Security Training For Select Agent Laboratories Applicable Regulations 42 CFR Part 73 (DHHS) 9 CFR 121 (APHIS) 7 CFR 331 (APHIS)

Slides:



Advertisements
Similar presentations
Designated Authority Training Parking & Access Control July 2009.
Advertisements

Emergency Preparedness and Response
Botulinum in the Research Laboratory - EHS Controls Presented by: Lisa Wisser, CIH AIHCE - June 6, 2001.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
5/3/2015 CAMPUS PUBLIC SAFETY DEPARTMENT ORIENTATION.
Identity Theft “Red Flags” Rules Under the FACT Act Reid Fudge CISSP, CISA Pulte Mortgage, LLC November 2008.
Anti-Money Laundering and OFAC Compliance for Transfer Agents SSA Annual Conference July 25, 2008.
1 Recent Bioterrorism Legislation Madelyn Miller August 2003.
Institutional Biosafety Committee and Biological Use Authorization.
New Faculty Orientation to Privacy and Security at UF Susan Blair, Chief Privacy Officer Kathy Bergsma, Information Security.
Environmental Health and Safety Radiation Control and Radiological Services.
ERIKA BARRETT TECHNICIAN, BIOLOGICAL SAFETY OFFICE OF RADIATION, CHEMICAL & BIOLOGICAL SAFETY FRIDAY, OCTOBER 3.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
8/28/2015 The Family Educational Rights and Privacy Act (FERPA)  Also known as the Buckley Amendment.  Statute: 20 U.S.C. 1232g; Regulations: 34 CFR.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
2005 MASFAA CONFERENCE CHARLESTON, WEST VIRGINIA Ginny D’Angelo Vice President of Student Loans Commerce Bank Diane Lambart Fleming Associate Director.
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
1. Objectives  Describe the responsibilities and procedures for reporting and investigating ◦ incidents / near-miss incidents ◦ spills, releases, ◦ injuries,
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
Emergency Planning in your business St. Louis City LEPC General Meeting September 4, 2013.
Biosafety/Biosecurity: An Update February 27, 2004.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
A Review of H.R. 3448: Public Health Security and Bioterrorism Preparedness Act of 2002 Harry Enoch, Ph.D. Director of Environmental, Health & Safety University.
Hazardous Materials Company Anti-Terrorism Tips. Overview This presentation is designed to inform companies of the appropriate steps that should be taken.
OSU-CHS ALARA Statement The OSU-CHS radiation safety program will be conducted in such a manner so that exposure to faculty, staff, students, the public,
Biosecurity at CDC pre & post 9/11 Jonathan Y. Richmond, PhD Director Office of Health and Safety CDC, Atlanta.
HealthBridge is one of the nation’s largest and most successful health information exchange organizations. Tri-State REC: Privacy and Security Issues for.
Security Management Providing a Secure Environment.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Inspection Part III.
Hayes/Ninemeier: Foundations of Lodging Management. (C) 2006 Pearson Education, Upper Saddle River, NJ All Rights Reserved. Safety and Security.
Texas Law Enforcement Best Practices Mid Year Training Conference.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
RYERSON UNIVERSITY 1 5. SECURITY. RYERSON UNIVERSITY 2 Biological Safety Training – Certificate Holder and User Training BIOLOGICAL SAFETY 5.Security.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
CONFIDENTIALITY TRAINING FOR CALLOWAY COUNTY SCHOOLS VOLUNTEERS SCHOOL YEAR
CU-IBC Institutional Biosafety Committee formerly the Recombinant DNA Committee Frank Cantone, Interim IBC Chair Cornell University Biological Safety Officer.
FALSE ALARM PREVENTION FOR YOUR HOME 1. Introduction 2 FARA Tips for Residences What is a false alarm? Why are false alarms a problem? How do alarm systems.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
False Alarm Prevention For Places of Worship. Introduction FARA Tips for Places of Worship What is a false alarm? Why are false alarms a problem? How.
FALSE ALARM PREVENTION FOR SCHOOLS 1. Introduction 2  What is a false alarm?  Why are false alarms a problem?  How do alarm systems work?  What are.
Draft for Discussion & Policy Purposes Only Money Room Security Assessment June 29, 2016.
Developed for Ridgeview Institute 2015 Hospital Wide Orientation
Nassau Association of School Technologists
Port of Stockton Escort Training
Port of Stockton Access Policy
Protection of CONSUMER information
Equipment Management Chris Crutcher | Branch Director, Internal Operations | September 19, 2017.
OFAC.
Red Flags Rule An Introduction County College of Morris
PI EHS Responsibilities
Building Emergency Evacuation Plan (BEEP) Training for Building Emergency Coordinators and Alternates.
Hazardous Material Training
Laboratory Inspections - OVERVIEW
Emergency Safety Plan Wayne County updated 7/22/13.
Requirements NAVSEA S0420-AA-RAD-010, (RAD-010) Radiological Affairs Support Program Manual NAVPGSCOL INSTRUCTION Radiation Safety Instruction.
Whose Job Is It? Responsibility for Laboratory Safety and Security
Property Control Asset Forms
OSU Controlled Substances Training Module for Researchers
Port of Stockton Access Policy
Building Emergency Evacuation Plan (BEEP) Training for Building Emergency Coordinators and Alternates.
Presentation transcript:

Security Training For Select Agent Laboratories Applicable Regulations 42 CFR Part 73 (DHHS) 9 CFR 121 (APHIS) 7 CFR 331 (APHIS)

73.11 Security Plan n Written Plan: Individual clearance Training Inventory control & Record Keeping Physical Security Visitor Access Policies Cyber Security Notification and Reporting –suspicious events –compromised security –exposures, releases

Authorized individuals n DOJ registered “entity” personnel n Background check (FBI clearance) –restricted person criteria n Have direct access to Select Agents (SA’s) n Biohazard (BSL3) clearance from IBC BL3/Biosafety/BBP/Chemical Safety Security/Shipping/Observation (work practices)

Authorized individuals n Notify EHS of: –updates in lab staff (new, exiting staff) –disgruntled employees in lab (those authorized or with access to SA areas) –Suspicious behaviour –restrict access/change locks

Visitor Access Policy to SA areas n Notify the EHS before bringing in guests n Training prior to entry n Escorted at all times in SA areas n Service work cleared before escorted entry n Record of entry/exit and escort name

SA Inventories (Log/checkbook) n For each SA: –Agent name, characteristics, source data –qty held on date of 1st inventory –qty acquired, source, date of acquisition –qty, volume or mass destroyed, and date of each action –qty used, date of use (toxins only) –qty transferred, transfer date, individuals involved –current qty held –Any SA lost, stolen, or unaccounted for Written explanation of any discrepancies –Records maintained by PI and EHS

Physical Security n Lock boxes n Locked freezers, incubators, animal cages, etc. n Locked Door –keycard access –each entry/exit recorded

Physical Security n Intrusion alarms –glass break –motion sensors –alarm activated camera –dead latch –hinged pins n High priority response areas –Security & Police

Cyber Security n Cyber Security Office n Firewalls n Passwords n Locked computer stations n Anti-virus programs n Prudent exchange of information

Notification & Reporting n Suspicious –people –activity –packages (in or out) n Immediately report to: –Local Police –Institutional Security –EHS Office

Notification & Reporting n Spills/releases n Loss of keys/ID’s n Theft or missing SA’s n Alteration of record n Immediately report to: –Local Police –Institutional Security –EHS Office

Notification of theft, loss, release n Theft/loss of SA –immediate notification to: HHS Secretary (APHIS) by phone, fax, or State law enforcement authorities Local law enforcement authorities –reported whether recovered or not, or responsible parties identified –Follow-up written report to HHS/APHIS w/in 7 days

Notification & Reporting n All Transfers –intra-facility –inter-facility –EHS, CDC, USDA approval –SA Form 2 n Final Destruction of SA’s –Provide notification to lead agency –May need to await federal approval

Records (maintained for 3 years) n For access to areas where SA’s used/stored name of each person who has accessed area date/time of entry - date/time individual left area Records of all entries to space of non approved persons and the authorized users who accompanied them –RO’s inspection records of SA locations (at least annually), list of authorized workers –Safety, security, emergency response plans –Training, transfer records –Safety, security incident reports

Penalties and Fines n Civil money penalites –$250,00 - $500,000 n Criminal Penalties – years in Prison