CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013.

Slides:



Advertisements
Similar presentations
HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Advertisements

Protect Our Students Protect Ourselves
FERPA: Family Educational Rights and Privacy Act
ETHICS. Business Conduct  The Agent agrees to conform to all applicable federal, state and local laws in conducting business under this agreement.
Privacy and Information Security Training ( ) VUMC Privacy Website
And the finer details of patient privacy TCH Confidential Understanding HIPAA.
Copyright Eastern PA EMS Council February 2003 Health Information Portability and Accountability Act It’s the law.
COBB/DOUGLAS COMMUNITY SERVICES BOARD Confidentiality and Privacy of Consumer Information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
HMIS Homeless Management Information System. MISSION To provide standardized and timely information to improve access to housing and services, and strengthen.
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
FERPA: Family Educational Rights and Privacy Act.
FERPA Skidmore College Family Education Rights & Privacy Act What is FERPA? It is the Family Educational Rights and Privacy Act of Is also referred.
Supportive Services for Veteran Families (SSVF) Data Bigger Picture Updated 5/22/14.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
HMIS Fundamentals HMIS Data Standards for VA Community Contract Programs.
Supportive Services for Veteran Families (SSVF) Data HMIS Beyond Data Collection Updated 9/14.
INTERNET and CODE OF CONDUCT
4/3/20011 Ethics in Special Education Assessment and Testing and Maintenance of Student Information.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
Overview of Engagement – Under the terms of this engagement, the Advisor will provide advice in the areas checked below. Investment Management – Develop.
HIPAA PRIVACY AND SECURITY AWARENESS.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Student Data and Confidentiality Parents Rights Schools’ Responsibilities.
A New Way to Work For the New Century. As a result of several years’ work by you and your co-workers, we have...
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
Incident Security & Confidentiality Integrity Availability.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
FERPA Guidelines for Cooperating Teacher and University Supervisors.
Personal data protection in research projects
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Revised: 05/11/2016 Created By :
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
HMIS (Homeless Management Information System) Security Awareness Training Created By: Revised: 05/11/2016.
Nassau Association of School Technologists
Overview to Student Data Privacy in Illinois
Protect Our Students Protect Ourselves
HIPAA Privacy and Security
HMIS Privacy and Security
HIPAA Privacy & Security
Privacy & Confidentiality
HMIS (Homeless Management Information System) Security Awareness Training Created By: Revised: 10/20/2017.
HMIS (Homeless Management Information System) Security Awareness Training Created By: Revised: 12/15/2017.
PERSONAL DATA PROTECTION ACT 2010
Overview to Student Data Privacy in Illinois
Move this to online module slides 11-56
Disability Services Agencies Briefing On HIPAA
Work-Study Student Confidentiality Agreement This Agreement is made between _________________________(“Work-Study Student") and Bristol Community College,
County HIPAA Review All Rights Reserved 2002.
HIPAA Privacy & Security
Confidentiality Agreement
Confidentiality, Privacy & Security Annual Training
Presented by: Steve Gerdes 26 January 2019
Session 1 – Introduction to Information Security
Protecting Student Data
Presentation transcript:

CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

Overview The purpose of this outline is to stress the importance of security when using HMIS. Client information is confidential and should always be treated as such. This outline provides an overview for the following topics:  Defining Security  Basic Requirements  User Authentication  Multiple Access Points  Physical Access  Client Confidentiality Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

Defining Security Security refers to the protection of client personal protected information and sensitive program information from unauthorized access, use, or modification. Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

Basic Security Requirements HMIS Users Need:  Unique username and password  Signed receipt of privacy notice Each Computer/Network Needs:  A secure location  A workstation username/password  Anti-virus software  Individual or network firewall Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

User Name and Password Every user accessing HMIS must have a unique username and password A unique password includes:  At least one number  At least one letter  At least one capital letter  At least 6 characters long  No common words or names  Good: [Na$car#39]  Bad: bobclark99  Ugly: hmis Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

Multiple Access HMIS will automatically log you out if:  Two users are logged into the same user name and password  An amount of time elapses in which HMIS has not been used Log out of HMIS when away from the workstation Do not share your login information with anyone Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

Physical Access/ Location Secure workstations  Lock offices  Place computer monitors away from others’ view  Use a privacy screen if necessary  Lock computer screens when away from the workstation Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

Client Confidentiality Must comply with federal, state, and local confidentiality laws Must comply with limits to data collection (relevant, appropriate, lawful) Must post sign at intake or comparable location with general reasons for collection and reference to privacy policy May infer consent for uses in the posted sign and written privacy policy Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

Uses of HMIS HMIS should not be used for:  Personal gain  Bias opinions  Stalking  Sharing with others outside of service providers  Curiosity HMIS should be used for:  Tracking enrollments/assessments  Referring clients  Creating case notes  Coordinating services for a client Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

Need-to-Know Basis Client information should only be shared/searched on a need-to-know basis.  Need-to-know:  1. The legitimate requirement of a person to access sensitive information that is critical to the performance of an authorized, assigned mission.  2. The necessity for access to specific information required to carry out official duties. Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

HUD’s HMIS Data Standards The purpose of the data standards are to “ensure that every HMIS captures the information necessary to fulfill HUD reporting requirements while protecting the privacy and informational security of all homeless individuals.” The most recent version is March You may access these data standards at:  %20Data%20Standards-Revised%20_3.pdf %20Data%20Standards-Revised%20_3.pdf Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013

AGENCY/ORGANIZATION NAME: ______________________________________ LOCATION: _________________________________________________________ San Antonio Homeless Management Information System (HMIS) USER CONFIDENTIALITY AGREEMENT I understand that I will be allowed access to confidential information and/or records in order to perform my specific job duties. I further understand and agree that I am not to disclose confidential information and/or records without the prior consent of the appropriate authority(s). I understand that all USERID/ Passwords to access the HMIS are issued on an individual basis. I further understand that I am solely responsible for all information obtained, through system access, using my unique identification. At no time will I allow any other person to use of my USERID/Password to logon to the HMIS. I understand that accessing or releasing confidential information and/or records, or causing confidential information and/or records to be accessed or released, on myself, other individuals, clients, relatives, etc., outside the scope of my assigned job duties would constitute a violation of this agreement. I understand my supervisor will be notified immediately of any violation and disciplinary action will be taken, up to termination of employment. By affixing my signature to this document I acknowledge that I have been apprised of the relevant laws, concerning access, use, maintenance and disclosure of confidential information and/or records which shall be made available to me through my use of the HMIS. I further agree that it is my responsibility to assure the confidentiality of all information, which has been issued to me in confidence, even after my access to HMIS has ended. Pursuant to this agreement I certify that I have read and understand the laws concerning confidential information and/or records. User Signature ____________________________ Date _________________ ________________________ Print or Type User Name _______________________ Title ___________________ Print This Page, Read, and Sign! Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013