Privacy and Security Basics for CDSME Data Collection. Updated October 2016

Size: px
Start display at page:

Download "Privacy and Security Basics for CDSME Data Collection. Updated October 2016"

Transcription

1 Privacy and Security Basics for CDSME Data Collection Updated October 2016

2 Overview Purpose of the Privacy Act Primary features of the Act Who needs privacy training? Master trainers and lay leaders Program coordinators and data collection/data entry personnel Types of information protected by the Act Disclosure Safeguarding, transporting and disposing of PII Roles and responsibilities Test questions 2

3 Privacy Act of 1974 Protects records that can be retrieved by personal identifiers such as a name, social security number, or other identifying number or symbol. Created in response to concerns about how the use of computerized databases might impact individuals' privacy rights. Requires government agencies to show individuals any records kept on them Requires agencies to follow "fair information practices" when gathering and handling personal data. Places restrictions on how agencies can share an individual's data with other people and agencies. Lets individuals sue the government for violating of these provisions 3

4 Who Needs To Be Trained? If your work involves the management of sensitive information, Personally Identifiable Information (PII), or protected health information, you need to ensure you are taking precautions to protect it from unauthorized access/disclosure, theft, loss, and improper disposal. 4

5 Who Needs To Be Trained? Anyone involved in the collection, handling and/or data entry of PII on individuals participating in CDSME, including: Managers Coordinators Other employees Master trainers (MTs) Lay leaders (LLs) Volunteers 5

6 What Type of Training is Needed? Training for program coordinators and program implementers The rights of individuals participating in CDSME The appropriate protection of PII shared by CDSME participants at the workshop level The appropriate storage and transfer of participant forms Training for individuals completing data entry and data transfer The appropriate protection of PII shared by CDSME participants at the workshop level The appropriate storage, transfer, and destruction of data forms Security requirements for electronic data transfer, storing, and degaussing (destruction) 6

7 Types of Information Covered by the Privacy Act Sensitive: If the loss of confidentiality, integrity, or availability could be expected to have a serious, severe, or catastrophic adverse effect on organizational operations, organizational assets, or individuals. Protected Health Information: Individually identifiable health information that relates to a person s past/present/future physical/mental health, health care received, or payment. 7

8 Information Protected by the Privacy Act PERSONALLY IDENTIFIABLE INFORMATION (PII) "the term Personally Identifiable Information means any information about an individual maintained by an agency, including, but not limited to, education, financial transactions, medical history, and criminal or employment history and information which can be used to distinguish or trace an individual s identity, such as their name, social security number, date and place of birth, mother s maiden name, biometric records, etc., including any other personal information which is linked or linkable to an individual. 8

9 Information Protected by the Privacy Act Personally Identifiable Information (PII) Home address Home telephone number Complete date of birth Personal medical information Social Security Number (including just the last four digits of SSN) Personal/private information (if the information can uniquely identify the individual) Photographs Education records Financial transactions Employment history 9

10 Disclosure No agency or person shall disclose: any record by any means of communication to any person or another agency without a written request or prior written consent of the individual to whom the record pertains Any means of communication includes oral (phone, inperson), written, and electronic ( s, faxes, texts, tweets, pins, etc.) 10

11 Safeguarding PII Must always be treated as FOR OFFICIAL USE ONLY and must be marked accordingly Applies not only to paper records but also includes , faxes, etc., which must contain the cautionary marking FOR OFFICIAL USE ONLY FOUO Should be stored in locked filing cabinets or other secure containers to prevent unauthorized access Electronic records must be password protected and be transferred via encrypted 11

12 Transporting PII Hand carrying Use a cover sheet to shield contents Using mail Use manila or white envelopes Mark the envelope to the attention of the authorized recipient Never indicate on the outer envelope that it contains PII Using Password protect personal data placed on shared drives, the Internet, or the Intranet Use encrypted Do not send PII to a personal, home, or unencrypted address Announce in the opening line of the text (NOT the subject line) that FOUO information is contained 12

13 Disposing of PII A disposal method is considered adequate if it renders the information unrecognizable or beyond reconstruction. Disposal methods may include: Burning Melting Chemically decomposing Pulping Pulverizing Shredding Mutilating Degaussing (erasing from magnetic field or disc) Deleting/emptying recycle bin 13

14 Your Role and Responsibility Take privacy protection seriously Respect the privacy of others Ensure messages, faxes, and s that contain personal information are properly marked and is encrypted Don t share PII with individuals who are not authorized Have appropriate transfer, storage, and disposal protocols in place for PII Do not PII to personal, home, or unencrypted accounts Read the Group Leader Script to advise all participants of their right to consent or refuse use of data about them 14

15 Your Role and Responsibility All individuals involved in providing CDSME programs must sign Non-Disclosure Agreements All individuals involved in data collection, data transfer, and/or data entry must sign Non-Disclosure Agreements Non-Disclosure Agreements should be maintained for three years after the end of the grant and stored by the grantee or the grantee s designee for data collection/data entry Non-Disclosure Agreements do not contain PII, so they can be faxed, ed, or mailed without encryption or privacy restrictions 15

16 Master Trainer and Lay Leader Role Use the CDSME Program Group Leader Script at a Class Zero pre-session or at the start of Session 1 and with any new participants who start at Session 2 The script explains why participant data is being collected and how it will be kept secure Emphasize that completing the survey is voluntary Individuals may skip any questions they do not want to answer Individuals may choose to not complete the Survey, but they can still participate in the program Store surveys in sealed envelope and mail to the program coordinator 16

17 Program Coordinator/Data Entry Roles Store completed CDSME forms in a secure, locked cabinet when not in use Enter data into secure, password protected database such as the CDSME database Destroy participant data forms after data entry 17

18 Test Questions Circle all correct answers 1. Information about an individual that is unique, or identifies or describes him or her (such as Social Security Number, medical history, date of birth, home address), is called: a. Interesting b. Record c. Data d. Personally Identifiable Information 18

19 Test Questions Circle all correct answers 2. Disposal methods may include all except: a. Burning b. Shredding c. Tearing in half and putting in the garbage can d. Melting 19

20 Test Questions Circle all correct answers 3. The CDSME Group Leader Script: a. Describes what participants will learn in the workshop b. Requests participants to share their birth date, address, and sex c. Explains how participant privacy is protected and why data is being collected d. Emphasizes that participants are required to complete all survey forms 20

21 Test Answer Code 1. d - Personally Identifiable Information 2. c - Tearing in half and putting in the garbage can 3. c - Explains how participant privacy is protected and why data is being collected 21

22 Privacy and Security Basics Live Well, Virginia! for CDSME Data Collection Privacy and Security Basics: Implementation in Virginia Sue Lachenmayr, MPH, CHES

23 Local Training Who needs training? Master Trainers Workshop Leaders Data Collection/Data Entry Personnel Any staff or volunteers with access to PII 23

24 Local Training Staff member/volunteer views this PowerPoint Local Coordinator (LC) reviews forms and data collection procedures with each leader By telephone or in person Staff member/volunteer signs Non- Disclosure Agreement 24

25 Non-Disclosure Agreement Signed by staff/volunteers after training. Acknowledgement that participant information should not be shared with others and should be safeguarded appropriately. 25

26 Training Documentation LC retains Non-Disclosure Agreement signed by each trainee: 3 years after grant ends (End date: July 31, 2021). LC maintains list of staff and volunteers trained in Privacy and Security Basics and procedures. 26

27 Workshop Forms to Be Completed (See also CDSME Workshop Paperwork Flow document) Program Information Cover Sheet Attendance Log Participant Information Survey Stop and Go Cover Sheet Everyone with Diabetes Counts Medical Release Form EDC BEFORE Survey EDC AFTER Survey Virginia CDSME Satisfaction Survey 27

28 Attendance Log Local coordinator provides list of registrants on Attendance Log, using first name and last initial only. If duplicate names (e.g. Barbara T.), use middle initial or differentiate names in another manner. Leaders update log at Sessions One and Two and keep attendance at each session. Attendance Log goes to LC after Session 6. LC adds Participant IDs (from Participant Information Forms) on Attendance Log. 28

29 Program Information Cover Sheet LC completes form before the workshop and provides to leaders with other materials. LC makes 2 extra copies of Page 1 to leaders to mail with completed forms after Sessions One and Two. After Session Six pages 1 and 2 go to LC with packet of completed forms. 29

30 Key Points: CDSME Group Leader Script Is read to the group at the Session 0 or 1 or any participants arriving at Session 2. Tells participants that completing the forms is optional and not required for participation in workshop Participants can decide not to complete any or all parts of survey. Workshop leaders should not push one way or the other. 30

31 Data Collection Procedures (See also CDSME Workshop Paperwork Flow document) At Session One, the Leaders: Start keeping attendance on Attendance Log Read CDSME Program Leader Script to group Distribute and collect: Stop and Go Cover Sheet Participant Information Survey Everyone with Diabetes Counts (EDC) Medical Release Form EDC BEFORE Survey 31

32 Data Collection Procedures After Session 1, Leaders Give or mail one copy of Page 1, Program Information Cover Sheet and completed participant forms to Local Coordinator (LC) at the end of the session. At Session 2, Leaders Repeat these procedures with new participants and mail the forms to the LC. 32

33 Data Collection Procedures At Session 6, Leaders distribute and collect: EDC AFTER Survey CDSME Satisfaction Survey EDC Medical Release Form (offer to any who had not completed previously) 33

34 Data Collection Procedures After Session 6, Leaders hand or mail the following completed forms to LC: Program Information Form Attendance Log EDC AFTER Survey Any additional EDC Medical Releases CDSME Satisfaction Survey 34

35 Data Collection Procedures Local Coordinator Collects forms from Leaders in person or via mail Keeps forms in locked cabinet Enters relevant data in NCOA database (Note: Remember to enter response to Question 1 on Virginia CDSME Satisfaction Survey) Mails complete packets to HQI Health Quality Innovators Attn: Venisha Lambert or Erica Morrison 9830 Mayland Dr., Suite J Richmond, VA Destroys forms after confirmation of NCOA data entry and receipt by HQI. 35

36 Privacy and Security Basics: Implementation in Virginia Questions? Contact April Holmes Coordinator of Prevention Programs Department for Aging and Rehabilitative Services (DARS)

Course Objectives Identifying Personally Identifiable Information (PII) Safeguarding Procedures of PII Reporting PII Breaches Proper disposal of PII

Course Objectives Identifying Personally Identifiable Information (PII) Safeguarding Procedures of PII Reporting PII Breaches Proper disposal of PII Course Objectives Identifying Personally Identifiable Information (PII) Safeguarding Procedures of PII Reporting PII Breaches Proper disposal of PII References Privacy Act of 1974 DA PAM 25-51, Army Privacy

More information

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors

Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program

More information

National CDSME Resource Center

National CDSME Resource Center National CDSME Resource Center Administration for Community Living New CDSME Data Collection Forms, Processes, and System Upgrades November 14, 2016 1 Speakers Kristie Kulinski, MSW Office of Nutrition

More information

Breaches and Remediation

Breaches and Remediation Breaches and Remediation Ramona Oliver US Department of Labor Personally Identifiable Information Personally Identifiable Information (PII): Any information about an individual maintained by an agency,

More information

Media Protection Program

Media Protection Program Media Protection Program Version 1.0 November 2017 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 PROGRAM DETAILS 4 3.2 MEDIA STORAGE AND ACCESS 4 3.3 MEDIA TRANSPORT

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

What is a Breach? 8/28/2017

What is a Breach? 8/28/2017 Michael E. Reheuser US Department of Defense 1 What is a Breach? The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or any similar term referring to

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

PII SPOT CHECK DOCUMENTATION

PII SPOT CHECK DOCUMENTATION Page 1 of 10 PII SPOT CHECK DOCUMENTATION This checklist is an internal document and is to be used by command leadership to assess the level of compliance in the handling of Personally Identifiable Information

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Mile Privacy Policy. Ticket payment platform with Blockchain. Airline mileage system utilizing Ethereum platform. Mileico.com

Mile Privacy Policy. Ticket payment platform with Blockchain. Airline mileage system utilizing Ethereum platform. Mileico.com Mile Privacy Policy Ticket payment platform with Blockchain Version 1.1 Feb 2018 [ Mile ] www.mileico.com Airline mileage system utilizing Ethereum platform Chapter 1 General Provisions Article_1 (Basic

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

A full list of SaltWire Network Inc. publications is available by visiting saltwire.com.

A full list of SaltWire Network Inc. publications is available by visiting saltwire.com. Introduction Effective January 1, 2004, private sector organizations must follow a code for the protection of personal information in accordance with the Personal Information Protection and Electronic

More information

Let s get started with the module Ensuring the Security of your Clients Data.

Let s get started with the module Ensuring the Security of your Clients Data. Welcome to Data Academy. Data Academy is a series of online training modules to help Ryan White Grantees be more proficient in collecting, storing, and sharing their data. Let s get started with the module

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy & Security Training HIPAA The Health Insurance Portability and Accountability Act of 1996 AMTA confidentiality requirements AMTA Professional Competencies 20. Documentation 20.7 Demonstrate

More information

What information is collected from you and how it is used

What information is collected from you and how it is used Richmond Road Runners Club PRIVACY POLICY Board Approved: 10/11/2017 Our Commitment to Privacy Richmond Road Runners Club (RRRC) is the sole owner of the information collected on its sites and through

More information

Data Compromise Notice Procedure Summary and Guide

Data Compromise Notice Procedure Summary and Guide Data Compromise Notice Procedure Summary and Guide Various federal and state laws require notification of the breach of security or compromise of personally identifiable data. No single federal law or

More information

PRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a

PRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a PRIVACY 102 TRAINING FOR SUPERVISORS PRIVACY ACT OF 1974 5 U.S.C.552a PRIVACY TOOL BOX WEB SITE: WWW.PRIVACY.NAVY.MIL Lists all approved Navy and Marine Corps Privacy Act systems of records DOD systems

More information

GARAS Privacy Notice

GARAS Privacy Notice GARAS Privacy Notice At GARAS we are committed to treating everyone with respect which is why we take treating your data seriously. We committed to being clear about how we collect, use and store your

More information

PayThankYou LLC Privacy Policy

PayThankYou LLC Privacy Policy PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the

More information

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. Gramm Leach Bliley Act 15 U.S.C. 6801-6809 GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 11/30/2016 1 Objectives for GLBA Training GLBA Overview Safeguards Rule

More information

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016 HIPAA Faux Pas Lauren Gluck Physician s Computer Company User s Conference 2016 Goals of this course Overview of HIPAA and Protected Health Information Define HIPAA s Minimum Necessary Rule Properly de-identifying

More information

Building a Privacy Management Program

Building a Privacy Management Program Building a Privacy Management Program February 26, 2013 Office of the Information and Privacy Commissioner of Alberta Session Overview Reasons for having a PMP Strategies to deal with current and future

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

Breaches and Remediation

Breaches and Remediation Breaches and Remediation Ramona Oliver US Department of Labor Personally Identifiable Information Personally Identifiable Information (PII): Any information about an individual maintained by an agency,

More information

Data Protection Policy

Data Protection Policy Introduction In order to; provide education, training, assessment and qualifications to its customers and clients, promote its services, maintain its own accounts and records and support and manage its

More information

Freedom of Information and Protection of Privacy (FOIPOP)

Freedom of Information and Protection of Privacy (FOIPOP) Freedom of Information and Protection of Privacy (FOIPOP) No.: 6700 PR1 Policy Reference: 6700 Category: FOIPOP Department Responsible: Records Management and Privacy Current Approved Date: 2008 Sep 30

More information

RE: AVA s NEW PRIVACY POLICY AND PROCEDURES ON THE COLLECTION OF PERSONAL INFORMATION

RE: AVA s NEW PRIVACY POLICY AND PROCEDURES ON THE COLLECTION OF PERSONAL INFORMATION American Volkssport Association 1001 Pat Booker Road, Suite 101 Universal City, Texas 78148 AVA: America s Walking Club DATE: May 13, 2017 TO: All AVA Club Officers RE: AVA s NEW PRIVACY POLICY AND PROCEDURES

More information

2017_Privacy and Information Security_English_Content

2017_Privacy and Information Security_English_Content 2017_Privacy and Information Security_English_Content 2.3 Staff includes all permanent or temporary, full-time, part-time, casual or contract employees, trainees and volunteers, including but not limited

More information

Privacy Roots: SORNs and PIAs. Systems of Records Notices TIMOTHY H. GRAHAM U.S. DEPARTMENT OF VETERANS AFFAIRS VETERANS HEALTH ADMINISTRATION

Privacy Roots: SORNs and PIAs. Systems of Records Notices TIMOTHY H. GRAHAM U.S. DEPARTMENT OF VETERANS AFFAIRS VETERANS HEALTH ADMINISTRATION Privacy Roots: SORNs and PIAs Systems of Records Notices TIMOTHY H. GRAHAM U.S. DEPARTMENT OF VETERANS AFFAIRS VETERANS HEALTH ADMINISTRATION Policy Objectives of the Privacy Act To restrict disclosureof

More information

2. What is Personal Information and Non-Personally Identifiable Information?

2. What is Personal Information and Non-Personally Identifiable Information? Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location

More information

Data Privacy Breach Policy and Procedure

Data Privacy Breach Policy and Procedure Data Privacy Breach Policy and Procedure Document Information Last revision date: April 16, 2018 Adopted date: Next review: January 1 Annually Overview A privacy breach is an action that results in an

More information

Castle View Primary School Data Protection Policy

Castle View Primary School Data Protection Policy Castle View Primary School Data Protection Policy Aims The Headteacher and Governors of the school intend to comply fully with the requirements and principles of the Data Protection Act 1998. All staff

More information

HIPAA UPDATE. Michael L. Brody, DPM

HIPAA UPDATE. Michael L. Brody, DPM HIPAA UPDATE Michael L. Brody, DPM Objectives: How to respond to a patient s request for a copy of their records. Understand your responsibilities after you send information out to another doctor, hospital

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

PRIVACY POLICY VANTAGE HOMES

PRIVACY POLICY VANTAGE HOMES State of Colorado PRIVACY POLICY VANTAGE HOMES Rev. 133C579 Version Date: April 01, 2017 GENERAL Vantage Homes LLC ( Company or we or us or our ) respects the privacy of its users ( user or you ) that

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Introduction WIT Diverse Campus Services Limited (herein after referred to as DCS) and/or its associated companies ( us or we ) have created this privacy statement to demonstrate

More information

Privacy Breach Policy

Privacy Breach Policy 1. PURPOSE 1.1 The purpose of this policy is to guide NB-IRDT employees and approved users on how to proceed in the event of a privacy breach, and to demonstrate to stakeholders that a systematic procedure

More information

This policy also applies to personal information about you that the Federation collects from any other third party.

This policy also applies to personal information about you that the Federation collects from any other third party. ANMF Policy Privacy The Australian Nursing and Midwifery Federation (the Federation) is an organisation of employees (ie a trade union) registered under Commonwealth industrial laws. The Federation is

More information

Users Guide. Prepared by COAW, the Consortium for Older Adult Wellness 2015, 2016, 2017 Updated 6/30/17

Users Guide. Prepared by COAW, the Consortium for Older Adult Wellness 2015, 2016, 2017 Updated 6/30/17 Users Guide Prepared by COAW, the Consortium for Older Adult Wellness 2015, 2016, 2017 Updated 6/30/17 Workshop Wizard Users Guide Table of Contents 1.0 Login: Logging on the Website... 4 2.0 My Workshops...

More information

UWTSD Group Data Protection Policy

UWTSD Group Data Protection Policy UWTSD Group Data Protection Policy Contents Clause Page 1. Policy statement... 1 2. About this policy... 1 3. Definition of data protection terms... 1 4. Data protection principles..3 5. Fair and lawful

More information

PTLGateway Data Breach Policy

PTLGateway Data Breach Policy 1 PTLGateway Data Breach Policy Last Updated Date: 02 March 2018 Data Breach Policy This page informs you of our policy which is to establish the goals and the vision for the breach response process. This

More information

Regulation P & GLBA Training

Regulation P & GLBA Training Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed

More information

The British Museum. Data Protection Code of Practise. 1 Introduction

The British Museum. Data Protection Code of Practise. 1 Introduction The Data Protection Code of Practice 1 Introduction 1.1 The 1998 Data Protection Act is aimed at ensuring a balance between individuals rights to privacy and the lawful processing of personal data undertaken

More information

Cyberspace : Privacy and Security Issues

Cyberspace : Privacy and Security Issues Cyberspace : Privacy and Security Issues Chandan Mazumdar Professor, Dept. of Computer Sc. & Engg Coordinator, Centre for Distributed Computing Jadavpur University November 4, 2017 Agenda Cyberspace Privacy

More information

General Legal Requirements under the Act and Relevant Subsidiary Legislations. Personal data shall only be processed for purpose of the followings:

General Legal Requirements under the Act and Relevant Subsidiary Legislations. Personal data shall only be processed for purpose of the followings: General Legal Requirements regarding the Personal Data Protection ( PDP ) Principles under the PDP Act 2010 ( Act ) and the relevant Subsidiary Legislations PDP Principles General Principle Data users

More information

Information Classification & Protection Policy

Information Classification & Protection Policy University of Scranton Information Technology Policy Information Classification & Protection Policy Executive Sponsor: AVP Information Resources Responsible Office: Information Security Originally Issued:

More information

Privacy Policy Manhattan Neighborhood Network Policies 2017

Privacy Policy Manhattan Neighborhood Network Policies 2017 Privacy Policy Manhattan Neighborhood Network Policies 2017 Table of Contents Manhattan Neighborhood Network Policies 3 MNN s Privacy Policy 3 Information Collection, Use and Sharing 4 Your Access to and

More information

University of Mississippi Medical Center Data Use Agreement Protected Health Information

University of Mississippi Medical Center Data Use Agreement Protected Health Information Data Use Agreement Protected Health Information This Data Use Agreement ( DUA ) is effective on the day of, 20, ( Effective Date ) by and between (UMMC) ( Data Custodian ), and ( Recipient ), located at

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY 1 Your Data Protection Responsibilities DATA PROTECTION POLICY 1.1 Everyone has rights with regard to how their personal data is handled. Personal data is any information that a person can be identified

More information

Table of Contents. PCI Information Security Policy

Table of Contents. PCI Information Security Policy PCI Information Security Policy Policy Number: ECOMM-P-002 Effective Date: December, 14, 2016 Version Number: 1.0 Date Last Reviewed: December, 14, 2016 Classification: Business, Finance, and Technology

More information

ACTION: Notice of modification to existing systems of records. General and Customer Privacy Act Systems of Records. These modifications are

ACTION: Notice of modification to existing systems of records. General and Customer Privacy Act Systems of Records. These modifications are This document is scheduled to be published in the Federal Register on 09/13/2012 and available online at http://federalregister.gov/a/2012-22511, and on FDsys.gov 7710-12 POSTAL SERVICE Privacy Act of

More information

GUIDE FOR THE PREPARATION OF SANITIZED AND DERIVATIVE WORK PRODUCTS USING CHEMICAL-TERRORISM VULNERABILITY INFORMATION (CVI)

GUIDE FOR THE PREPARATION OF SANITIZED AND DERIVATIVE WORK PRODUCTS USING CHEMICAL-TERRORISM VULNERABILITY INFORMATION (CVI) GUIDE FOR THE PREPARATION OF SANITIZED AND DERIVATIVE WORK PRODUCTS USING CHEMICAL-TERRORISM VULNERABILITY INFORMATION (CVI) June 2007 CONTENTS Introduction... 1 Categories of CVI Work Products... 1 1.

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,

More information

Protecting Your Gear, Your Work & Cal Poly

Protecting Your Gear, Your Work & Cal Poly 9/20/2016 1 Protecting Your Gear, Your Work & Cal Poly Information Security Office Shar i f Shar i f i, CI SSP, CRISC Kyle Gustafson, Information Security Analyst Jon Vasquez, Information Security Analyst

More information

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Introduction: Welcome to Honesty and Confidentiality Lesson Three: The False Claims Act is an important part

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,

More information

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017 This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,

More information

Record Keeping Best Practice. Distinguish between University and Non-University Records

Record Keeping Best Practice. Distinguish between University and Non-University Records UNIVERSITY SECRETARIAT Gilmour Hall, Room 210 Phone: 905.525.9140, Ext. 24337 Board of Governors 1280 Main Street West Fax: 905.526.9884 Senate Hamilton, Ontario, Canada E-mail: univsec@mcmaster.ca L8S

More information

Barrie Baydogs Triathlon Club Inc (Baydogs) Privacy Policy

Barrie Baydogs Triathlon Club Inc (Baydogs) Privacy Policy Barrie Baydogs Triathlon Club Inc (Baydogs) Privacy Policy Purpose 1. Privacy of personal information is governed by the Personal Information Protection and Electronics Documents Act ( PIPEDA ). Baydogs

More information

PRIVACY STATEMENT. Effective Date 11/01/17.

PRIVACY STATEMENT. Effective Date 11/01/17. PRIVACY STATEMENT Effective Date 11/01/17. PREMIER Bankcard, LLC. [hereinafter referred to as our, us, or we ] is committed to advising you of the right to your privacy, and strives to provide a safe and

More information

Effective Date: November 26, A. Overview

Effective Date: November 26, A. Overview WEI Technology LLC ( WEI, we or us ) takes your privacy seriously. Please read this Privacy Policy, which describes the types of information we collect through www.lendingpad.com (the Website ), and how

More information

Handbook for Safeguarding Sensitive Personally Identifiable Information

Handbook for Safeguarding Sensitive Personally Identifiable Information Handbook for Safeguarding Sensitive Personally Identifiable Information At The Department of Homeland Security Updated 10-06-2011 Privacy Office U.S. Department of Homeland Security Washington, DC 20528

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

FOOT LOCKER PRIVACY POLICY

FOOT LOCKER PRIVACY POLICY Foot Locker Privacy Statement: ( Foot Locker ) is committed to upholding fundamental principles of privacy and security in our relationship with our in-store customers and visitors to our web site. Our

More information

Privacy Policy. 1. Information may collected by Feelingtouch

Privacy Policy. 1. Information may collected by Feelingtouch Privacy Policy When you use Feelingtouch game software or accept Feelingtouch game services, Feelingtouch may collect and use your relevant information. Feelingtouch promises to strictly protect your privacy.

More information

VFS GLOBAL PVT LTD PRIVACY DISCLAIMER

VFS GLOBAL PVT LTD PRIVACY DISCLAIMER VFS GLOBAL PVT LTD PRIVACY DISCLAIMER Version 1.0 Privacy Disclaimer Scope VFS GLOBAL (hereinafter referred to as VFS GLOBAL ) is an outsourced partner of Diplomatic Missions across globe, and is authorized

More information

Data subject ( Customer or Data subject ): individual to whom personal data relates.

Data subject ( Customer or Data subject ): individual to whom personal data relates. Privacy Policy 1. Information on the processing of personal data We hereby inform you in this document about the principles and procedures for processing your personal data and your rights, in accordance

More information

Ambition Training. Privacy Policy

Ambition Training. Privacy Policy Ambition Training Privacy Policy Privacy Protection Ambition Training is a Registered Training Organisation with responsibility for delivering vocational education and training. Ambition Training collects

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Keeping It Under Wraps: Personally Identifiable Information (PII)

Keeping It Under Wraps: Personally Identifiable Information (PII) Keeping It Under Wraps: Personally Identifiable Information (PII) Will Robinson Assistant Vice President Information Security Officer & Data Privacy Officer Federal Reserve Bank of Richmond March 14, 2018

More information

Protecting your privacy

Protecting your privacy Protecting your privacy What information we collect and why When and to whom we disclose your information Where to take concerns about privacy issues Protecting Your Privacy We re committed to protecting

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

HAGA CLICK AQUÍ PARA TRADUCCION AL ESPAÑOL DE LA POLÍTICA DE PRIVACIDAD

HAGA CLICK AQUÍ PARA TRADUCCION AL ESPAÑOL DE LA POLÍTICA DE PRIVACIDAD HAGA CLICK AQUÍ PARA TRADUCCION AL ESPAÑOL DE LA POLÍTICA DE PRIVACIDAD PURPOSE PRIVACY POLICY We respect your privacy and are committed to safeguarding your personally identifiable information or personal

More information

Red Flag Regulations

Red Flag Regulations Red Flag Regulations Identity Theft Put In Context Overview of Topics Red Flag Regulations Overview How UM Protects Information What is the Student Workers role in identity theft prevention? What s this

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

Records Management and Retention

Records Management and Retention Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors

More information

Information Privacy Statement

Information Privacy Statement Information Privacy Statement Commitment to Privacy The University of Florida values individuals' privacy and actively seeks to preserve the privacy rights of those who share information with us. Your

More information

Dynamic Church Planting International - Europe Privacy Policy

Dynamic Church Planting International - Europe Privacy Policy Dynamic Church Planting International - Europe Privacy Policy Table of Contents Dynamic Church Planting International - Europe Privacy Policy... 1 1. Background:... 1 2. Information About Us... 2 3. The

More information

Data Processing Agreement

Data Processing Agreement In accordance with the European Parliament- and Council s Directive (EU) 2016/679 of 27th April 2016 (hereinafter GDPR) on the protection of physical persons in connection with the processing of personal

More information

PRIVACY POLICY. Catholic Diocese of Ballarat

PRIVACY POLICY. Catholic Diocese of Ballarat PRIVACY POLICY Introduction The (the Diocese) comprises parishes, schools, health, aged, disability and social services providers and a wide variety of people, cultures and ministries all directed to proclaiming

More information

Last updated 31 March 2016 This document is publically available at

Last updated 31 March 2016 This document is publically available at PRIVACY POLICY Last updated 31 March 2016 This document is publically available at http://www.conexusfinancial.com.au/privacy 1. INTRODUCTION This Privacy Policy sets out our commitment to protecting the

More information

Data security statement Volunteers

Data security statement Volunteers Data security statement Volunteers 1 Register controller 2 Contact information for matters pertaining to the handling of personal information 3 Personal data group 4 The purpose for processing personal

More information

QUALITY HIPAA December 23, 2013

QUALITY HIPAA December 23, 2013 December 23, 2013 Page 1 of 5 Breach, HIPAA and Protected Health Information This week, we look at the rules governing HIPAA, the HITECH Act and HIPAA Omnibus Rule. Unsecured PHI means Protected Health

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

North Carolina Health Information Exchange Authority. User Access Policy for NC HealthConnex

North Carolina Health Information Exchange Authority. User Access Policy for NC HealthConnex North Carolina Health Information Exchange Authority User Access Policy for NC HealthConnex North Carolina Health Information Exchange Authority User Access Policy for NC HealthConnex Introduction The

More information

St Bernard s Primary School Data Protection Policy

St Bernard s Primary School Data Protection Policy St Bernard s Primary School Data Protection Policy St Bernard s RC Primary School, A Voluntary Academy Approved by Governors: 11.11.2015 Review date: Autumn 2016 St Bernard s Data Protection Policy General

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

WEBSITE & SOCIAL MEDIA PRIVACY POLICY

WEBSITE & SOCIAL MEDIA PRIVACY POLICY WEBSITE & SOCIAL MEDIA PRIVACY POLICY This website is the property of Girls on the Run of Northern Virginia ( Girls on the Run ), an Independent Council of Girls on the Run International, Inc. of Charlotte,

More information

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk

CURTIS BANKS LIMITED. Privacy Information Notice. curtisbanks.co.uk CURTIS BANKS LIMITED Privacy Information Notice curtisbanks.co.uk Contents Section Page 1 Who we are 3 2 Why we need to collect, use and process personal information 3 3 The information we may collect,

More information

ENCRYPTED . Copyright UT Health 1

ENCRYPTED  . Copyright UT Health 1 ENCRYPTED EMAIL The improper use or disclosure of sensitive information presents the risk of identity theft, invasion of privacy, and can cause harm and embarrassment to students, faculty, staff, patients,

More information

At Electronics Watch, we re committed to protecting and respecting your privacy

At Electronics Watch, we re committed to protecting and respecting your privacy Privacy Policy At Electronics Watch, we re committed to protecting and respecting your privacy This Policy sets out our data collection and processing practices, the conditions under which we may disclose

More information

Greater Toronto Hockey League (GTHL) PRIVACY POLICY

Greater Toronto Hockey League (GTHL) PRIVACY POLICY Greater Toronto Hockey League (GTHL) PRIVACY POLICY BACKGROUND The Greater Toronto Hockey League ( GTHL ) is the governing body for amateur hockey in a specific geographical jurisdiction of Ontario. In

More information

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders HIPAA Developed by The University of Texas at Dallas Callier Center for Communication Disorders Purpose of this training Everyone with access to Protected Health Information (PHI) must comply with HIPAA

More information

Hallmark Solutions Limited PRIVACY NOTICE

Hallmark Solutions Limited PRIVACY NOTICE Hallmark Solutions Limited PRIVACY NOTICE Who We Are Hallmark Solutions Limited specialise in the delivery of IT related projects, including consultancy, project management, software development and training.

More information