientation shall be provided to the therapist as part of the disaster plan and electronic record system training.
6 Appendix A010 Page ROUTINE PROCEDURE 1. System Administrators: a. Back-up electronic data daily and store on external server, in accordance to the guidelines DATA RECOVERY: In the event of an emergency that renders the electronic system inoperable: 1. Director of Rehabilitation: a. Produce and disseminate the paper-based records to the appropriate therapists and organize these basic critical documents in 3-ring binders. b. Supervise the manual paper-based documentation by the interdisciplinary staff involved. c. Interdisciplinary Team Members: 12.0 POLICY: IMPERSONATION Continue the required documentation under this manual method until the system is returned to use.\ When the electronic system returns to use, each responsible interdisciplinary team member who created entries in the paper-based documents shall: o Transfer the information from the paper-based document to the electronic system as soon as practical an in accordance with the policies in authenticating entries. o File the original paper-based records in the resident s permanent health record. Under specific circumstances the Director of Rehabilitation may Impersonate, or enter daily charges for another therapist, in the system. The Impersonate function will be audited to ensure the accuracy and integrity of the data in the medical record DEFINITIONS/KEY WORDS
7 Appendix A010 Page 7 Impersonate Practice of the Director of Rehabilitation entering daily therapy charges into the system for another staff member due to certain specified circumstances 14.0 PROCEDURE 1. Directors of Rehabilitation are the only facility staff allowed to use the Impersonate function in the system. 2. If the Director of Rehabilitation must use the Impersonate function, the Daily Activity Log will be utilized to enter the missing daily charges. When the impersonated therapist has returned to the facility, the Director of Rehabilitation will review the Daily Activity Log with the therapist for accuracy. 3. When impersonating, the Director of Rehabilitation must be specific for the reason they are impersonating the charges and include their initials. 4. A regular audit of impersonated charges will be performed by the Area Rehab Services Manager. 5. The following are circumstances when use of the Impersonate function may be warranted for entering daily therapy charges: a. Staff medical or personal emergency b. PRN or agency staff not scheduled to return to the facility within the billing period c. Disciplinary issues d. Login access issues e. End of month billing is due f. Minutes are needed to complete the MDS 6. The Impersonate function may not be used for the following: a. Staff not properly trained in the system b. Therapist forgot to enter charges
8 Appendix A010 Page POLICY: THERAPY SCHEDULING All therapy provided will be scheduled using the Assignment Board 16.0 PROCEDURES 1. All patient care will be planned in Projections 2. The Projections transfers planned minutes to the Assignment Board a. Scheduled minutes can be changed in the Assignment Board on the day of treatment if needed (i.e., therapist calls in sick) 3. The Director of Rehabilitation, or designee, will assign the therapist or assistant who will be providing the treatment on the Assignment Board 4. Therapy schedules for each therapist and therapy assistant are printed from the Assignment Board each day 5. Throughout the day, the therapist or assistant will make notes on their schedule to indicate the amount of time spent on each CPT code or other important information that may need to be entered into 6. By the end of the day, the therapist or assistant will enter all treatment charges into the system using their schedule as a reference 7. All schedules will be filed by following the Storage of Therapy Schedules Policy 17.0 POLICY: STORAGE OF THERAPY SCHEDULES Therapy schedules will be stored as substantiation of care provided. They will be readily available in the case of billing questions or compliance investigations 18.0 PROCEDURES
9 Appendix A010 Page 9 1. Therapy schedules for each therapist and therapy assistant are printed from daily 2. At the end of the day, the therapist or assistant will enter all treatment charges into the system using their schedule as reference a. The therapist or assistant will sign their schedule and note hours worked b. All schedules will be filed in a binder in the therapy office by date of care chronologically 3. All schedules will be stored for two (2) months 4. After two (2) months, schedules may be disposed of in compliance with HIPAA guidelines (i.e., shredding the schedules)
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
MUSC Information Security Policy Compliance Checklist for System Owners Instructions
Instructions This checklist can be used to identify gaps in compliance with MUSC's information security policies and standards, which are published on the Web at http://www.musc.edu/security. Each of the
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES
PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES TABLE OF CONTENTS A. Overview of HIPAA Compliance Program B. General Policies 1. Glossary of Defined Terms Used in HIPAA Policies and Procedures 2. Privacy
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
HIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
Information Systems Access Policy
Information Systems Access Policy I. PURPOSE The purpose of this policy is to maintain an adequate level of security to protect data and information systems from unauthorized access. This
InfinityQS SPC Quality System & FDA s 21 CFR Part 11 Requirements
InfinityQS SPC Quality System & FDA s 21 CFR Part 11 Requirements www.infinityqs.com Copyright InfinityQS International Table of Contents Overview... FDA s 21 CFR Part 11 Requirements... PART 11 ELECTRONIC
itrust Medical Records System: Requirements for Technical Safeguards
itrust Medical Records System: Requirements for Technical Safeguards Physicians and healthcare practitioners use Electronic Health Records (EHR) systems to obtain, manage, and share patient information.
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
DeltaV Capabilities for Electronic Records Management
September 2004 Page 1 An integrated solution for meeting FDA 21CFR Part 11 requirements in process automation applications using a configurable off-the-shelf (COTS) solution Emerson Process Management.
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
HIPAA Security Rule Compliance
HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA
WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
HIPAA Security Checklist
HIPAA Security Checklist The following checklist summarizes HIPAA Security Rule requirements that should be implemented by covered entities and business associates. The citations are to 45 CFR 164.300
DeltaV Capabilities for Electronic Records Management
January 2013 Page 1 DeltaV Capabilities for Electronic Records Management This paper describes DeltaV s integrated solution for meeting FDA 21CFR Part 11 requirements in process automation applications
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
White Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
Policy Title: HIPAA Security Awareness and Training
Policy Title: HIPAA Security Awareness and Training Number: TD-QMP-7011 Subject: HIPAA Security Awareness and Training Primary Department: TennDent/Quality Monitoring/Improvement Effective Date of Policy:
University of Wisconsin-Madison Policy and Procedure
Page 1 of 14 I. Policy II. A. The, the units of the UW-Madison Health Care Component and each individual or unit within UW-Madison that is a Business Associate of a covered entity (hereafter collectively
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Minnesota Health Care Programs (MHCP) MN ITS Interactive User Guide http://mn-its.dhs.state.mn.us. Using MN ITS Interactive. Entering an Online Claim
Minnesota Health Care Programs (MHCP) MN ITS Interactive User Guide http://mn-its.dhs.state.mn.us Objective Performed by Background Claim Form Completing a MN ITS Interactive Professional (837P) claim
DEPARTMENTAL POLICY. Northwestern Memorial Hospital
Northwestern Memorial Hospital DEPARTMENTAL POLICY Subject: DEPARTMENTAL ADMINISTRATION Title: 1 of 11 Revision of: NEW Effective Date: 01/09/03 I. PURPOSE: This policy defines general behavioral guidelines
Datto Compliance 101 1
Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)
HIPAA Security Matrix
HIPAA Matrix Hardware : 164.308(a)(1) Management Process =Required, =Addressable Risk Analysis The Covered Entity (CE) can store its Risk Analysis document encrypted and offsite using EVault managed software
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
Electronic Signature, Attestation, and Authorship
Electronic Signature, Attestation, and Authorship Appendix C: Electronic Signature Model Policy This template document is not intended for adoption as a substitute for a customized organizational policy
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich
HIPAA Audit Processes Erik Hafkey Rainer Waedlich 1 Policies for all HIPAA relevant Requirements and Regulations Checklist for an internal Audit Process Documentation of the compliance as Preparation for
User Guide. Digital Signature
User Guide Digital Signature ENTRUST ESP 9..2 Document version: 2.2 Publication date: January 2014 This guide is the exclusive property of Notarius Inc. All reproduction, printing or distribution of this
Rehab Notes Management System
Rehab Time The Rehab Time module is integral to determining staff productivity and practice profitability. It is designed to function as a time clock. Each staff member simply logs in and punches in/out
InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures
InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures Overview One of the most popular applications of InfoCenter Suite is to help FDA regulated companies comply with
Pennsylvania Department of Public Welfare. Bureau of Information Systems OBSOLETE. Secure E-Mail User Guide. Version 1.0.
Pennsylvania Department of Public Welfare Bureau of Information Systems Secure E-Mail User Guide Version 1.0 August 30, 2006 Table of Contents Introduction... 3 Purpose... 3 Terms of Use Applicable to
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
Horizon Physician Portal Training Guide 13.3.2 (November 2013)
Horizon Physician Portal Training Guide 13.3.2 (November 2013) For assistance please call the Help Desk at 561-955-4037 Telephone support is available during normal business hours, to resolve access questions,
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
LRFP AND PROJECT APPLICATION TRACKING SYSTEM District Administrator Instructions. Accessing the Administrator Section of the Website
LRFP AND PROJECT APPLICATION TRACKING SYSTEM District Administrator Instructions Each school district is responsible for creating and assigning user accounts to access the district s data on the LRFP and
HIPAA Security. 1 Security 101 for Covered Entities. Security Topics
HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &
Appendix F, Section 2 Web-Enabled Data Repository: Test Phase
Appendix F, Section 2 Web-Enabled Data Repository: Test Phase Agency: Department of Children, Families and Learning (DCFL) TIS Evaluation Meeting Date: 2 June 1999 State Archives Staff: Mary Klauda, Shawn
Sponsor Site Questionnaire FAQs Regarding Maestro Care
Sponsor Site Questionnaire FAQs Regarding Maestro Care Data Security and Validation 1. Are the electronic source documents or computer systems specific to the site and/or developed by the site? a. Developed
Certificate Renewal. Teachers need a total of 150 professional learning hours to renew their teaching certificate.
Certificate Renewal Teachers need a total of 150 professional learning hours to renew their teaching certificate. Professional learning hours include: District Provided Professional Development (DPPD)
Union County. Electronic Records and Document Imaging Policy
Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability
Full Compliance Contents
Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex
Empower TM 2 Software
Empower TM 2 Software 21 CFR PART 11 COMPLIANCE ASSESSMENT Revision A, December, 2005 1 of 14 Waters Corporation Note: Information presented in this document assumes that the appropriate Empower 2 System
IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview
IBM Internet Security Systems The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview Health Insurance Portability and Accountability Act
Sunrise Clinical Manager (SCM) View-Only Training
Sunrise Clinical Manager (SCM) View-Only Training General Use Guide UK Hosp, Staff Education July 06 1 Logging on to SCM At the desktop, double click on the Sunrise Clinical Manager icon. OR At the bottom
AZ RMTS Participant s Guide
AZ RMTS Participant s Guide Revised 07/2013 Page 1 TABLE OF CONTENTS Introduction.. Page 3 Participant Screens A. E-Mail Notifications..... Page 4 B. Accessing Your On-Line RMTS Form..... Page 5 C. Program
21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES 21.11.2013. 21 CFR Part 11 Compliance PLA 2.1
21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Compliance of PLA 2.1 21.11.2013 21 CFR Part 11 Compliance PLA 2.1 SEC. 11.2 IMPLEMENTATION. (a) For records required to be maintained but not submitted
The Second National HIPAA Summit
HIPAA Security Regulations: Documentation and Procedures The Second National HIPAA Summit Healthcare Computing Strategies, Inc. John Parmigiani Practice Director, Compliance Programs Tom Walsh, CISSP Practice
UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook
Introduction Per UCSC's HIPAA Security Rule Compliance Policy 1, all UCSC entities subject to the HIPAA Security Rule ( HIPAA entities ) must implement the UCSC Practices for HIPAA Security Rule Compliance
REGULATIONS COMPLIANCE ASSESSMENT
ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS
Information Security Policy
Information Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED
HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH
HIPAA Security Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH What is this? Federal Regulations August 21, 1996 HIPAA Became Law October 16, 2003 Transaction Codes and Identifiers
Security Standard: Servers, Server-based Applications and Databases
Security Standard: Servers, Server-based Applications and Databases Scope This standard applies to all servers (including production, training, test, and development servers) and the operating system,
Rackspace Archiving Compliance Overview
Rackspace Archiving Compliance Overview Freedom Information Act Sunshine Laws The federal government and nearly all state governments have established Open Records laws. The purpose of these laws is to
Self-Assessment of eresearch Compliance with 21 CFR Part 11, Electronic Record; Electronic Signatures
Self-Assessment of eresearch Compliance with 21 CFR Part 11, Electronic Record; Electronic Signatures Subpart A General Provisions Sec. 11.1 Scope. (a) The regulations in this part set forth the criteria
HealthInfoNet HELP DESK REFERENCE GUIDE. Revised on 10.16.2014 Page 1 of 26
HealthInfoNet HELP DESK REFERENCE GUIDE Revised on 10.16.2014 Page 1 of 26 INSIDE: HealthInfoNet Help Desk Reference Guide Contacting HealthInfoNet (HIN) Determining Priority How to Reach HIN Account Management
Timesheet Instructions
Timesheet Instructions Updated June 2012 Chapter 1 Accessing KDADS Web Applications Table of Contents KDADS Web Applications and Security... 1 Signing into Web Applications... 2 Your Profile Settings...
21 CFR Part 11 Implementation Spectrum ES
21 CFR Part 11 Implementation Spectrum ES INFRARED SPECTROSCOPY T E C H N I C A L N O T E Introduction Compliance with 21 CFR Part 11 is mandatory for pharmaceutical companies and their suppliers to sell
Authorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
How To Use A Court Record Electronically In Idaho
Idaho Judicial Branch Scanning and Imaging Guidelines DRAFT - October 25, 2013 A. Introduction Many of Idaho s courts have considered or implemented the use of digital imaging systems to scan court documents
An Introduction to HIPAA and how it relates to docstar
Disclaimer An Introduction to HIPAA and how it relates to docstar This document is provided by docstar to our partners and customers in an attempt to answer some of the questions and clear up some of the
Protecting Patient Information in an Electronic Environment- New HIPAA Requirements
Protecting Patient Information in an Electronic Environment- New HIPAA Requirements SD Dental Association Holly Arends, RHIT Clinical Program Manager Meet the Speaker TRUST OBJECTIVES Overview of HIPAA
Agile Applicant Tracking System. Hiring Manager
Agile Applicant Tracking System Hiring Manager 2/27/2014 Section Page Change Password 3 Forgot Password? 4 Logging Into System 2 Printed or Scanned Candidate Information 10 Routed Candidates and Messages
On your desktop double-click the Qqest Time and Attendance Systems icon:
- 1 - On your desktop double-click the Qqest Time and Attendance Systems icon: You will be prompted for your Username, Password, and Company Code: Enter your information, then click the Login button. Passwords
Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer
Securing the FOSS VistA Stack HIPAA Baseline Discussion Jack L. Shaffer, Jr. Chief Operations Officer HIPAA as Baseline of security: To secure any stack which contains ephi (electonic Protected Health
Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman,
Research and the HIPAA Security Rule Prepared for the Association of American Medical Colleges by Daniel Masys, M.D. Professor and Chairman, Department of Biomedical Informatics Vanderbilt University School
MINNESOTA. Downloaded January 2011
4658.00 (GENERAL) MINNESOTA Downloaded January 2011 4658.0015 COMPLIANCE WITH REGULATIONS AND STANDARDS. A nursing home must operate and provide services in compliance with all applicable federal, state,
NETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
Data Compliance. And. Your Obligations
Information Booklet Data Compliance And Your Obligations What is Data Protection? It is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection
ClicktoFax Service Usage Manual
ClicktoFax Service Usage Manual 1. Log in to Fax Service 2. Configure your account 3. Send a fax 4. Receive a fax/search for Faxes/View Faxes 5. Logout 6. Additional Support 1. Log into fax service: a.
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
Implementation of 21CFR11 Features in Micromeritics Software Software ID
Implementation of 21CFR11 Features in Micromeritics Software Software ID PART 11 ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Subpart A General Provisions Sec. 11.1 Scope. 11.2 Implementation. 11.3 Definitions.
HIPAA Compliance: Are you prepared for the new regulatory changes?
HIPAA Compliance: Are you prepared for the new regulatory changes? Baker Tilly CARIS Innovation, Inc. April 30, 2013 Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed
Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice
Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
C.T. Hellmuth & Associates, Inc.
Technical Monograph C.T. Hellmuth & Associates, Inc. Technical Monographs usually are limited to only one subject which is treated in considerably more depth than is possible in our Executive Newsletter.
HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS
HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS Thank you for taking the time to fill out the privacy & security checklist. Once completed, this checklist will help us get a better
Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)
Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative
Server Security Checklist (2009 Standard)
Server Security Checklist (2009 Standard) Server identification and location: Completed by (please print): Date: Signature: Manager s signature: Next scheduled review date: Date: Secure Network and Physical
HIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations
HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards
Denver Public Schools - East High School
Denver Public Schools - East High School Return this page to the Technology Department in room 230 Electronic Web Access Agreement for Viewing Student Information via DPS Infinite Campus Parent/Student
Appendix to Resolution No. 646/2011 of the Warsaw Stock Exchange Management Board dated 20 May 2011 (as amended)
Appendix to Resolution No. 646/2011 of the Warsaw Stock Exchange Management Board dated 20 May 2011 (as amended) Rules of providing current and periodical information in the alternative trading system
Implementing Title 21 CFR Part 11 (Electronic Records ; Electronic Signatures) in Manufacturing Presented by: Steve Malyszko, P.E.
Implementing Title 21 CFR Part 11 (Electronic Records ; Electronic Signatures) in Manufacturing Presented by: Steve Malyszko, P.E. President & CEO Agenda Introduction Who is Malisko Engineering? Title
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES
Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance
FILEHOLD DOCUMENT MANAGEMENT SYSTEM 21 CFR PART 11 COMPLIANCE WHITE PAPER
FILEHOLD DOCUMENT MANAGEMENT SYSTEM 21 CFR PART 11 COMPLIANCE WHITE PAPER Copyright 2012 FileHold Systems Inc. All rights reserved. For further information about this manual or other FileHold Systems products,
