2015 HMIS Annual Workshop



Similar documents
Initial Client Setup Manual v. 5.5 InHOUSE Alameda Countywide HMIS System

Network and Workstation Acceptable Use Policy

HMIS Privacy/Security Plan

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

Introduction. PCI DSS Overview

Rocklin Unified School District Employee Authorized Network, Internet Usage, and Privacy Agreement

Business ebanking Fraud Prevention Best Practices

Quick Start Guide to Logging in to Online Banking

User Manual for National Transplant Procurement Management (NTPM) TOP team user Web Application

Information Security

PROGRAM R 2361/Page 1 of 12 ACCEPTABLE USE OF COMPUTERS NETWORKS/COMPUTERS AND RESOURCES

Reliance Bank Fraud Prevention Best Practices

Employer Registrations On Maine s Job Bank Helpline:


How To Protect The Time System From Being Hacked

BOWMAN SYSTEMS SECURING CLIENT DATA

Common Cyber Threats. Common cyber threats include:

District Regulation ACCEPTABLE USE OF COMPUTER NETWORK/ COMPUTERS AND RESOURCES

3. Electronic Mail ( )

Casey State Bank Online Banking Agreement and Disclosure

INTRODUCTION HMIS Objectives and Expectations... 1

Acceptable Use of ICT Policy For Staff

RESPONSIBLE USE OF TECHNOLOGY AND THE INTERNET

1. Computer and Technology Use, Cell Phones Information Technology Policy

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

2. _General Help and Technical Support

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

Table of Contents. Introduction Logging into ETO ETO HMIS Homepage Description ETO HMIS Homepage Tabs... 13

U.S. Bank Secure Mail

REGULATION ALLENDALE BOARD OF EDUCATION. PROGRAM R 2361/Page 1 of 7 USE OF COMPUTER NETWORK/COMPUTERS R 2361 USE OF COMPUTER NETWORK/COMPUTERS

BUSINESS ONLINE BANKING AGREEMENT

BSHSI Security Awareness Training

Internet Acceptable Use and Software Installation Policy

2. Prohibit and prevent unauthorized online disclosure, use, or dissemination of personally identifiable information of students.

How To Protect A Hampden County Hmis From Being Hacked

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Homeless Management Information System (HMIS) Indiana Housing & Community Development Authority

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

CODE OF CONDUCT regarding the Data Storage Web Health History ("W.H.H.") Service called Lifepassport provided by Meshpass SA

MIDDLESEX SAVINGS BANK ONLINE BANKING AGREEMENT

USE OF TECHNOLOGY RESOURCES IN INSTRUCTION

Follow the instructions below for first-time users only

FMS Bank s Internet Banking Accounts Access Agreement

Denver Public Schools - East High School

Green Climate Fund Online Accreditation System: User s Guide

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Safe Practices for Online Banking

Computer and Network Security Policy

R3321 ACCEPTABLE USE OF COMPUTER NETWORK(S)/COMPUTERS AND RESOURCES BY TEACHING STAFF MEMBERS

Online Banking. Customer Information

HMIS Policies and Procedures. San Antonio/Bexar County Continuum of Care (CoC) Homeless Management Information System (HMIS) Policies and Procedures

HMIS Support Ticket System User Guide

Sussex County Charter School for Technology Acceptable Use Policy Faculty & Staff September, 2009

System and Network Security Policy Internet User Guidelines and Policy. North Coast Council West Canal Road Valley View, Ohio 44125

OPUS. System Administrators Manual Updated March 17, 2010

Central Agency for Information Technology

How To Secure An Rsa Authentication Agent

Hyde School Student Computer Systems Acceptable Use Policy

Data Quality Plan Louisiana Service Network Data Consortium

Internet usage Policy

R 2361 ACCEPTABLE USE OF COMPUTER NETWORK/COMPUTERS AND RESOURCES

Tenth Judicial Circuit of Florida Information Systems Acceptable Use Guidelines Polk, Hardee and Highlands Counties as of January 2014

Hang Seng HSBCnet Security. May 2016

Franciscan University of Steubenville Information Security Policy

If you contact us orally, we may require that you send us your complaint or question in writing within 10 business days.

Pulaski Technical College

- Do not leave open /network applications unattended. Log off of a computer when it is in an unsecured area and out of your sight.

Responsible Access and Use of Information Technology Resources and Services Policy

Security Tips You are here: Home» Security Tips

Acceptable Use of Information Systems Standard. Guidance for all staff

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

Revelstoke Board of Education Policy Manual

COMPUTER USE IN INSTRUCTION

Responsible Computer Use Policy for Students

Information Technology Acceptable Use Policy

Standard Data Entry Workflow SP5.12

Portal User Guide. Customers. Version 1.1. May of 5

Information Technology Acceptable Use Policies and Procedures

Online (Internet) Banking Agreement and Disclosure

Interskill LMS Admin Guide

Online Banking Customer Awareness and Education Program

Chicago Homeless Management Information System (HMIS) Privacy Packet

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

THE OPEN UNIVERSITY OF TANZANIA INSTITUTE OF EDUCATIONAL AND MANAGEMENT TECHNOLOGIES. ICT security procedures for staff

HealthInfoNet HELP DESK REFERENCE GUIDE. Revised on Page 1 of 26

D3 TECHNOLOGIES SPAM FILTER

M&T BANK CANADIAN PRIVACY POLICY

STAAR Assessment Management System User s Guide. STAAR Grades 3 8 and End-of-Course Assessments

Internet Acceptable Use Policy

Terms and Conditions of Use - Connectivity to MAGNET

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

Bank of Wisconsin Dells Personal Online Banking Agreement and Disclosures (01/2016)

Policy for the Acceptable Use of Information Technology Resources

Century Commons' Internet Use

The Basics of HIPAA Privacy and Security and HITECH

POLICIES AND REGULATIONS Policy #78

Online Banking Fraud Prevention Recommendations and Best Practices

How To Protect Your Privacy On Coolcampuschallenge.Org

Instruction. Neoga Community Unit School District #3 Page 1 of 5

APHIS INTERNET USE AND SECURITY POLICY

Transcription:

2015 HMIS Annual Workshop

2015 HMIS Annual Workshop August 20 th 2015 AGENDA 9:00 AM Welcome (All times are approximate) 9:15 AM Security, Data Integrity, Compatibility 10:45 AM ServicePoint Feature Set 11:30 AM - Annual Homeless Assessment Report 11:45 LUNCH BREAK 1:15 PM New HUD Data Elements 2:00 PM The TOP 25 2:45 PM Open Discussion

HMIS General Security Essentials

MORE SECURE DATA ENVIRONMENT Adhere to HMIS REQUIRED policies and implement at every security level COMPUTER USER CLIENT ORGANIZATION/PROVIDER

MORE SECURE DATA ENVIRONMENT Create an environment of confidentiality by restricting open discussions that include secure information. Assure that only staff who work directly with clients or who have administrative responsibilities can look at, enter, or edit client records.

COMPUTER SECURITY All computers that will access HMIS must be in secured locations. Personally Identifiable Information (PID) included in HMIS should not be visible to other clients or the public. This information should not be able to be accessed by unauthorized users.

COMPUTER SECURITY All computers running HMIS must have up to date anti-virus software and must be behind a software and/or hardware firewall. Use a secure, supported operating system. (Windows 7, Windows 8, ipad)** **Computers running ART must be running Java 6 release 45.

COMPUTER SECURITY Maintain current operating system updates. Keep your operating system updated by applying the latest service packs and patches. Use recommended and updated browsers (Firefox and Chrome) for HMIS.

COMPUTER SECURITY It is a BEST PRACTICE to implement the PRINCIPLE of LEAST PRIVILEGE (PoLP) when users log onto a computer to use it for HMIS. It is recommended that there be a separate ADMINISTATOR user on a computer and that the day to day entries and use of the computer be performed while logged in as a STANDARD USER without administrative privileges.

COMPUTER SECURITY A computer running HMIS must not be left unattended. Every computer s power settings must automatically turn off the display after a reasonable length of time (e.g. 15 minutes) without activity and; Require a re-entry of the user password in order to log back in.

COMPUTER SECURITY Do not download unfamiliar software off the Internet: KaZaA, Bonzi, Gator, HotBar, WhenUSave, LimeWire, Ads by Ultra Coupon, Coupon Factor, Firefox Redirect and other programs may appear at first to have useful and legitimate functions. However, it may contain spyware or malware, which will damage your computer functionality.

COMPUTER SECURITY Whenever you install a computer program, look and read carefully each screen before clicking NEXT. You may, without realizing it, give permission to install other software that can affect the performance of your computer and/or add malware/spyware to your system.

COMPUTER SECURITY BEST PRACTICE: Install only the software on your computer systems that is needed for your legitimate business practice.

COMPUTER SECURITY Obtain all software, including public domain software from reputable sources. It may look like the same software, it may seem like a great price, but the cost can be high to your organization, if the software contains viruses or malware, or is a pirated copy of a computer program.

USER SECURITY An HMIS user is a staff person or volunteer who is authorized and trained to collect and disseminate information regarding clients or potential clients of PROGRAMS operated within the CoC.

USER SECURITY Every user must have a unique HMIS login ID, and a password that changes on a periodic basis. User login and password information must be kept secured, and must not be shared with anyone.

USER SECURITY All users must be trained in the use of HMIS and must sign a user confidentiality agreement with the Suncoast Partnership HMIS.

USER SECURITY You can find an up to date list of the HMIS training programs that are scheduled on the Suncoast Partnership website. Look for the icon the reads HMIS Training.

USER SECURITY Confidential information obtained from HMIS is to remain confidential, even when the HMIS user s relationship with the agency changes or concludes for any reason.

USER SECURITY Any unauthorized access or unauthorized modification to the computer system information or interference with normal system operations will result in immediate suspension of the users access to the HMIS and may jeopardize your employment status with your agency.

HMIS PASSWORD SECURITY POLICY Passwords must be 8 to 16 characters in length and must contain at least two numbers. The system allows only one login per password at a time. In other words, you cannot log into the system on two terminals at the same time using a single password. Passwords automatically expire every 45 days. When your password expires, you must enter a new one; you cannot reenter the same one.

HMIS PASSWORD SECURITY POLICY In order to enforce password security, ServicePoint will not allow your browser to save your password. Additionally, if you attempt to log into ServicePoint three consecutive times with the wrong password, your user account will need to be reset by a system administrator. You must contact your administrator to have your account reactivated.

HMIS PASSWORD SECURITY POLICY ServicePoint has an automatic logout function for users who have been idle for a pre-determined period of time. This function decreases potential viewing and/or manipulation of client data by unauthorized individuals. This timer is typically set for 30 minutes.

PRACTICAL PASSWORD GUIDELINES A strong, effective password requires a necessary degree of complexity. There are four practices to help create these strong passwords and yet keep them relatively easy to remember.

PRACTICAL PASSWORD GUIDELINES Four best practices for passwords: Length Width Depth Substitution.

PRACTICAL PASSWORD GUIDELINES Length means that the longer a password, the more difficult it is to crack. Simply put, longer is better. Probability dictates that the longer a password the more difficult it will be to crack. HMIS Software allows for 8 to 16 characters

PRACTICAL PASSWORD GUIDELINES Width is a way of describing the different types of characters that are used. Don t just consider the alphabet and upper and lower case letters. Also include numbers and special characters like %.

PRACTICAL PASSWORD GUIDELINES Depth refers to choosing a password not easily guessable. However, it has been found that creating passwords that are just random characters creates organizational problems, as the passwords are too difficult to remember. Stop thinking in terms of passwords and start thinking in terms of phrases.

PRACTICAL PASSWORD GUIDELINES Creating depth means using phrase passwords including something phonetically spelled, such as ImuKat! (instead of I m a cat! ) or the first letters of a memorable phrase such as qbfjotld = quick brown fox jumped over the lazy dog. Add a number in place of a letter, a special character in place of a letter and capitalize a letter and you have a great password. Qbfj0t!d

PRACTICAL PASSWORD GUIDELINES Substitution is a great way add complexity without making the password more difficult to remember. The password we used in the Depth example was Qbfj0t!d, relating to the phrase quick brown fox jumped over the lazy dog. Note: that we replaced the letter o with the number 0 and replaced the letter l with the exclamation point. This is called Substitution.

PRACTICAL PASSWORD GUIDELINES With Substitution you can create some easy to remember substitution rules. For example: For the capital letter S, substitute the $ symbol. For the letter z, substitute the number 2. For the letter l, substitute the exclamation point. For the letter B, substitute the number 8. These are just a few simple substitution rules that you might utilize.

CLIENT SECURITY Each client must be made aware that their information is to be entered into the HMIS and why that information is collected.** To help meet the client s needs to help with case management and help make sure the client gets services needed. **See Organization/Provider Security for more information.

CLIENT SECURITY Each client must be made aware that their information is to be entered into the HMIS and why that information is collected.** To help HMIS and program providers count and do research regarding how many people we serve and the types of people we serve. **See Organization/Provider Security for more information.

CLIENT SECURITY Each client must be made aware that their information is to be entered into the HMIS and why that information is collected.** To help HMIS and program providers understand the types of services people need and develop new services to meet the needs. **See Organization/Provider Security for more information.

CLIENT SECURITY Each client must be made aware that their information is to be entered into the HMIS and why that information is collected.** HMIS and program providers only collect personal information that is necessary and seek to only maintain personal information that is complete, correct, consistent and current.

CLIENT SECURITY Each client must be made aware that their information is to be entered into the HMIS.** A client should consent to have their information entered into HMIS. It should be noted that a client may refuse to have their information entered but this may effect their eligibility for services.

CLIENT SECURITY Each client should sign a RELEASE OF INFORMATION for the sharing of their information among participating providers. Each provider must have their own RELEASE OF INFORMATION with each client.

ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding: Posting of the required Notice of Uses and Disclosures for HMIS Collecting, editing, and reporting information. Sharing and/or protecting client information. Setting policies against discriminatory, profane, offensive or inflammatory language in HMIS.

ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding collecting, editing, and reporting information. Only staff who work directly with clients or who have administrative responsibilities can look at, enter, or edit client records. When working with other organizations and the HMIS staff, use client numbers only.

ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding collecting, editing, and reporting information. Misrepresentation of the client database by knowingly entering inaccurate information is prohibited

ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding collecting, editing, and reporting information. Client records are not to be deleted from the HMIS system. If a client or guardian of a client chooses to rescind consent to participate in the HMIS, her/his file shall become inactive.

IMPORTANT NOTICE The HMIS system is to be used for business purposes only. Transmission of material in violation of any United States Federal or State of Florida regulations or laws is prohibited and includes material that is copyrighted, legally judged to be threatening or obscene, and considered protected by trade secret. The HMIS will not be used to defraud the Federal, State or local government or an individual entity or to conduct any illegal activity.

ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding sharing client information. Staff should be trained, understand and share with clients the purpose of HMIS and both how and why information is obtained and documented in HMIS.

ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding sharing client information. Staff should be trained, understand and share with clients the benefits of HMIS, including the fact that the information they provide can assist in better referrals and a more complete set of services on their behalf.

ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding sharing client information. Written client consent, or Release of Information (ROI), is required for every client due to the fact that some or all of the data collected will be shared with other providers, the program funding sources and other administrative staff.

ORGANIZATION/PROVIDER SECURITY Organizational responsibilities regarding sharing client information. Copies of client consent records shall be kept by the participating agencies for at least 7 years. An electronic copy of the ROI may be attached to the client s HMIS profile by scanning the signed agreement.

ServicePoint Feature Set

CallPoint - Call management and tracking, connecting calls to ClientPoint and HMIS ClientPoint - Manage client information and use effective tools like Case Management. ActivityPoint - Schedule classes, events. Track attendance and more. Fund Manager - Real Time tracking of dollars for services, programs and shelter ShelterPoint - Effective Bed Utilization SkanPoint - Faster and more convenient provision of services, programs and shelter ResourcePoint CommunityPoint Keeping information about your organization up to date. Reporting - Available Standard Reports, Easy Access to Information

CallPoint - Call management and tracking, connecting calls to ClientPoint and HMIS Add a dynamic information and referral management tool to your ServicePoint system. Utilize CallPoint to log calls, capture information about callers, and refer those in need to the most appropriate community providers.

ClientPoint - Manage client information and use effective tools like Case Management. Efficiently manage your client records with this powerful core ServicePoint module. Whether you need to view a summary of client activity, link clients in households, assess client needs, log case plans, or record services - ClientPoint has you covered!

ActivityPoint - Easily record client attendance, manage wait-lists, and track volunteer service at any activity or event for quick reference and reporting. Identify the topic, teachers, location and dates of each activity. Know who is scheduled to attend and keep a record of their attendance.

ActivityPoint - Schedule classes, events. Track attendance and more. You can even schedule & track attendance for volunteers using Activity Point.

Fund Manager Efficiently Manage Your Funding in real-time with FundManager. FundManager allows for seamless integration of grant management and client activity, providing a full picture of how funds are spent and who funds assist.

Fund Manager Make Your Grant Management Simple Case Managers are guided through the selection of appropriate funds for a service, and Fund Administrators have flexible options to set up their funds according to the to grant requirements. FundManager allows you to track which clients and households are receiving assistance dollars and for what services. Fund Administrators control fund compliance parameters and which providers have access to the funds. Other flexible options include the ability to allocate assistance amounts to providers or leave the fund open for use on a first come, first serve basis. FundManager empowers case managers by guiding the workflow when providing assistance to their clients. Take the guesswork out of determining the best funding sources to assist clients by displaying only relevant funding source options and providing real-time fund balances. Case Managers are kept up to date on the status of fund requests and informed of the next steps needed to fulfill their clients' fund requests. Make real-time auditing of your grant and fund management easy. FundManager provides unparalleled accountability for your funding as you easily track and report which clients or households are receiving assistance dollars and for what services.

ShelterPoint - Effective Bed Utilization

ShelterPoint - Effective Bed Utilization ShelterPoint was specifically designed as an all-in-one module to support the unique needs and workflows of human service residential programs. View realtime occupancy information, manage reservations and unit assignments, and much more. And ShelterPoint integrates with the rest of ClientPoint, Fund Manager and even SkanPoint.

SkanPoint - Faster and more convenient provision of services, programs and shelter Stream-line data entry for services. With SkanPoint, you can instantly record one or more services, quickly assign a residential unit, easily generate client ID cards for multiple services, and much more.

ResourcePoint CommunityPoint Keeping information about your organization up to date. HMIS ResourcePoint http://mycommunitypt.com/sarasota/

Identifying Service Codes that will match a client/households needs. Each resource in ResourcePoint has a list of Service Codes that come from the AIRS Taxonomy.

Reporting - Available Standard Reports, Easy Access to Information, Custom Reporting Canned Reports Standard reports provided with ServicePoint to help track items like services, referrals and more. No need for special programming. Special Recipe Individualized reports to meet a projects specific needs. Usually done with the Advanced Reporting Tool (ART) by the HMIS staff.

Reporting Reporting: ServicePoint Reports Canned Reports ReportWriter Dashboard Reports Counts Reports My Fund Requests ART Dashboard Reports Specialized ART Reports

Annual Homeless Assessment Report

Description and Purpose of the AHAR Report A H A R The Annual Homeless Assessment Report (AHAR) is a HUD report to the U.S. Congress that provides nationwide estimates of homelessness, including information about the demographic characteristics of homeless persons, service use patterns, and the capacity to house homeless persons. The report is based primarily on Homeless Management Information Systems (HMIS) data about persons who experience homelessness during a 12-month period. For our area, the City of Sarasota is the only geocode included for the AHAR report. Focus is on emergency housing, transitional housing and permanent supportive housing. Current Status Quarterly status reports enable providers to correct errors and complete information that is lacking in a client file. Timeline First draft due in October, final report is due by Mid-November.

HUD Standards: A few changes and a greater emphasis on performance.

Program Data Elements Project Requested Data Elements Universal Data Elements include REQUIRED fields for data entry for all projects and are included for all projects. Program Data Elements are required fields for specific projects upon the funding source, and are not always available for every project. Project Requested Data Elements are fields that your specific project requests that are neither required or part of the Universal Data Elements. These fields may provide helpful data as you make services available.

FY 2015 New HUD Data Standards: Universal Data Elements 3.12 Destination 3.17 Time on Streets, Emergency Shelters, or Safe Havens Program Specific Data Elements 4.11 Domestic Violence RHY Only 4.35A Commercial Sexual Exploitation 4.35B Commercial Labor Exploitation SSVF Only 4.44 HP Screening Score 4.45 VAMC Station Number HOPWA Only 4.47 T-Cell and Viral Load

System Performance Measures: Length of Time Persons Remain Homeless Exit Homelessness to Permanent Housing & Return to Homelessness Number of Homeless Persons Employment and Income Growth for Homeless Persons in CoC Program funded Projects Number of Persons who Become Homeless for the First Time Homelessness Prevention and Housing Placement of Persons Defined by Category 3 of HUD s Homeless Definition in CoC Program-funded Projects Successful Housing Placements

25 Questions

25 Questions The HMIS Annual Workshop Booklet has all 25 questions and our best answer for each. You can download a copy of this booklet on line at: www.suncoastpartnership.org/what-we-do/hmis/hmis-training/

Thank You.