Visitor and Contractor IT Premise Access Procedure
|
|
- Clementine Greer
- 5 years ago
- Views:
Transcription
1 Visitor and Contractor IT Premise Access Procedure Reference No. xx Revision No. 1 Relevant ISO Control No Issue Date: January 23, 2012 Revision Date: January 23, 2012 Approved by: Title: Ted Harvey Director, Technology Services Version History Version # Version Date Author Summary of Changes 1.0 Jan Ted Harvey Approvals Name Title Date of Approval Version # Ray Hoppins Distribution Name Title Date of Issue Version No. Personal Communication Devices Document Control Document Title Visitor and Contractor IT Premise Access Procedure Document Location IT Premise Access Procedure Page 1
2 IT Premise Access Procedure Page 2
3 Table of Contents 1.0 Overview Purpose Scope Risks...6 The risks associated with the Procedure subject... Error! Bookmark not defined. 5.0 Procedure Detail...7 Detailed Procedure statements... Error! Bookmark not defined. More Content... Error! Bookmark not defined. Procedure Detail Sub Heading... Error! Bookmark not defined. More Content... Error! Bookmark not defined. 6.0 Enforcement...11 If any member of IT staff is found to have breached this Procedure, they may be subject to disciplinary action.... Error! Bookmark not defined. If any user is found to have breached this security Procedure, they may be subject to disciplinary action.... Error! Bookmark not defined. Any violation of the Procedure by a temporary worker, contractor or supplier may result in the termination of their contract or assignment Procedure Governance Definitions...15 Detail any necessary definitions... Error! Bookmark not defined. More Content... Error! Bookmark not defined. 9.0 References...16 List any reference material used... Error! Bookmark not defined. More Content... Error! Bookmark not defined. IT Premise Access Procedure Page 3
4 1.0 Overview Chinook s Edge is a k-12 Learning organization, delivering. As such, we have a significant interest in the safety and privacy of our students and staff. Also, our data facilities have areas that could be considered hazardous to untrained or unequipped personnel. This document provides the mechanism to protect both our Visitors and the organization, while still filling our mandate of community education and participation. 2.0 Purpose The purpose of this document is to provide guidance for Visitors to Chinook s Edge IT data centres, data wiring and switch rooms, as well as employees sponsoring Visitors to Chinook s Edge. IT Premise Access Procedure Page 4
5 3.0 Scope This Procedure applies to all Visitors, Contractors and sub-contractors to any premise of Chinooks Edge, and to employees who sponsor Visitors. IT Premise Access Procedure Page 5
6 4.0 Risks IT Premise Access Procedure Page 6
7 5.0 Procedure Detail 5.1 Parking Visitors are encouraged to use designated Visitor Parking spots. If these spots are in use, regular employee parking spots should not be used. 5.2 Check-In All Visitors must arrive at a designated Check-In entrance (the main reception desk in most locations). All Visitors must present government-issue photo identification at time of Check-In. All Visitors must be met by their employee sponsor at the time of Check-In. A Visitor cannot sponsor another Visitor. Pets are not permitted; however, assistance animals such as Seeing Eye Dogs are permitted. In some cases prior arrangements may be required. Some technology areas (such as server rooms) are not appropriate for animals under any circumstances. 5.3 Visitor Badges Visitor Badges must be worn at all time. Employees are instructed to immediately report anyone not wearing a Visitor or Employee badge. Visitors requiring access to areas controlled by swipe card access locks should arrange with their sponsor for access. The sponsor or their designate should remain in attendance while the visitor is in these areas. 5.4 Photographs and Cameras Visitors are not permitted to take photographs inside of Chinook s Edge premises, unless arranged specifically with sponsoring employees. For instance, photographs are sometimes required for documentation purposes. If employees have any questions about the suitability of photographs, they should consult the FOIP Coordinator. IT Premise Access Procedure Page 7
8 5.5 Information Disclosure Visitors should not request information that does not pertain to their visit or the work being performed. Confidential or otherwise inappropriate nature, requests for corporate documents, student information, financial projections, comments on any matter currently under litigation or future organizational direction, or requests for information or statements in the name of the company (as might be requested by a reporter or a lawyer) will be reported to the FOIP officer, and will be dealt with under the Penalties section of this document. 5.6 Check-Out Visitors will check out at the same station where they arrived. All Visitor electronics may be checked out individually. Checking out of computers and related equipment may take significantly longer after regular business hours, Visitors should factor this into their estimates for exit times. 5.7 Emergency Evacuation All visitors must be made aware of the evacuation procedure in case of an emergency. In the event of an emergency, it is the sponsoring employee's responsibility to ensure that the Visitor remains in the Roster area. Emergency Coordinators will tally all Visitors using the Visitor Check- In information (using either the preferred online method or the fallback paper sheets). Visitors will not leave the property until it is confirmed with the Emergency Coordinators that they have successfully evacuated the building. 5.8 Multiple Day Visits and Longer Term Contracts Visitors who are at Chinook s Edge for multiple days must follow all procedures associated with this Procedure (Check-In, Check-Out, etc.) on each day of their visit. Longer term contractors can be sponsored for a photo-id badge and would then fall under the Long Term Contractor Procedure. IT Premise Access Procedure Page 8
9 5.9 Visitors and Groups Requesting Tours of the Facility All requests by groups for tours of Chinook s Edge facility will be referred to the Principal, Director or Superintendent for handling as an exception In these cases, a verbal summary of the Emergency Evacuation Procedure and the restrictions on Photographs will be communicated to the Visitor Group prior to entry of the facility by a pre-designated Chinook s Edge employee. Any hazard specific to the areas being visited will also be communicated at that time. Visits to areas of this type may require waivers to be signed individually before entry to the facility. All Visitors or Groups on a tour will be accompanied by their sponsor(s) at all times Network or System Access Consultants or other Visitors that require internet network access can freely access the CESDGUEST Wireless Network. Visitors who require access to production IT networks will need permission from their employee sponsor, who will arrange temporary credentials with the Helpdesk. Part of this procedure will require the Visitor to review the Acceptable Use Procedure. After credentials are arranged, activities on the network will be subject to the Acceptable Use Procedure. Visitor use of employee credentials is not permitted under any circumstances. Visitors who require access to the Student Information network will require prior permission from the FOIP Officer and the Superintendent of System Services. Visitor use of employee credentials is not permitted under any circumstances. Contractors making changes to production systems on either the IT or SIS networks are subject to the IT Systems Change Control Procedure. In these cases, employee sponsors are required to review this Procedure with affected Visitors and ensure that the lead time and exceptions sections especially are clearly identified. Remote Access to Chinook s Edge networks are governed by the Chinook s Edge Remote Access Procedure Courtesy IT Premise Access Procedure Page 9
10 All employees of Chinook s Edge are to bear in mind at all times that all Visitors are stakeholders. Even in the case of clear violations of this Procedure, all actions, dealings and conversations are to be courteous in nature. IT Premise Access Procedure Page 10
11 6.0 Enforcement Compliance This document is maintained jointly by the People Services Department and the Director of Technology. Enforcement of this Procedure falls to these offices, as indicated in this document Administration of the Check-In / Check-Out procedure is the responsibility of identified individuals in each facility. In most facilities it is a duty of the main Reception Desk. Authorized personnel within Chinook s Edge will perform audits on a regular basis. The Director of Technology Services, in accordance with the Audit Procedure, will manage audits. Technology Services will filter findings not related to a specific operational group and then present the findings to the appropriate support staff for remediation or justification. Every effort will be made to prevent audits from causing operational failures or disruptions. The responsibility for implementing this Procedure belongs with all Sponsors. Responsibility for ensuring that new and existing systems remain in compliance with this Procedure resides with the Chinook s Edge Technology Director. If any employee is found to have breached this security Procedure, they may be subject to disciplinary action. Any violation of the Procedure by a temporary worker, contractor or supplier may result in the termination of their contract or assignment. IT Premise Access Procedure Page 11
12 IT Premise Access Procedure Page 12
13 7.0 Procedure Governance The following table identifies who within CESD is Accountable, Responsible, Informed or Consulted with regards to this Procedure. The following definitions apply: Responsible the person(s) responsible for developing and implementing the Procedure. Accountable the person who has ultimate accountability and authority for the Procedure. Consulted the person(s) or groups to be consulted prior to final Procedure implementation or amendment. Informed the person(s) or groups to be informed after Procedure implementation or amendment. Responsible Director Technology Services Accountable Associate Superintendent System Services Consulted Technology Committee, FOIP coordinator, Safety Officer, COLT, Principals, Director of Faciltities Informed All CESD Employees, All Contractors, All temporary workers. IT Premise Access Procedure Page 13
14 IT Premise Access Procedure Page 14
15 8.0 Definitions TERM Application Administration Account DEFINITION Any account that is for the administration of an application (e.g., Oracle database administrator, PowerSchool administrator). IT Premise Access Procedure Page 15
16 9.0 References IT Premise Access Procedure Page 16
CONTRACTORS SAFETY PROCEDURES Health and Safety Procedures Overview. Safety is a high priority of the Chinook s Edge School Division No. 73.
CONTRACTORS SAFETY PROCEDURES Health and Safety Procedures Overview Safety is a high priority of the Chinook s Edge School Division No. 73. Chinook s Edge School Division No. 73 (CESD) is committed to
More informationInformation Privacy and Security
Information Privacy and Security 2015 Purpose of HIPAA HIPAA stands for the Health Insurance Portability and Accountability Act. Its purpose is to establish nationwide protection of patient confidentiality,
More informationHealth, Safety and Welfare Policy
Health, Safety and Welfare Policy General statement of policy Our policy is to provide and maintain safe and healthy working conditions, equipment and systems of work for all our employees, and to provide
More informationHealth and Safety Policy
Health and Safety Policy September 2018 Our Vision We value every child s individuality We value the development of the whole child-academically, physically, emotionally, socially and spiritually. We value
More informationDear Prospective Volunteer,
Dear Prospective Volunteer, Vaughan Animal Services would like to take this opportunity to thank you for your interest in our volunteer program. Please note we currently have three volunteer programs to
More informationReturning Volunteer Application
Returning Volunteer Application Office Use Only Application Received Brenda LeBlanc, Volunteer Coordinator 978-683-4000 x2645 Brenda.leblanc@lawrencegeneral.org Welcome! Returning Volunteers, Before returning,
More informationPHYSICIAN VOLUNTEER APPLICATION
PHYSICIAN VOLUNTEER APPLICATION Name: Specialty: Employer/practice: Office address: Home address: Office phone: Cell phone: Email: DOB: SSN: Language fluencies: KY medical license number & date of last
More informationHIPAA Training
2011-2012 HIPAA Training New Hire Orientation and General Training 1 This training is to ensure all Health Management workforce members (associates, contracted individuals, volunteers and students) understand
More informationMedical Staff Policy Student Observers*
Medical Staff Policy Student Observers* Reviewed Revised 10/2012, 1/2014, 5/2016 *Note that this policy and forms may also be used by Providence Medical Group for student observers in PMG clinic areas
More informationStudent Orientation: HIPAA Health Insurance Portability & Accountability Act
_ Student Orientation: HIPAA Health Insurance Portability & Accountability Act HIPAA: National Privacy Law History of HIPAA What was once an ethical responsibility to protect a patient s privacy is now
More informationRules for Visitation 1. The Tulsa County Sheriff's Office may terminate a visit at any time. 2. The Tulsa County Sheriff's Office reserves the right
Rules for Visitation 1. The Tulsa County Sheriff's Office may terminate a visit at any time. 2. The Tulsa County Sheriff's Office reserves the right to deny entry to any person believed to be a threat
More informationSafety and Security. Last Updated: November Begin
Safety and Security Last Updated: November 2014 Begin Module Objectives When this module is complete, team members will be able to: Identify the roles and responsibilities of security officers. Describe
More informationTHIS AGREEMENT made effective this day of, 20. BETWEEN: NOVA SCOTIA HEALTH AUTHORITY ("NSHA") AND X. (Hereinafter referred to as the Agency )
THIS AGREEMENT made effective this day of, 20. BETWEEN: NOVA SCOTIA HEALTH AUTHORITY ("NSHA") AND X (Hereinafter referred to as the Agency ) It is agreed by the parties that NSHA will participate in the
More informationHEALTH AND SAFETY PROGRAM 103 PLANT ENTRY REQUIREMENTS
Page 1 of 16 1.0 PURPOSE This procedure has been developed to ensure all personnel, other than Axiall employees, entering the plant have the proper security identification and receive a minimum level of
More informationHIPAA Privacy & Security
POWERCHART ACCESS REQUEST FORM Instructions: Complete this form for users who are not employed by St. Dominic-Jackson Memorial Hospital that will access St. Dominic Hospital s electronic health record.
More informationCENTRAL TEXAS MEDICAL CENTER
CENTRAL TEXAS MEDICAL CENTER Date: To: Physician Office Staff Personnel or Billing Agents From: Jan Knott, CMSCICPCS Re: Security Registration In order to register you through the CTMC security system
More informationAdvanced HIPAA Communications and University Relations
Advanced HIPAA Communications and University Relations accepts no liability of any use reliance placed on it, as it is warranty, express, or implied, or completeness of 1 the HIPAA Health Insurance Portability
More informationNORWICH UNIVERSITY TELECOMMUTING POLICY Reviewed and approved on April 30, 2012 OBJECTIVE
NORWICH UNIVERSITY TELECOMMUTING POLICY Reviewed and approved on April 30, 2012 OBJECTIVE This policy is to establish procedures, eligibility requirements, criteria, and responsibilities for approving
More informationHEALTH AND SAFETY POLICY
HEALTH AND SAFETY POLICY Ratified by Governors/Principal: Resources, Finance and Employment Committee (REF) Current ratification date: Spring 2015 Review frequency: Two years Next review date: Spring 2017
More informationREFERENCES: (If applying to assist with religious activities, please include a member of the clergy as a reference.)
BRRJA APPLICATION FOR VOLUNTEER SERVICES SITE: AA NA Academic Religious Other DATE: FULL NAME: Last First Middle HOME ADDRESS: Street City State Zip PHONE: Home Cell Work EMAIL ADDRESS: EDUCATION: HS Degree
More informationSection: Medical Staff Office Page: 1 of 2
Section: Medical Staff Office Page: 1 of 2 Subject: Job Shadowers and Observers Not Covered Under Clinical Affiliation Agreement Executive Owner: Chief Medical Officer Original Policy: 6/4/13 Current Effective
More informationApplication for Volunteer Work
Application for Volunteer Work Volunteer Services All new volunteers are required to complete an Application for Volunteer Work form. The information on this form will be treated in strict confidence under
More informationC OMMUNITY, C OUNSELING, AND C ORRECTIONAL S ERVICES, I NC. WATCH West PROGRAM Visitor Application
C OMMUNITY, C OUNSELING, AND C ORRECTIONAL S ERVICES, I NC. WATCH West PROGRAM Visitor Application Please Print Any incorrect, incomplete, false or misleading information on this application will void
More informationHealth Insurance Portability and Accountability Act. Awareness Training for Volunteers
Health Insurance Portability and Accountability Act Awareness Training for Volunteers Southeastern Health Southeastern Health has a strong tradition of protecting the privacy of patient information. Confidentiality
More informationCollege Health and Safety Committee/Board of Governors
Title: 2017: Health and Safety Policy Originator: College Health and Safety Manager Date: 1 st April 2017 College Health and Safety Committee/Board of Governors General Statement of Intent 1. Introduction
More informationEmployment-Recruitment Non-Facility Personnel File, Orientation, Evaluation & Check-In Requirements (Centura) Page 1 of 6
POLICY TITLE: Non-Facility Personnel File, Orientation, Evaluation & Check-In Requirements (Centura) DEPARTMENT: Human Resources ORIGINATION DATE: 04/01/2011 CATEGORY: Employment-Recruitment EFFECTIVE
More informationReport of the Information & Privacy Commissioner/Ontario. Review of Cancer Care Ontario:
Information and Privacy Commissioner / Ontario Report of the Information & Privacy Commissioner/Ontario Review of Cancer Care Ontario: A Prescribed Entity under the Personal Health Information Protection
More informationSecurity Management Plan
Effective Date: 01/2017 1 of 10 I. Table of Contents: I Table of Contents II Authority III Purpose & Scope IV Policy Statement V The Joint Commission Standards VI Performance Standards VII DUPD Services
More informationWilliamson County EMS (WCEMS) HIPAA Training for Third Out Riders
Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders Training Statement: This training program is designed to educate you on WCEMS legal requirements to protect our patients rights and confidentiality,
More informationTABLE OF CONTENTS Roles & Responsibilities
TABLE OF CONTENTS Roles & Responsibilities 2. ROLES & RESPONSIBILITIES... 2--2 A. PURPOSE... 2 2 B. SCOPE... 2 2 C. RESPONSIBILITIES... 2 3 D. ENFORCEMENT OF HEALTH AND SAFETY RULES.... 2---6 E. PROGRAM
More informationLifeBridge Health HIPAA Policy 4. Uses of Protected Health Information for Research
LifeBridge Health HIPAA Policy 4 Uses of Protected Health Information for Research This Policy contains the following Sections: I. Policy II. III. IV. Definitions Applicability Procedures A. Individual
More informationHigher Administration HEALTH AND SAFETY AT WORK. Unit 1.3
Higher Administration HEALTH AND SAFETY AT WORK Unit 1.3 Below is a summary of the main health and safety points covered by the range of Health and Safety Acts Fire Procedures Fire Drills Fire Exits Fire
More informationMCCP Online Orientation
1 Objectives At the conclusion of this presentation, students will be able to: Discuss application of HIPAA to student s role. Describe the federal requirements of the HIPAA/HITECH regulations that protect
More informationIVAN FRANKO HOME Пансіон Ім. Івана Франка
THE IVAN FRANKO HOME S COMMITMENT TO PRIVACY PRIVACY STATEMENT The Ivan Franko Home respects this privacy of our residents, employees, Directors, volunteers and donors. We are committed to ensuring that
More informationHIPAA Privacy Training for Non-Clinical Workforce
Office of Compliance Programs HIPAA Privacy Training for Non-Clinical Workforce Revised: January 24, 2017 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA)
More informationAsbestos Management Plan
Asbestos Management Plan Version Control Sheet Version Date Reviewed By Revision Details 1 12/12/2017 Louise Newsham Asbestos Management Plan created. Page 2 of 9 Asbestos Management Plan, Version 1, 12/12/17
More informationLaboratory Access Policy
2017 Laboratory Access Policy PREPARED BY CHEMICAL SAFETY COMMITTEE APPROVED MAY 9, 2014 REVISED JULY, 2016 Table of Contents 1 LETTER OF PROMULGATION...2 2 Introduction...3 3 Research Laboratory Access
More informationPrivacy and Security Orientation for Visiting Observers. DUHS Compliance Office
Privacy and Security Orientation for Visiting Observers DUHS Compliance Office 919-668-2573 compliance@dm.duke.edu Introduction This orientation is to provide new Visiting Observers with the HIPAA Privacy
More informationInternship Application x2645
Internship Application 978-683-4000 x2645 Office Use Only Application Received Interview Orientation CORI TB1 TB2 Pin # Entered in Volgistics FLU PERSONAL INFORMATION First Name Last Name Street Address
More informationPRIVACY POLICIES AND PROCEDURES
Vinay M. Reddy, M.D., Ethelynda Jaojoco, M.D. Karen D. Cain, PA-C Julie J. Stackhouse, PA-C Jacie Touart, PA-C Brian Vaccarezza, PA-C Physical Medicine & Rehabilitation Electrodiagnostic Medicine Disorders
More informationPatient and Family Partner Policies Handbook and Agreement
Patient and Family Partner Policies Handbook and Agreement At BC Cancer, we strive to build our services around our patients and families. Patient-centred care is a shared priority among the BC Ministry
More informationChild Protection/Safeguarding Policy Lettings Policy E-Safety Policy Fire Safety Manual First Aid Policy. Minibus Policy Physical Intervention Policy
Page 1 of 12 Document Title Security Policy Current Version V1-09/16 Authors Kathrin Williams, Business Manager Chris Teague, Premises Manager Related Policies Administration of Medicines Policy Child
More informationPersonal Electronic Devices Acceptable Use Policy
Personal Electronic Devices Acceptable Use Policy Version 1.0 Purpose: For use by: This document is compliant with /supports compliance with: This document supersedes: Approved by: To advise Trust staff
More informationDean s Policy and Operating Memorandum 08-1
Dean s Policy and Operating Memorandum 08-1 OFFICE OF THE DEAN UNITED STATES MILITARY ACADEMY WEST POINT, NEW YORK 10996 MADN-LIB 1 August 2016 West Point Jefferson Hall Library And Learning Center Para
More informationParental Consent For Minors to Receive Services
Parental Consent For Minors to Receive Services Welcome to the University of San Diego s Wellness Area! We appreciate your coming our way, and look forward to working with you. The following provides important
More informationVisitor management policy
Visitor management policy 1. Mission statement We are proud to be a happy, diverse and inclusive school where everybody matters. School Aims Helping to challenge inspire and motivate each other. Aiming
More informationDean s Policy and Operating Memorandum 08-3
Dean s Policy and Operating Memorandum 08-3 OFFICE OF THE DEAN UNITED STATES MILITARY ACADEMY WEST POINT, NEW YORK 10996 MADN-LIB 30 June 2018 Bartlett Hall North, Fourth Floor USMA Library Operations
More informationHealth and Safety Policy
Health and Safety Policy Aim of the Academy To provide unique and enriching opportunities for all. This policy should be read in conjunction with: Langley Academy Health and Safety of Students on Educational
More informationSECTION: Health, Safety & Security POLICY #: 524 TITLE: PROCEDURE #: 524-A. DEPT: Business Services DIVISION: Risk Management
ADMINISTRATIVE POLICIES SECTION: Health, Safety & Security POLICY #: 524 TITLE: PROCEDURE #: 524-A Building Security and Access ORDER #: 09-3 DEPT: Business Services DIVISION: Risk Management ADOPTED:
More informationPediatric Dental Specialists
Pediatric Dental Specialists Notice of Privacy Practices This Notice describes how your health information may be used and disclosed and how you can get access to this information. Please review it carefully.
More informationWHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004
Rev. 1/22/2010 HIPAA TRAINING WHAT IS HIPAA? Health Insurance Portability and Accountability Act HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004
More informationRules for Non Trackside Sponsors joining the Sentinel Scheme
Rules for Non Trackside Sponsors joining the Sentinel Scheme Rules for Non Trackside Sponsors joining the Sentinel Scheme...1 Introduction...1 1. Sponsorship...2 2. Management System Requirements...5 3.
More informationRELATIONS WITH LAW ENFORCEMENT AUTHORITIES AND SOCIAL SERVICE AGENCIES
Regulation KLG-RA Las Cruces Public Schools Related Entries: Responsible Office: JIH, JIH-R, KLG, KI, KI-R Associate Superintendent for Operations RELATIONS WITH LAW ENFORCEMENT AUTHORITIES AND SOCIAL
More informationHANDBOOK FOR VOLUNTEERS
HANDBOOK FOR VOLUNTEERS Head Office - Unit 10/5-11 Hollywood Avenue Bondi Junction NSW 2022 www.hardiagedcare.com.au FACILITIES ARE LOCATED AT Blacktown Guildford Mountainview (Penrith) Seven Hills Wyoming
More informationCLINICIAN S GUIDE TO HIPAA PRIVACY
CLINICIAN S GUIDE TO HIPAA PRIVACY Introduction... 2 What is HIPAA?... 2 Health Information Privacy... 2 Protected Health Information... 3 Identifiers... 3 HIPAA s Impact on Clinical Practice, Treatment,
More informationHALLS LICENCE AGREEMENT 2016/2017
HALLS LICENCE AGREEMENT 2016/2017 February 2016 THIS AGREEMENT is made on the date specified in your Offer Letter. BETWEEN The University of Nottingham and the Student whose name is on the Offer Letter.
More informationTelecommuting Policy - SAMPLE
Telecommuting Policy - SAMPLE XYZ Corporation considers telecommuting to be a viable alternative work arrangement in cases where individual, job and supervisor characteristics are best suited to such an
More informationGuest Relations for Students
Guest Relations for Students Guest Relations Tift Regional Health System s (TRHS) culture as an organization and the principles of human relationships by which we operate are reviewed in this program.
More informationMelrose. Mr H G & Mrs A De Rooij. Overall rating for this service. Inspection report. Ratings. Requires Improvement
Mr H G & Mrs A De Rooij Melrose Inspection report 8 Melrose Avenue Hoylake Wirral Merseyside CH47 3BU Tel: 01516324669 Website: www.polderhealthcare.co.uk Date of inspection visit: 24 April 2017 27 April
More informationPrivacy and Security Training for Connecting Ontario. PACE Cardiology April, 2017
Privacy and Security Training for Connecting Ontario PACE Cardiology April, 2017 Session Goals By the end of this session you will: Review key elements of privacy protection Know your privacy obligations
More informationNotice of Privacy Practices
Notice of Privacy Practices This notice describes how medical information about you may be used and disclosed, and how you can get access to this information. Please review it carefully. Our commitment
More informationCorporate. Visitors & VIP s Standard Operating Procedure. Document Control Summary. Contents
Corporate Visitors & VIP s Standard Operating Procedure Document Control Summary Status: Version: Author/Owner: Approved by: Ratified: Related Trust Strategy and/or Strategic Aims Implementation Date:
More informationSample Notice of Privacy Practices 2 of 6 cda.org/practicesupport
Sample Notice of Privacy Practices 2 of 6 cda.org/practicesupport RUSSELL L. CURETON D.D.S. Notice of Privacy Practices This Notice describes how your health information may be used and disclosed and how
More informationSAISD Volunteer Information Packet
SAISD Volunteer Information Packet Thank you for choosing to volunteer in the San Antonio Independent School District. We hope that the time that you spend volunteering at SAISD is both fun and rewarding.
More informationRaptor Sex Offender Visitor Management Procedures Guide
Raptor Sex Offender Visitor Management Procedures Guide RAPTOR VISITOR MANAGEMENT GUIDE 2014-15 1 Table of Contents Contents... 2 FAQ s... 3 Introduction... 6 General Procedures... 7 Visitor Categories...
More informationCaldecote Day Nursery
Health & Safety General Policy EYFS: 3.25, 3.28, 3.29, 3.30, 3.44, 3.45, 3.46, 3.47, 3.50, 3.51, 3.54, 3.55, 3.56, 3.57, 3.63, 3.64, 3.65, 3.66 At Caldecote Day Nursery we provide and maintain safe and
More informationNorth Town Nursery. Policy on Camera, Mobile Phone and Recording Device Use. Signed:.Head teacher. Signed: Chair of Governors. Date: September 2016
Policy on Camera, Mobile Phone and Recording Device Use Signed:.Head teacher Signed: Chair of Governors Date: Reviewed in: Table Of Contents 1. Policy Name... 3 2. Scope and Application... 3 3. Procedures...
More informationNew HIPAA Privacy Regulations Governing Research. Karen Blackwell, MS Director, HIPAA Compliance
New HIPAA Privacy Regulations Governing Research Karen Blackwell, MS Director, HIPAA Compliance kblackwe@kumc.edu 913-588 588-0942 HIPAA Health Insurance Portability and Accountability Act In a Nutshell
More informationVolunteers in Public Schools
Volunteers in Public Schools Kent School District Volunteer Program Manual Successfully Preparing All Students For Their Futures Table of Contents Overview... 2 School/Department Responsibilities... 3
More informationVHA Privacy Policy Training FY VHA Privacy Office
VHA Privacy Policy Training Applicable Confidentiality Statutes and Regulations The following legal provisions govern the collection, use, maintenance, and disclosure of information from VHA records. The
More informationPiedmont Healthcare, Inc. Code of Conduct
Piedmont Healthcare, Inc. Code of Conduct You are part of the Piedmont Healthcare family, a group of talented and dedicated people who take pride in what you do and are committed to our patients and our
More informationFailure to comply may result in WU being liable for civil and criminal penalties under the HIPAA regulations.
HIPAA Privacy Procedure #1 Effective Date: April 14. 2003 Reviewed Date: February, 2011 Accountabilities for Compliance to HIPAA Privacy Revised Date: February, 2011 Rules Scope: Radiation Oncology ************************************************************************************************
More informationHealth and Safety Plan
Health and Safety Plan Mission Statement: The mission of Manatee Technical College is to produce highly skilled individuals and resourceful leaders through collaborative education to meet the ever-changing
More informationStudent Orientation Post-Assessment
Name Date Student Orientation Post-Assessment Print, answer questions and bring with you to Education Resources at Penrose Hospital. 1. List two (2) of the seven (7) Centura Core Values and describe their
More informationCareer Counselling. University of lethbridge. COunselling & Career. SERvices AH
Career Counselling University of lethbridge COunselling & Career SERvices counselling.services@uleth.ca AH153 403-317-2845 Informed Consent for Career Counselling Purpose: For you to understand the process,
More informationDORMITORY RULES AND REGULATIONS OF THE JOHN PAUL II CATHOLIC UNIVERSITY OF LUBLIN
DORMITORY RULES AND REGULATIONS OF THE JOHN PAUL II CATHOLIC UNIVERSITY OF LUBLIN GENERAL PROVISIONS 1 1. The student dormitory, called SD henceforth, is an integral part of the John Paul II Catholic University
More informationHIPAA Privacy Regulations Governing Research
HIPAA Privacy Regulations Governing Research HIPAA Health Insurance Portability and Accountability Act In a Nutshell The Privacy Regulations govern a provider s use and disclosure of health information
More informationSchool Security Policy April 2017
Somers Park Primary School Non-statutory Policy School Security Policy April 2017 Responsibility: Head Teacher Agreed on: January 2018 Signed: To be reviewed: January 2020 School Security Policy Introduction
More informationSentinel Scheme Rules
Purpose and Scope... 1 1. The... 2 2. Roles and Responsibilities... 4 3. Management System Requirements... 8 4. Breaches of the... 14 5. Investigating breaches of the... 15 6. Scheme Assurance Arrangements...
More informationHEALTH AND SAFETY POLICY/ RISK ASSESSMENT POLICY
HEALTH AND SAFETY POLICY/ RISK ASSESSMENT POLICY STATEMENT OF INTENT The Governors of Madani Primary School are committed to the promotion of a safe and healthy environment for staff and pupils and for
More informationTABLE OF CONTENTS A. INTRODUCTION 3 B. MSRC USERS 3 C. MSRC ACCESS 3 D. POLICIES 5 E. MSRC HEALTH AND SAFETY 6 F. LABORATORY MANAGERS MEETINGS 7
MSRC USER'S MANUAL 2016 TABLE OF CONTENTS PAGE A. INTRODUCTION 3 B. MSRC USERS 3 C. MSRC ACCESS 3 D. POLICIES 5 E. MSRC HEALTH AND SAFETY 6 F. LABORATORY MANAGERS MEETINGS 7 G. EXTRACURRICULAR USE OF MSRC
More informationRaptor V-Soft Procedural Guide
Raptor V-Soft Procedural Guide Table of Contents Overview... 3 Visitor Management System Procedures... 3 Introduction... 3 General Procedures... 3 Visitor Categories... 4 District 209 Employees That Forget
More informationRadiation Protection Procedures for the Cincinnati Proton Therapy Center (CPTC)
Radiation Protection Procedures for the Cincinnati Proton Therapy Center (CPTC) Ver 1.3 1 Cincinnati Children s Medical Center University of Cincinnati Revision Number Original- Ver 1 Date of Revision
More informationHealth and Safety General Policy
Health and Safety General Policy At Little Faces Nursery we provide and maintain safe and healthy working conditions, equipment and systems of work for all our employees and a safe early learning environment
More informationSafeguarding Policy 2016/17
Safeguarding Policy 2016/17 JTL Safeguarding Policy Safeguarding Policy I confirm that I have received, read and understand and agree to abide by the JTL Safeguarding Policy....... Signature......... Date......
More informationPATIENT BILL OF RIGHTS & NOTICE OF PRIVACY PRACTICES
Helping People Perform Their Best PRIVACY, RIGHTS AND RESPONSIBILITIES NOTICE PATIENT BILL OF RIGHTS & NOTICE OF PRIVACY PRACTICES Request Additional Information or to Report a Problem If you have questions
More informationPatient Appointment Agreement
Patient Appointment Agreement Welcome and thank you for choosing the East Carolina University School of Dental Medicine for your oral health care needs. We are committed to providing you with the best
More informationSTANDARD ADMINISTRATIVE PROCEDURE
STANDARD ADMINISTRATIVE PROCEDURE 16.99.99.M0.21 Patient Request to Amend Personal Health Information Approved October 27, 2014 Next scheduled review: October 27, 2019 SAP Statement This procedure applies
More informationDEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, D,C,
-= DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, D,C, 20350-2000 IN REPLY REFER TO 5211 Ser DNS-36/6U833273 7 Sep 06 From: Subj: Chief of Naval Operations
More informationReport of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN):
Information and Privacy Commissioner / Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Cardiac Care Network of Ontario (CCN): A Prescribed Person under the Personal Health
More informationCOunselling & Career SERvices
Personal Counselling University of lethbridge COunselling & Career SERvices counselling.services@uleth.ca AH153 403-317-2845 Informed Consent for Personal Counselling Purpose: For you to understand the
More informationHealth and Safety Policy
Health and Safety Policy 1. Introduction The health, safety and welfare of all the people who work or learn at our School are of fundamental importance. We aim to provide a safe, secure and pleasant working
More informationHOW TO MAINTAIN A LAB NOTEBOOK- RECORD KEEPING AND HIPAA. Fern Tsien, PhD Department of Genetics LSUHSC
HOW TO MAINTAIN A LAB NOTEBOOK- RECORD KEEPING AND HIPAA Fern Tsien, PhD Department of Genetics LSUHSC Type and Format Check with your mentor if he/she requires a specific format depending on the type
More informationVolunteer Application
Volunteer Application I. CONTACT INFORMATION Mr. Mrs. Name (first): (middle): (last): Ms. Home Address: City: State: Zip: Phone (home): E-mail Address: (business): (cell): Birth Date: Employer/School:
More informationHIPAA and Joint Commission Requirements Compared and Contrasted
HIPAA and Joint Commission Requirements Compared and Contrasted Twelfth National HIPAA Summit April 10, 2006 Fran Carroll Corporate Compliance and Privacy Officer Joint Commission on Accreditation of Healthcare
More informationtyuiopasdfghjklzxcvbnmqwertyuiopas dfghjklzxcvbnmqwertyuiopasdfghjklzx cvbnmqwertyuiopasdfghjklzxcvbnmq wertyuiopasdfghjklzxcvbnmqwertyuio
tyuiopasdfghjklzxcvbnmqwertyuiopas dfghjklzxcvbnmqwertyuiopasdfghjklzx cvbnmqwertyuiopasdfghjklzxcvbnmq wertyuiopasdfghjklzxcvbnmqwertyuio SAINT MARTIN S UNIVERSITY pasdfghjklzxcvbnmqwertyuiopasdfghj Student
More informationPrivacy and Security For Teammates
Privacy and Security For Teammates This self-directed learning module contains information all CRHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience:
More informationMERCED YOUTH COUNCIL General Guidelines
MERCED YOUTH COUNCIL General Guidelines Background The The Merced Merced City City established established a a task task force force in in 2013 2013 to to research researchand and get get youth youth input
More informationMonkstown Hockey Club, Safety Statement
2015/16 Monkstown Hockey Club, Safety Statement Rev (1) This document is a working document which will be reviewed and updated in line with knowledge and experience of implementation. It is hoped therefore
More informationHealth and Safety Policy for Worcesters School
London Borough of Enfield Health and Safety Policy Worcesters Primary School 01.03.16 Name Signature Date Revised by: Checked and Reviewed by: Approved by: Lesley Crossman Karen Jaeggi Chair of Governors
More information