Frequently Asked Questions About Getting On NCAtrak

Similar documents
Altius IT Policy Collection

August 2, 2004 Ohio Balance of State Homeless Management Information System (OBOSHMIS) Policy and Procedures Manual

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Information Security Policy

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Certified Trainer Program Guide

Institute of Technology, Sligo. Information Security Policy. Version 0.2

GBVIMS+ Set-Up and Rollout Preparation

I. PURPOSE III. PROCEDURE

PRIVACY POLICY QUICK GUIDE TO CONTENTS

Boerner Consulting, LLC Reinhart Boerner Van Deuren s.c.

COUNTY OF EL DORADO, CALIFORNIA BOARD OF SUPERVISORS POLICY

Data Protection Policy

HIPAA Security and Privacy Policies & Procedures

TechTarget, Inc. Privacy Policy

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

Use of Mobile Devices on Voice and Data Networks Policy

CASA External Peer Review Program Guidelines. Table of Contents

IBM Security Intelligence on Cloud

AUTHORITY FOR ELECTRICITY REGULATION

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

KSU Policy Category: Information Technology Page 1 of 5

EXHIBIT A. - HIPAA Security Assessment Template -

General Information System Controls Review

Service Description: Software Support

WHITE PAPER- Managed Services Security Practices

HIPAA Federal Security Rule H I P A A

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Network Security Policy

RFM Procedure 3: Certification Body Approval for Chain of Custody Standard. Alaska Responsible Fisheries Management (RFM) Certification Program 17065

Cell Phone Policy. 1. Purpose: Establish a policy for cell phone use and compensation allowance.

Wireless Communication Stipend Effective Date: 9/1/2008

Service Description: Software Support

ISSP Network Security Plan

HIPAA Compliance Checklist

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Data protection policy

CrossFit Glen Burnie Privacy Policy

VMware vcloud Air Accelerator Service

The Common Controls Framework BY ADOBE

Overview Let s define those involved in this project and bound by this contract

Adobe Fonts Service Additional Terms. Last updated October 15, Replaces all prior versions.

MISC/GENRAL. What is your Return Policy? Does AFAA offer insurance to Instructors? Or have a discounted partnership?

Electronic Communication Disclosures and Consent

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.

FileMaker Business Alliance. Program Guide

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

Gaia CPD Portal 25/11/2014. Bernard Dady

UKIP needs to gather and use certain information about individuals.

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

CONTINUING EDUCATION PROVIDER GUIDE

In addition to the currently approved version of the Chapter s Bylaws roles and responsibilities:

Checklist: Credit Union Information Security and Privacy Policies

PCI Compliance. What is it? Who uses it? Why is it important?

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

Enviro Technology Services Ltd Data Protection Policy

Privacy Policy. Effective date: 21 May 2018

Privacy Policy Identity Games

VETDATA PRIVACY POLICY

What information is collected from you and how it is used

Data protection. 3 April 2018

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

NMHC HIPAA Security Training Version

I. CHW Profile.. Page 1 II. Employer Profile Page 12 III. Training Partner/Instructor Profile.. Page 27

IBM Sterling B2B Services File Transfer Service

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

2018 CANADIAN ELECTRICAL CODE UPDATE TRAINING PROVIDER PROGRAM Guidelines

CPRC Renewal Changes

Accessing CharityMaster data from another location

1-TIER AUTHORIZED INFORMATICA RESELLER (AIR)

Offer Description : Cisco Webex

IBM PureApplication Service

STATEMENT OF WORK FOR. County of Los Angeles Chief Executive Office

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Privacy Notice. Introduction. What is personal data? Date Updated: 2/11/2019

STEPS TO SUCCESS. LCDC 101 User Guide YMCA OF METROPOLITAN DALLAS YMCA OF THE USA

Lakeshore Technical College Official Policy

MICHIGAN INTERNATIONAL SPEEDWAY KIDS CLUB PRIVACY POLICY

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Subject: University Information Technology Resource Security Policy: OUTDATED

Security Policies and Procedures Principles and Practices

University of Wyoming Mobile Communication Device Policy Effective January 1, 2013

BT Compute Protect Schedule to the General Terms

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

IBM Cloud Service Description: Watson Analytics

Radware. Training Policies V001.70

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

Microsoft Certified Trainer

CANDIDATE GUIDE STP Professional Accreditation

Application for Membership of the Association for Solution Focused Hypnotherapy

TREND MICRO PRIVACY POLICY (Updated May 2012)

TCJIUG Texas Criminal Justice Information Users' Group PO Box Austin, TX 78768

Trust Services Principles and Criteria

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms

Transcription:

Frequently Asked Questions About Getting On NCAtrak

Frequently Asked Questions About Getting on NCAtrak (technology reaching all kids) 1. What is NCAtrak? NCAtrak is a computerized, web-based case tracking system developed to help Children s Advocacy Centers track case specific information in a user-friendly, reliable manner. Flexibility is built into the system so that centers can customize fields as well as add some fields they feel would benefit their program, regardless of organizational structure. Initial NCAtrak development was funded through a cooperative agreement provided to National Children s Alliance by the U. S. Department of Justice, Office of Juvenile Justice and Delinquency Prevention (OJJDP). On-going operations of the system are funded by subscription fees paid by member organizations using NCAtrak. 2. How was the system designed? The system was designed with all types of CAC s in mind, and tested utilizing pilot test sites that represented a variety of organizational structures. Pilot sites for this project: National Children s Advocacy Center Huntsville, AL. Emerald Coast Children s Advocacy Center Niceville, F.L Midwest Children s Resource Center St. Paul, MN. Children s Advocacy Center of Hamilton County, Inc. Chattanooga, TN. Memphis Child Advocacy Center Memphis, TN. 3. Who is eligible to purchase the system? Active members of National Children s Alliance in good standing with the organization. 4. Steps in getting connected? Connecting to NCAtrak is more than just connecting to a Web site. However, as users of NCAtrak, your team will become part of the NCAtrak User Community. This community is committed to two objectives: Secure use of the NCAtrak system. Successful use of the NCAtrak system. Every organization desiring to use NCAtrak must commit to these objectives. The steps below describe how all participants in the NCAtrak User Community learn to meet these objectives. 11/24/08 NCAtrak FAQs for CAC Directors_V1.4 Page 2 of 8

A. Contact NCA for the NCAtrak Application Packet. - Packet includes the NCAtrak Application and NCAtrak Participant Agreement. B. Complete the NCAtrak Application and submit to NCA. C. Carefully review and sign the NCAtrak Participant Agreement. - All NCAtrak subscribers are required to comply with policies and procedures designed to protect NCAtrak and the confidentiality/privacy of the data in the system. Be sure your organization understands these responsibilities and expectations, including requirements for computers and networks used to access NCAtrak. D. Submit a signed NCAtrak Participant Agreement document E. Submit payment of your initial (first year) subscription fee to NCA. F. Register for the NCAtrak Initial Training Workshop and receive your copy of the NCAtrak Initial Training Workshop Guide. - Once all of your paperwork and fees have been processed you will be contacted by NCA to register for the initial training. As part of the registration, the NCAtrak Initial Training Workshop Prep Guide will be emailed to you. This guide will give you all the information you need about travel, what to expect, and what to bring. G. Select two representatives from your organization to serve as NCAtrak Security Officers for your organization. - Typically, the Security Officers are the people you will send to the required NCAtrak Initial Training Workshop where they will learn how to manage all of the administrative/security-oriented functions of NCAtrak for your local needs. H. Make reservations for travel and lodging for your training days. - Travel arrangements and costs are the responsibility of your organization and are not included in your subscription. I. Participate in the NCAtrak Initial Training Workshop Pre-Training Conference Call. - This is a brief but important opportunity for you to review your preparations, meet the training staff, and seek answers to questions about getting started with NCAtrak. J. Attend the NCAtrak Initial Training Workshop. This workshop is very hands on and designed to give you time to do initial entry of key data and initial set-up of important features in the system. This workshop training is conducted monthly in Oak Ridge, TN. During the training your NCAtrak Security Officers will get connected to the system and learn how to give others within your organization access to the system. 5. What are the requirements for computers and networks used to access NCAtrak? Microsoft Window s Operating System - NCAtrak is built using Microsoft technology that is integrated to improve security. Mac computers can access NCAtrak using Microsoft Windows compatibility packs for Internet Explorer. Microsoft Internet Explorer 7.0 Minimum 64 MB RAM 11/24/08 NCAtrak FAQs for CAC Directors_V1.4 Page 3 of 8

Adobe Acrobat Reader version 6.0 or higher Virus/Spyware, Firewall software routinely updated. NCAtrak Client Certificate (you will learn to create these at the NCAtrak Initial Training Workshop). Internet Connection must NOT be through a wireless network, unless that network is established and maintained by a full-time network team such as you would find in a hospital or other fully-staffed Information Technology (IT) Department. Permission to use a wireless network to access NCAtrak is granted by NCA only after a formal request for a waiver is submitted and review by NCA. NCA realizes that some CACs have installed wireless networks for their centers however wireless computing increases the opportunity for confidential/private data to be accessed by unauthorized parties. Data transmitted between computers, stored on computers, and transmitted between the internet and computers on wireless networks is more vulnerable to hackers. In order to meet the objectives for secure and successful use of the NCAtrak System the user community has agreed to limit the use of wireless networks to those that are installed and maintained by IT departments with technical expertise to adequately configure and maintain security setting and respond to breaches in security. Several center using wireless networks have installed a wired internet connection for the computers used to access NCAtrak. They take out the wireless network card, (or turn it off) when accessing NCAtrak. 6. How much does NCAtrak cost? Each NCA member organization must purchase a subscription annually to NCAtrak in order to access the system. Subscriptions fees are based on your membership level with NCA. Effective January 1, 2009 subscription fees for NCAtrak will be as follows: Accredited and Associate Members Initial Year $3,000 Annual Renewal $2,000 7. What does the subscription fee cover? Access to the NCAtrak Web Application - You can authorize access to NCAtrak for an unlimited number of users from your organization and partner agencies. Unlimited cases, MDT meetings, reports - There is no restriction to the amount of data you enter into the application or data your retrieve from the application. NCAtrak System Operations and Maintenance - Because NCAtrak is a Web-based Application your organization does not have to buy servers or pay for technical support to perform maintenance, enhancements, or upgrades. Instead, the maintenance and operations costs for NCAtrak are shared by the NCAtrak User Community. NCAtrak is operated and maintained by Science Applications International Corporation (SAIC) for the NCAtrak User Community according to the Governing NCAtrak Policies and Procedures. 11/24/08 NCAtrak FAQs for CAC Directors_V1.4 Page 4 of 8

Automatic Upgrades to the NCAtrak system You never have to install a new version of the system. Updates, bug-fixes, enhancements are all automatically available when you logon. Data Back-ups - Multiple types of data back-ups performed and maintained for you. Training Registration fees for two (2) participants - for the NCAtrak Initial Training Workshop in Oak Ridge, TN. 3 hours organization-specific support and instruction - following the initial training workshop your Security Officers can set-up additional personalized telephone consultation and technical support time with the NCAtrak trainers. Access to all On-Line Training offered through-out the year including monthly custom report trainings. Access to personal assistance from the NCAtrak Service Desk. Ability to submit on-line requests for system improvements. 8. How do the fees apply? The fee cannot be broken down, but is rather a complete charge for the package of the system and services to support your use. Once you are online, your organization will receive an annual invoice to pay your subscription fee. On time payment of annual renewal fees will continue your organizational access to NCAtrak without interruption. 9. If we purchase a subscription to NCAtrak, who can access our data? Each CAC inputs their own data, and maintains the integrity of their data. The CAC may share this responsibility with team members from partner agencies. There are many different approaches to gathering and entering data that work for current NCAtrak users. Information entered by your organization and authorized partner agencies will be stored in a secure NCAtrak server owned by NCA and hosted by SAIC. The server is monitored for performance and security. Your data will routinely be backed-up for you and back-up tapes stored in a secure location also managed by SAIC. Each computer used to access NCAtrak is required to have a client security certificate that will help you monitor who has access to your data and from where, (for example, home, office). Instructions and support will be provided to help you use the certificate correctly. The table below outlines specific questions about others access to your data Who Your Organization Can they access our data? Yes To what extent? Your organization has access to your data; however, your staff will only have permission to access the system when your Security Officers grant them access. And, your organization will decide what each user can view, update, access within each case record and in all other areas of NCAtrak. Your Partner Maybe You may give staff from your partner agencies NCAtrak access and again, 11/24/08 NCAtrak FAQs for CAC Directors_V1.4 Page 5 of 8

Who Agencies Other CACs or Multidisciplinary Teams NCA Can they access our data? No Very limited data To what extent? your Security Officers will set up specifically what each individual can view, edit, access within the system. NCAtrak does not allow organizations to access each others data. The system has been built to eventually allow for sharing of non-specific client data between centers. This will functionality will only be completed and made available after all necessary steps such as Institutional Review Board Approval have been completed. NCA s access to your organization s data is restricted just like any other organization. However, NCA does have some administrative tools in NCAtrak that allow NCA to monitor system usage, and access the statistics you submit for your bi-annual report. NCA CANNOT view case details, see confidential information, access case specific information, change any of your administrative settings, run reports against your case data, search your data, log in to your organization s data, ask SAIC to pull up any case details from your case records or pull statistics about your cases without your knowledge and consent. NCA CAN log in to their section of NCAtrak where they have tools to manage organization accounts, view your CAC contact information, view contact information for your Security Officers so we can contact you if you have requested assistance, view comments or security incidents about NCAtrak entered by your users, access NCA Statistical Reports submitted by your organization. NCA also can determine if anyone is online and NCA tracks statistics about system usage for planning and management purposes. Chapters No You can create reports, print them, and share your data with your Chapter but your Chapter will not have access to your data. NCAtrak may be modified in the future to allow your organization to electronically submit statistics to your Chapter for state-wide reports like you do with your NCA Statistical Report but it will not allow Chapters to access your data without your knowledge or consent. SAIC Yes, in order to perform system maintenan ce or provide your team with technical support SAIC provides maintenance to the system and to the database. There is a very small team of personnel at SAIC who provide technical and programmatic support for NCAtrak and an even smaller number who occasionally interact with the data itself. Each member of this team signed a non-disclosure agreement and submitted to a criminal background check specifically looking for crimes against children. SAIC CANNOT log in to the NCAtrak Web site and see your cases, or run reports, or search your data, or change your administrative settings. The NCAtrak team at SAIC CAN based upon their job duties, access the system database to perform maintenance, or run special 11/24/08 NCAtrak FAQs for CAC Directors_V1.4 Page 6 of 8

Who Can they access our data? when requested. To what extent? queries to help you with your specific trouble shooting or statistics gathering needs; access system logs and tools to monitor performance and security; access the same tools NCA uses to maintain organization accounts, and respond to comments or suggestions or security incident logs: complete server maintenance, restore the system from a back-up tape, and perform other maintenance activities, 10. What does NCA do to be sure data in NCAtrak is secure? NCA implemented a comprehensive security plan for NCAtrak to prevent, detect, contain, and correct security violations. The NCAtrak Security Plan was developed based upon security practices recommended by the United States government and international cyber security institutes. The plan was designed to be HIPAA Friendly so organizations that are defined by HIPAA as 'covered entities' could be comfortable using NCAtrak. The plan involves the entire NCAtrak User Community and details specific procedures to addresses the following: General security NCAtrak asset classification and access management Assigning roles and responsibilities for system operations and maintenance, security. Security Incident Reporting and Response What we re going to do when we detect a security concern. Contingency planning Preparing for when something breaks or we have a disaster. Security plan evaluation Making improvements to the security plan. Personnel security Security training Teaching everyone to be responsible for security. User authorization, supervision, and termination Granting specific privileges for each user, creating and terminating user accounts. Password management Keeping passwords strong and secure. Physical security Hosting facility security - Keeping data stored in NCAtrak safe from unauthorized access. Workstation security Making my desktop/ laptop secure. 11/24/08 NCAtrak FAQs for CAC Directors_V1.4 Page 7 of 8

Technical security User authentication and access control How the system knows who is allowed to use NCAtrak and which CAC they belong to. Intrusion detection and audit logs Preventing, detecting and responding to unauthorized access to NCAtrak. Data integrity measures - Knowing who used NCAtrak and who made changes to case records. Transmission security Keeping the data safe while it travels over the internet. 11. Can I transfer existing data to the new system? Yes, and there are several ways to enter current and/or old case data into NCAtrak with varying costs. Some organizations use a data entry person from their own staff or a volunteer for a short period of time to focus on manual entry of a select number of cases. Others have purchased Data Migration Services to support the migration of large volumes of data into NCAtrak. Data Migration Services are available for an additional fee and are not included as part of the NCAtrak subscription fee. Costs vary significantly and are based on the amount of data to be migrated. Additional information about how the process works and how to determine an estimate for your cost are discussed at the NCAtrak Initial Training Workshop. 12. Will I be able to get a copy of the software and install it on my computer? You will not need to install the system on your computer. You will access NCAtrak through a secure connection over the Internet. 13. What happens to our data if we choose not to renew our subscription? If the relationship between NCA and the Member Organization ends, your organization will have up to 6 months to move their data to another secure location. Costs associated with this transfer of data are the responsibility of the Member Organization and not included in the NCAtrak subscription fee. 14. Who should I contact for further questions or to get started using NCAtrak? Troy Price, Coordinator for Information Services National Children s Alliance 800-239-9950 x113 tprice@nca-online.org 11/24/08 NCAtrak FAQs for CAC Directors_V1.4 Page 8 of 8