Draft Order. Draft U.S. Government Accountability Office GAO INFORMATION SYSTEMS RULES OF BEHAVIOR TBD

Size: px
Start display at page:

Download "Draft Order. Draft U.S. Government Accountability Office GAO INFORMATION SYSTEMS RULES OF BEHAVIOR TBD"

Transcription

1 U.S. Government Accountability Office Draft Order Draft Subject: GAO INFORMATION SYSTEMS RULES OF BEHAVIOR Chapter 1. Introduction Purpose and Scope Supersession Authority Definitions Security Web Page. 3 Chapter 2. Requirements General Requirements Virtual Desktop Infrastructure (VDI) Making Changes to GAO IT Resources Passwords Physically Protecting GAO IT Resources Using GAO IT Resources Away from GAO Using the Internet Using Using Personally Owned Hardware and Software Using Compact Discs, USB Drives, and other Removable Media Printing Running Into Problems. 8 Chapter 3. Enforcement and Penalties Penalties Accountability for Personal Use of GAO IT Resources Authority to Recover and Restore GAO IT Resources Authority to Monitor Use of GAO IT Resources. 9 Appendix 1. References Appendix 2. Description of Changes Distribution: GAO Intranet Initiated by: Information Systems and Technology Services (ISTS)

2 Draft Chapter 1. Introduction 1. Purpose and Scope. a. This order provides instructions regarding permitted and prohibited activities when using Government Accountability Office (GAO) Information Technology (IT) resources and accessing GAO information, generally referred to as Information Systems Rules of Behavior. b. This order applies to GAO employees (referred to as covered persons ). The requirements herein shall apply to contractor personnel and other nongovernment employees by the inclusion of references in contracts or memorandums of agreement as conditions for using GAO office equipment and space. c. This order does not apply to GAO IT resources that are authorized for processing, maintaining, or communicating classified national security information (referred to as classified information ). See GAO Directive , Information Security Requirements for Classified Information. 2. Supersession. This order supersedes GAO Directive , GAO Information Technology Rules of Behavior, dated September 15, Authority. a. This order is issued under the authority of GAO Order , Information Systems Security Policy, and GAO Order , GAO Security Program. b. This order is consistent with (and related guidance can be found in) (1) GAO Order , Limited Personal Use of Government-Provided Office and IT Equipment, Including Internet; (2) GAO Order , GAO's Telework Program and GAO Order , Telework for Non-Bargaining Unit Employees; and (3) GAO Order , Control of Capitalized and Other Accountable Personal Property. 4. Definitions. a. For purposes of this order, GAO information is all information used in the course of GAO authorized work, whether for mission or administrative purposes. This includes information relating to audits and investigations, and internal personnel and financial management. It includes information on internal and external Web sites maintained by GAO, computer hard drives, and USB drives and other mobile storage devices. Examples include word processor and spreadsheet documents, business related , internal Web application and Web page contents, and logs from computer systems. b. Sensitive information refers to any information under the authority or control of GAO that is not classified national security information (referred to as classified information ), but that requires protection to ensure that it is not released to the public or any other individual or organization not under the authority or control of GAO without further review because it may be exempt from such disclosure. Examples of sensitive information include: 2

3 Draft personally identifiable information (PII), national security information, law enforcement information, proprietary commercial rights, and internal agency decision-making (GAO Order Information Security Requirements for Sensitive Information). c. GAO IT resources include all IT under the authority or control of GAO, including hardware (e.g., smartphones, computers, tablets, servers, etc.), software, and the GAO network. d. GAO network is the IT infrastructure (hardware and software) that provides information processing and communications capabilities to GAO covered persons. This includes information processing at user workstations, access to the Internet, and internal GAO Web sites, Web applications, , and printing. The GAO network provides this access to covered persons at GAO facilities and remotely, via the Internet, to covered persons at home and on travel. e. Hardware is physical IT resources. This includes laptops, workstations, and other technology, including computer peripherals such as monitors, keyboards, mice, docking stations, mobile storage devices (such as portable hard drives, USB drives, CD-ROMs, and DVDs), and mobile communications devices (such as smartphones and tablets). f. Software is digital (nonphysical) IT resources, not including information. This includes operating systems, applications running on a laptop or desktop computer, and applications accessed via the GAO network. Examples of software include Microsoft Windows, Microsoft Word, Microsoft Outlook, as well as engagement-support applications such as EAGLE, the Engagement Management System (EMS), and the various security tools installed on GAO user workstations. g. Personally owned hardware and software is hardware or software owned by the user. Examples of personally owned hardware and software include a personal home computer, an MP3 player, a non-gao smartphones, and software such as productivity suites, video games, and communications tools purchased by the user rather than GAO. h. Third-party devices are hardware not owned by the user and not under the authority or control of GAO. Examples of third-party devices include hotel wireless access points, computers in Internet cafes and similar settings, and equipment owned by other agencies. i. Users (also known as covered persons) are all GAO employees. 5. Security Web Page. The IT Security Policy webpage on GAO s intranet contains updates to GAO information systems security guidance. Chapter 2. Requirements 1. General Requirements. a. Users must understand that there is no expectation of privacy as any information on or transmitted through GAO IT resources may be monitored, recorded, or copied by authorized personnel, and such information may be provided to law enforcement officials. b. Use of GAO IT resources is permitted by authorized persons only. 3

4 Draft (1) All users are responsible for understanding current GAO policies and procedures relating to the use of GAO IT resources, including the GAO Information Systems Rules of Behavior, as specified in this order. (2) All users shall immediately report any unauthorized disclosure of sensitive information to a supervisor and to the GAO Help Desk, as provided in Directive , GAO Information Security Incident Response. (3) Authorized use of GAO IT resources requires the user to c. Users shall (a) sign an acknowledgement of the GAO Information Systems Rules of Behavior as a precondition to authorization, and (b) receive annual training on the GAO Information Systems Rules of Behavior. (1) behave in an ethical, proficient, informed, and trustworthy manner, as required by GAO Order , Code of Ethics; (2) use GAO IT resources for the purpose and in the manner they are intended; and (3) protect GAO IT resources from theft, destruction, or inappropriate use. d. Users shall know the sensitivity of the information they are working with, including whether it is classified information, and protect it consistent with GAO policies and procedures, as required by Order GAO Security Program, Directive , Information Security Requirements for Classified Information, and Directive , Information Security Requirements for Sensitive Information. Users shall: (1) Limit personal use of GAO IT resources so that the use does not interfere with the conduct of official business, diminish productivity, or involve inappropriate activity that could adversely reflect on GAO, as required by GAO Order , Limited Personal Use of Government-Provided Office and IT Equipment, Including Internet. (2) Log out of and turn off GAO laptop and desktop computers daily. (3) Be aware of and comply with any relevant system-specific rules of behavior. e. The Chief Information Officer (CIO) may grant waivers for any portion of this order on a temporary or permanent basis. Such waivers may be general or apply to specific users, groups, projects, technologies, and may be based on any factors deemed appropriate by the CIO. 2. Virtual Desktop Infrastructure (VDI). VDI automatically enforces some of the rules/policies described in the following sections. Whether using a physical or virtual device to connect to the GAO Network, these practices will be enforced when connecting to VDI. a. Slim Client Standard desktop image placed on new laptops issued to staff. (1) There is no storage supported on the physical computer. (2) There are no applications (software) on the physical computer. b. All VDI desktops are shut down/recycled every night. 4

5 Draft c. Data download to removable media requires coordination and approval. d. Support for two-factor authentication using RSA token. e. Connection to VDI only requires endpoint (e.g., computer, tablet, or smartphone) to support Citrix Receiver. 3. Making Changes to GAO IT Resources. GAO uses a least privileged policy when building computer images (meaning that users are given enough privileges to be able to do their work, but users should not modify the configuration provided on their assigned computer.) a. Making changes to GAO IT resources without authorization is prohibited. (1) Users shall not change the configuration of GAO IT resources without coordination with, and authorization by, Information Systems and Technology Services (ISTS). (2) Users shall not install software without coordination with, and authorization by, ISTS. (3) Users shall not attempt to override or circumvent security mechanisms, such as login screens and desktop management software. b. No changes may be made to GAO IT resources in a manner inconsistent with GAO Order , Limited Personal Use of Government-Provided Office and IT Equipment, Including Internet. 4. Passwords. For most password requirements, GAO supports two-factor authentication using the RSA token. Users should follow the guidance below and the guidance available in the ISTS Technology Guidance section on the GAO Intranet. a. When creating passwords, users shall follow the ISTS secure password guidelines. b. Users shall not share passwords or personal identification numbers (PIN) with others. c. Users should not save passwords to files on computers except for ISTS-approved password storage applications. d. Passwords should never be written down or stored online, except in an ISTS-approved password application. 5. Physically Protecting GAO IT Resources. It is the responsibility of users to safeguard assigned IT equipment from loss or damage. a. Users shall lock their computer screen (start the screensaver) when leaving the workspace and shut the computer down at the end of the work day. b. Users shall physically secure their RSA SecurID token. When leaving work, precautions include locking it in a cabinet or drawer, or taking it home. It is strongly recommended that users take their token home with them each night to facilitate working from home, if needed. c. Users shall position monitors so that screen contents cannot be seen by individuals who may not have authorization to view them. Whenever possible, monitors should not face doors, windows, or heavily traveled areas. 5

6 Draft Using GAO IT Resources Away from GAO. GAO s solution for accessing the GAO Network when away from the office is primarily to support telework but also supports network access when on travel. a. Users shall not remove GAO IT resources from GAO facilities, except under the following circumstances. (1) Users are authorized to take their GAO non-classified laptops, mobile storage, and/or communications devices home, on travel, or otherwise away from GAO facilities, as needed to perform GAO work. (2) Use of GAO IT resources away from GAO facilities must be consistent with GAO Orders , , , , and associated directives and guidance. b. Upon removal of GAO IT resources from GAO facilities, users are responsible for (1) keeping those resources secure, and (2) complying with the GAO Information Systems Rules of Behavior, as specified in this order. c. Users shall not leave GAO IT resources unattended or unsecured when away from GAO facilities. (1) It is not acceptable to leave GAO IT resources in plain view, unsecured in a room, such as a locked hotel room where persons unknown to the user may have access to the room. Users shall ensure that the resource is secured to the greatest extent possible. (2) Acceptable techniques for securing IT resources should be applied while teleworking. However, the determination of the particular technique to use while teleworking is at the discretion of the individual teleworking, who is responsible for safeguarding GAO assets and information. d. Users are permitted to use GAO IT resources to connect remotely to the GAO Network as needed to perform GAO work. All such work must comply with the requirements set forth in GAO Order , GAO s Telework Program and GAO Order , Telework for Non-Bargaining Unit Employees. e. Use of wireless networks at home, on travel, and at other locations such as coffee shops is permitted for telework purposes and limited personal use. f. The following best practices are strongly recommended when working from home, on travel, or otherwise away from GAO. (1) When working in public spaces, users should be aware of any individuals attempting to read screen contents. (2) Users should consider the security protections of a third-party device before using it for GAO work. Users often want to perform remote access from third-party devices, such as checking from a kiosk computer at a conference or connecting via a wireless access point at an Internet café. Users shall not use third-party devices for GAO work involving sensitive information. See GAO Directive , Information Security Requirements for Sensitive Information. 6

7 Draft (3) Users who use their wired or wireless home networks for telework should ensure that they are securely configured and that all attached devices are securely configured. 7. Using the Internet. Web browsers (e.g., Internet Explorer and Firefox) installed on various GAO IT resources ensure that users are able to access the Internet. Users are also able to use their personal computer s web browser to access the GAO Network. a. When using GAO IT resources, from any location, to access the Internet, the user must comply with existing limited personal use restrictions. (1) The following uses are prohibited except when specifically authorized to perform GAO work: (a) Accessing, downloading, storing, viewing, displaying, or printing sexually explicit or suggestive text or images, or other offensive material; (b) Accessing, downloading, storing, viewing, displaying, or printing violent or haterelated content; (c) Accessing online gambling; and (d) Using peer-to-peer file sharing (P2P). (2) Further requirements and guidance are provided in GAO Order , Limited Personal Use of Government-Provided Office and IT Equipment, Including Internet. 8. Using . It is the responsibility of users to safeguard GAO data that is being transmitted via . a. Users shall exercise caution when conducting GAO business via . (1) Users shall not send official correspondence from a non-gao address without receiving authorization to do so from the CIO and the GAO Records Officer. (2) Users shall not auto-forward GAO information to personal addresses. b. Users are permitted to forward individual s to personal accounts, provided that any data sent is protected commensurate with the sensitivity of the data contained therein. c. Business-related s that meet the definition of a GAO record (see GAO Order , GAO Records Management Program) must be saved into the electronic records management repository in order for the appropriate records retention policy to be applied. d. Further requirements and guidance for protecting sensitive data are provided in GAO Directive , Security Requirements for Sensitive Information. 9. Using Personally Owned Hardware and Software. a. Approval is required from ISTS for use of personally owned hardware (e.g., computers, portable music players, portable hard drives, USB drives, or other peripherals) connecting to the GAO network or their assigned GAO laptop or desktop computer. (Users can initiate this request via the ISTS Helpdesk at (202) ) b. Users are not permitted to load personally owned software on their assigned GAO laptop or desktop computer. GAO uses a least privileged policy when building computer images 7

8 Draft (meaning that users are given enough privileges to be able to do their work but users should not modify the configuration provided on their assigned computer without assistance from ISTS.) c. GAO-issued equipment is preferred for use away from GAO. However, users are permitted to use personally owned hardware and software to connect remotely to the GAO network, as needed, to perform GAO work. All such work must comply with the requirements set forth in GAO Order , GAO s Telework Program and GAO Order , Telework for Non-Bargaining Unit Employees. d. Users are permitted to connect GAO laptops to home and third-party networks for work purposes and limited personal use. All Information Systems Rules of Behavior apply. See chapter 2, paragraph Using Compact Discs, USB Drives, and other Removable Media. a. Users are permitted to store GAO information on GAO-provided writable CDs/DVDs, USB drives, and other removable media, provided that when doing so, they shall (1) Be aware of the sensitivity level of information being stored and protect the media commensurate with the sensitivity level of the information on it. See GAO Directive , Information Security Requirements for Sensitive Information. If unsure, consult a manager. (2) Adhere to secure disposal procedures for media containing GAO information. For more information, visit the Office of Security Web page on the GAO Intranet. (3) Ensure that the removable media does not contain any executable files (.exe). (4) GAO business-related information that meets the definition of a GAO record (see GAO Order , GAO Records Management Program) must be saved into the electronic records management repository in order for the appropriate record retention policy to be applied. b. With using VDI, staff must gain approval from their SES management and coordinate with the Help Desk when they want to store GAO information on removable media. For more information, visit the Downloading to External Devices in VDI webpage on the GAO Intranet. 11. Printing. a. When printing documents, users shall be aware of the sensitivity level of information being printed. Users shall protect the documents commensurate with the sensitivity level of the information. See GAO Directive , Information Security Requirements for Sensitive Information. b. Use of printers is subject to GAO Order , Limited Personal Use of Government- Provided Office and IT Equipment, Including Internet. 12. Running Into Problems. For problems with IT resources, unless noted otherwise below, contact the ISTS Helpdesk at (202)

9 Draft a. Users shall not attempt to perform physical maintenance on GAO IT resources. In the event of damage to GAO IT resources, users shall contact the ISTS Helpdesk. b. In the event that GAO IT resources are stolen, lost, or damaged, (1) users shall notify the GAO Helpdesk as soon as practicable; and (2) the discoverer of the loss, theft, or damage of GAO IT resources shall provide written notification (with a description of the circumstances) to the Director, Security and Emergency Management (SEM), the Director of Facility Management and Services (FMS), and the CIO, as required by GAO Order , and GAO Directive , Protection Services Program. c. Users shall report any incidents of suspected fraud, waste, or misuse of GAO IT resources to the Office of Inspector General at (866) Also, see the OIG fraud web page, Fraud, Waste, and Abuse, on the GAO Intranet. d. Users shall report any condition that might constitute a breach of system security and unusual network, hardware, and software behavior to the ISTS Helpdesk. e. For general problems and questions, users should contact the ISTS Helpdesk. Chapter 3. Enforcement and Penalties 1. Penalties. Users who do not comply with the rules of behavior defined in this order are subject to penalties imposed under existing requirements, as provided in GAO Order , Discipline and Adverse Actions. 2. Accountability for Personal Use of GAO IT Resources. Although GAO does not prohibit all use of GAO IT resources for personal purposes, users will be held accountable for acts deemed inappropriate or negligent. (See GAO Order , Limited Personal use of Government-Provided Office and IT Equipment including Internet.) 3. Authority to Recover and Restore GAO IT Resources. In the event that user-installed software or devices are determined to be the cause of system failure or loss of functionality, GAO reserves the right to erase the hard drive and restore hardware to its original state as it was issued. 4. Authority to Monitor Use of GAO IT Resources. Any information on or transmitted through GAO IT resources may be monitored, recorded, or copied by authorized personnel, and such information may be provided to law enforcement officials. 9

10 Draft Appendix 1. References This appendix lists the GAO orders and directives that are pertinent to this order. a. GAO Order , GAO Information Systems Security. b. GAO Order , GAO Security Program. c. GAO Directive , Information Security Requirements for Sensitive Information. d. GAO Order , GAO Privacy Program. e. GAO Order , GAO Records Management Program. f. GAO Directive , Protection Services Program. g. GAO Order , Control of Capitalized and Other Accountable Personal Property. h. GAO Order , Limited Personal Use of Government-Provided Office and IT Equipment, Including Internet. i. GAO Order , GAO's Telework Program and GAO Order , Telework for Non-Bargaining Unit Employees. j. GAO Order , Discipline and Adverse Actions. 10

11 Draft Appendix 2. Description of Changes The directive has been changed to an order. Therefore, all relevant references to directive have been replaced with order. In addition to editorial changes, the following changes were made: a. Title Section The Title was changed to GAO Information Systems Rules of Behavior to be consistent with the Information Systems Security Policy and to be more inclusive of privacy information. b. Chapter 1 (1) In section 1a, added and accessing GAO information and replaced IT with Information Systems. (2) In section 1b, deleted consultants, contractors, subcontractors, and their employees, and any other persons who have been granted access to GAO IT resources and added The requirements herein shall apply to contractor personnel and other nongovernment employees by the inclusion of references in contracts or memorandums of agreement as conditions for using GAO office equipment and space. (3) Added section 2, Supersession. (4) In section 3b(2), added GAO Order , Telework For Non-Bargaining Unit Employees. (5) In section 4a, added for purposes of this Order and is all. (6) In section 4b, added Sensitive information refers to any information under the authority or control of GAO that is not classified national security information (referred to as classified information ), but that requires protection to ensure that it is not released to the public or any other individual or organization not under the authority or control of GAO without further review because it may be exempt from such disclosure. Examples of sensitive information include: personally identifiable information (PII), national security information, law enforcement information, proprietary commercial rights, and internal agency decision-making (GAO Order Information Security Requirements for Sensitive Information). (7) In section 4c, added (e.g., smartphones, computers, tablets, servers, etc.), to hardware examples. (8) In section 4e, replaced Blackberry with smartphones and cell phones with tablets. (9) In section 4f, deleted the GAO Meeting Room Booking System and JIS and added the Engagement Management System (EMS), and as well as. (10) In section 4g, changed cell phone to smartphones. (11) In section 4i, deleted consultants, contractors, subcontractors, and their employees, and any other persons who have been granted access to GAO IT resources. 11

12 Draft (12) In section 5, updated the reference to the GAO intranet webpage. c. Chapter 2 (1) In section 1a, added must understand that there is no expectation of privacy as; and updated may be monitored, recorded, or copied and added by authorized personnel, and such information may be provided to law enforcement officials. These modifications were made to emphasize the fact that users should have no expectation of privacy when using GAO IT resources. (2) In section 1b(1), updated IT to Information Systems and changed directive to order. (3) In section 1b(2), the following statement was added to ensure that readers know how to report unauthorized disclosure of sensitive information: All users shall immediately report any unauthorized disclosure of sensitive information to a supervisor and to the GAO Help Desk, as provided in Directive , GAO Information Security Incident Response. (4) In section 1b(3) a and b, replaced IT with Information Systems. (5) In section 1d, added Users shall: In section 1d(1) deleted does not and replaced it with or. (6) Section 2 on VDI is new. (7) In section 3 (former section 2), the following clarifying language was added to this section: GAO uses a least privileged policy when building computer images (meaning that users are given enough privileges to be able to do their work, but users should not modify the configuration provided on their assigned computer. (8) In section 4 (former section 3), the following clarifying language was added to the beginning of the section: For most password requirements, GAO supports two-factor authentication using the RSA token. Users should follow the guidance below and the guidance available in the ISTS Technology Guidance section on the GAO Intranet. (9) In section 4d, deleted users are discouraged from writing down passwords. If written down, passwords must be physically and visually secured to ensure they are not used by anyone else and added passwords should never be written down or stored online, except in an ISTS-approved password application. (10) In section 5 (former section 4), the following clarifying language was added: It is the responsibility of users to safeguard assigned IT equipment from loss or damage. (11) The following sentence from former section 4 was deleted: Users shall secure their assigned GAO laptop in the docking station with the provided security cable. (12) In section 6 (former section 5), the following clarifying language was added: GAO s solution for accessing the GAO Network when away from the office is primarily to support telework but also supports network access when on travel. (13) In section 6a(1), added /or to and. 12

13 Draft (14) In section 6a(2), added (15) In section 6b(2) replaced IT with Information Systems. (16) In section 6c, parts 1 and 2 were reversed. In 6c(1), Users shall was added. In 6c(2), the following was added: should be applied while teleworking. However, the determination of the particular technique to use while teleworking is at the discretion of the individual teleworking, who is responsible for safeguarding GAO assets and information. (17) In 6d, added the reference to GAO Order (18) In section 6f(3), deleted the following statement: For additional information, review tips for working outside the office. (19) In section 7 (former section 6), added the following clarifying language to this section: Web browsers (e.g., Internet Explorer and Firefox) installed on various GAO IT resources ensure that users are able to access the Internet. Users are also able to use their personal computer s web browser to access the GAO Network. (20) In section 7a, added from any location language to ensure users know that the limited personal use restrictions apply in all situations. (21) In section 7a(1), replaced as with when and deleted as needed. (22) In Section 7a(1)(d), added P2P acronym and deleted (i.e., Kazaa, BitTorrent, or Napster). (23) In section 8 (former section 7), added the following clarifying language to this section: It is the responsibility of users to safeguard GAO data that is being transmitted via e- mail. (24) In section 8b, deleted All business related s must be saved into the electronic records management repository so that records retention policies will be applied. (25) In section 8c, modified the sentence deleted in 8b to read: Business-related s that meet the definition of a GAO record (see GAO Order , GAO Records Management Program) must be saved into the electronic records management repository in order for the appropriate records retention policy to be applied. (26) In section 9b, added GAO uses a least privileged policy when building computer images (meaning that users are given enough privileges to be able to do their work but users should not modify the configuration provided on their assigned computer without assistance from ISTS.) (27) In section 9c, added and GAO Order , Telework for Non-Bargaining Unit Employees. (28) In section 9d, updated the reference from chapter 2, paragraph 5 to chapter 2, paragraph 6. Also replaced Technology with Systems. (29) In section 10a(1), added For more information, visit the and on the GAO intranet and deleted a link to the GAO Office of Security. 13

14 Draft (30) In section10a(4), added that meets the definition of a GAO record (see GAO Order , GAO Records Management Program), in order for the appropriate, and policy. (31) Added section 10b: With using VDI, staff must gain approval from their SES management and coordinate with the Help Desk when they want to store GAO information on removable media. For more information, visit the Downloading to External Devices in VDI webpage on the GAO Intranet. (32) In section 11, deleted former section 10b: Users shall follow disposal procedures for paper containing GAO Information. See the Office of Security Web page: GAO Office of Security. (33) In section 12 (former section 11), added: For problems with IT resources, unless noted otherwise below, contact the ISTS Helpdesk at (202) Deleted the Helpdesk phone number from the rest of section 12. (34) In section 12b(2) updated the title of the Director of Office of Security (OS) to Director, Security and Emergency Management and Director of Facilities and Property Management to Director of Facility Management and Services (FMS). (35) In section 12c, added on the GAO Intranet and in 12d deleted generally. d. Chapter 3 (1) In section 1, the only order that pertains to penalties is GAO Order ; therefore, the other orders were deleted. Updated title of order to Discipline and Adverse Actions. (2) In section 2, added a reference to GAO Order , Limited Personal use of Government-Provided Office and IT Equipment including Internet. (3) In section 4, deleted GAO reserves the right to monitor, record, or copy any information on or transferred through GAO IT resources and added Any information on or transmitted through GAO IT resources may be monitored, recorded, or copied by authorized personnel, and such information may be provided to law enforcement officials. e. Appendix 1. References (1) Titles of references were updated, as necessary. Dates were deleted. (2) GAO Order , Safeguarding Personnel Records and File (Aug, 23, 2005) and a reference to this order were deleted. (3) Added, GAO Order , GAO Privacy Program (4) Added, GAO Order , GAO Records Management Program (5) Added GAO Directive , Protection Services Program. (6) In section i, added and GAO Order , Telework for Non-Bargaining Unit Employees. 14

Information Privacy and Security

Information Privacy and Security Information Privacy and Security 2015 Purpose of HIPAA HIPAA stands for the Health Insurance Portability and Accountability Act. Its purpose is to establish nationwide protection of patient confidentiality,

More information

I. PURPOSE DEFINITIONS. Page 1 of 5

I. PURPOSE DEFINITIONS. Page 1 of 5 Policy Title: Computer, E-mail and Mobile Computing Device Use Accreditation Reference: Effective Date: October 15, 2014 Review Date: Supercedes: Policy Number: 4.31 Pages: 1.5.9 Attachments: October 15,

More information

Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008)

Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008) Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008) Your Information Management Officer (IMO), System Administrator (SA) or Information Assurance

More information

Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Updated FY15 Dignity Health General Compliance Education for Staff Module 2 Updated FY15 Dignity Health General Compliance Education for Staff Module 2 This course will provide you with important information about the laws and regulations that affect the healthcare industry, our

More information

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 Incorporating Change 1, October 27, 2017 SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure

More information

Security Risk Analysis

Security Risk Analysis Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis.

More information

Chapter 9 Legal Aspects of Health Information Management

Chapter 9 Legal Aspects of Health Information Management Chapter 9 Legal Aspects of Health Information Management EXERCISE 9-1 Legal and Regulatory Terms 1. T 2. F 3. F 4. F 5. F EXERCISE 9-2 Maintaining the Patient Record in the Normal Course of Business 1.

More information

NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation File: July 13, 2015

NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation File: July 13, 2015 NORTHWEST TERRITORIES INFORMATION AND PRIVACY COMMISSIONER Review Recommendation 15-138 File: 14-192-4 July 13, 2015 BACKGROUND In November of 2014, a physician working on contract with the Stanton Territorial

More information

United States Department of Agriculture. Office of the Chief Information Officer DN

United States Department of Agriculture. Office of the Chief Information Officer DN United States Department of Agriculture Office of the Chief Information Officer DN 3300-011 Commercial Wireless Technologies in USDA Acceptable Use Policy Commercial Wireless Technologies in USDA Acceptable

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Document Number 2010/35/V1 Document Title Data Protection Policy Author Nic McCullagh Author s Job Title Information Governance Manager Department IM&T Ratifying Committee Capacity

More information

Notre Dame College Website Terms of Use

Notre Dame College Website Terms of Use Notre Dame College Website Terms of Use Agreement to Terms of Use These Terms and Conditions of Use (the Terms of Use ) apply to the Notre Dame College web site located at www.notre-dame-college.edu.hk,

More information

MEMORANDUM FOR HEADQUARTERS, UNITED STATES ARMY ACQUISITION SUPPORT CENTER (HQ, USAASC), FORT BELVOIR, VA 22060

MEMORANDUM FOR HEADQUARTERS, UNITED STATES ARMY ACQUISITION SUPPORT CENTER (HQ, USAASC), FORT BELVOIR, VA 22060 DEPARTMENT OF THE ARMY UNITED STATES ARMY ACQUISITION SUPPORT CENTER 9900 BELVOIR ROAD, BUILDING 201, SUITE 101 FORT BELVOIR, VIRGINIA 22060-5567 SFAE-SPA MEMORANDUM FOR HEADQUARTERS, UNITED STATES ARMY

More information

Policy on Telecommuting

Policy on Telecommuting Page 1 of 9 PURPOSE: California State University Channel Islands supports telecommuting when the campus determines that telecommuting is in its best interest. Such instances for telecommuting

More information

PRIVACY BREACH MANAGEMENT POLICY

PRIVACY BREACH MANAGEMENT POLICY \(.kon Education Education PRIVACY BREACH MANAGEMENT POLICY Effective Date: September 1, 2016 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (A TIPP Act) public bodies

More information

PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY

PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY CLASSIFICATION Internal DOCUMENT NO: DOCUMENT TITLE: OIL-IS-PRO-MDTP PROCEDURE FOR MOBILE DEVICE & TELEWORKING POLICY VERSION NO 1.0 RELEASE DATE 28/02/2015 LAST REVIEW DATE 31.03.2017 PROCEDURE FOR MOBILE

More information

CENTRAL TEXAS MEDICAL CENTER

CENTRAL TEXAS MEDICAL CENTER CENTRAL TEXAS MEDICAL CENTER Date: To: Physician Office Staff Personnel or Billing Agents From: Jan Knott, CMSCICPCS Re: Security Registration In order to register you through the CTMC security system

More information

COUNTY OF EL DORADO, CALIFORNIA

COUNTY OF EL DORADO, CALIFORNIA HR-01 1 of 16 I. DEFINITION Telework - An alternative work mode in which the employee works in a designated area outside their principal work location. Teleworker - An employee who meets the eligibility

More information

Privacy and Security For Teammates

Privacy and Security For Teammates Privacy and Security For Teammates This self-directed learning module contains information all CRHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience:

More information

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD Report No. D-2009-111 September 25, 2009 Controls Over Information Contained in BlackBerry Devices Used Within DoD Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for

More information

Emergency Medical Services Division Policies Procedures Protocols

Emergency Medical Services Division Policies Procedures Protocols Emergency Medical Services Division Policies Procedures Protocols Patient Medical Record Security and Privacy Policies and Procedures (1003.00) I. GENERAL PROVISIONS: A. The intent of these policies and

More information

INCOMPLETE APPLICATIONS WILL NOT BE PROCESSED

INCOMPLETE APPLICATIONS WILL NOT BE PROCESSED Dear Applicant: Enclosed in this reappointment application for membership to the Guadalupe Regional Medical Center (GRMC) Allied Health Professionals Staff, you will find the following. Allied Health Professional

More information

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information PP-501.00 SOP For Safeguarding Protected Health Information Effective date of version: 01 April 2012 Study Management PP 501.00 STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

More information

(1) COMNAVRESFOR Telework Information Technology Strategy

(1) COMNAVRESFOR Telework Information Technology Strategy DEPARTMENT OF THE NA VY COMMANDER NAVY RESERVE FORCE 1915 FORRESTALDRIVE NORFOLK. V IRGINIA 2355 1-4615 COMNAVRESFOR INSTRUCTION 12610.2A COMNAVRESFORINST 12610.2A NOOCP From : Subj : Commander, Navy Reserve

More information

Safeguarding Healthcare Information. By:

Safeguarding Healthcare Information. By: Safeguarding Healthcare Information By: Jamal Ibrahim Enterprise Info Security ICTN 4040-602 Spring 2015 Instructors: Dr. Phillip Lunsford & Mrs. Constance Bohan Abstract Protection of healthcare information

More information

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA This Application is for Non-employed Clinical Assistants (RN, dental assistant, orthotist, etc) who wish to assist a supervising physician at one or more of our facilities. Advanced Practice Nurses (CRNA,

More information

Report of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN):

Report of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN): Information and Privacy Commissioner / Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Cardiac Care Network of Ontario (CCN): A Prescribed Person under the Personal Health

More information

ethesis Submission Guide: PGR Students

ethesis Submission Guide: PGR Students ethesis Submission Guide: PGR Students Table of Contents ethesis submission overview... 2 Notice of Submission... 3 Submitting via My Manchester... 3 Logging in... 3 Unable to see My ETD portlet... 3 ethesis

More information

AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS. Information and tips on how to keep you FIPPA FRIENDLY

AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS. Information and tips on how to keep you FIPPA FRIENDLY AN OVERVIEW OF FIPPA for FACULTY, INSTRUCTORS & ADMINISTRATORS Information and tips on how to keep you FIPPA FRIENDLY Privacy Legislation Ontario universities were made subject to provincial Freedom of

More information

Supply Chain Risk Management

Supply Chain Risk Management Supply Chain Risk Management 731 07 December 2013 A. AUTHORITY: The National Security Act of 1947, as amended; 50 USC 3329, note (formerly 50 USC 403-2, note); the Counterintelligence Enhancement Act of

More information

Telecommuting Policy - SAMPLE

Telecommuting Policy - SAMPLE Telecommuting Policy - SAMPLE XYZ Corporation considers telecommuting to be a viable alternative work arrangement in cases where individual, job and supervisor characteristics are best suited to such an

More information

Teleworking and access to ECHA IT systems

Teleworking and access to ECHA IT systems Teleworking and access to ECHA IT systems Biocides CA meeting 16 May 2013 Hugues KENIGSWALD Background The same security model is used to access both REACH/CLP and Biocides data Unified Security Declaration

More information

Technology Standards of Practice

Technology Standards of Practice 2016 Technology Standards of Practice Used with permission from the Association of Social Work Boards (2016) Table of Contents Technology Standards of Practice 2 Definitions 2 Section 1 Practitioner Competence

More information

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File The Alexandra Hospital, Ingersoll PRIVACY POLICY SUBJECT-TITLE Privacy Policy REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust DATE Oct 11, 2005 Nov 8, 2005 POLICY CODE DATE OF ORIGIN

More information

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES INFORMATION TECHNOLOGY, MOBILES AND DIGITAL MEDIA POLICY AND PROCEDURES Updates Who Updated Comments Aug annually Lewis External version TABLE OF CONTENTS AIMS AND LEGISLATION... 3 MOBILE PHONES PARENTS/CARERS

More information

HIPAA Privacy Training for Non-Clinical Workforce

HIPAA Privacy Training for Non-Clinical Workforce Office of Compliance Programs HIPAA Privacy Training for Non-Clinical Workforce Revised: January 24, 2017 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA)

More information

Guide to Enterprise Telework and Remote Access Security (Draft)

Guide to Enterprise Telework and Remote Access Security (Draft) Special Publication 800-46 Revision 1 (Draft) Guide to Enterprise Telework and Remote Access Security (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Paul Hoffman

More information

PERSONALLY IDENTIFIABLE INFORMATON (PII)

PERSONALLY IDENTIFIABLE INFORMATON (PII) PERSONALLY IDENTIFIABLE INFORMATON (PII) 1 PII - REFERENCES DOD 5400.11-R, DoD Privacy Act Program, May 07 OSD Memo, Subj: Safeguarding Against and Responding to the Breach of Personally Identifiable Information,

More information

East Carolina University 2010 Annual HIPAA Privacy Training

East Carolina University 2010 Annual HIPAA Privacy Training East Carolina University 2010 Annual HIPAA Privacy Training What are the HIPAA Privacy and Security Rules? Federal laws that govern the use and disclosure of health information of our patients and research

More information

1. Student demonstrates age appropriate keyboarding speed & accuracy. 2. Student demonstrates the ability to solve the most common technology

1. Student demonstrates age appropriate keyboarding speed & accuracy. 2. Student demonstrates the ability to solve the most common technology S T R E A M This 2018-2019 school year we are continuing our STREAM curriculum - Science, Technology, Religion, Engineering, Art, and Math. Activities, such as coding, will continue to enhance technology

More information

State of Delaware TELECOMMUTING POLICY

State of Delaware TELECOMMUTING POLICY State of Delaware TELECOMMUTING POLICY PURPOSE DEFINITIONS Alternate Work Location Central Workplace This policy sets forth the State of Delaware s policy regarding telecommuting and establishes the requirements

More information

4-223 BODY WORN CAMERAS (06/29/16) (07/29/17) (B-D) I. PURPOSE

4-223 BODY WORN CAMERAS (06/29/16) (07/29/17) (B-D) I. PURPOSE MINNEAPOLIS POLICE DEPARTMENT BY ORDER OF THE CHIEF OF POLICE SPECIAL ORDER DATE ISSUED: DATE EFFECTIVE: NUMBER: PAGE: July 26, 2017 July 29, 2017 SO17-010! 1 of! 14 TO: RETENTION DATE: Distribution A

More information

Compliance Program, Code of Conduct, and HIPAA

Compliance Program, Code of Conduct, and HIPAA Compliance Program, Code of Conduct, and HIPAA Agenda Introduction to Compliance The Compliance Program Code of Conduct Reporting Concerns HIPAA Why have a Compliance Program Procedures to follow applicable

More information

The Privacy & Security of Protected Health Information

The Privacy & Security of Protected Health Information The Privacy & Security of Protected Health Information By the end of this course, you should: Be familiar with the patient s rights to privacy under HIPAA Privacy Act Be able to identify Protected Health

More information

MINNEAPOLIS PARK POLICE DEPARTMENT

MINNEAPOLIS PARK POLICE DEPARTMENT MINNEAPOLIS PARK POLICE DEPARTMENT BY ORDER OF THE CHIEF OF POLICE DATE ISSUED: TBD TO: All Park Police Staff SUBJECT: DATE EFFECTIVE: TBD SPECIAL ORDER 2017-XX NUMBER: SO 17-XX Body Worn Camera Policy

More information

octo TELEWORK POLICY IV. POLICY Policy Number: OCT Effective Date: February 23, 2016 I. PURPOSE Ill. SCOPE

octo TELEWORK POLICY IV. POLICY Policy Number: OCT Effective Date: February 23, 2016 I. PURPOSE Ill. SCOPE octo OFFICE OF THE CHIEF TECHNOLOGY OFFICER District of Columbia Government - Office of the Chief Technology Officer TELEWORK POLICY Policy Number: OCT0-01-2016 Effective Date: February 23, 2016 I. PURPOSE

More information

HIPAA Privacy & Security Training

HIPAA Privacy & Security Training HIPAA Privacy & Security Training for Nonclinicians Introduction As a Duke Medicine workforce member you may have access to patients and patient information and you have a legal and ethical obligation

More information

HIPAA Privacy & Security Training

HIPAA Privacy & Security Training HIPAA Privacy & Security Training for Clinicians Introduction As a clinician at Duke Medicine, you have direct access to patients and patient information and a legal and ethical obligation to protect patient

More information

DOCUMENT CONTROL Title: Use of Mobile Phones and Tablets (by services users & visitors in clinical areas) Policy. Version: Reference Number: CL062

DOCUMENT CONTROL Title: Use of Mobile Phones and Tablets (by services users & visitors in clinical areas) Policy. Version: Reference Number: CL062 DOCUMENT CONTROL Title: Version: Reference Number: Use of Mobile Phones and Tablets (by services users & visitors in clinical areas) Policy 5 CL062 Scope: This Policy applies all employees of the Trust,

More information

Department of the Army *USAFCOEFS Regulation Headquarters, USAFCOEFS 455 McNair Avenue, Suite 100 Fort Sill, Oklahoma June 2015

Department of the Army *USAFCOEFS Regulation Headquarters, USAFCOEFS 455 McNair Avenue, Suite 100 Fort Sill, Oklahoma June 2015 Department of the Army *USAFCOEFS Regulation 25-11 Headquarters, USAFCOEFS 455 McNair Avenue, Suite 100 Fort Sill, Oklahoma 73503 5 June 2015 Information Management Wireless Mobile Device Management (MDM),

More information

Piedmont Healthcare, Inc. Code of Conduct

Piedmont Healthcare, Inc. Code of Conduct Piedmont Healthcare, Inc. Code of Conduct You are part of the Piedmont Healthcare family, a group of talented and dedicated people who take pride in what you do and are committed to our patients and our

More information

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector. ANN CAVOUKIAN, Ph.D. COMMISSIONER

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector. ANN CAVOUKIAN, Ph.D. COMMISSIONER What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, Ph.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER OF ONTARIO Table of Contents What is a privacy breach?...1

More information

HIPAA and HITECH: Privacy and Security of Protected Health Information

HIPAA and HITECH: Privacy and Security of Protected Health Information HIPAA and HITECH: Privacy and Security of Protected Health Information What is HIPAA? Health Insurance Portability and Accountability Act of 1996 A federal law enacted to: Protect the privacy of a patient

More information

Rialto Police Department Policy Manual

Rialto Police Department Policy Manual Rialto Police Department Policy Manual Policy 451 BODY WORN VIDEO SYSTEMS 451.1 PURPOSE AND SCOPE (a) To provide policy and procedures for use of the portable video recording system (BWV) including both

More information

Working with Information Governance INFORMATION GOVERNANCE REFRESHER TRAINING WORK BOOK

Working with Information Governance INFORMATION GOVERNANCE REFRESHER TRAINING WORK BOOK Working with Information Governance INFORMATION GOVERNANCE REFRESHER TRAINING WORK BOOK Name: Date:.. Training Material & Assessment. Accreditation for Completed Assessments Included 1 IG Refresher Training

More information

Telecommuting. Policy Statement. Reason for the Policy. Applicability of the Policy. Policy V

Telecommuting. Policy Statement. Reason for the Policy. Applicability of the Policy. Policy V Policy V.7.13.1 Responsible Official: Vice President for Human Resources, Diversity and Multicultural Affairs Effective Date: December 5, 2017 Telecommuting Policy Statement This policy specifies the terms

More information

June 6, Mr. Scott Gessler Secretary of State State of Colorado Department of State 1700 Broadway, Suite 200 Denver, CO 80290

June 6, Mr. Scott Gessler Secretary of State State of Colorado Department of State 1700 Broadway, Suite 200 Denver, CO 80290 June, 0 Mr. Scott Gessler Secretary of State State of Colorado Department of State 100 Broadway, Suite 00 Denver, CO 00 RE: Proposed Rules Concerning Voting System Conditions for Use, May, 0 Dear Secretary

More information

MOT CHARTER SCHOOL ASSIGNED SCHOOL COMPUTER USE AGREEMENT

MOT CHARTER SCHOOL ASSIGNED SCHOOL COMPUTER USE AGREEMENT MOT CHARTER SCHOOL ASSIGNED SCHOOL COMPUTER USE AGREEMENT Each MOT Charter School student will receive an assigned school computer and will be permitted and expected to take the device home to work on

More information

SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD for NON-CHANNELERS

SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD for NON-CHANNELERS SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD for NON-CHANNELERS The goal of this document is to provide adequate security and integrity for criminal history record information (CHRI) while under

More information

FCSRMC 2017 HIPAA PRESENTATION

FCSRMC 2017 HIPAA PRESENTATION FCSRMC 2017 HIPAA PRESENTATION BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited by guarantee, and forms part of the international

More information

DRAFT. Telework Policy. 1. Applicability. This policy applies to civilian employees of the Fort Belvoir Garrison.

DRAFT. Telework Policy. 1. Applicability. This policy applies to civilian employees of the Fort Belvoir Garrison. DRAFT Telework Policy 1. Applicability. This policy applies to civilian employees of the Fort Belvoir Garrison. 2. Proponent. 3. References. a. Section 359 Public Law 106-346. b. DoD memorandum, 22 October

More information

VCU Health System PatientKeeper Connect. Request Instructions

VCU Health System PatientKeeper Connect. Request Instructions VCU Health System PatientKeeper Connect Request Instructions Remote Clinical User 1. Complete pages 2, 4, and 5. All items are required. 2. Have your Site Supervisor complete and sign page 3. 3. Send forms

More information

The Impact of New Technology in Health Care on Privacy

The Impact of New Technology in Health Care on Privacy The Impact of New Technology in Health Care on Privacy Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Ontario College of Social Workers and Social Service Workers June 18, 2008 Presentation

More information

System of Records Notice (SORN) Checklist

System of Records Notice (SORN) Checklist System of Records Notice (SORN) Checklist Do not use any tabs, bolding, underscoring, or italicization in the system of records notice submissions to the Defense Privacy Office. Use this as a checklist

More information

FAFSA Completion Initiative Participation Agreement

FAFSA Completion Initiative Participation Agreement Larry Hogan Governor Boyd K. Rutherford Lt. Governor Anwer Hasan Chairperson James D. Fielder, Jr., Ph. D. Secretary FAFSA Completion Initiative Participation Agreement This FAFSA Completion Initiative

More information

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office The University of Toledo Corporate Compliance and HIPAA Training Presented by: The Compliance and Privacy Office Topics Compliance HIPAA (Health Insurance Portability and Accountability Act) FERPA( Family

More information

THIS AGREEMENT made effective this day of, 20. BETWEEN: NOVA SCOTIA HEALTH AUTHORITY ("NSHA") AND X. (Hereinafter referred to as the Agency )

THIS AGREEMENT made effective this day of, 20. BETWEEN: NOVA SCOTIA HEALTH AUTHORITY (NSHA) AND X. (Hereinafter referred to as the Agency ) THIS AGREEMENT made effective this day of, 20. BETWEEN: NOVA SCOTIA HEALTH AUTHORITY ("NSHA") AND X (Hereinafter referred to as the Agency ) It is agreed by the parties that NSHA will participate in the

More information

VHA Privacy Policy Training FY VHA Privacy Office

VHA Privacy Policy Training FY VHA Privacy Office VHA Privacy Policy Training Applicable Confidentiality Statutes and Regulations The following legal provisions govern the collection, use, maintenance, and disclosure of information from VHA records. The

More information

EMPLOYEE HANDBOOK EMPLOYEE HANDBOOK. Code of Conduct

EMPLOYEE HANDBOOK EMPLOYEE HANDBOOK. Code of Conduct EMPLOYEE HANDBOOK EMPLOYEE HANDBOOK L E A D I N G T E A C H I N G C A R I N G CODE OF CON DUCT Who We Are and What We Stand For In 2016, UNC Health Care adopted a system-wide. The purpose of this is to

More information

DOD MANUAL ACCESSIBILITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT)

DOD MANUAL ACCESSIBILITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) DOD MANUAL 8400.01 ACCESSIBILITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) Originating Component: Office of the Chief Information Officer of the Department of Defense Effective: November 14, 2017

More information

2018 Employee HIPAA Orientation (EHO) Handbook

2018 Employee HIPAA Orientation (EHO) Handbook 2018 Employee HIPAA Orientation (EHO) Handbook Using EHO The material in this booklet is designed to provide newly hired employees with an understanding of HIPAA s regulations and their impact on the employee

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES NOTICE OF PRIVACY PRACTICES Effective Date: 2013 Wisconsin Dental Association (800) 243-4675 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS

More information

1. INTRODUCTION 2. BACKGROUND

1. INTRODUCTION 2. BACKGROUND 1. INTRODUCTION The National Environmental Satellite, Data, and Information Service (NESDIS) recognizes the value of Telework as a tool for enhancing employee productivity and job satisfaction, improving

More information

CLINICIAN S GUIDE TO HIPAA PRIVACY

CLINICIAN S GUIDE TO HIPAA PRIVACY CLINICIAN S GUIDE TO HIPAA PRIVACY Introduction... 2 What is HIPAA?... 2 Health Information Privacy... 2 Protected Health Information... 3 Identifiers... 3 HIPAA s Impact on Clinical Practice, Treatment,

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5525.07 June 18, 2007 GC, DoD/IG DoD SUBJECT: Implementation of the Memorandum of Understanding (MOU) Between the Departments of Justice (DoJ) and Defense Relating

More information

Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS)

Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS) BUPERS-07 BUPERS INSTRUCTION 2060.1 From: Chief of Naval Personnel Subj: BUREAU OF NAVAL PERSONNEL POLICY FOR USING NAVY MOBILE DEVICES (SMART PHONE/TABLETS) Ref: (a) CNO WASHINGTON DC 211645Z Apr 15 (NAVADMIN

More information

I. SUBJECT: PORTABLE VIDEO RECORDING SYSTEM

I. SUBJECT: PORTABLE VIDEO RECORDING SYSTEM MODESTO POLICE DEPARTMENT GENERAL ORDER Number 12.17 Date: I. SUBJECT: PORTABLE VIDEO RECORDING SYSTEM II. PURPOSE A. To provide policy and procedures for use of the portable video recording system (PVRS),

More information

Compliance with Personal Health Information Protection Act

Compliance with Personal Health Information Protection Act Compliance with Personal Health Information Protection Act Ontario s Personal Health Information & Protection Act (PHIPA) governs the collection, use and disclosure of personal health information by midwives

More information

Advanced HIPAA Communications and University Relations

Advanced HIPAA Communications and University Relations Advanced HIPAA Communications and University Relations accepts no liability of any use reliance placed on it, as it is warranty, express, or implied, or completeness of 1 the HIPAA Health Insurance Portability

More information

Effective date of issue: March 1, 2004 (Revised September 1, 2009) Page 1 of 7 STATE OF MARYLAND JUDICIARY. Policy on Telework

Effective date of issue: March 1, 2004 (Revised September 1, 2009) Page 1 of 7 STATE OF MARYLAND JUDICIARY. Policy on Telework Effective date of issue: March 1, 2004 (Revised September 1, 2009) Page 1 of 7 STATE OF MARYLAND JUDICIARY I. PURPOSE The purpose of this policy is to provide the guidelines and define qualifications for

More information

AUDIT DEPARTMENT UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE. For the period October 2008 through May JEREMIAH P. CARROLL II, CPA Audit Director

AUDIT DEPARTMENT UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE. For the period October 2008 through May JEREMIAH P. CARROLL II, CPA Audit Director UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE For the period October 2008 through May 2009 JEREMIAH P. CARROLL II, CPA Audit Director Audit Department 500 S Grand Central Pkwy Ste 5006 PO Box 551120 Las Vegas

More information

NIAGARA FALLS POLICE DEPARTMENT GENERAL ORDER

NIAGARA FALLS POLICE DEPARTMENT GENERAL ORDER NIAGARA FALLS POLICE DEPARTMENT GENERAL ORDER EFFECTIVE DATE: 03/12/2015 RESCINDS: None Previous SUBJECT: Wearable Video Recorders (Body Cameras) Number 310.10 Number of pages 6 I. PURPOSE The purpose

More information

IT Managed Services Provider

IT Managed Services Provider RFP 2018 2 February 2, 2018 IT Managed Services Provider City of Duncan, Finance Department Attention: Talitha Soldera, Director of Finance City of Duncan, 200 Craig Street, Duncan, BC, V9L 1W3 Submission

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 51-105 25 SEPTEMBER 2014 Law AUTOMATED LEGAL INFORMATION SERVICES AND LIBRARY SYSTEM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:

More information

PROCEDURAL MANUAL SAFEGUARDING INFORMATION DESIGNATED AS CHEMICAL-TERRORISM VULNERABILITY INFORMATION (CVI)

PROCEDURAL MANUAL SAFEGUARDING INFORMATION DESIGNATED AS CHEMICAL-TERRORISM VULNERABILITY INFORMATION (CVI) PROCEDURAL MANUAL SAFEGUARDING INFORMATION DESIGNATED AS CHEMICAL-TERRORISM VULNERABILITY INFORMATION (CVI) June 2007 Approved for Release: Lawrence Stanton Director (Acting), CSCD Andrew J. Puglia Levy

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Employer Support of the Guard and Reserve Public Website (www.esgr.mil) Employer Support of the Guard and Reserve (ESGR) SECTION 1: IS A PIA REQUIRED? a. Will this

More information

Social Media IUSM-GME-PO-0031

Social Media IUSM-GME-PO-0031 Social Media IUSM-GME-PO-0031 FULL POLICY CONTENTS Scope Reason for Policy Policy Statement Procedures Definitions ADDITIONAL DETAILS Implementation Oversight Additional Contacts Forms Related Information

More information

COMPLIANCE PROGRAM. Our commitment to ethical conduct and compliance depends on all employees having a clear understanding of Corporate expectations.

COMPLIANCE PROGRAM. Our commitment to ethical conduct and compliance depends on all employees having a clear understanding of Corporate expectations. COMPLIANCE PROGRAM Our commitment to ethical conduct and compliance depends on all employees having a clear understanding of Corporate expectations. SpecialCare Hospital Management Corporation s Commitment

More information

Identification and Protection of Unclassified Controlled Nuclear Information

Identification and Protection of Unclassified Controlled Nuclear Information ORDER DOE O 471.1B Approved: Identification and Protection of Unclassified Controlled Nuclear Information U.S. DEPARTMENT OF ENERGY Office of Health, Safety and Security DOE O 471.1B 1 IDENTIFICATION

More information

Report of the Information & Privacy Commissioner/Ontario. Review of Cancer Care Ontario:

Report of the Information & Privacy Commissioner/Ontario. Review of Cancer Care Ontario: Information and Privacy Commissioner / Ontario Report of the Information & Privacy Commissioner/Ontario Review of Cancer Care Ontario: A Prescribed Entity under the Personal Health Information Protection

More information

U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy

U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy DLA achieves unmatched agility through telework and BYOD strategy White Paper U.S. Department of Defense: Defense Logistics Agency (DLA) achieves unmatched agility through telework and BYOD strategy Redefining

More information

I. Preamble: II. Parties:

I. Preamble: II. Parties: I. Preamble: MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL COMMUNICATIONS COMMISSION AND THE FOOD AND DRUG ADMINISTRATION CENTER FOR DEVICES AND RADIOLOGICAL HEALTH The Food and Drug Administration (FDA)

More information

DESK OPERATIONS COORDINATOR HIRING DOCUMENT

DESK OPERATIONS COORDINATOR HIRING DOCUMENT DESK OPERATIONS COORDINATOR HIRING DOCUMENT 2016-17 HOUSING & RESIDENTIAL EDUCATION MISSION AND VALUES Housing & Residential Education (HRE) creates an environment where students become responsible members

More information

Personal Electronic Devices Acceptable Use Policy

Personal Electronic Devices Acceptable Use Policy Personal Electronic Devices Acceptable Use Policy Version 1.0 Purpose: For use by: This document is compliant with /supports compliance with: This document supersedes: Approved by: To advise Trust staff

More information

Scanning Electron Microscopy Facility Rules

Scanning Electron Microscopy Facility Rules Scanning Electron Microscopy Facility Rules Access and Training According to the level of expertise, three levels of access may be granted to users: 1. Untrained users the untrained user will be assisted

More information

HIPAA Training

HIPAA Training 2011-2012 HIPAA Training New Hire Orientation and General Training 1 This training is to ensure all Health Management workforce members (associates, contracted individuals, volunteers and students) understand

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 36-2254, VOLUME 3 18 JUNE 2010 Personnel RESERVE PERSONNEL TELECOMMUTING/ADVANCED DISTRIBUTED LEARNING (ADL) GUIDELINES COMPLIANCE WITH

More information

USER VALIDATION FORM (NIPRNET & SIPRNET)

USER VALIDATION FORM (NIPRNET & SIPRNET) USER VALIDATION FORM (NIPRNET & SIPRNET) Complete all requested information and maintain a copy for your records PRIVACY ACT STATEMENT Authority: Executive Order 10450, 9397; Public Law 99-474; the Computer

More information

Health Information Privacy Policies and Procedures

Health Information Privacy Policies and Procedures University of the Pacific Arthur A. Dugoni School of Dentistry Health Information Privacy Policies and s These Health Information Privacy Policies & s implement our obligations to protect the privacy of

More information

City and County of San Francisco Telecommuting Program Policy

City and County of San Francisco Telecommuting Program Policy City and County of San Francisco Micki Callahan Human Resources Director Department of Human Resources Connecting People with Purpose www.sfdhr.org City and County of San Francisco Telecommuting Program

More information

Privacy Toolkit for Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA)

Privacy Toolkit for Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA) Social Workers and Social Service Workers Guide to the Personal Health Information Protection Act, 2004 (PHIPA) COPYRIGHT 2005 BY ONTARIO COLLEGE OF SOCIAL WORKERS AND SOCIAL SERVICE WORKERS ALL RIGHTS

More information