EXAMPLE 2-JOINT PRIVACY AND SECURITY CHECKLIST

Size: px
Start display at page:

Download "EXAMPLE 2-JOINT PRIVACY AND SECURITY CHECKLIST"

Transcription

1 Purpose: The purpose of this Checklist is to evaluate your proposal to use or disclose Protected Health Information ( PHI ) for the purpose indicated below and allow the University Privacy Office and Office of Cybersecurity to jointly review and provide guidance on the information privacy and security controls associated with your proposal. This Checklist is meant to be used in a variety of projects including IRB research, educational activities, any project involving vendors who will receive Institutional PHI or any project where you will be receiving PHI from another entity for a reason other than treatment. Instructions: Please complete this form with as much detail as you are able and return it via to the address listed at the end of this form. After we receive the completed Checklist, we will evaluate your responses and respond to you with next steps (if any). Should you have any questions about completing this form, please them to the University X Privacy Officer at privacyofficer@universityx.edu or by phone at PI or Project Leader Name & Title: Dr. Patricia Patterson, Developmental Behavioral Pediatrician PI or Project Leader Contact Information: Phone Number: ppatterson@universityx.edu School/Department: Pediatrics Your contact information (name/phone/ ) if you are not the PI or project leader: Rex Alman, Administrator; Purpose of this Request: Check all that apply Student education Quality improvement/quality assessment University administration and/or operations (including HR) Medical/clinical care IRB approved research (Protocol no ) Fundraising or marketing Other (describe: Click here to enter text.) If you have IT support in your department or as part of this project, please list their name and contact information here: Sid Foley; sid.foley@universityx.edu 1. Briefly describe your project and the timeline in which you hope to begin your project: Development of autistic children through various behavioral therapies. Studying social behaviors of children diagnosed with Autism Spectrum Disorder (ASD) using wearable technology (Google Glass) by measuring instances of eye contact with the researcher and/or parent to examine participant social behaviors. Study will examine variety of conditions, including differences between interaction with minor subject and his/her parent (bonded relationship) and minor subject and researcher (non-bonded relationship) to examine any behavioral patterns over time. 2. Will any data be disclosed to, or received from, a 3 rd party? ( A third party is any person outside the PI s research team, or outside of the Project leader s internal 1

2 team. 3 rd parties including people from elsewhere at University X, or from another institution altogether)? If yes, please describe: Yes, we will receive data: Please describe from where/whom and how the data will be transferred? University X will receive data directly from study participants (raw video footage between child and researcher and/or child and parent). Yes, we will disclose data: Please describe to where/whom and how the data will be transferred? University X will transmit video files to collaborating institution (University G) for analysis. No, we will not be transmitting data to any 3 rd party, nor will we receive data from any 3 rd party. 3. Check all that are identifiers that will be created, accessed, analyzed, transmitted, stored, received or disclosed as part of this research or project: Check all that apply. Names Geographic subdivisions smaller than a state: Please list exactly what geographic identifiers will be received and/or disclosed (state, city, county, street address, zip code): Click here to enter text.) Dates: (except year) directly related to an individual, including DOB, health care service, admission, or discharge dates, date of death, and all ages over 89 and all elements of dates (including year) indicative of such age, unless aggregated into a single category of ages over 89: Please list the types of dates (ex., date of service) and format of any dates (month/year) being received or disclosed: Dates of birth, dates of services Telephone numbers, fax numbers, and/or addresses Social security numbers Medical record numbers Health insurance ID number(s), account numbers, and/or plan beneficiary numbers Certificate/driver s license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers Web Uniform Resource Locators (URLs) and/or Internet Protocol (IP) address numbers Biometric identifiers, including finger and voice prints Full face photographic images and any comparable images Any other unique identifying number, characteristic, or code Student data (demographics, grades, other Click here to enter text. ) Faculty or staff employment documents (personnel files, salary, benefits, etc.) University ID numbers, student or employee ID numbers Donor information (from University fundraising) Research data from other IRB approved studies 2

3 Medical Records: Describe (ex: diagnosis and treatment information, lab results, physician notes, diagnostic images, prescription information, sensitive medical conditions (STDs, HIV, mental health records, alcohol and drug treatment information), etc.) Click here to enter text. Other (describe) Raw video footage of minor children diagnosed with Autism 4. For all data elements listed above, list the location(s) where the data will be 1) collected/created, 2) stored, 3) accessed from and/or analyzed, and 4) how it will be shared or released? (Include details covering both physical locations and electronic systems. Include system IDs if possible. Make special note if a system is mobile, such as a laptop, external hard drive or thumb drive.) If you are able to submit a data life cycle or data flow diagram with this Checklist, it will greatly improve our ability to analyze your proposal. A data life cycle or data flow diagram will list specifically the security controls in place at each stage of the data during its collection, storage, use (by all internal parties), release (including security controls used in planned transmissions of the data) as well as storage and ultimately archival and destruction. Raw video between study participants and parent/researcher will be temporarily stored locally on one of three sets of Google Glasses. Raw footage will be uploaded from mobile device via USB cable to a department-issued encrypted desktop and uploaded to an encrypted portal hosted by collaborating institution University G and stored on an encrypted server with University G s data warehouse. Local copy of video on Google Glass will be deleted upon confirmation that upload was successful to encrypted portal. University G researchers will analyze the video using study-specific metrics. University G researchers will share analysis with University X researchers. University G will archive the data for the duration of the project and approximately three years thereafter to meet statutory, regulatory and institutional records retention requirements. 5. Describe the population of individuals whose data will be collected, accessed, stored, transmitted, processed, released (e.g. University Hospital patients, clinical research participants, students, etc.) and provide an estimate of the number of persons and number of unique records per person for each category (e.g. All Medicare recipients living in the state of Wisconsin so roughly 1.5 million who have three types of records collected as part of this project each year over three years resulting in the collection of roughly 4.5 million different records, each year). Types of individuals whose data will be involved in this project: Males and females > 8 and <16 with Autism Spectrum Disorder (ASD). Total number of individuals who whose data will be involved with this project (please estimate if this is a multiyear project please provide an estimate over multi-year intervals): 3

4 Approximately 30 subjects (from University X). Longitudinal study to span approximately 3 years. 6. Will a vendor or third party perform any service as part of this research project on your behalf or at your request? If so, please list the name, address and contact information for the vendor or individual and describe the service they will perform and how data will be transmitted to this vendor. (Examples: using a survey system not owned and operated by the researcher team; using computer systems for storage, backup, or statistical analysis, providing data to another party for geo coding, etc ) University G (collaborating institution) will store raw video obtained from Google Glass sessions on device. 7. Will any data need to be shared with collaborators (internal or external to University X)? YES NO a. If YES, list the collaborators and their institution: University G, Dr. Jillian Goke, Department of Pediatrics b. Indicate how the data will be shared with collaborators? University G will provide encrypted portal and local servers to store raw video footage and perform analysis using systematic methodology developed between the collaborating institutions. 8. Is there an agreement (executed or in draft form) for the data sharing with the collaborator(s)? YES - If yes, please attach a copy NO 9. Have all University X employees involved with this project, including all IT staff supporting your systems, completed this current year s annual HIPAA training? YES NO Unknown Please return this form and any attachments as follows: University X Privacy Officer at privacyofficer@universityx.edu 4

5 5

EXAMPLE 3-JOINT PRIVACY AND SECURITY CHECKLIST

EXAMPLE 3-JOINT PRIVACY AND SECURITY CHECKLIST Purpose: The purpose of this Checklist is to evaluate your proposal to use or disclose Protected Health Information ( PHI ) for the purpose indicated below and allow the University Privacy Office and Office

More information

HIPAA and HIPAA Compliance with PHI/PII in Research

HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA Compliance Federal Regulations-Enforced by Office of Civil Rights State Regulations-Texas Administrative Codes Institutional Policies-UTHSA HOPs/IRB

More information

POLICY. Create a governance process to manage requests to extract de- identified data from the Information Exchange (IE).

POLICY. Create a governance process to manage requests to extract de- identified data from the Information Exchange (IE). Academic Health Center Office of Biomedical Health Informatics POLICY Extraction of De- Identifiable Data from the Information Exchange Approved Proposal Purpose Create a governance process to manage requests

More information

Introduction/Instructions

Introduction/Instructions Introduction/Instructions Registries (data banks) and repositories (tissue banks, usually with databases associated) all involve the collection and storage of information and/or biological specimens that

More information

HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL

HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL Just a Few Reminders HIPAA applies to Covered Entities HIPAA is a federal law that governs the privacy

More information

University of Mississippi Medical Center Data Use Agreement Protected Health Information

University of Mississippi Medical Center Data Use Agreement Protected Health Information Data Use Agreement Protected Health Information This Data Use Agreement ( DUA ) is effective on the day of, 20, ( Effective Date ) by and between (UMMC) ( Data Custodian ), and ( Recipient ), located at

More information

Security Overview. Joseph Balberde North Country Community Mental Health Information Technology Director

Security Overview. Joseph Balberde North Country Community Mental Health Information Technology Director Security Overview Joseph Balberde North Country Community Mental Health Information Technology Director 2-5-2019 Protected Health Information Individually Identifiable Health Information (IIHI): is information

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014 Computer Security Incident Response Plan Name of Approver: Mary Ann Blair Date of Approval: 23-FEB-2014 Date of Review: 31-MAY-2016 Effective Date: 23-FEB-2014 Name of Reviewer: John Lerchey Table of Contents

More information

Health Link Frequently Asked Questions

Health Link Frequently Asked Questions Health Link Frequently Asked Questions We hope that you find our Health Link patient portal easy to use. If you have any questions or comments, please contact Health Link Support by email at healthlink@hvhs.org

More information

Universal Patient Key

Universal Patient Key Universal Patient Key Overview The Healthcare Data Privacy (i.e., HIPAA Compliance) and Data Management Challenge The healthcare industry continues to struggle with two important goals that many view as

More information

HIPAA 101: What All Doctors NEED To Know

HIPAA 101: What All Doctors NEED To Know HIPAA 101: What All Doctors NEED To Know 1 HIPAA Basics HIPAA: Health Insurance and Portability Accountability Act of 1996 Purpose: to protect confidential information through improved security and privacy

More information

AUTHORIZATION TO RELEASE HEALTH INFORMATION

AUTHORIZATION TO RELEASE HEALTH INFORMATION Request Completed Health Information Management AUTHORIZATION TO RELEASE HEALTH INFORMATION Completion of this form authorizes the use and/or disclosure (release) of individually identifiable health information,

More information

University of Wisconsin-Madison Policy and Procedure

University of Wisconsin-Madison Policy and Procedure Page 1 of 10 I. Policy The Health Information Technology for Economic and Clinical Health Act regulations ( HITECH ) amended the Health Information Portability and Accountability Act ( HIPAA ) to establish

More information

Completing & Submitted the IRB Approval of Human Subjects Form

Completing & Submitted the IRB Approval of Human Subjects Form Completing & Submitted the IRB Approval of Human Subjects Form All areas of the form should be completed. Once completed it must be submitted to the IRB by sending it to the EU IRB Chairperson. The following

More information

Attachment B Newtopia Wellness Program and Genetic Testing. The Health Risk Assessment also invites individuals to undergo genetic testing.

Attachment B Newtopia Wellness Program and Genetic Testing. The Health Risk Assessment also invites individuals to undergo genetic testing. Attachment B Newtopia Wellness Program and Genetic Testing The Newtopia health risk assessment asks about individuals health status, history, and risk factors, including family history of obesity. The

More information

IRBManager Quick Start Guide INITIAL APPLICATION - OVERVIEW

IRBManager Quick Start Guide INITIAL APPLICATION - OVERVIEW Page 1 of 16 GENERAL INFORMATION IRBManager Quick Start Guide INITIAL APPLICATION - OVERVIEW Initial Application Types: The IRBManager initial application form (xform) is available for specific types of

More information

HIPAA and Social Media and other PHI Safeguards. Presented by the UAMS HIPAA Office August 2016 William Dobbins

HIPAA and Social Media and other PHI Safeguards. Presented by the UAMS HIPAA Office August 2016 William Dobbins HIPAA and Social Media and other PHI Safeguards Presented by the UAMS HIPAA Office August 2016 William Dobbins Social Networking Let s Talk Facebook More than 1 billion users (TNW, 2014) Half of all adult

More information

ENCRYPTED . Copyright UT Health 1

ENCRYPTED  . Copyright UT Health 1 ENCRYPTED EMAIL The improper use or disclosure of sensitive information presents the risk of identity theft, invasion of privacy, and can cause harm and embarrassment to students, faculty, staff, patients,

More information

Privacy Preserving Data Mining: An approach to safely share and use sensible medical data

Privacy Preserving Data Mining: An approach to safely share and use sensible medical data Privacy Preserving Data Mining: An approach to safely share and use sensible medical data Gerhard Kranner, Viscovery Biomax Symposium, June 24 th, 2016, Munich www.viscovery.net Privacy protection vs knowledge

More information

Institutional Review Board. Application for Research Using Humans

Institutional Review Board. Application for Research Using Humans Institutional Review Board 4500 Riverwalk Parkway Riverside, CA 92515 IRB Research Application Phone 951.785.2099 Fax 951.785.2918 www.lasierra.edu/spa/human-subjects Institutional Review Board Application

More information

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By: HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Created By: Overview The purpose of this presentation is to emphasize the importance of security when using HMIS. Client information

More information

(Provide name and role/title as identified in the study protocol, (a backup data custodian is recommended but not required))

(Provide name and role/title as identified in the study protocol, (a backup data custodian is recommended but not required)) UHealth Research Data HSRO Security Assessment Version: 1.0 Study Number: Study Title: Date: Last Update/Review Date: Review Cycle: Annual Primary Data Custodian: (Provide name and role/title as identified

More information

OnCore Enterprise Research. Subject Administration Full Study

OnCore Enterprise Research. Subject Administration Full Study OnCore Enterprise Research Subject Administration Full Study Principal Investigator Clinical Research Coordinator June 2017 P a g e 1 This page is intentionally blank. P a g e 2 Table of Contents What

More information

Overview of Datavant's De-Identification and Linking Technology for Structured Data

Overview of Datavant's De-Identification and Linking Technology for Structured Data Overview of Datavant's De-Identification and Linking Technology for Structured Data Introduction Datavant is firmly committed to advancing healthcare through data analytics while protecting patients privacy.

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

Compliance & HIPAA Annual Education

Compliance & HIPAA Annual Education Compliance & HIPAA Annual Education 1 The purpose of this education is to UPDATE The purpose and of this education REFRESH is to UPDATE your and REFRESH understanding understanding of: of: Aultman s Compliance

More information

Best Practices. Contents. Meridian Technologies 5210 Belfort Rd, Suite 400 Jacksonville, FL Meridiantechnologies.net

Best Practices. Contents. Meridian Technologies 5210 Belfort Rd, Suite 400 Jacksonville, FL Meridiantechnologies.net Meridian Technologies 5210 Belfort Rd, Suite 400 Jacksonville, FL 32257 Meridiantechnologies.net Contents Overview... 2 A Word on Data Profiling... 2 Extract... 2 De- Identification... 3 PHI... 3 Subsets...

More information

If this is your first time submitting a protocol for review, see FAQs for information to consider beforehand.

If this is your first time submitting a protocol for review, see FAQs for information to consider beforehand. IRB CHART REVIEW System Requirements: FORM If using Windows, use Internet Explorer (IE) or Firefox as your browser. If using Macintosh, use Safari or Firefox as your browser. Your browser must be configured

More information

Domestic Violence Client Intake Form

Domestic Violence Client Intake Form Domestic Violence Client Intake Form Date: Client ID: Client Name: DOB: Petitioner s Place of Birth Race Address: City State Zip Tel. No. Alt. No. Name/Relation of Contact Person Does the person who you

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions What is FollowMyHealth? FollowMyHealth offers you personalized and secure online access to important information in your electronic medical record. FollowMyHealth is available

More information

Vision Services Application Overview

Vision Services Application Overview The Georgia Lions Lighthouse is a 501(c)3 nonprofit. Our mission is to provide vision and hearing services through education, detection, prevention, and treatment. The services we provide are made possible

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities

More information

Admission Application: Intensive Residential Rehabilitation / Community Residence / Supportive Living COVER PAGE

Admission Application: Intensive Residential Rehabilitation / Community Residence / Supportive Living COVER PAGE COVER PAGE Please check which level of care to which the applicant is applying. Complete referral packages* should be faxed to (716) 362-0221 or scanned and emailed to intake@cazenoviarecovery.org. Thank

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES NOTICE OF PRIVACY PRACTICES Chmura Orthodontics ( Practice ) understands the important of keeping your personal information private. Personal information includes: your name, postal address, e-mail address,

More information

Provider Portal User Guide. For the Provider Portal External Use

Provider Portal User Guide. For the Provider Portal External Use Provider Portal User Guide For the Provider Portal External Use IT Department Issued January 2017 mynexus 2017. All rights reserved. Version 1.4 Revised 07122017 Contents Getting Started with the Portal...

More information

Office of Human Research

Office of Human Research Office of Human Research JeffTrial End-User Training Document Regulatory Coordinator Training for Non-Oncology personnel Office of Human Research 8/16/2013 Ver. 1.0 Contents The REG Role: Completing Basic

More information

TIES Usage Policies. for University of Pittsburgh. Authors. University of Pittsburgh

TIES Usage Policies. for University of Pittsburgh. Authors. University of Pittsburgh TIES Usage Policies for University of Pittsburgh Authors University of Pittsburgh Girish Chavan, MS Elizabeth Legowski, BS Rebecca Crowley Jacobson, MD, MS Table of Contents A. DOCUMENT HISTORY... A-1

More information

University of North Florida

University of North Florida Last edited by: Kayla Champaigne Last edited on: December 5, 2012 University of North Florida Institutional Review Board IRB Protocol Please note, this is a sample of the North Florida - IRB Protocol output.

More information

RelayHealth Legal Notices

RelayHealth Legal Notices Page 1 of 7 RelayHealth Legal Notices PRIVACY POLICY Revised August 2010 This policy only applies to those RelayHealth services for which you also must accept RelayHealth s Terms of Use. RelayHealth respects

More information

(10/17) PATIENT GUIDE

(10/17) PATIENT GUIDE (10/17) PATIENT GUIDE Welcome to Parkview MyChart! mychart.parkview.com Welcome to your one story of care. As a patient of Parkview, you now have access to your health information from the convenience

More information

Admission, Discharge, Update Client Data and Associated Forms

Admission, Discharge, Update Client Data and Associated Forms Admission, Discharge, Update Client Data and Associated Forms Table of Contents Introduction... 2 When to Update Client Data... 2 Admission Form... 2 Discharge Form...10 Update Client Data Form...11 CSI

More information

ProviderConnect Registered Services Autism Service Provider User Manual ASD Behavioral Assessment, Treatment Plan and Program Book Development

ProviderConnect Registered Services Autism Service Provider User Manual ASD Behavioral Assessment, Treatment Plan and Program Book Development ProviderConnect Registered Services Autism Service Provider User Manual ASD Behavioral Assessment, Treatment Plan and Program Book Development Created 9/1/17 Table of Contents Introduction... 3 Accessing

More information

Cite: CTSA NIH Grant UL1- RR024982

Cite: CTSA NIH Grant UL1- RR024982 PREREQUISITE FOR USE Review and approval of the project by the Institutional Review Board is required If colleting data for the purpose of human subject s research. Cite: CTSA NIH Grant UL1- RR024982 1

More information

IRBManager Quick Start Guide AMENDMENT SUBMISSION - CHANGE IN PERSONNEL

IRBManager Quick Start Guide AMENDMENT SUBMISSION - CHANGE IN PERSONNEL Page 1 of 12 IRBManager Quick Start Guide AMENDMENT SUBMISSION - CHANGE IN PERSONNEL NOTE: This Quick Start Guide provides instructions for removing and/or adding personnel, other than the Principal Investigator,

More information

Data Governance & Classification Policy A Data Classification and Data Types

Data Governance & Classification Policy A Data Classification and Data Types Data Governance & Classification Policy 9.1.1.A Data Classification and Data Types Data Classification and Data Types The university utilizes various data types. Data types with similar levels of risk

More information

USER GUIDE. TABLE OF CONTENTS What is My Westmed? Registering for My Westmed

USER GUIDE. TABLE OF CONTENTS What is My Westmed? Registering for My Westmed USER GUIDE TABLE OF CONTENTS What is My Westmed? Registering for My Westmed Adult Patient 8+ Family Access for Adult Patient 8+ Family Access for Pediatric Adolescent Patient -7 Family Access for a Child

More information

Companion Guide Benefit Enrollment and Maintenance 834

Companion Guide Benefit Enrollment and Maintenance 834 Companion Guide Benefit Enrollment and Maintenance 834 Private Exchanges X12N 834 (Version 5010) X12N 834 (Version 5010)Healthcare Services Review Benefit Enrollment and Maintenance Implementation Guide

More information

CYBER Overview. Updated 10/3/17 #00895

CYBER Overview. Updated 10/3/17 #00895 CYBER Overview Updated 10/3/17 #00895 What does CYBER stand for? Children and Youth Behavioral Health Electronic Record 2 What is CYBER? A fully functional Electronic Medical Records system, that is a

More information

Patient Portal Enrollment Guide

Patient Portal Enrollment Guide Hanover Hospital MyHealthPortal Patient Portal Enrollment Guide www.hhmyhealthportalenroll.com WELCOME TO HANOVER HOSPITAL S PATIENT PORTAL. This online tool gives you the flexibility to access your health

More information

ecare Vault, Inc. Privacy Policy

ecare Vault, Inc. Privacy Policy ecare Vault, Inc. Privacy Policy This document was last updated on May 18, 2017. ecare Vault, Inc. owns and operates the website www.ecarevault.com ( the Site ). ecare Vault also develops, operates and

More information

SFDPH Annual Privacy and Data Security Training Module

SFDPH Annual Privacy and Data Security Training Module SFDPH Annual Privacy and Data Security Training Module FY2017-2018 Office of Compliance and Privacy Affairs (OCPA) 1 Objectives By the end of this course you will demonstrate: 1. How HIPAA privacy rules

More information

Physician Office Name Ambulatory EHR Security Risk Analysis

Physician Office Name Ambulatory EHR Security Risk Analysis Process is in place to verify access granted is appropriate (ie: Role Based access indicates that the biller has access to billing screens and the nurse has access to the patient medical information).

More information

Family Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD

Family Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD Family Medicine Residents HIPAA Highlights May 2016 Heather Schmiegelow, JD The UAMS HIPAA Office Heather Schmiegelow, UAMS HIPAA Privacy Officer Stephen Cochran, UAMS Security Officer Sara Thompson, HIPAA

More information

CYBER Overview Training for New Providers in the New Jersey Children s System of Care

CYBER Overview Training for New Providers in the New Jersey Children s System of Care CYBER Overview Training for New Providers in the New Jersey Children s System of Care Updated 6/4/2018 #01043 What is CYBER? A fully functional Electronic Health Records system, that is a tool for providers

More information

Reviewers Guide on Clinical Trials

Reviewers Guide on Clinical Trials Reviewers Guide on Clinical Trials Office of Research Integrity & Compliance Version 2 Updated: June 26, 2017 This document is meant to help board members conduct reviews for Full Board: Clinical Trial

More information

Social Security Number Protection Policy.

Social Security Number Protection Policy. Privacy HIPAA Notice of Privacy Practices. Website Privacy Policy. Social Security Number Protection Policy. HIPAA Notice of Privacy Practices: To read more about our privacy practices regarding health

More information

Detention/Hold Have the parents been notified? Yes - No By Whom Time: Officer/s Involved: Reason(s) for placement/offense: Person transporting:

Detention/Hold Have the parents been notified? Yes - No By Whom Time: Officer/s Involved: Reason(s) for placement/offense: Person transporting: Admission Form Date: PORT Group Homes Name: Last First Middle Date of birth Social Security number Admitted by order of : of on (Social Worker, Probation Officer, Judge) (County) (Date) Picture Taken:

More information

Student Confirmation Packet

Student Confirmation Packet Congratulations on being picked as an international finalist! To confirm your plans to participate in the Certiport Worldwide Competition on Microsoft Office, please complete this packet (typed) and fax

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

Privacy and Security for the Medical Student. HIPAA Compliance Audit and Compliance Services Mount Sinai Health System

Privacy and Security for the Medical Student. HIPAA Compliance Audit and Compliance Services Mount Sinai Health System Privacy and Security for the Medical Student HIPAA Compliance Audit and Compliance Services Mount Sinai Health System Table of Contents 1. Confidential and Protected Information 2. Access, Use, Disclosure

More information

Privacy Shield Policy

Privacy Shield Policy Privacy Shield Policy Catalyst Repository Systems, Inc. (Catalyst) has adopted this Privacy Shield Policy ("Policy") to establish and maintain an adequate level of Personal Data privacy protection. This

More information

When your registration has been completed, you will receive an invitation to create your account.

When your registration has been completed, you will receive an  invitation to create your account. Contact: Phone: 307.578.2784 Email: portal@wphcody.org What is the West Park Hospital Patient Portal? The West Park Hospital Patient Portal is a convenient and secure health-management tool you can use

More information

GUADALUPE ENT, P.A. JENNIFER G. HENNESSEE, M.D. MAANSI DOSHI, D.O. LISA M. WRIGHT, PA

GUADALUPE ENT, P.A. JENNIFER G. HENNESSEE, M.D. MAANSI DOSHI, D.O. LISA M. WRIGHT, PA GUADALUPE ENT, P.A. JENNIFER G. HENNESSEE, M.D. MAANSI DOSHI, D.O. LISA M. WRIGHT, PA Patient Profile Last Name First Name Middle Name of Birth Gender Social Security Number Marital Status Email Race Ethnic

More information

General Social Survey (GSS) NORC

General Social Survey (GSS) NORC General Social Survey (GSS) NORC OBTAINING GSS SENSITIVE DATA FILES The GSS geographic identification code files are made available to researchers under special contract with NORC. The GSS takes its promise

More information

University Hospitals UH Personal Health Record User Guide

University Hospitals UH Personal Health Record User Guide This guide will help you learn how to use the University Hospitals Personal Health Record, including requesting appointments, viewing health information, sending secure messages and more. What is the?...

More information

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy & Security Training HIPAA The Health Insurance Portability and Accountability Act of 1996 AMTA confidentiality requirements AMTA Professional Competencies 20. Documentation 20.7 Demonstrate

More information

Informational Guide for the NewSTEPs Data Repository

Informational Guide for the NewSTEPs Data Repository Informational Guide for the NewSTEPs Data Repository Document Contents What is the NewSTEPs Data Repository... 2 What data is being collected?... 2 Why is this data being collected?... 2 How did NewSTEPs

More information

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. HIPAA GENERAL RULE PHI may not be disclosed without patient authorization

More information

Helpful Hints: Request an Initial Authorization

Helpful Hints: Request an Initial Authorization Helpful Hints: Request an Initial Authorization Select Location Select Location Window Patient Selection Referral Source Type Patient Last Name Patient First Name Patient DOB Insurance Name Subscriber

More information

Spectrum Wellness Privacy Statement

Spectrum Wellness Privacy Statement Spectrum Wellness Privacy Statement This policy sets out the basis on which any personal data we collect from you, or that you provide to us, will be processed by us. Please read the following carefully

More information

Mobile security: Tips and tricks for securing your iphone, Android and other mobile devices

Mobile security: Tips and tricks for securing your iphone, Android and other mobile devices Mobile security: Tips and tricks for securing your iphone, Android and other mobile devices Presented by Michael Harris [MS, CISSP, WAPT] Systems Security Analyst University of Missouri Overview What data

More information

Therapy Provider Portal. User Guide

Therapy Provider Portal. User Guide Therapy Provider Portal User Guide Page 2 of 16 UCare User Guide V1.7 Table of Contents I. Introduction...3 About HSM Therapy Management... 4 Terms of Use... 4 Contact Information... 6 II. Using the Therapy

More information

ANY INTERNET azcu2.atsusers.com The system works best with Internet Explorer or Firefox. azcu2.atsusers.com DO NOT azcu2.atsusers.

ANY INTERNET azcu2.atsusers.com The system works best with Internet Explorer or Firefox. azcu2.atsusers.com DO NOT azcu2.atsusers. I. Introduction a. This system is what we use at ACU to collect and secure important medical and emergency contact information on our student-athletes. We utilize this system to keep track of emergency

More information

Patient Registration

Patient Registration Patient Registration Adding a Patient Adding a new patient through SequelMed can be accomplished through just a few steps: Defining the Patient Attaching a Plan (optional) Attaching Documents (optional)

More information

Subject Area Data Element Examples Earliest Date Patient Demographics Race, primary language, mortality 2000 Encounters

Subject Area Data Element Examples Earliest Date Patient Demographics Race, primary language, mortality 2000 Encounters User Guide DataDirect is a self-service tool enabling access to robust, up-to-date data on more than 3 million unique patients from across the UMHS enterprise. This data informs study design and guides

More information

Privacy by Design: Product Development Guidelines for Engineers & Product Managers. Purpose:

Privacy by Design: Product Development Guidelines for Engineers & Product Managers. Purpose: Privacy by Design: Product Development Guidelines for Engineers & Product Managers Purpose: The purpose of this document is to provide our development teams with high level principles and concepts relating

More information

Provider Secure Portal User Manual

Provider Secure Portal User Manual Provider Secure Portal User Manual Copyright 2011 Centene Corporation. All rights reserved. Operational Training 2 August 2011 Table of Contents Provider Secure Portal... 5 Registration... 6 Provider -

More information

Information Classification & Protection Policy

Information Classification & Protection Policy University of Scranton Information Technology Policy Information Classification & Protection Policy Executive Sponsor: AVP Information Resources Responsible Office: Information Security Originally Issued:

More information

Banner Health Information Security and Privacy Training Team. Morgan Raimo Paul Lockwood

Banner Health Information Security and Privacy Training Team. Morgan Raimo Paul Lockwood Banner Health Information Security and Privacy Training Team Morgan Raimo Paul Lockwood PHI Storage InfoGraphics PHI Data Storage and Sharing Cybersecurity and Privacy Training and Awareness Table of Contents

More information

GROUP ASSURANCE EDUCATION GUARDIAN BENEFITS CLAIM FORM

GROUP ASSURANCE EDUCATION GUARDIAN BENEFITS CLAIM FORM GROUP ASSURANCE EDUCATION GUARDIAN BENEFITS CLAIM FORM GUIDELINES FOR COMPLETION OF THIS FORM The following guidelines will help Old Mutual Group Assurance to process your claim quickly and accurately:

More information

Mobile Application Privacy Policy

Mobile Application Privacy Policy Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered

More information

HIPAA & RESEARCH DATA SECURITY FOR BU RESEARCHERS CHARLES RIVER CAMPUS. November 14, 2017

HIPAA & RESEARCH DATA SECURITY FOR BU RESEARCHERS CHARLES RIVER CAMPUS. November 14, 2017 HIPAA & RESEARCH DATA SECURITY FOR BU RESEARCHERS CHARLES RIVER CAMPUS November 14, 2017 This Training Will Cover- How HIPAA impacts human subject research What researchers need to do to protect health

More information

Covisint DocSite Enterprise

Covisint DocSite Enterprise Covisint DocSite Enterprise June 2013 Site Administrator User Guide Covisint DocSite Enterprise Site Administrator Guide Compuware-Covisint All rights reserved 2013 SiteAdminGuideDocSite-2013.5-061113

More information

PRIVACY STATEMENT. Effective Date 11/01/17.

PRIVACY STATEMENT. Effective Date 11/01/17. PRIVACY STATEMENT Effective Date 11/01/17. PREMIER Bankcard, LLC. [hereinafter referred to as our, us, or we ] is committed to advising you of the right to your privacy, and strives to provide a safe and

More information

DHCS PPSDS. End User Guide. Applies to: California DHCS. WITS Version 18.0+

DHCS PPSDS. End User Guide. Applies to: California DHCS. WITS Version 18.0+ DHCS PPSDS End User Guide Applies to: WITS Version 18.0+ California DHCS Last Updated September 22, 2017 Preface California DHCS DHCS PPSDS Prevention WITS is a web-based application specifically designed

More information

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Marissa Gordon-Nguyen Office for Civil Rights (OCR) U.S. Department of Health and Human Services June

More information

Introduction to. Sponsored by the Pediatric Research Office (PRO)

Introduction to. Sponsored by the Pediatric Research Office (PRO) Introduction to Sponsored by the Pediatric Research Office (PRO) Agenda Overview of REDCap Basic project work flow Creating a project with REDCap Interactive demonstration Questions and Answers Overview

More information

ICD-10 Compliance Project November 2013 update

ICD-10 Compliance Project November 2013 update ICD-10 Compliance Project November 2013 update Presented by Hewlett-Packard Development Corporation, LP 1 November 2013 Topics ICD-10 news ICD-10 CMS news ICD-10 forms update ICD-10 APR-DRG update ICD-10

More information

EHR Connectivity Integration Specification

EHR Connectivity Integration Specification EHR Connectivity Integration Specification HeC Contact information Name Phone Email Title/Role Jeremy Smith (315) 671 2241 x320 jsmith@healtheconnections.org Manager, HIE Integration OVERVIEW This document

More information

Maryland Health Care Commission

Maryland Health Care Commission Special Review Maryland Health Care Commission Security Monitoring of Patient Information Maintained by the State-Designated Health Information Exchange September 2017 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT

More information

Applying E-Consent to Studies. Presenters: Haemar Kin, MHA, Melissa Scotti, PhD, Lara Lechtenberg, MPH

Applying E-Consent to Studies. Presenters: Haemar Kin, MHA, Melissa Scotti, PhD, Lara Lechtenberg, MPH Applying E-Consent to Studies Presenters: Haemar Kin, MHA, Melissa Scotti, PhD, Lara Lechtenberg, MPH 1 CME Disclosure Statement Northwell Health adheres to the ACCME s new Standards for Commercial Support.

More information

Use MyThedaCare to Schedule Your Appointment. Easy, Convenient 24/7 access!

Use MyThedaCare to Schedule Your Appointment. Easy, Convenient 24/7 access! Use MyThedaCare to Schedule Your Appointment. Easy, Convenient 24/7 access! If you already have an active mythedacare account, simply go to: www.mythedacare.org and follow the instructions below to schedule

More information

Edition. MONTEREY COUNTY BEHAVIORAL HEALTH MD User Guide

Edition. MONTEREY COUNTY BEHAVIORAL HEALTH MD User Guide Edition 1 MONTEREY COUNTY BEHAVIORAL HEALTH MD User Guide i Table of Content OderConnect/InfoScriber Registration CH1 Pg.2 Sign In to MyAvatar CH2..Pg.10 Sync OrderConnect Password CH3.Pg.14 Client Look

More information

Fannin County High School 360 Rebel Circle, Blue Ridge, Georgia Phone (706) Fax (706)

Fannin County High School 360 Rebel Circle, Blue Ridge, Georgia Phone (706) Fax (706) Fannin County High School 360 Rebel Circle, Blue Ridge, Georgia 30513 Phone (706) 632-2081 Fax (706) 632-6908 www.fchs.fannin.k12.ga.us DARREN DANNER Assistant Principal Administration PATRICIA DuBOIS

More information

HARMONY HAUS SOBER LIVING MEMBER APPLICATION HARMONY HAUS, LLC.

HARMONY HAUS SOBER LIVING MEMBER APPLICATION HARMONY HAUS, LLC. HARMONY HAUS SOBER LIVING MEMBER APPLICATION HARMONY HAUS, LLC. BACKGROUND CHECK INFORMATION FULL NAME: NICKNAME OR ALIAS: PHONE: EMAIL: MARITAL STATUS: DATE OF BIRTH: DL/ID# EXPIRATION DATE STATE ISSUED

More information

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute Health Law Institute Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More Brooke Bennett Aziere October 18, 2017 Agenda Enforcement Trends Phase 2 HIPAA Audits Upcoming Initiatives 1 Enforcement

More information

icare s Provider Portal Guide

icare s Provider Portal Guide icare s Provider Portal Guide 2 CONTENTS New Provider Registration... 4 New Registration...5 Login Page 9 Sign In 9 Forget Your Password...10 Provider Home Page 12 Track Request 12 Contact Us.. 14 Provider

More information

If you have any questions or concerns about this Privacy Policy, please Contact Us.

If you have any questions or concerns about this Privacy Policy, please Contact Us. Illuminate Education Your Privacy Rights Are Important To Us The privacy of students and their parents and guardians is important to Illuminate Education, Inc. ( Illuminate ) and the teachers, administrators,

More information