Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services



Similar documents
Privacy Policy on the Responsibilities of Third Party Service Providers

Privacy Incident and Breach Management Policy

Policy & Procedure. This policy applies to all records in the custody and control of SMGH.

Personal Health Information Privacy Policy

Title: Data Security Policy Code: Date: rev Approved: WPL INTRODUCTION

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

How To Ensure Health Information Is Protected

PRIVACY BREACH MANAGEMENT POLICY

Electronic Health Record Privacy Policies

BOARD POLICY POLICY TITLE. Records and Information Management 1.0 PURPOSE

Information Security Program

ISO Controls and Objectives

HIPAA Security Alert

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

PBGC Information Security Policy

California State University, Sacramento INFORMATION SECURITY PROGRAM

Information Security Program Management Standard

UTech Services Compliance, Auditing, Risk, and Security (CARS) Team Charter

Utica College. Information Security Plan

Privacy and Security Framework, February 2010

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

Legislative Language

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

ADMINISTRATIVE MANUAL Policy and Procedure

BERKELEY COLLEGE DATA SECURITY POLICY

Data Management Policies. Sage ERP Online

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION BETWEEN WAKE FOREST UNIVERSITY BAPTIST MEDICAL CENTER AND

Authorized. User Agreement

Contact: Henry Torres, (870)

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

Third Party Security Requirements Policy

INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN

University of Aberdeen Information Security Policy

DHHS Information Technology (IT) Access Control Standard

INFORMATION TECHNOLOGY SECURITY STANDARDS

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

ISO27001 Controls and Objectives

Information Security Program CHARTER

Service Children s Education

Administrative Procedures Memorandum A2005

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)

ONE Mail Direct. Privacy Impact Assessment Summary

CITY OF BOULDER *** POLICIES AND PROCEDURES

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS

Data Security Incident Response Plan. [Insert Organization Name]

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

Indiana University of Pennsylvania Information Assurance Guidelines. Approved by the Technology Utilities Council 27-SEP-2002

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

ORDER MO Appeal MA Township of Minden Hills. July 31, 2013

MINUTE TAKING TIPS. How to keep your minutes FIPPA friendly

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Third-Party Access and Management Policy

MEDICAL TRAINEE DATA FORM (This information is required for all medical students)

FINAL May Guideline on Security Systems for Safeguarding Customer Information

State of Oregon. State of Oregon 1

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Information Security Policy Manual

USE OF INFORMATION TECHNOLOGY FACILITIES

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

Information Security Policy

FSIS DIRECTIVE

TABLE OF CONTENTS Information Systems Security Handbook Information Systems Security program elements. 7

Office 365 Data Processing Agreement with Model Clauses

BUSINESS ASSOCIATE ADDENDUM

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

Document Title: System Administrator Policy

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation

Bridging the HIPAA/HITECH Compliance Gap

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

HIPAA Security Rule Compliance

Guidelines 1 on Information Technology Security

CRISC Glossary. Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data

Information Management and Protection Policy

Information Technology Branch Access Control Technical Standard

Supplier Security Assessment Questionnaire

Supplier Information Security Addendum for GE Restricted Data

INFORMATION TECHNOLOGY SECURITY POLICY

COLLEGE POLICY MANUAL

Top Ten Technology Risks Facing Colleges and Universities

IT ACCESS CONTROL AND USER ACCESS MANAGEMENT POLICY

Transcription:

Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives... 1 2 Scope... 2 2.1 Scope and Applicability... 2 2.2 Violations... 2 3 Principles... 2 3.1 Governance... 2 3.2 Controls... 3 3.3 Risk... 3 4 Policy... 3 4.1 General... 3 4.2 Personal Health Information and Personal Information... 4 4.3 Security Risk Management... 5 4.4 External Parties... 5 4.5 Accountability... 6 5 Responsibilities... 6 5.1 ehealth Ontario Board of Directors... 6 5.2 Chief Executive Officer (CEO)... 6 5.3 Business Unit Head... 6 5.4 Business Unit Managers... 7 5.5 Chief Security Officer, Security Services... 7 5.6 Legal... 7 5.7 Security Services... 7 5.8 Personnel (including Agency and third party Service Providers)... 8 5.9 Procurement... 8 6 Glossary... 9 7 References and Associated Documents... 12 Information Security Policy / Document ID: 3809 / Version: 1.0 Page i

1 Purpose / Objective 1.1 Information Security The security of the services provided by or to and of the healthcare information entrusted to ehealth Ontario is critical to the organization s success and the strategic objective of improving the efficiency and effectiveness of healthcare in Ontario. Loss of confidentiality, integrity, or availability of information, or of the technology-based systems and services, could adversely affect the achievement of goals and objectives, and result in harm to ehealth Ontario, its clients, and other stakeholders. Information security is the discipline that assists in identifying and mitigating security-related risks to limit potential damages; and to enable the achievement of business objectives. ehealth Ontario uses a risk based approach towards Information Security. Risks are evaluated based on how they may impact the organization, and will be re-evaluated as security safeguards are added. 1.2 Purpose This policy represents senior management s commitment to Information Security in the organization. This policy provides direction to ehealth Ontario Personnel on the security of organizational Assets, including but not limited to information, including Personal Health Information (PHI), Personal Information (PI) and other Agency Information, services, and information technology resources to guard against theft, loss, unauthorized use, disclosure, disruption, modification or disposal. 1.3 Objectives This policy is intended to ensure: 1) the establishment of accountabilities and implementation of safeguards that are consistent with the responsibilities placed upon ehealth Ontario under the roles that the organization could play, as defined under the following: O. Reg. 43/02 made under the Development Corporations Act 1 (DCA) as amended from time to time; the Freedom of Information and Protection of Privacy Act 2 (FIPPA) as amended from time to time; and the Personal Health Information Protection Act, 2004 3 (PHIPA) and O. Reg. 329/04 ( the Regulation ) as amended from time to time; 2) that security mechanisms and practices will be employed to protect information collected, used, stored, transmitted, disclosed or exchanged by the organization, and to ensure the continued delivery of services through the use of information systems; 1 R.S.O. 1990, c. D.10 2 R.S.O. 1990, C. F.31 3 S.O. 2004, C. 3, SCHED. A Information Security Policy / Document ID: 3809 / Version: 1.0 Page 1

3) the consistent and effective management of safeguards throughout ehealth Ontario through the implementation of security plans, practices, and controls in alignment with ISO 27001 Information Security Management Systems Requirements; ISO 27002 Code of Practice for Information Security Management; and ISO 27799 Information Security Management in Health Using ISO 27002. 2 Scope 2.1 Scope and Applicability This Policy will be the foundational component of ehealth Ontario s security governance and accountability framework. This policy applies to all ehealth Ontario Personnel. This Policy applies to all: 1) ehealth Ontario business units and program areas. 2) Information owned or controlled by ehealth Ontario, or for which the organization has a stewardship responsibility; 3) Assets and facilities owned, leased, licensed, or managed by ehealth Ontario; 4) Information security services provided by ehealth Ontario, both internally and externally; and 5) Information security services provided by public or private sector organizations to ehealth Ontario, and relied upon by the organization for the conduct of its business. 2.2 Violations Violation of the policy by Personnel may result in disciplinary action, up to and including termination. Violation of the requirements of this policy by a service provider may be subject to the penalties contained within any contractual agreement between ehealth Ontario and the service provider. 3 Principles The following principles guide this policy: 3.1 Governance i. information security will ensure the confidentiality, integrity, and availability of organizational Assets, including information systems and information entrusted to ehealth Ontario; ii. security of Assets will be approached in a holistic and practical manner throughout the Asset lifecycle; iii. information security strategies, mechanisms, and competencies will be regularly reviewed to ensure compliance, suitability, and effectiveness; iv. continuous information security awareness, education and training should be practiced. Information Security Policy / Document ID: 3809 / Version: 1.0 Page 2

3.2 Controls i. information security requirements must be documented and will be enforced; ii. safeguards must be applied in a manner consistent with business requirements and best practices, and compliant with policy, legal and regulatory requirements; iii. safeguards consist of people, processes and technology; iv. responsibilities / duties assigned to individuals must follow the principle of segregation of duties and least privilege. 3.3 Risk i. information security risks must be identified, evaluated, and treated / escalated according to the Enterprise Risk Management Policy; or Corporate Compliance Policy as required; ii. information security risks must be documented and communicated to the appropriate stakeholders; iii. infrastructure or enterprise risks identified during an application Threat and Risk Assessment (TRA) must be managed by the appropriate infrastructure or enterprise stakeholder; iv. information security-related business residual risks must be managed and accepted at the appropriate level within ehealth Ontario; 4 Policy 4.1 General Confidentiality, integrity, and availability safeguards for information, and information systems and resources must be designed to comply with applicable requirements, including but not limited to legislative requirements (e.g., PHIPA and the Regulation) and agreements entered into between ehealth Ontario and external parties (e.g. the Ministry of Health and Long-Term Care). All Information and Information Technology (I&IT) assets (Physical & Data) must be classified and protected according to the ehealth Ontario Information Classification Standard Practice. Business owners are responsible for identifying and classifying I&IT Assets used by their area. All I&IT Assets must be secured in line with legal and business requirements throughout the Asset lifecycle. Evaluation and selection of information security controls for Sensitive Assets must include the following domains when applicable: a) Asset management; b) human resource security; c) physical and environmental security; d) secure communications and operations management; e) access control; f) system development and acquisition; g) security incident management; h) business continuity management; and i) security compliance. Information Security Policy / Document ID: 3809 / Version: 1.0 Page 3

The rationale and approval for the exclusion of any of the above domains from an assessment shall be documented. All new and existing business units shall be assessed for security requirements. New programs and projects will identify security requirements that must be included in its deliverable design. Security requirements must be documented to the same level of granularity as the deliverable requirements. Where applicable, these security requirements will be included in the solution documentation for review by ehealth Ontario s architecture gating bodies. The design of information systems and resources must: a) comply with PHIPA and the Regulation, FIPPA and all regulations thereunder, other applicable laws, and any other applicable legal requirements (such as agreements entered into between ehealth Ontario and external parties); b) comply with ehealth Ontario privacy and security policies and standards; c) align with security best practices; d) include processes that record information about security incidents and communicate that information to the appropriate stakeholders; e) include processes and technology to monitor the security of information systems and resources; and f) include supporting materials to demonstrate compliance with this policy. Safeguards must be planned, documented, implemented, and tested. New or modified safeguards must be recorded, evaluated, and approved by the appropriate stakeholder(s), before those safeguards are implemented, changed or deleted. Safeguards that do not successfully pass testing: a) Will not be considered as safeguards as intended; and b) Must be recorded, re-evaluated, and re-assessed for risk treatment by the appropriate stakeholder(s). Where possible, technical security controls must be auditable. Technical security controls will be reviewed periodically to verify that they continue to operate as planned. Business unit Managers must ensure that all security responsibilities within their area are carried out correctly and in a manner that complies with applicable security requirements. All areas within the organization will be subject to regular audit to ensure compliance with applicable security requirements. Compliance with the requirements of this policy will be subject to internal audit. 4.2 Personal Health Information and Personal Information ehealth Ontario must comply with the requirements of PHIPA and the regulation, FIPPA and the Regulations and any other applicable laws for personal health information (PHI), Personal Information (PI) and other records. This includes, but is not limited to, the following mandatory requirements: a) ensuring the necessary written agreements are executed and maintained where required under law or as a best practice; b) keeping an electronic record of all accesses to PHI maintained by ehealth Ontario; Information Security Policy / Document ID: 3809 / Version: 1.0 Page 4

c) performing a security threat risk assessment ( TRA ) with respect to threats, vulnerabilities and risks to the confidentiality, availability and integrity of the data, information system, service or resource dealing with PHI and on request, making available a written copy of the summary of the TRA to each health information custodian that provides PHI to ehealth Ontario; d) describing the administrative, technical and physical safeguards relating to the confidentiality, integrity and availability of the personal health information as appropriate. Personnel within ehealth Ontario will treat and handle PHI in accordance with PHIPA and the Regulation. This includes the following compulsory requirements: a) having proper authorization and written agreement from the Chief Privacy Officer before accessing or handling PHI; b) protecting the integrity, availability and confidentiality of PHI; and c) immediately reporting potential unauthorized access / handling or loss of PHI to your respective Manager and then the Enterprise Service Desk in accordance with ehealth Ontario s Incident Management policy. 4.3 Security Risk Management Security assessments must be performed on Sensitive Assets to identify risks. These assessments must be performed periodically, or on notice of significant change. Security risks will be evaluated with risk treatment options. The treatment and acceptance of security risks must align with ehealth Ontario s governance and Enterprise Risk Management Policy. Residual security-related business risk(s) must be accepted by a person with the necessary authority (e.g., Risk Owners) within the organization. The Business Unit Manager, with input from Security Services, must create and maintain a security plan for Sensitive Assets. The security plan must document at least the following: a) appropriate management action, resources, responsibilities and priorities to mitigate identified security risks; b) the confidentiality, integrity and availability safeguards selected and their implementation plans; c) the level of risk accepted; d) the routine review of compliance to applicable security requirements; and e) the routine review and improvement of safeguard effectiveness. f) Security plans shall be signed by the Business Unit Head, or person with the equivalent or greater authority within the organization 4.4 External Parties When exchanging information with external organizations, or relying on information technology infrastructure and services provided by other parties, or an external party accessing agency information or processing facility, ehealth Ontario must establish written contracts and legal service agreements with these organizations which must include security controls that meet or exceed the requirements of this Policy. Where an external party has a standard agreement and no provision to vary it to meet agency requirements, the external party s standard clauses are assessed against ehealth Ontario s requirements and the risk associated with the gap is assessed before deciding whether or not to proceed with the offered terms. Where there is a significant Information Security Policy / Document ID: 3809 / Version: 1.0 Page 5

variation between the requirements and what is offered, the security services risk management process will be followed in order to proceed with the provider as governed by Enterprise Risk Management Policy. Existing contracts and service agreements that do not meet or exceed the requirements of this policy must be updated for compliance at the earliest reasonable, time e.g. on contract renewal negotiation. Where necessary, a nondisclosure agreement must be entered with the third party. Access to existing and new processing facilities must follow the process identified under Physical and Environmental Security Policy. 4.5 Accountability Any individual who causes or contributes to a Security Incident will be held accountable when his / her action or inaction goes against training received, job specification, agreement, contract, policy, or law. 5 Responsibilities 5.1 ehealth Ontario Board of Directors The ehealth Ontario Board of Directors will be responsible for: a) review and approval of this Policy; b) oversight of ehealth Ontario s capability for security risk management; and c) being informed of significant security risks related to the organization, and actions being taken by management to ensure risks are managed within the acceptable risk tolerance levels. 5.2 Chief Executive Officer (CEO) The CEO will be responsible for: a) ensuring that all ehealth Ontario Personnel have a clear understanding of security expectations for which they will be held accountable; b) ensuring that appropriate structures and processes are in place for the execution of the organization s security governance and accountability framework; c) ensuring that all ehealth Ontario Personnel comply with the principles and mandatory requirements of corporate management policies and standards and laws; d) maintaining relationship with the ehealth Ontario s Board of Directors, and communicating the Board s directions with regard to risk tolerance and security risk management expectations; and e) accepting residual security-related business risks as required. 5.3 Business Unit Head The Business Unit Head is responsible for: a) ensuring compliance with the requirements in this policy; b) accepting residual security-related business risks within the appropriate level of authority; c) signing the Business Unit s security plans; Information Security Policy / Document ID: 3809 / Version: 1.0 Page 6

d) providing business directions and confirming business priorities in regards to the business unit s security plan; e) communicating the CEO s directions with regard to risk tolerance and security risk management expectations; and f) approving adequate funding and resources for the business unit s security plans. 5.4 Business Unit Managers The business unit Managers shall be responsible for: a) providing direction and oversight for management of security risks within their areas of responsibility; b) ensuring that all business operations and service delivery requirements follow this policy, and the security policies and standards of the organization; c) routinely reviewing compliance with the requirements in this policy; d) ensuring that adequate procedures, training and awareness programs are attended to make all employees, contractors and vendors employees aware of their Information Security obligations; e) developing and executing the business unit s security plan(s); and f) ensuring that all employees, contractors or third party users under their responsibility: return Agency assets in their possession upon termination of their employment, contract or agreement; and all the access rights and authorization are removed from the systems. 5.5 Chief Security Officer, Security Services The Chief Security Officer, Security Services is responsible for: a) this policy, as well as other security policies; b) approving routine compliance reviews of business unit security plans; c) approving the information security governance and the Security Services Department s plan; d) ensuring that ehealth Ontario s information security plan is coordinated with, and has business objectives consistent with the organization s privacy plans; e) providing corporate leadership and direction to business units on the implementation of this policy; and f) coordinating responses to information security issues at the overall organization level. 5.6 Legal The Legal department is responsible for: a) reviewing this policy; b) maintaining the contact list with authorities that may be used in the event of a security incident; and c) ensuring necessary review is conducted before contacting authorities. 5.7 Security Services Security Services is responsible for: a) evaluating the effectiveness of this and other security policies, and recommending any necessary changes to the policy; b) coordinating routine compliance reviews of business unit security plans; c) developing and managing information security governance and Security Services Department s plan; d) developing the organization s information security training and awareness program; and Information Security Policy / Document ID: 3809 / Version: 1.0 Page 7

e) providing information and advice to the business units to ensure consistent implementation of safeguards and security plans. 5.8 Personnel (including Agency and third party Service Providers) Personnel are responsible for: a) completing the annual security training and awareness program; b) reading, understanding, accepting and signing the Employee Privacy and Security Code of Conduct or the Privacy and Security Standard of Conduct for Service Providers, as applicable; c) reading, understanding, accepting and signing the Acknowledgment of Confidentiality; reading, understanding, and accepting the Information and Information Technology (I&IT) Resource Acceptable Use policy; and d) following all ehealth Ontario security policies, standards and procedures. 5.9 Procurement The Procurement department is responsible for: a) Ensuring all contractors and agents have undergone necessary screening, as per the Security Screening Policy; and b) Working with Security Services and Legal to ensure appropriate language is included in contracts and Requests for Proposal (RFPs). Information Security Policy / Document ID: 3809 / Version: 1.0 Page 8

6 Glossary TERM Accountability DEFINITION Any individual who causes or contributes to a Security Incident will be held accountable when his / her action or inaction goes against training received, job specification, agreement, contract, policy, or law. Approver The individual responsible for ensuring that the policy, process, procedure, etc. is defined and maintained to serve (related) business objectives effectively. This may (typically) also be the owner. Asset A component or part of the total system or network to which the owner directly assigns a value to represent the level of importance to the business or operations/operational mission of the Business Unit, and therefore warrants an appropriate level of protection. Asset types include, but are not limited to: information, hardware, communications equipment, firmware, documents/publications, environmental equipment, infrastructure, money, revenue, services and organizational image. Availability The property of an asset and services that ensures they can be accessed and used as required, without undue delay. Business Unit A group of people within ehealth Ontario, including but not limited to a division, department, program, or project. Business Unit Head A head of an Business Unit within ehealth Ontario, e.g., Operations, Development and Delivery, etc. Business Unit Manager Vice presidents, directors, and managers who report up to the Business Unit Head. Confidentiality The property that information is available or disclosed only to authorized individuals, entities or processes. Document Prime The individual responsible for managing and maintaining the process document, and who is the focal point for questions and information pertaining to the document. Typically, this is a Subject Matter Expert (SME), and may participate in or guide the development of the process document. Integrity The assurance that the information being used, displayed or sent has not been modified by Information Security Policy / Document ID: 3809 / Version: 1.0 Page 9

unauthorized means. Owner The individual designated by management responsible for the development, maintenance, and communication of the policy, process, procedure, etc. to achieve (related) business objectives in an effective and efficient manner. Personnel ehealth Ontario employees and temporary staff (contractors, temp agency staff, co-op students and seconded individuals.) Contractors are individuals procured through a company for a specified period of greater than 3 months to fill a permanent full time position temporarily and on a day- to- day basis are managed directly by ehealth Ontario management. Personal Health Information Has the meaning set out in section 4 of the Personal Health Information Protection Act, 2004 (PHIPA), and generally means identifying information about an individual in oral or recorded form pertaining to that person s health or health services provided to the individual. Personal Information (PI) Has the meaning set out in section 2 of the Freedom of Information and Protection of Privacy Act (FIPPA) as: recorded information about an identifiable individual, including, (a) information relating to the race, national or ethnic origin, colour, religion, age, sex, sexual orientation or marital or family status of the individual, (b) information relating to the education or the medical, psychiatric, psychological, criminal or employment history of the individual or information relating to financial transactions in which the individual has been involved, (c) any identifying number, symbol or other particular assigned to the individual, (d) the address, telephone number, fingerprints or blood type of the individual, (e) the personal opinions or views of the individual except where they relate to another individual, (f) correspondence sent to an institution by the individual that is implicitly or explicitly of a private or confidential nature, and replies to that correspondence that would reveal the contents of the original correspondence, (g) the views or opinions of another individual about the individual, and (h) the individual s name where it appears with other Personal Information relating to the individual or where the disclosure of the name would reveal other Personal Information about the individual. Risk Treatment Action(s) that may be taken to bring the risk situation to a level where the exposure to risk is acceptable to ehealth Ontario. Safeguard A precautionary measure, stipulation, device, technical or non-technical solution to prevent an undesired incident from occurring. Security Incident Any activity that could compromise the security of government information or systems, including but not limited to, a social engineering attempt such as a request for a password, loss of a laptop or blackberry, a computer virus infection, degradation of a system, unauthorized changes to files or file sizes, or the addition of files. Information Security Policy / Document ID: 3809 / Version: 1.0 Page 10

Sensitive Asset Any Asset defined as sensitive in accordance with the Information Classification Policy. Sensitive Information Information defined as sensitive in accordance with the Information Classification Policy. Service Provider An individual or entity that ehealth Ontario contracts to act on the Agency s behalf to provide goods or services that assist in the delivery of ehealth Ontario Services. The term includes vendors, consultants and service delivery partners. User All ehealth Ontario Personnel and anyone else who is granted access to ehealth Ontario information, systems and other IT resources. Information Security Policy / Document ID: 3809 / Version: 1.0 Page 11

7 References and Associated Documents REFERENCE Development Corporations Act LOCATION Freedom of Information and Protection of Privacy Act Personal Health Information Protection Act, 2004 http://www.elaws.gov.on.ca/html/statutes/english/elaws_statutes_90d10_e.htm http://www.elaws.gov.on.ca/html/statutes/english/elaws_statutes_90f31_e.htm http://www.elaws.gov.on.ca/html/statutes/english/elaws_statutes_04p03_e.ht m Information Security Policy / Document ID: 3809 / Version: 1.0 Page 12