Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Size: px
Start display at page:

Download "Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited."

Transcription

1 Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

2 SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring Your Own Device (BYOD) Policy is provided solely as a sample policy for your agency to consider and it is not intended as legal advice. You should consult with your agency s own legal counsel to properly tailor this Sample Policy for use in your organization. The Policy must also be customized to reflect your state s laws and any other applicable laws. Using the Sample Policy does not ensure that your organization is in compliance with all applicable laws; only your attorney can make an informed determination regarding your compliance with applicable laws after careful review of your BYOD policy. Attendees are urged to have the enclosed materials reviewed by their legal counsel to ensure compliance with state laws and that they are within the recommendations of the organization s legal counsel. These materials are for educational purposes only and to provide a general overview of issues discussed in the conference. The information contained in the attached materials is subject to change at any time by new laws or regulations, repeals or modifications of existing laws and regulations, court and agency decisions, and in numerous other ways. While our materials are based on official sources of information, you must consult with your legal counsel to ensure compliance with state and federal laws. Of course, we cannot be responsible to update these materials for you, nor are we responsible for any decisions you make based in whole or in part upon the attached materials. While we believe the information presented in these materials to be accurate, errors are possible. Consult your legal counsel for advice on dealing with any specific legal issues you may have. These materials are the copyright of Page, Wolfberg & Wirth, LLC. No part of this material may be duplicated, reproduced or distributed by any means. By utilizing these materials, you agree to these terms and conditions. Sample BYOD Policy Page 1 of 8

3 ABC AMBULANCE SERVICE BRING YOUR OWN DEVICE POLICY PURPOSE To ensure the confidentiality, integrity, and availability of all confidential information and protected health information (PHI) that ABC Ambulance creates, receives, maintains, or transmits and to protect against any reasonably anticipated threats to such information, including security threats and improper, unauthorized or illegal uses or disclosures of such information. POLICY Authorized staff members may, but are not required, to use authorized personal portable devices for business-related purposes. Staff members may use a personal portable device to create, receive, maintain or transmit PHI or confidential information only as authorized by this policy and only when done for a legitimate, authorized business-related purpose. All other uses or disclosures of such information using personal portable devices are strictly prohibited without the express permission of ABC Ambulance. ABC Ambulance will take appropriate disciplinary action against any staff member who violates this policy. This policy will not be applied or construed in any way that might limit or improperly interfere with any applicable legal rights of ABC Ambulance staff members, including, but not limited to, any rights under Federal or state labor laws. PROCEDURE A. Definitions Under This Policy Breach means any acquisition, access, use, or disclosure of PHI or confidential information in a manner that violates this policy, any other ABC Ambulance policy or any law. Breach also means the loss, theft or unauthorized acquisition, access or use of a personal portable device. Business-Related Purpose means an authorized activity that legitimately and directly or indirectly supports the business of ABC Ambulance and may involve the use or disclosure of PHI or confidential information. Sample BYOD Policy Page 2 of 8

4 Confidential Information means any information created, received or used by ABC Ambulance in the conduct of its business that ABC Ambulance has a legitimate legal and/or business-related interest in keeping private, such as, but not limited to: information about confidential business processes, product information, deployment strategies, information about operational systems, marketing plans, customer data, contracts, computer systems, revenues, billing systems, internal reports, confidential business policies and plans, internal business-related confidential communications, patient data, insurance information, intellectual property, employee data and trade secrets. Personal Portable Device means any portable electronic device or storage media not owned, provided by, or paid for by ABC Ambulance that is used to create, receive, store or transmit PHI or confidential information of ABC Ambulance. Examples of such devices include, but are not limited to staff member s personal: laptops, tablets, cameras, cell phones, digital recording devices, SD cards and USB flash drives. Protected Health Information or PHI means any information, whether oral or recorded in any form or medium, that relates to the past, present, or future physical or mental health or condition of an individual, the provision of healthcare to an individual, or the past, present, or future payment for the provision of healthcare to an individual that either identifies the individual, or about which there is a reasonable basis to believe the information can be used to identify the individual. Security Incident means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of PHI or other confidential information or interference with system operations in an information system. Examples of security incidents include viruses, hacking attempts, successful hacking incidents, spam, corrupted software, etc. B. Authorization to Use Devices/Revocation 1. Authorized Staff Members. Only staff members expressly authorized by management may use a personal portable device for a business-related purpose. 2. Authorized Personal Portable Devices. Only personal portable devices approved by management are permitted to be used for a business-related purpose. 3. Management Discretion. Staff members may make a request to management to use a personal portable device for business-related purposes. Management has sole and complete discretion in deciding which staff members will be authorized to use personal portable devices and what devices may be used for a business-related purpose. Sample BYOD Policy Page 3 of 8

5 4. Revocation. Management reserves the right to revoke the authority of a staff member to use any personal portable device for a business-related purpose at any time for any reason. 5. Procedures Upon Revocation/Separation. If management revokes a staff member s authority to use personal portable devices or to use any particular device, or if the staff member is terminated or otherwise separated from affiliation with ABC Ambulance: a. The staff member shall immediately discontinue the use of the personal portable device(s) for a business-related purpose and he or she may no longer use the device(s) to create, receive, store or transmit PHI or confidential information of ABC Ambulance. b. If the device was at any time used to store PHI or confidential information, of ABC Ambulance, the staff member shall provide the device to ABC Ambulance for all PHI and other confidential information to be wiped clean. C. Security Standards for Personal Portable Devices 1. Record of Devices. Authorized staff members must register any personal portable devices authorized for a business-related purpose with a person designated by management to be responsible for maintaining that registry. Authorized staff members must immediately notify this individual if they plan to discontinue the use of a registered personal portable device for business-related purposes. 2. Verification of Security Features. Authorized staff members shall allow ABC Ambulance to review their personal portable device(s) prior to their initial use of the device(s) for a business-related purpose so that the ABC Ambulance can ensure that the device(s) meets the security standards required by this policy. 3. Authorized Applications and Programs. No applications ( apps ) or programs that enable access to PHI or confidential information of ABC ambulance may be installed on a personal portable device unless approved by management. 4. Password or Other User Authentication. Personal portable devices must be protected by a password or other unique user authentication measure, such as a personal identification number (PIN) or biometric measure. a. All passwords must have at least eight characters comprised of a least one uppercase letter, one lowercase letter, one number and one special symbol such as: &. Sample BYOD Policy Page 4 of 8

6 b. Any PIN shall be a nonsequential number that is not obviously personal to the staff member, such as birth year, last four digits of telephone number, last four digits of Social Security number, etc. If a personal portable device has the capability to enable a more complex PIN (e.g., longer than a 4-digit PIN), a more complex PIN should be used. c. If a personal portable devices has the capability to enable a biometric authentication measure (e.g., a fingerprint), staff members shall use the biometric measure. 5. Encryption. Personal portable devices must be equipped to store and transmit PHI and confidential information in an encrypted format. ABC Ambulance will verify that appropriate encryption software, which enables the encryption of PHI and other confidential information at rest and while being transmitted (such as through ), is installed on the personal portable device. 6. Remote Wiping/Disabling. Personal portable devices must have installed and enabled remote wiping/disabling features so that data can be remotely erased or the device can be remotely locked if the device is lost, stolen or otherwise unaccounted for. 7. Firewall and Antivirus. Personal portable devices should be protected with up-todate firewall and antivirus software. ABC Ambulance will determine what firewall protections and antivirus software are appropriate. 8. Log-Off and Lock-Out. Personal portable devices must be configured to lock out and require a password or PIN to resume activity after a period of inactivity. ABC Ambulance will determine the appropriate period of inactivity for log-off features for devices. If a personal portable device has a security feature that permits the erasing of data after a certain number of repeated unsuccessful password/pin attempts, this feature should be enabled. 9. Updated Programs and Software. Updates to installed programs, software and applications on personal portable devices must be installed as soon as possible. Whenever possible, the user shall enable automatic updates on devices. D. General Rules Regarding Use of Personal Portable Devices 1. Legitimate Business-Related Purpose. Staff members authorized to use personal portable devices for a business-related purpose must confine their use of the Sample BYOD Policy Page 5 of 8

7 devices to the business-related purpose for which they are authorized to use the personal portable device. 2. Tracking or Serial Number. A unique name or number for identifying and tracking use of a personal portable device for a business-related purpose will be assigned to each person authorized to use a personal portable device for a business-related purpose. 3. Physical Security. Staff members authorized to use a personal portable device for a business-related purpose must secure the device at all times (e.g., keeping it on your person, storing it in a locked area, etc.) to prevent unauthorized access. Staff members should also manually lock out the device when it is not in use (e.g., by pressing Ctrl+Alt+Delete or depressing the standby button). 4. Local Storage of PHI and Confidential Information. Staff members should, whenever possible, refrain from storing PHI or confidential information locally on a personal portable device. Local storage of such information is only permitted when authorized by ABC Ambulance. PHI and confidential information should, whenever possible, be stored on storage media (e.g., servers) of ABC Ambulance. 5. Reporting Breaches and Security Incidents. Staff members authorized to use a personal portable device for a business-related purpose shall immediately report an actual or suspected breach or security incident to management and provide full details of the event known to them. For example, if a staff member learns that his or her personal portable device is lost, stolen or has been accessed by an unauthorized third party, the staff member should notify management right away and let management know what happened. Staff members shall, at the direction of management, remotely wipe and/or disable a personal portable device to protect PHI and confidential information of ABC Ambulance. 6. Secure Storage and Transmission. Staff members must store and transmit all PHI and confidential information using approved encryption methods and approved secure channels. For example, staff members should use encrypted programs, encrypted texting applications, encrypted USB drives and other secure methods to transmit and store PHI. 7. Remote Access to PHI. Staff members may only access PHI or confidential information through a secure, encrypted channel, such as a secure Wi-Fi network, VPN channel, or secure browser connection ( HTTPS ). Most public networks in airports and other locations are unsecure and should not be used to access or transmit PHI or confidential information unless the staff member is using a VPN channel or secure browser connection. Sample BYOD Policy Page 6 of 8

8 8. Compliance. All activity using a personal portable device for a business-related purpose must comport with all of ABC Ambulance s policies and procedures, HIPAA or other applicable federal and state laws. E. Specifically Prohibited Activity on Personal Portable Devices The following activities are strictly prohibited at all times using personal portable devices: 1. Creating, receiving, maintaining, or transmitting any PHI or confidential information of ABC Ambulance without authorization from ABC Ambulance, in violation of any ABC Ambulance policy or in violation of the law. 2. Online posting, sharing or otherwise disseminating PHI or confidential information of ABC Ambulance without authorization from ABC Ambulance. 3. Capturing any images or videos on a personal portable device that could potentially identify a patient without the express permission of ABC Ambulance. 4. Storing or transmitting any PHI or confidential information of ABC Ambulance in a manner the staff member knows or should know is unsecure. For example, storing PHI on an unencrypted USB drive is an unsecure method of storing patient data. 5. Permitting any unauthorized individual to access PHI or confidential information on or through the use of a personal portable device. 6. Opening s or attachments on personal portable devices from unknown or untrusted sources. F. Ownership and Control of Confidential Information and PHI 1. All PHI and confidential information of ABC Ambulance that is created, received, maintained or transmitted using a personal portable device is at all times the property of ABC Ambulance and may be considered to be part of the official records of ABC Ambulance. 2. ABC Ambulance cannot guarantee the confidentiality of PHI or confidential information of ABC Ambulance stored on any personal portable device, except that ABC Ambulance will take all steps necessary to secure PHI and confidential information in accordance with all applicable laws. PHI and confidential information stored on personal portable devices may be subject to disclosure to law enforcement or other third parties at the sole discretion of ABC Ambulance. Sample BYOD Policy Page 7 of 8

9 3. ABC Ambulance may monitor activity on our information systems and our network(s) at any time for the business-related purpose of ensuring that PHI and confidential information is not being improperly used or disclosed. This includes the ability to monitor internet activity and , as permitted by law. G. Discipline 1. Where permitted by law to do so, ABC Ambulance will investigate and take appropriate disciplinary action against staff members whenever ABC Ambulance learns about a possible or actual violation of our this policy or the law. 2. Violation of this policy or the law may result in disciplinary action up to and including termination of employment or association with ABC Ambulance. Sample BYOD Policy Page 8 of 8

HIPAA and HIPAA Compliance with PHI/PII in Research

HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA Compliance Federal Regulations-Enforced by Office of Civil Rights State Regulations-Texas Administrative Codes Institutional Policies-UTHSA HOPs/IRB

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Employee Security Awareness Training Program

Employee Security Awareness Training Program Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,

More information

Data Compromise Notice Procedure Summary and Guide

Data Compromise Notice Procedure Summary and Guide Data Compromise Notice Procedure Summary and Guide Various federal and state laws require notification of the breach of security or compromise of personally identifiable data. No single federal law or

More information

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS INTRODUCTION: Before the California State Teachers Retirement System (hereinafter "CalSTRS," "We," or "Us") will provide services found at mycalstrs.com (the

More information

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996

HIPAA Privacy & Security Training. HIPAA The Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy & Security Training HIPAA The Health Insurance Portability and Accountability Act of 1996 AMTA confidentiality requirements AMTA Professional Competencies 20. Documentation 20.7 Demonstrate

More information

HIPAA FOR BROKERS. revised 10/17

HIPAA FOR BROKERS. revised 10/17 HIPAA FOR BROKERS revised 10/17 COURSE PURPOSE The purpose of this information is to help ensure that all Optima Health Brokers are prepared to protect the privacy and security of our members health information.

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017 HIPAA How to Comply with Limited Time & Resources Jonathan Pantenburg, MHA, Senior Consultant JPantenburg@Stroudwater.com August 17, 2017 Stroudwater Associates is a leading national healthcare consulting

More information

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Policy and Procedure: SDM Guidance for HIPAA Business Associates Policy and Procedure: SDM Guidance for HIPAA Business (Adapted from UPMC s Guidance for Business at http://www.upmc.com/aboutupmc/supplychainmanagement/documents/guidanceforbusinessassociates.pdf) Effective:

More information

ACCEPTABLE USE OF HCHD INTERNET AND SYSTEM

ACCEPTABLE USE OF HCHD INTERNET AND  SYSTEM Page Number: 1 of 6 TITLE: PURPOSE: ACCEPTABLE USE OF HCHD INTERNET AND EMAIL SYSTEM To establish the guidelines for the use of the Harris County Hospital District s Internet and email system. POLICY STATEMENT:

More information

Internet, , Social Networking, Mobile Device, and Electronic Communication Policy

Internet,  , Social Networking, Mobile Device, and Electronic Communication Policy TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

FERPA & Student Data Communication Systems

FERPA & Student Data Communication Systems FERPA & Student Data Ellevation is subject to the Family Educational Rights and Privacy Act (FERPA) as operating under the "school official" exception, wherein student directory and PII (Personal Identifying

More information

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services. TERMS OF USE A. PLEASE READ THESE TERMS CAREFULLY. YOUR ACCESS TO AND USE OF THE SERVICES ARE SUBJECT TO THESE TERMS. IF YOU DISAGREE OR CANNOT FULLY COMPLY WITH THESE TERMS, DO NOT ATTEMPT TO ACCESS AND/OR

More information

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009

Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Housecall Privacy Statement Statement Date: 01/01/2007. Most recent update 09/18/2009 Privacy Policy Intent: We recognize that privacy is an important issue, so we design and operate our services with

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016 HIPAA Faux Pas Lauren Gluck Physician s Computer Company User s Conference 2016 Goals of this course Overview of HIPAA and Protected Health Information Define HIPAA s Minimum Necessary Rule Properly de-identifying

More information

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory

Data Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES NOTICE OF PRIVACY PRACTICES Chmura Orthodontics ( Practice ) understands the important of keeping your personal information private. Personal information includes: your name, postal address, e-mail address,

More information

Privacy & Information Security Protocol: Breach Notification & Mitigation

Privacy & Information Security Protocol: Breach Notification & Mitigation The VUMC Privacy Office coordinates compliance with the required notification steps and prepares the necessary notification and reporting documents. The business unit from which the breach occurred covers

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

Elements of a Swift (and Effective) Response to a HIPAA Security Breach

Elements of a Swift (and Effective) Response to a HIPAA Security Breach Elements of a Swift (and Effective) Response to a HIPAA Security Breach Susan E. Ziel, RN BSN MPH JD Krieg DeVault LLP Past President, The American Association of Nurse Attorneys Disclaimer The information

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

HIPAA UPDATE. Michael L. Brody, DPM

HIPAA UPDATE. Michael L. Brody, DPM HIPAA UPDATE Michael L. Brody, DPM Objectives: How to respond to a patient s request for a copy of their records. Understand your responsibilities after you send information out to another doctor, hospital

More information

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH R 3321/Page 1 of 6 The school district provides computer equipment, computer services, and Internet access to its pupils and staff for educational purposes only. The purpose of providing technology resources

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE 1. General The term PPS refers to: Professional Provident Society Holdings Trust, (The Holding Trust); Professional

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 9 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information

More information

Information Classification & Protection Policy

Information Classification & Protection Policy University of Scranton Information Technology Policy Information Classification & Protection Policy Executive Sponsor: AVP Information Resources Responsible Office: Information Security Originally Issued:

More information

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services

Mobile Device Policy. Augusta University Medical Center Policy Library. Policy Owner: Information Technology Support and Services Augusta University Medical Center Policy Library Mobile Device Policy Policy Owner: Information Technology Support and Services POLICY STATEMENT Augusta University Medical Center (AUMC) discourages the

More information

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union)

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union) ASSEMBLY, No. 0 STATE OF NEW JERSEY th LEGISLATURE INTRODUCED NOVEMBER 0, 0 Sponsored by: Assemblywoman ANNETTE QUIJANO District 0 (Union) SYNOPSIS Requires certain persons and business entities to maintain

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Village Emergency Center Privacy Policy Updated: 1/22/18. PLEASE READ THIS PRIVACY POLICY (Privacy Policy) CAREFULLY. By accessing and using this website, you agree to be bound by

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By: HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Created By: Overview The purpose of this presentation is to emphasize the importance of security when using HMIS. Client information

More information

North Carolina Health Information Exchange Authority. User Access Policy for NC HealthConnex

North Carolina Health Information Exchange Authority. User Access Policy for NC HealthConnex North Carolina Health Information Exchange Authority User Access Policy for NC HealthConnex North Carolina Health Information Exchange Authority User Access Policy for NC HealthConnex Introduction The

More information

Class Composer General Terms of Use

Class Composer General Terms of Use Class Composer General Terms of Use Effective Date: July 24, 2017 Welcome to Class Composer! Please continue reading to learn about the terms by which you may use our Service. If you have any questions

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

HIPAA & Privacy Compliance Update

HIPAA & Privacy Compliance Update HIPAA & Privacy Compliance Update Vermont Medical Society FREE Wednesday Webinar Series March 15, 2017 Anne Cramer and Shireen Hart Primmer Piper Eggleston & Cramer PC acramer@primmer.com shart@primmer.com

More information

Information Technology Standards

Information Technology Standards Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

ecare Vault, Inc. Privacy Policy

ecare Vault, Inc. Privacy Policy ecare Vault, Inc. Privacy Policy This document was last updated on May 18, 2017. ecare Vault, Inc. owns and operates the website www.ecarevault.com ( the Site ). ecare Vault also develops, operates and

More information

University of Mississippi Medical Center Data Use Agreement Protected Health Information

University of Mississippi Medical Center Data Use Agreement Protected Health Information Data Use Agreement Protected Health Information This Data Use Agreement ( DUA ) is effective on the day of, 20, ( Effective Date ) by and between (UMMC) ( Data Custodian ), and ( Recipient ), located at

More information

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders

HIPAA. Developed by The University of Texas at Dallas Callier Center for Communication Disorders HIPAA Developed by The University of Texas at Dallas Callier Center for Communication Disorders Purpose of this training Everyone with access to Protected Health Information (PHI) must comply with HIPAA

More information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information HIPAA Privacy & Security Training Privacy and Security of Protected Health Information Course Competencies: This training module addresses the essential elements of maintaining the HIPAA Privacy and Security

More information

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012

HIPAA Privacy and Security. Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 HIPAA Privacy and Security Rochelle Steimel, HIPAA Privacy Official Judy Smith, Staff Development January 2012 Goals and Objectives Course Goal: Can serve as annual HIPAA training for physician practice

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech

More information

Electronic Network Acceptable Use Policy

Electronic Network Acceptable Use Policy Electronic Network Acceptable Use Policy 2016-2017 www.timothychristian.com ELECTRONIC NETWORK ACCEPTABLE USE POLICY Electronic Network This Policy is intended to serve as a guide to the scope of TCS s

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

HIPAA Security Manual

HIPAA Security Manual 2010 HIPAA Security Manual Revised with HITECH ACT Amendments Authored by J. Kevin West, Esq. 2010 HALL, FARLEY, OBERRECHT & BLANTON, P.A. DISCLAIMER This Manual is designed to set forth general policies

More information

Protecting Health Information

Protecting Health Information Agenda Protecting Health Information BRONSON HEALTHCARE GROUP INFORMATION TECHNOLOGY SECURITY ENGINEERING MICHAEL SMITH Personal device usage with sensitive data Mobile devices and BYOD Secure messaging

More information

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND October 2005 Table of Contents Introduction... 1 Purpose Of This Policy... 1 Responsibility... 1 General Policy... 2 Data Classification Policy...

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Name of Policy: Computer Use Policy

Name of Policy: Computer Use Policy Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership

More information

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule.

Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in the HIPAA Privacy Rule. Medical Privacy Version 2018.03.26 Business Associate Agreement This Business Associate Agreement (the Agreement ) shall apply to the extent that the Lux Scientiae HIPAA Customer signee is a Covered Entity

More information

II.C.4. Policy: Southeastern Technical College Computer Use

II.C.4. Policy: Southeastern Technical College Computer Use II.C.4. Policy: Southeastern Technical College Computer Use 1.0 Overview Due to the technological revolution in the workplace, businesses such as Southeastern Technical College (STC) have turned to computer

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

Beam Technologies Inc. Privacy Policy

Beam Technologies Inc. Privacy Policy Beam Technologies Inc. Privacy Policy Introduction Beam Technologies Inc., Beam Dental Insurance Services LLC, Beam Insurance Administrators LLC, Beam Perks LLC, and Beam Insurance Services LLC, (collectively,

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston CYBERSECURITY Recent OCR Actions & Cyber Awareness Newsletters Claire C. Rosston DISCLAIMER This presentation is similar to any other legal education materials designed to provide general information on

More information

PILOT Palm Springs Unified School District PILOT BYOD PILOT Staff Mobile Device Agreement

PILOT Palm Springs Unified School District PILOT BYOD PILOT Staff Mobile Device Agreement PILOT Palm Springs Unified School District PILOT BYOD PILOT Staff Mobile Device Agreement Prior to accessing the Bring Your Own Device (BYOD) network, staff must initial each line, fill in the boxes, sign

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:

More information

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V.

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V. Privacy Policy General A. The parties involved in reference to this policy are Company and You, the User of these sites: www.bittrademarket.com A.1 Bittrade Market decentralize system is the publisher

More information

Social Media and Texting: A Growing Concern

Social Media and Texting: A Growing Concern Social Media, Care Providers Texting: How Do You Protect PHI? HCCA Compliance Institute Monday, April 18, 2016 Presented By: Donna Thiel, VP & CCO, Fortis Management Group, LLC Craig Day, Esq., Lane Powell

More information

LCU Privacy Breach Response Plan

LCU Privacy Breach Response Plan LCU Privacy Breach Response Plan Sept 2018 Prevention Communication & Notification Evaluation of Risks Breach Containment & Preliminary Assessment Introduction The Credit Union makes every effort to safeguard

More information

University of Wisconsin-Madison Policy and Procedure

University of Wisconsin-Madison Policy and Procedure Page 1 of 10 I. Policy The Health Information Technology for Economic and Clinical Health Act regulations ( HITECH ) amended the Health Information Portability and Accountability Act ( HIPAA ) to establish

More information

Compliance A primer. Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation.

Compliance A primer. Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation. Compliance A primer Surveys indicate that 80% of the spend on IT security technology is driven by the need to comply with regulatory legislation. The growth in the sharing of sensitive data combined with

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

PRIVACY-SECURITY INCIDENT REPORT

PRIVACY-SECURITY INCIDENT REPORT SECTION I GENERAL INFORMATION Name of Staff Member Reporting Incident PRIVACY-SECURITY INCIDENT REPORT Telephone Number Email Address Division/Office/Facility Unit/Section Supervisor SECTION II PRIVACY

More information

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding) CLAUSE 13 ON-LINE BIDDING 13.1 ON-LINE BIDDING.1 Definitions: Owner means the party and/or their agent designated to receive on-line

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications

More information

Mobile Application Privacy Policy

Mobile Application Privacy Policy Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered

More information

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Introduction: Welcome to Honesty and Confidentiality Lesson Three: The False Claims Act is an important part

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

WARNER PACIFIC COLLEGE

WARNER PACIFIC COLLEGE WARNER PACIFIC COLLEGE Network Access and Acceptable Use Policy 1. Statement of Purpose Warner Pacific College's computer resources and information network are vital for the fulfillment of the academic,

More information

Privacy Policy. I. How your information is used. Registration and account information. March 3,

Privacy Policy. I. How your information is used. Registration and account information. March 3, Privacy Policy This Privacy Policy describes how and when we collect, use and share your information across our App. When using our App you consent to the collection, transfer, storage, disclosure, and

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

HPE DATA PRIVACY AND SECURITY

HPE DATA PRIVACY AND SECURITY ARUBA, a Hewlett Packard Enterprise company, product services ( Services ) This Data Privacy and Security Agreement ("DPSA") Schedule governs the privacy and security of Personal Data by HPE in connection

More information

Lakeshore Technical College Official Policy

Lakeshore Technical College Official Policy Policy Title Original Adoption Date Policy Number Information Security 05/12/2015 IT-720 Responsible College Division/Department Responsible College Manager Title Information Technology Services Director

More information

Wireless Communication Device Use Policy

Wireless Communication Device Use Policy Wireless Communication Device Use Policy Introduction The Wireless Communication Device Policy exists to provide guidance to employees regarding the acquisition and use of William Paterson University provided

More information

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.

Violations of any portion of this policy may be subject to disciplinary action up to and including termination of employment. Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist

More information

WEBSITE TERMS OF USE

WEBSITE TERMS OF USE WEBSITE TERMS OF USE Effective Date: April 14, 2018 Welcome to the Center for Behavioral Sciences, Inc. ( CBS ) website! CBS, Inc. maintains this website ( Website ) for your personal information, education

More information

LifeWays Operating Procedures

LifeWays Operating Procedures 07-02.08 EMAIL GUIDELINES AND REQUIREMENTS I. PURPOSE To define the security, privacy and professional standards and considerations regarding electronic mail communication. II. SCOPE This procedure covers

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Is your privacy secure? HIPAA Compliance Workshop September 2008 Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Agenda Have you secured your key operational, competitive and financial

More information

Legal notice and Privacy policy

Legal notice and Privacy policy Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains

More information

Federal Breach Notification Decision Tree and Tools

Federal Breach Notification Decision Tree and Tools Federal Breach Notification and Tools Disclaimer This document is copyright 2009 by the Long Term Care Consortium (LTCC). These materials may be reproduced and used only by long-term health care providers

More information