HMIS Privacy/Security Plan
|
|
|
- Jeremy McLaughlin
- 10 years ago
- Views:
Transcription
1 Page 1 of 8 Memphis and Shelby County Homeless Management Information System Community Alliance for the Homeless, MIS Department Memphis TN (901) Phone, (901) Fax HMIS Privacy/Security Plan
2 Page 2 of 8 PRIVACY PLAN PURPOSE This document describes the privacy plan of the Memphis/Shelby County Continuum of Care Homeless Management Information System (MSCCOC-HMIS) and agencies contributing data (HMIS Partnering Agencies) to the MSCCOC-HMIS. This document covers the processing of protected personal information for clients of HMIS Partnering Agencies. Protected Personal Information is any information we maintain about a client that: a. Allows identification of a client/consumer directly or indirectly b. Can be manipulated by a reasonably foreseeable method to identify a specific client/consumer, or c. Can be linked with other available information to identify a specific client/consumer. The provisions of this plan shall go into effect immediately. DATA COLLECTION NOTICE HMIS Partnering Agencies must let clients know that personal identifying information is being collected, and the reasons for collecting this information. To meet this requirement, HMIS Partnering agencies must post the following language in places where intake takes place: Agency Name and its partner provider agencies collect personal information directly from you for reasons that are discussed in our NOTICE OF PRIVACY PRACTICES. Agency Name and its partner provider agencies may be required to collect some personal information by law or by organizations that provide funds to operate this project. Other personal information that is collected is important to run our projects, to improve services, and to better understand the needs of individuals being housed/sheltered/served. Agency Name and its partner provider agencies only collect information that is considered to be appropriate. While the posted notice is the minimum requirement, agencies may choose to take additional steps to obtain consent from clients, including obtaining written consent. Agencies without a contractual relationship with Agency Name may use an Agency-specific alternative that complies with HUD s baseline privacy standards. Each Agency should adopt and comply with the attached Notice of Privacy Practices for Use with the MSCCOC-HMIS ( HMIS Privacy Notice ). Agencies without a contractual relationship with Agency Name may use an Agency-specific alternative that complies with HUD s baseline privacy standards. Each Agency must provide a copy of the HMIS Privacy Notice upon client request. Clients must acknowledge receipt by signing an HMIS Client Consent Form. Agencies without a contractual relationship with Agency Name may use an Agency-specific alternative. The Agency must keep signed copies of the HMIS Client Consent Form.
3 Page 3 of 8 PRIVACY PLAN Each Agency shall provide reasonable accommodations to persons with disabilities and to persons with limited English proficiency to ensure their understanding of the HMIS Privacy Notice and/or Acknowledgement Form. ACCOUNTABILITY Each agency must uphold relevant federal and state confidentiality regulations and laws that protect client records, including but not limited to the privacy and security standards found in HUD s Data and Technical Standards. If the Agency is a HIPAA-covered entity, the Agency is required to operate in accordance with HIPAA regulations and is exempt from the privacy and security standards found in HUD s Data and Technical Standards. ACCESS AND CORRECTION Each agency must allow individuals to inspect and have a copy of their personal information that is maintained in HMIS. Each agency must offer to explain any information that is not understood. Individuals must submit a request to inspect their HMIS data in writing to their social worker/case manager. Each agency must consider a written request for correction of inaccurate or incomplete personal information. If the agency agrees that the information is inaccurate or incomplete, the agency may delete it or may choose to mark it as inaccurate or incomplete and to supplement it with additional information. Each agency may deny the individual s request for inspection or copying of personal information if: a. Information was compiled in reasonable anticipation of litigation or comparable proceedings b. Information is about another client/consumer c. Information was obtained under a promise of confidentiality and the disclosure would reveal the source of the information, or d. Disclosure of the information would be reasonably likely to endanger the life or physical safety of any individual. If the agency denies a request for access or correction, it must explain the reason for the denial and include documentation of the request and the reason for the denial. Each agency may reject repeated or harassing requests for access or correction. PURPOSE AND USE LIMITATIONS Each agency will use or disclose personal information for activities described in this part of the notice. The agency assumes that clients consent to the use or disclosure of personal information for the purposes described here and for other uses and disclosures that are determined to be compatible with these uses or disclosures:
4 Page 4 of 8 PRIVACY PLAN a. To provide or coordinate services to individuals (shelter, housing, case management, etc.) b. For functions related to payment or reimbursement for services c. To carry out administrative functions such as personnel oversight, management functions, and auditing purposes. d. To create de-identified (anonymous) information that can be used for research and statistical purposes e. When required by law f. To avert a serious threat to health or safety if: i. the agency believes that the use or disclosure is necessary to prevent or lessen a serious and imminent threat to the health or safety of an individual or the public, and ii. the use or disclosure is made to a person reasonably able to prevent or lessen the threat, including the target of the threat g. To report victims of abuse when authorized by law. h. For research purposes unless restricted by other federal and state laws. i. To a law enforcement official for a law enforcement purpose (if consistent with applicable law and standards of ethical conduct). j. For judicial and administrative proceedings in response to a lawful court order, court-ordered warrant, subpoena or summons issued by a judicial officer, or a grand jury subpoena. k. To comply with government reporting obligations for homeless management information systems and for oversight of compliance with homeless management information system requirements. Before any use or disclosure of personal information that is not described here, the agency must seek the clients consent first. CONFIDENTIALITY Each agency must maintain any/all personal information as required by federal, state, or local laws. Each agency shall only solicit or input into HMIS client information that is essential to providing services to the client. Each agency shall not knowingly enter false or misleading data under any circumstance, nor use HMIS with intent to defraud federal, state or local governments, individuals or entities, or to conduct any illegal activity. Each agency shall ensure that all staff, volunteers and other persons who use HMIS are issued an individual User ID and password. Each agency shall ensure that all staff, volunteers and other persons issued a User ID and password for HMIS receive confidentiality training, HMIS training, and comply with the attached HMIS User Agreement and the HMIS Participation Agreement.
5 Page 5 of 8 PRIVACY PLAN PROTECTIONS FOR VICTIMS OF DOMESTIC VIOLENCE, DATING VIOLENCE, SEXUAL ASSAULTS AND STALKING Victim service providers are prohibited from entering data into HMIS. Other agencies must be particularly aware of the need for confidentiality regarding information about persons who are victims of domestic violence, dating violence, sexual assault, and stalking. Additional protections for these clients includes explicit training for staff handling personal identifying information of the potentially dangerous circumstances that may be created by improper release of this information.
6 Page 6 of 8 SECURITY PLAN This plan describes the standards for the security of all data contained in the Memphis/Shelby County Continuum of Care Homeless Management Information System (MSCCOC-HMIS). This plan outlines the security measures currently implemented by the HMIS Lead Agency, the Community Alliance for the Homeless (CAFTH) and details the baseline security requirements for all HMIS Partnering Agencies. Applicability CAFTH, MIS Department and HMIS Partnering Agencies must apply system security provisions to all the systems where personal protected information (PPI) is stored, including, but not limited to, its networks, desktops, laptops, mini-computers, mainframes and servers. User Authentication Upon successful completion of training and subject to approval by CAFTH, MIS Department Staff, each HMIS user will be provided with a unique personal User Identification Code (User ID) and initial password to access the HMIS. While the User ID provided will not change, HUD standards require that the initial password only be valid for the user's first access to the HMIS. Upon access with the initial password, the user will see a screen that will prompt the user to change the initial password to a personal password created by the user. 1. Only the user will know the personal password he or she creates. It is the user's responsibility to remember the password. 2. The password created by the user must be meet the following Federal and application-enforced guidelines: o The password must be at least eight characters long. o The password must contain at least one letter. o The first character of the password must be a letter. o The password must contain at least one number. o The password must contain at least one symbol or punctuation character. o The password may not contain your User ID. o The password may not contain the consecutive upper- or lower-case letters HMIS or hmis. Providers are responsible for communicating all staff departures to the CAFTH, MIS Department Manager in a timely manner to ensure user profiles for departed staff are inactivated. 3. The password may not be stored in a publicly accessible location and written information pertaining to the User ID, password, or how to access the HMIS may not be displayed in any publicly accessible location. 4. The user is not permitted to divulge this password or to share this password with anyone.
7 Page 7 of 8 SECURITY PLAN Before logging in to the HMIS, the user must check a box agreeing to the HMIS User Agreement which was established by Bowman System in cooperation with the Memphis/Shelby County Continuum of Care. Application Security HMIS Partnering Agencies must maintain anti-virus software on all PC s on their network. PC s that access the Internet must be configured to automatically download updated virus definitions. Steps should also be taken to prevent the intrusion of adware and spyware programs. Agency Name maintains hardware, software and PPI in a secure environment, protected by a Firewall. Public Access End users connect to the MSCCOC-HMIS through the public Internet via a Secure Socket Layer (SSL) Public Key Infrastructure (PKI) tunnel connection. Physical Access to HMIS Data HMIS Partnering Agencies must staff computers at all times that are stationed in public areas and used to collect and HMIS data. Every computer that is used to access the HMIS must have a password-protected screen saver that automatically turns on when the computer is temporarily not in use. If an HMIS user will be away from the computer for an extended period of time, he or she is required to log off from HMIS before leaving the work area in which the computer is located. Disaster Protection and Recovery HMIS data is contained on SQL 2005 databases which are run on a Windows Server clustered environment so that there will failover if the primary server becomes unavailable. The physical data storage is on multiple disc drives in a RAID array for redundancy so that no data will be lost or downtime incurred if a physical disk drive becomes inoperable. Additional hardware redundancy exists in the form of dual power supplies, disc controllers and network interface cards. CAFTH maintains service coverage through original and extended warranties from the original equipment manufacturer and assures that the systems are kept up to date in terms of patches and updates issued by both the software and hardware vendors. The SQL databases are automatically backed up nightly and stored on another secure server. The HMIS database server itself is located in a controlled, physically secured environment at bowman Systems in Shreveport LA and is protected by modern systems for HVAC and Fire Suppression which are monitored 24/7. A diesel generator is maintained for backup power, and redundant Internet connections exist on opposite sides of the building. The Terminal Servers are in a office location where they are also behind a locked door in a building that has 24/7 security. Disposal The Community Alliance for the Homeless contracts with a certified specialist for destruction of physical disk drives who can be utilized as required. System Monitoring HMIS produces reports based on log files that are reviewed and inactive user accounts are consequently disabled. In addition to the HMIS database itself, access to HMIS is also controlled, monitored and logged by the Active Directory (AD) and Checkpoint security systems.
8 Page 8 of 8 SECURITY PLAN Electronic Data Storage HMIS data is contained on SQL 2005 databases which are run on a Windows Server clustered environment; and therefore, is stored in binary format. Hard Copy Security The guidelines regarding the security of paper or other hard copy containing PPI that is either generated by or for the HMIS, including, but not limited to reports, data entry forms, and signed consent forms are: 1. HMIS Partnering Agency staff must supervise at all times any paper or other hard copy generated by or for the HMIS that contains PPI when the hard copy is in a public area. 2. When HMIS Partnering Agency staff is not present, the information must be secured in areas that are not publicly accessible. 3. Written information specifically pertaining to user access (e.g., User ID and password) must not be stored or displayed in any publicly accessible location. Duration This plan must be reviewed annually and updated as needed by the MSCCOC MIS Committee.
HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE
HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE This plan describes the standards for the security of all data contained in the Philadelphia Continuum of Care Homeless Management Information System
How To Protect A Hampden County Hmis From Being Hacked
Hampden County HMIS Springfield Office of Housing SECURITY PLAN Security Officers The Springfield Office of Housing has designated an HMIS Security Officer whose duties include: Review of the Security
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA
TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE
Genworth Life Insurance Company Genworth Life Insurance Company of New York NOTICE OF PRIVACY PRACTICES
Genworth Life Insurance Company Genworth Life Insurance Company of New York NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN
VALPARAISO UNIVERSITY NOTICE OF PRIVACY PRACTICES. Health, Dental and Vision Benefits Health Care Reimbursement Account
VALPARAISO UNIVERSITY NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
Privacy Notice Document (HIPAA)
Privacy Notice Document (HIPAA) THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. This Privacy
HIPAA Policies and Procedures
HIPAA Policies and Procedures William T. Chen, MD, Inc. General Rule 164.502 A Covered Entity may not use or disclose PHI except as permitted or required by the privacy regulations. Permitted Disclosures:
The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014
The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local
HIPAA Notice of Patient Privacy Practices
HIPAA Notice of Patient Privacy Practices Effective Date: January 1, 2014 THIS NOTICE DESCRIBES HOW PROTECTED HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.
SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY
SCHOOL DISTRICT OF BLACK RIVER FALLS HIPAA PRIVACY AND SECURITY POLICY School Board Policy 523.5 The School District of Black River Falls ( District ) is committed to compliance with the health information
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
Connecticut Carpenters Health Fund Privacy Notice
Connecticut Carpenters Health Fund Privacy Notice THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
HIPAA PRIVACY NOTICE PLEASE REVIEW IT CAREFULLY
HIPAA PRIVACY NOTICE THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN OBTAIN ACCESS TO THIS INFORMATION. INTRODUCTION PLEASE REVIEW IT CAREFULLY Moriarty
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act
Notice of Privacy Practices. Human Resources Division Employees Benefits Section
Notice of Privacy Practices Human Resources Division Employees Benefits Section THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.
Effective Date: March 23, 2016
AIG COMPANIES Effective Date: March 23, 2016 HIPAA NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.
NOTICE OF PRIVACY POLICY. Effective:, 2013
THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE READ IT CAREFULLY. NOTICE OF PRIVACY POLICY Effective:, 2013 The
NOTICE OF PRIVACY PRACTICES for the HARVARD UNIVERSITY MEDICAL, DENTAL, VISION AND MEDICAL REIMBURSEMENT PLANS
NOTICE OF PRIVACY PRACTICES for the HARVARD UNIVERSITY MEDICAL, DENTAL, VISION AND MEDICAL REIMBURSEMENT PLANS THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
CloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
Eye Clinic of Bellevue, LTD. P.S. Privacy Policy EYE CLINIC OF BELLEVUE LTD PS NOTICE OF INFORMATION PRACTICES
Eye Clinic of Bellevue, LTD. P.S. Privacy Policy EYE CLINIC OF BELLEVUE LTD PS NOTICE OF INFORMATION PRACTICES Date of Last Revision: 4/8/03 Effective Date: Immediately This information is made available
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
HIPAA NOTICE TO PATIENTS
HIPAA NOTICE TO PATIENTS THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Federal regulations
HIPAA Omnibus Notice of Privacy Practices Effective Date: March 03, 2012 Revised on: July 1, 2015
HIPAA Omnibus Notice of Privacy Practices Effective Date: March 03, 2012 Revised on: July 1, 2015 Mobile Physician Group PC 231 High Street Suite 1, Mount Holly, NJ 08060 1-855-MPG-DOCS THIS NOTICE DESCRIBES
Patti Levin, LICSW, Psy.D. Clinical Psychologist
Patti Levin, LICSW, Psy.D. Clinical Psychologist 673 Boylston St. #4. 617.227.2008 Boston, MA02116 fax: 617.247.7523 www.drpattilevin.com email:[email protected] Notice of Privacy Practices (HIPAA)
HIPAA NOTICE OF PRIVACY PRACTICES
HIPAA NOTICE OF PRIVACY PRACTICES Marden Rehabilitation Associates, Inc. Marden Rehabilitation Associates of Ohio, Inc. Marden Rehabilitation Associates of West Virginia Health Care Plus Preferred Care
Dr. Adam Apfelblat 5140 Highland Road Waterford 48327 Phone: (248)618-3467 Fax: (248)618-3515
Dr. Adam Apfelblat 5140 Highland Road Waterford 48327 HIPAA NOTICE OF PRIVACY PRACTICES PLEASE REVIEW THIS NOTICE CAREFULLY. IT DESCRIBES HOW YOUR MEDICAL INFORMATION MAY BE USED AND DISCLOSED AND HOW
NOTICE OF PRIVACY PRACTICES Allergy Treatment Center of New Jersey, P.C. Effective Date: April 14, 2003
Allergy Treatment Center of New Jersey, P.C. 388 Pompton Avenue 415 Avenel Street Cedar Grove, NJ 07009 Avenel, NJ 07001 (973) 857 9890 (732) 636-7030 NOTICE OF PRIVACY PRACTICES Allergy Treatment Center
NOTICE OF PRIVACY PRACTICES (NPP)
NOTICE OF PRIVACY PRACTICES (NPP) This Notice contains information about how your medical information may be used and/or disclosed and how you can get access to this information. Please read this Notice
CBIA Service Corporation Privacy and Security Notice
July 1, 2012 CBIA Service Corporation Privacy and Security Notice THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
PRIVACY NOTICE. In certain situations, we may also disclose patient information to another provider or health plan for their health care operations.
1 PRIVACY NOTICE THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. This Privacy Notice is being
Effective Date of This Notice: September 1, 2013
Rev.10-2013-KB P-drive-HR Forms NOTICE OF HEALTH INFORMATION PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED OR DISCLOSED BY United Cerebral Palsy of Miami (UCP) and
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
M&T BANK CANADIAN PRIVACY POLICY
M&T BANK CANADIAN PRIVACY POLICY At M&T Bank, we are committed to safeguarding your personal information and maintaining your privacy. This has always been a priority for us and this is why M&T Bank (
Chief Privacy Officer Christian Brothers Services 1205 Windham Parkway Romeoville, IL 60446-1679 [email protected] 800-807-0100
Summary of Notice of Privacy Practices for Christian Brothers Prescription Drug Program Christian Brothers Services is the program sponsor of the Christian Brothers Prescription Drug Program (the Program
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
HIPAA Privacy Notice
HIPAA Privacy Notice This notice describes how medical information about you may be used and disclosed and how you can get access to this information. Please review it carefully. This notice describes
650 Clark Way Palo Alto, CA 94304 650.326.5530
THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. (Adopted 4-14-03; revised December 2006) If
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
OUR LADY OF THE LAKE, HOSPITAL INC. AND OUR LADY OF THE LAKE PHYSICIAN GROUP, LLC NOTICE OF PRIVACY PRACTICES
OUR LADY OF THE LAKE, HOSPITAL INC. AND OUR LADY OF THE LAKE PHYSICIAN GROUP, LLC NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU
WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery
WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights
The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3
Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use
NOTICE OF PRIVACY PRACTICES UNIVERSITY OF CALIFORNIA DAVIS HEALTH SYSTEM
NOTICE OF PRIVACY PRACTICES Effective Date: April 14, 2003 UNIVERSITY OF CALIFORNIA DAVIS HEALTH SYSTEM THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN
NOTICE OF PRIVACY PRACTICES
NOTICE OF PRIVACY PRACTICES Effective Date: Immediately This information is made available to all patients THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU
Connecticut Pipe Trades Health Fund Privacy Notice. 2013 Restatement
Connecticut Pipe Trades Health Fund Privacy Notice 2013 Restatement Section 1: Purpose of This Notice and Effective Date THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED
Sarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL 34239 Phone 941.954.9990 Fax 941.954.9995
Sarasota Personal Medicine 1250 S. Tamiami Trail, Suite 202 Sarasota, FL 34239 Phone 941.954.9990 Fax 941.954.9995 NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY
NOTICE OF PRIVACY PRACTICES
NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. IF YOU HAVE ANY
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
PRIVACY PRACTICES OUR PRIVACY OBLIGATIONS
PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. General Information To comply
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
Notice of Privacy Practices
Notice of Privacy Practices This notice describes how medical information about you may be used and disclosed and how you can get access to this information. Please review it carefully. This Notice of
ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING. By: Jerry Jackson Compliance and Privacy Officer
ACCOUNTABLE HEALTHCARE IPA HIPAA PRIVACY AND SECURITY TRAINING By: Jerry Jackson Compliance and Privacy Officer 1 1 Introduction Welcome to Privacy and Security Training course. This course will help you
How To Protect Mental Health Information In Upb
UNIVERSITY PHYSICIANS OF BROOKLYN, INC. POLICY AND PROCEDURE Subject: MENTAL HEALTH INFORMATION Page 1 of 6 No: Prepared by: Shoshana Milstein Original Issue Date: NEW Reviewed by: HIPAA Policy & Procedure
KESWICK MULTI-CARE CENTER, INC. NOTICE OF PRIVACY PRACTICES
KESWICK MULTI-CARE CENTER, INC. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
Privacy Notice. The Plan s duties with respect to health information about you
Privacy Notice Please carefully review this notice. It describes how medical information about you may be used and disclosed and how you can get access to this information. The Health Insurance Portability
PLLC NOTICE OF PRIVACY PRACTICES
PLLC THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE READ IT CAREFULLY. NOTICE OF PRIVACY PRACTICES The following
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Terms and Conditions of Use - Connectivity to MAGNET
I, as the Client, declare to have read and accepted the terms and conditions set out below for the use of the network connectivity to the Malta Government Network (MAGNET) provided by the Malta Information
HIPAA PRIVACY POLICIES AND PROCEDURES
HIPAA PRIVACY POLICIES AND PROCEDURES FOR MOTT COMMUNITY COLLEGE NOVEMBER 18, 2004 PREPARED BY: KUSHNER & COMPANY 2427 WEST CENTRE AVENUE PORTAGE, MICHIGAN 49024 (269) 342-1700 WWW.KUSHNERCO.COM EMPLOYEE
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
SDC-League Health Fund
SDC-League Health Fund 1501 Broadway, 17 th Floor New York, NY 10036 Tel: 212-869-8129 Fax: 212-302-6195 E-mail: [email protected] NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION
Northport Health Services of Florida, LLC d/b/a Ocala Health and Rehabilitation Center 1201 Southeast 24 th Road Ocala, FL 34471-6009 352-732-2449
Northport Health Services of Florida, LLC d/b/a Ocala Health and Rehabilitation Center 1201 Southeast 24 th Road Ocala, FL 34471-6009 352-732-2449 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU
