SIU School of Medicine Identity Protection Act and Associated SIU Policy.

Slides:



Advertisements
Similar presentations
Public Records Office Indiana Access to Public Records Act and Responding to Subpoenas Employee Training.
Advertisements

ETHICS. Business Conduct  The Agent agrees to conform to all applicable federal, state and local laws in conducting business under this agreement.
Protection of privacy for all Students!
Review Questions Business 205
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Privacy Rule Training
HIPAA Privacy Training Your Name Here. © 2004 MHM Resources Inc.2 HIPAA Background Health Insurance Portability and Accountability Act of 1996.
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Corporate Compliance Program STANDARDS OF CONDUCT HIPAA PRIVACY & SECURITY Temple University Health System Maribel Valentin, Esquire Associate Counsel.
PIPA PRESENTATION PERSONAL INFORMATION PROTECTION ACT.
Protecting the Confidentiality of Social Security Numbers Business Procedures Memorandum 66 Revised November 1, 2006 The University of Texas System.
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
Critical Data Management Indiana University HR Summit April 24, 2014.
Conversation on the Chemical Facility Anti-Terrorism Standards (CFATS) and Critical Infrastructure Protection Chemical-Terrorism Vulnerability Information.
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
Data Classification & Privacy Inventory Workshop
2/16/2010 The Family Educational Records and Privacy Act.
FERPA 2008 New regulations enact updates from over a decade of interpretations.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Health Insurance Portability and Accountability Act (HIPAA)
Anglican Province of Canada Privacy Policy. Commitment to Privacy The Privacy Policy, including the Web Privacy Statement, is the Anglican Province of.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Information Asset Classification
1 VUMC Confidentiality Policy and HIPAA Implications for Clinical Research General Clinical Research Center Skills Workshop March 2, 2007 Gaye Smith Privacy.
April 23, Massachusetts’ New Data Security Regulations: Ten Steps To Compliance Amy Crafts
FERPA Family Educational Rights and Privacy Act and Rebecca Macon Registrar University of Georgia Presentation for GASFAA October.
CPS Acceptable Use Policy Day 2 – Technology Session.
Electronic Records Management: What Management Needs to Know May 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
An Educational Computer Based Training Program CBTCBT.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
707 KAR 1:360 Confidentiality of Information. Section 1: Access Rights 1) An LEA shall permit a parent to inspect and review any education records relating.
TAMUCC EPA SECURITY Security Training for Users of Canopy for Creation and Approval of Payroll Documents.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Chapter 7—Privacy Law and HIPAA
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Professional Practices: Referral & Documentation Melody Kipp, PhD, LMHC Life & Work Soulutions, Inc.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Confidentiality A Training Without the Video. Laws FERPA (1976) or the Buckley Amendment (1994) IDEA (1991) KY Safe Schools (1998)
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
ISO/IEC 27001:2013 Annex A.8 Asset management
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
VETERANS HEALTH ADMINISTRATION SLIDE 0 New Requirements for VA ORD Investigators: Implementation of Data Management and Access Plans.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
Indiana’s Public Access Laws Heather Willis Neal Indiana Public Access Counselor Indiana Association of Cities and Towns Red Flag and Sunshine Workshop.
DON Code of Privacy Act Fair Information Principles DON has devised a list of principles to be applied when handling Protected Personal Information (PPI).
TASFAA 2016 Legacy of Leadership. TASFAA 2016 Legacy of Leadership Family Educational Rights and Privacy Act (FERPA) An Overview Molly Thompson Associate.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
Final HIPAA Privacy Rule: The Research Provisions Julie Kaneshiro DHHS Office for Human Research Protections Phone: Fax:
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
HIPAA Privacy Rule Training
Nassau Association of School Technologists
The Acceptable Use of Technology
Privacy & Confidentiality
Data Security Policies
Obligations of Educational Agencies: Parents’ Bill of Rights
Disability Services Agencies Briefing On HIPAA
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Family Educational Rights & Privacy Act (FERPA)
IAPP TRUSTe SYMPOSIUM 9-11 JUNE 2004
The Office of Open Records webinar will begin soon
State of florida tax information sharing Paula Barfield August 5, 2015
Family Educational Rights and Privacy Act of 1974
Presentation transcript:

SIU School of Medicine Identity Protection Act and Associated SIU Policy

Authority : Pursuant to Illinois’s Identity Protection Act (5 ICLS 179/1) Requires each local or State agency to draft, approve and implement an Identity- Protection Policy to ensure the confidentiality and integrity of Social Security Numbers (SSN) that the agency collects, maintains and uses. The SIU Board of Trustees approved the required SIU system policy at their May 2011 meeting. The various SIU campuses are required to implement the policy no later than May SOM Action Plan: Identify departments and units where SSNs are Requested, Received, Used or Disclosed. (school-wide survey conducted) Determine appropriateness and authority to obtain and use SSNs. (surveys reviewed) Conduct education sessions for those employees who have access to SSNs on the regulatory restrictions and prohibitions of the Act and associated SIU policy.

General: The SOM is only authorized to obtain, use, and retain SSNs as authorized by state or federal law, rule, regulation and otherwise necessary for the University to conduct its affairs. Utilizing SSNs for purposes not authorized or not disclosed to the person whose SSN is being utilized is prohibited. Access to SSNs will be limited to only those SOM employees who have a need for the information. The SOM is responsible to provide an appropriate level of security for SSNs which are obtained, disclosed, retained and eventually destroyed. For those employees who are required to have access to SSNs, these employees are to be trained in the proper procedures for handling such information from the time of collection through destruction.

Requesting or Receiving SSNs: The SOM must inform the individual whose SSN is being requested as to the purpose(s) of obtaining the information. Paper, electronic, or a written disclosure statement added to a business form are acceptable. Units may use the standard Statement of Purpose (see SIU Policy) or modify to meet their specific needs. Not required to list specific uses or recipients, a general statement of purpose is sufficient. The SOM shall not request nor transmit a SSN over the internet unless the SSN is encrypted. accounts w/passwords are not considered secure connections. Disclosure of SSNs among internal SOM users is permissible, so long as the SSN owner has been provided with a disclosure and data security measures have been taken.

Using or Disclosing SSNs: May not utilize or disclose a SSN unless authorized by law or regulation, or necessary for the performance of an authorized SOM function. May only use a SSN if the purpose has been disclosed to the individual. Do not display a SSN on materials mailed, by any delivery means, unless state or federal laws allow it, it is part of an application for enrollment, in connection with any tax administered by the IRS or IL. Department of Revenue, or to confirm the accuracy of the SSN. SSNs may never be included in an unless encrypted. Unless otherwise authorized by law, an individual’s SSN must be redacted (blackened out) before releasing the document for public inspection or copying the document. For security reasons and whenever practical, the SSN should be completely redacted, but if not possible than limited to four or five sequential characters. i.e. XXX-X1-2345

Destruction of SSNs: As soon as allowable under state and/or federal law or University policy, a document in either electronic or paper format containing a SSN where the need for the information is no longer relevant, should be securely destroyed as per SOM policy. Summary : If this were your SSN, how would you want your information handled?