Privacy Incident Response & Reporting: Pre and Post HITECH

Size: px
Start display at page:

Download "Privacy Incident Response & Reporting: Pre and Post HITECH"

Transcription

1 Privacy Incident Response & Reporting: Pre and Post HITECH Erika Riethmiller-Bol, Director, Corporate Privacy-Incident Program, Anthem, Inc. HCCA Managed Care Compliance Conference February 16, 2015 Objectives Historical look at incident management in healthcare Organizing your program for success Why it is critical that you get it right 1

2 Questions: What is Incident Response? How do your report an incident at your organization? Can you name one member on your privacy IRT (incident response team) besides the privacy officer? Think of the most effective training you ve ever given or been to. Why was it effective? Who is your /your privacy officer s most critical contact in your organization when something goes wrong? COMPANY CONFIDENTIAL FOR INTERNAL USE ONLY DO NOT COPY 3 Questions, cont. If your CEO/Board asked for 1 key metric to prove your value in 2014, what would you provide him/her? Have you ever heard of someone getting sanctioned for a privacy event? Is quality improvement embedded into the culture of your organization or an after thought? COMPANY CONFIDENTIAL FOR INTERNAL USE ONLY DO NOT COPY 4 2

3 Purpose of Incident Management Identify and respond to unexpected events Minimize occurrence of incidents and lessen severity Mitigate impact (on organization and impacted individuals) Incident Management - Stages Preparation Detection Classification/Triage Investigation Response (Stop Bleed) Report Wrap-up/Lessons Learned 3

4 Types of Incidents Technical Failures of systems, people, processes, etc. Incident Response Pre HITECH Totally a Security thing Birth of security organizations and standards began early 2000 HITRUST (2008) MS-ISAC (2003) ISO (2005) Privacy was busy dealing with Notice of Privacy Practices, Patients / Members Rights, Privacy Complaints, etc. And documenting it via Policies and Procedures, etc. Task driven approach Regulatory focus 4

5 And then. HITECH Act of 2009 Sec Notification In The Case Of Breach A covered entity that accesses, maintains, retains, modifies, records, stores, destroys, or otherwise holds, uses, or discloses unsecured protected health information shall, in the case of a breach of such information that is discovered by the covered entity, notify each individual whose unsecured protected health information has been, or is reasonably believed by the covered entity to have been, accessed, acquired, or disclosed as a result of such breach. Standards: Notification of Covered Entity by Business Associate Breaches Treated as Discovered Timeliness of Notification Methods of Notice (1) Individual Notice (2) Media Notice (3) Notice to Secretary (4) Posting on HHS Public Website Content of Notification Delay of Notification Authorized for Law Enforcement Purposes Unsecured Protected Health Information Defined 5

6 Table 3-5. Incident Handling Checklist Action Completed Detection and Analysis 1. Determine whether an incident has occurred 1.1 Analyze the precursors and indicators 1.2 Look for correlating information 1.3 Perform research (e.g., search engines, knowledge base) 1.4 As soon as the handler believes an incident has occurred, begin documenting the investigation and gathering evidence 2. Prioritize handling the incident based on the relevant factors (functional impact, information impact, recoverability effort, etc.) 3. Report the incident to the appropriate internal personnel and external organizations Containment, Eradication, and Recovery 4. Acquire, preserve, secure, and document evidence 5. Contain the incident 6. Eradicate the incident 6.1 Identify and mitigate all vulnerabilities that were exploited and our world as Privacy Officers/Compliance Officers became more complicated 6.2 Remove malware, inappropriate materials, and other components 6.3 If more affected hosts are discovered (e.g., new malware infections), repeat the Detection and Analysis steps (1.1, 1.2) to identify all other affected hosts, then contain (5) and eradicate (6) the incident for them 7. Recover from the incident 7.1 Return affected systems to an operationally ready state 7.2 Confirm that the affected systems are functioning normally 7.3 If necessary, implement additional monitoring to look for future related activity Post-Incident Activity 8. Create a follow-up report 9. Hold a lessons learned meeting (mandatory for major incidents, optional otherwise) Breaches Affecting 500 or More Individuals Name of Covered Entity State Covered Entity Type Individuals Affected Breach Date Type of Breach Location of Breached Information Business Associate Present Web Description Dermatology Associates of Tallahassee FL Healthcare Provider /30/0002 Unknown Other No \N UNCG Speech and Hearing Center NC Healthcare Provider /01/1997 Hacking/IT Incident Desktop Computer No \N UMass Memorial Medical Center MA Healthcare Provider /06/ /04/2014 Unauthorized Access/Disclosur e Electronic Medical Record, Paper/Films No \N Riverside Mercy Hospital and Ohio/Mercy Diagnostics Healthcare OH /29/2003 Provider Improper Disposal Paper/Films No As of 2/5/15: 1131 Breaches affecting >500 individuals reported since 9/

7 Privacy Needed to Get Organized Needed its own Incident Response and Reporting Process Needed to coordinate with Information Technology/Security when IT issues affected PHI/PII Needed to account for issues going on with Legal, Human Resources, IT, etc., etc. Privacy Officer forced to become jack of all trades and promoter of communication Response & Reporting Reporting easy for Privacy Officers Used to documentation Used to regulatory obligations Comfortable in Legal space Incident Response a little trickier Requires coordination Requires rapid-fire intervention Lots of players involved Mitigation key Planned and organized response CRUCIAL 7

8 Privacy Officers needed to Morph Key IT Security Personality traits* Attention to detail Dependability Initiative Achievement Flexibility Independence Integrity Persistence Cooperation And needed to be/become flexible and comfortable in risk space No Risk Acceptable Total Risk Taker Post HITECH 7 Elements Modified for Incident Response Implementing written policies, procedures and incident response plans Designating a privacy and security officer and incident response team/s Conducting effective training and education Developing effective lines of communication with all stakeholders Conducting internal monitoring and auditing to ensure data is valid and processes are effective Enforcing standards through well-publicized disciplinary guidelines (sanctions) Responding promptly to detected incidents and undertaking corrective action to deter/prevent future incidents 8

9 Post HITECH Privacy Incident Management 7 Elements Implementing written policies, procedures and incident response plans YOU MUST HAVE A PLAN IN PLACE ANSWER HOW, WHAT, WHO, WHERE & WHEN (ALTHOUGH WHEN IS ALMOST ALWAYS IMMEDIATELY) DEFINE YOUR INCIDENT RESPONSE TEAM ROLES AND MEMBERS DOCUMENT IT SO EVERYONE KNOWS WHAT TO DO WHEN CRISIS OCCURS UPDATE IT PERIODICALLY OR WHEN ANYTHING CHANGES TEMPLATES ABOUND ON THE INTERNET Incident Reporting How? Web-based? Paper based? ? Make sure people understand HOW to get you the information you need How Quickly? Immediately Within 24 hours Within 72 hours As soon as possible COMPANY CONFIDENTIAL FOR INTERNAL USE ONLY DO NOT COPY 18 9

10 RE-fine Your Scope What about Ethics Issues? Be Clear about what you want coming to you if not, you may get it all! COMPANY CONFIDENTIAL FOR INTERNAL USE ONLY DO NOT COPY 19 What Do You Need to Know? What Information do you want and need? date and time of incident discovery, general description of the incident, systems, populations and/or data at possible risk, actions they have taken since incident discovery, contact information, any additional information reporter feels is important and relevant COMPANY CONFIDENTIAL FOR INTERNAL USE ONLY DO NOT COPY 20 10

11 Incident Triage What is a Significant Event to Your Organization? Subjective assessment BUT if you keep in mind your culture and goals this process should be fairly straight forward Examples: Incidents involving VIPs or key accounts Incidents for which a press release may or will be issued, or media coverage is anticipated Incidents involving 50 or more affected individuals Incidents likely to result in litigation or regulatory investigation Incidents involving criminal activity Any other incident that is likely to involve reputational, regulatory, or financial risk to organization COMPANY CONFIDENTIAL FOR INTERNAL USE ONLY DO NOT COPY 21 What About Lower-Risk Events? Still Important Consider sub-teams that can handle these lesser incidents Collect data from these as well COMPANY CONFIDENTIAL FOR INTERNAL USE ONLY DO NOT COPY 22 11

12 Post HITECH Privacy Incident Management 7 Elements Designating a privacy and security officer and incident response team/s SEEMINGLY SIMPLE? NEED THE RIGHT MIX OF LEGAL/REGULATORY FOCUS AND ABILITY TO RESPOND UNDER PRESSURE AND IN LINE WITH ORGANIZATIONAL GOALS ABILITY TO HANDLE STRESS WELL; WHAT WE DO IS STRESSFUL PRIVACY AND SECURITY MUST WORK TOGETHER FOR THE GOOD OF ALL Privacy Incident Response Team Members Incident Responder Investigator IT security specialist Business manager Legal Human resources Public Relations Facilities Management Risk Management Etc. Etc. Etc. customize to your organization & how it does business 12

13 Post HITECH Privacy Incident Management 7 Elements Conducting effective training and education YOUR EMPLOYEES NEED TO KNOW HOW TO RESPOND WHEN AN INCIDENT OCCURS REQUIRED RESPONSE TIMEFRAME IS CRITICAL SUPPORTED BY MANAGEMENT/EXECUTIVE LEADERSHIP AND DOCUMENTED IN POLICY NEW HIRE TRAINING/REFRESHER TRAINING DO ANYTHING TO GET IT TOP OF MIND FOR YOUR EMPLOYEES TARGETED TRAINING TO SPECIFIC AREAS IN NEED OF IT AND/OR IN RESPONSE TO AN INCIDENT EMPLOYEES NEED TO KNOW WHO PRIVACY OFFICER IS/OUTREACH IN PERSON AS MUCH AS POSSIBLE Post HITECH 7 Elements Modified for Incident Response Developing effective lines of communication with all stakeholders RELATIONSHIP BUILDING IS THE MOST IMPORTANT PART OF AN INCIDENT MANAGEMENT PROGRAM IF PEOPLE DON T TRUST YOU, THEY WON T TELL YOU WHAT YOU NEED TO KNOW NEED TO RECOGNIZE TOTAL CUSTOMER BASE: INTERNAL, EXTERNAL, REGULATORS, ETC. 13

14 Post HITECH 7 Elements Modified for Incident Response Conducting internal monitoring and auditing to ensure data is valid and processes are effective CRUCIAL TO EFFECTIVE MITIGATION AND MINIMIZATION OF INCIDENTS YOU CAN T MANAGE WHAT YOU DON T KNOW DATA, DATA, DATA IT S THERE; FIGURE OUT A WAY TO CAPTURE IT key performance indicators: employee training statistics/response times/slice & dice of incidents by service line, employee/compare with peers IF YOUR DATA IS BAD, SO ARE ANY CONCLUSIONS YOU DRAW FROM IT SO AUDIT, MONITOR, CRUNCH, REPORT VISUALLY IN DASHBOARDS, PRESENT TO SENIOR MANAGEMENT Post HITECH 7 Elements Modified for Incident Response Enforcing standards through well-publicized disciplinary guidelines (sanctions) NOT ONLY VERY HELPFUL TO DETERING/ PREVENTING FUTURE INCIDENTS BUT REQUIRED BY LAW EMPLOYEES TALK; USE THAT TO YOUR ADVANTAGE REMEMBER CARROT ANDSTICK. SOME OF YOUR BEST MESSAGES WILL COME FROM THOSE WHO HAVE BEEN INVOLVED IN AN INCIDENT AND WATCHED THE TEAM WORK 14

15 Post HITECH 7 Elements Modified for Incident Response Responding promptly to detected incidents and undertaking corrective action to deter/prevent future incidents MITIGATION IS KEY; THE QUICKER YOU CAN STOP THE BLEED, THE LESS THE PAIN WE HAVE TO GET FIXED WHAT WE CAN SO WE CAN BE READY FOR WHAT WE CANNOT PREVENT OR ANTICIPATE 8 th Element Relax/Have Fun/Reward your staff and yourself MOST INDIVIDUALS WHO CHOOSE A CAREER IN COMPLIANCE HAVE LARGE DOSES OF INTEGRITY, CARE DEEPLY ABOUT THEIR ORGANIZATIONS, AND ENJOY A LITTLE CRAZINESS WHILE TYPICALLY DRIVEN INTERNALLY, WE TEND TO CRASH HARDER WHEN WE FINALLY DO RECOGNIZE THIS AND GO ON VACATION, GARDEN FOR AN ENTIRE WEEKEND, ETC. - BEFORE THIS OCCURS! 15

16 Resources President s Data Breach Proposal dated-data-breach-notification.pdf Special Publication Revision 2 OIG s 7 Elements Trainings Office of National Coordinator for Health IT (created by HITECH) Erika Riethmiller-Bol Director, Corporate Privacy-Incident Program erika.bol@anthem.com 16

Compliance Case Studies

Compliance Case Studies Compliance Case Studies What Can Go Wrong and How Can We Learn from Others? Caron Cullen, Sr. Vice President & Compliance Officer, Affinity Health Plan Virgilio Florentino, Principal, Compliance Strategies,

More information

Preparing for the General Data Protection Regulation (GDPR)

Preparing for the General Data Protection Regulation (GDPR) Preparing for the General Data Protection Regulation (GDPR) ServiceNow Governance, Risk, and Compliance Table of Contents What is the GDPR?...3 Key Requirements for the GDPR...4 Accountability, Policies,

More information

a physicians guide to security risk assessment

a physicians guide to security risk assessment PAGE//1 a physicians guide to security risk assessment isalus healthcare isalus healthcare a physicians guide to security risk assessment table of contents INTRO 1 DO I NEED TO OUTSOURCE MY SECURITY RISK

More information

You Might Have a HIPAA Breach. Now What?

You Might Have a HIPAA Breach. Now What? You Might Have a HIPAA Breach. Now What? Ann M. Curran O Connor & Thomas, PC Phuong D. Nguyen Compliance Manager HealthTexas Provider Network Introductions Phuong D. Nguyen Compliance Manager, HealthTexas

More information

You Might Have a HIPAA Breach. Now What?

You Might Have a HIPAA Breach. Now What? You Might Have a HIPAA Breach. Now What? Ann M. Curran O Connor & Thomas, PC Phuong D. Nguyen Compliance Manager HealthTexas Provider Network Introductions Phuong D. Nguyen Compliance Manager, HealthTexas

More information

Social Networking. Management Guide. Compliance and Legal Services

Social Networking. Management Guide. Compliance and Legal Services Social Networking Management Guide Compliance and Legal Services Table of Contents IU Health Policies... 3 ADM 1.13 Standards of Conduct for Business Practices ADM 1.98 Information Security Incident Response

More information

VIRTUA DATE OF LAST REVIEW 5/11; 4/14, 8/16

VIRTUA DATE OF LAST REVIEW 5/11; 4/14, 8/16 8/16 POLICY Virtua is committed to helping the people of our region be well, get well, and stay well. Part of our commitment to the communities we serve is to provide services of the highest quality to

More information

Computer Programs and Systems, Inc. Code of Business Conduct and Ethics

Computer Programs and Systems, Inc. Code of Business Conduct and Ethics (as of January 28, 2013) Introduction This sets forth the guiding principles by which we operate Computer Programs and Systems, Inc. (the Company ) and conduct our daily business with our stockholders,

More information

Essentials for Building a Scalable Privacy Response Strategy. Jay Loder Rouleur Privacy Consulting

Essentials for Building a Scalable Privacy Response Strategy. Jay Loder Rouleur Privacy Consulting Essentials for Building a Scalable Privacy Response Strategy Jay Loder Rouleur Privacy Consulting Introduction Customers want organizations to take responsibility and protect them from the potential consequences

More information

LIBERTY Dental Plan General Compliance Training

LIBERTY Dental Plan General Compliance Training LIBERTY Dental Plan General Compliance Training 1 IMPORTANT NOTICE IMPORTANT NOTICE This training module will assist Medicare Parts C and D plan Sponsors in satisfying the Compliance training requirements

More information

What is GDPR and Should You Care?

What is GDPR and Should You Care? What is GDPR and Should You Care? Ingram Micro Inc. 1 Overview of Privacy Climate & Concerns 2 2 Today We Live In A World Where Advertisers read key words in your Facebook posts and emails and decide what

More information

PROJECT CHAMPION USER GUIDE

PROJECT CHAMPION USER GUIDE DIVERSITY EQUITY INCLUSION TOOLKIT Better Companies. Brighter World. PROJECT CHAMPION USER GUIDE A Glossary of Terms, a complete List of Assessment Questions and a References list are available for download

More information

My name is Sam Mulholland and I am the Managing Director of Standby Consulting.

My name is Sam Mulholland and I am the Managing Director of Standby Consulting. Cyber Security Forum Presentation C.B (Sam) Mulholland Good Afternoon My name is Sam Mulholland and I am the Managing Director of Standby Consulting. Just a little bit about myself. I have worked in IT

More information

Measuring Compliance Program Effectiveness

Measuring Compliance Program Effectiveness Measuring Compliance Program Effectiveness Measuring Compliance Program Effectiveness: A Resource Guide HCCA Hawaii Regional Debbie Troklus, CHC-F, CCEP-F, CCEP-I, CHRC, CHPC Aegis Compliance and Ethics

More information

Code of Business Conduct and Ethics

Code of Business Conduct and Ethics Code of Business Conduct and Ethics Table of Contents Purpose... 1 Scope... 1 Policy... 2 Responsibilities... 8 Enforcement... 8 Review and Revision... 8 PURPOSE Pursuant to the Sarbanes-Oxley Act of 2002

More information

Scope Policy Statement Reason For Policy Procedure Definitions Sanctions Additional Contacts History. Scope. University Policies.

Scope Policy Statement Reason For Policy Procedure Definitions Sanctions Additional Contacts History. Scope. University Policies. Management of Human Resource Records: Personnel Records for Staff and Temporary Employees and Benefit Program Records for All Employees, Retirees, and COBRA Participants About This Policy Effective Date:

More information

Conducting Effective Internal Investigations. From Workplace Harassment to Criminal Conduct and Everything in Between

Conducting Effective Internal Investigations. From Workplace Harassment to Criminal Conduct and Everything in Between Conducting Effective Internal Investigations From Workplace Harassment to Criminal Conduct and Everything in Between Presenters Christopher G. Keim Partner, Management Committee Chris is a trial lawyer

More information

Preparing for an OCR Audit: What is Expected of You

Preparing for an OCR Audit: What is Expected of You Preparing for an OCR Audit: What is Expected of You Speakers Chuck Burbank CISO and Director of Managed Privacy Services FairWarning Robert Mireles, CIPM Sr. Healthcare Privacy Specialist for Managed Privacy

More information

Better Security More Often. How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission

Better Security More Often. How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission How to Keep Sacramento County Information Systems and Data Secure While Achieving Your Department Mission 1 Table of contents Privacy and Security Matter: You Decide How Much A Look Inside Sacramento County

More information

NATURAL DISASTERS AND THE WORKPLACE

NATURAL DISASTERS AND THE WORKPLACE NATURAL DISASTERS AND THE WORKPLACE Eight Steps Employers Should Take to Prepare Their Workplace for a Natural Disaster We may think, Natural disasters can t happen here, or That couldn t happen to us,

More information

Healthcare Cybersecurity Transformation for your Organization: Looking to the Future Session #CS5, February 19, 2017 Mitchell Parker, Executive

Healthcare Cybersecurity Transformation for your Organization: Looking to the Future Session #CS5, February 19, 2017 Mitchell Parker, Executive Healthcare Cybersecurity Transformation for your Organization: Looking to the Future Session #CS5, February 19, 2017 Mitchell Parker, Executive Director, Information Security & Compliance, Indiana University

More information

External Supplier Control Obligations

External Supplier Control Obligations External Supplier Control Obligations Resilience Control Title Control Description Why this is important 1.Resilience and recovery governance Supplier must establish effective governance to maintain resilience

More information

Securing Intel s External Online Presence

Securing Intel s External Online Presence IT@Intel White Paper Intel IT IT Best Practices Information Security May 2011 Securing Intel s External Online Presence Executive Overview Overall, the Intel Secure External Presence program has effectively

More information

General Data Protection Regulation

General Data Protection Regulation October 2017 Whitepaper General Data Protection Regulation What does it mean for you and your organization? Page 1 General Data Protection Regulation (GDPR) From May 2018, the General Data Protection Regulation,

More information

OUR CODE OF BUSINESS CONDUCT AND ETHICS

OUR CODE OF BUSINESS CONDUCT AND ETHICS OUR CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not cover every issue that may arise, but

More information

Anti-bribery corporate policy

Anti-bribery corporate policy Anti-bribery corporate policy 1. Scope and purpose of this guideline One of the key factors and reasons for the favorable reputation and image of Sb Accounting & Consulting is its ability and will to conduct

More information

1 Privacy by Design: The Impact of the new European Regulation on Data protection. Introduction

1 Privacy by Design: The Impact of the new European Regulation on Data protection. Introduction Introduction On April 2016 the European Parliament approved the General Data Protection Regulation (GDPR). This new regulation, with mandatory implementation by Member States (MS) and businesses that have

More information

COACHING USING THE DISC REPORT

COACHING USING THE DISC REPORT COACHING USING THE DISC REPORT TAKING THE NEXT STEP Congratulations! You ve taken the first vital step in showing that you are a champion in your organization that wants to make a difference. Your employees

More information

On the Alert: Incident Response Plan for Healthcare 111/13/2017

On the Alert: Incident Response Plan for Healthcare 111/13/2017 On the Alert: Incident Response Plan for Healthcare 111/13/2017 Presenter Introductions Nadia Fahim-Koster Managing Director, IT Risk Management Meditology Services Kevin Henry Senior Associate, IT Risk

More information

HIPAA Compliance and Mistakes:

HIPAA Compliance and Mistakes: HIPAA Compliance and Mistakes: Let s just say what everyone is thinking: Trying to be compliant with the Health Insurance Portability and Accountability Act (HIPAA) is tough! At HIPAAgps, we get that.

More information

In-service Education Packet Corporate Compliance

In-service Education Packet Corporate Compliance In-service Education Packet Corporate Compliance What is a Corporate Compliance program? A Corporate Compliance program is a system which is designed to detect and prevent violations of law by the agents,

More information

A Guide to Professional Standards

A Guide to Professional Standards A Guide to Professional Standards Jones Lang LaSalle Incorporated LaSalle Investment Management Table of Contents Introduction; Purpose of this Guide... 3 Resources... 4 Specific Actions to Promote Professional

More information

CherryRoad Technologies Inc. Property of

CherryRoad Technologies Inc. Property of Aligning Strategic Project Goals with Organizational Goals During Technology Implementations: Hospitals & Health Systems www.cherryroad.com Recently, a senior executive of a Midwestern Hospital & Health

More information

Disciplinary and Dismissal Procedure

Disciplinary and Dismissal Procedure Disciplinary and Dismissal Procedure Date updated: April 2018 Lead person(s): Head of Human Resources Review date: April 2019 Policy Title: Sunfield Disciplinary and Dismissal Procedure Page 1 of 9 Human

More information

Federal Employees Transgender Model Policy

Federal Employees Transgender Model Policy The Women s and Fair Practices Departments Federal Employees Transgender Model Policy Below is a sample policy 1 that your Local can use as the basis for negotiating with your Agency over an inclusive

More information

Sharp HealthCare s 2017 Compliance Education. Compliance and Ethics Module 1

Sharp HealthCare s 2017 Compliance Education. Compliance and Ethics Module 1 Sharp HealthCare s 2017 Compliance Education Compliance and Ethics Module 1 1 Learning Objectives In this module you will learn about the following: Sharp HealthCare s Compliance and Ethics Program The

More information

GDPR The role of the Internal Audit Function

GDPR The role of the Internal Audit Function www.pwc.com/mt GDPR The role of the Internal Audit Function What should the Internal Auditor do? 24 MAY 2017 it s not your problem yet 2 How does GDPR feature in your 2017 audit plan? much of 2017 will

More information

The Coaching Playbook. Your Must-Have Game Plan for Maximizing Employee Performance

The Coaching Playbook. Your Must-Have Game Plan for Maximizing Employee Performance The Coaching Playbook Your Must-Have Game Plan for Maximizing Employee Performance CONTENTS Coaching Overview What is Coaching? Coaching Categories Coaching Relationships Who Can Be a Coach? Coaching Personas

More information

REGULATORY HOT TOPIC Third Party IT Vendor Management

REGULATORY HOT TOPIC Third Party IT Vendor Management REGULATORY HOT TOPIC Third Party IT Vendor Management 1 Todays Outsourced Technology Services Core Processing Internet Banking Mobile Banking Managed Security Services Managed Data Center Services And

More information

30 Course Bundle: Year 1. Vado Course Bundle. Year 1

30 Course Bundle: Year 1. Vado Course Bundle. Year 1 30 : Year 1 Vado s 30 Year 1 Vado 1. Employee Career Aspirations Coaching Career Development 2. Communicate Clear and Concise Messages Communication Skills for Managers 3. Conflict Management Expectations

More information

Dynamic IT Disaster Recovery Plan

Dynamic IT Disaster Recovery Plan Because of fast and expansive technological developments, no business can function without incorporating IT (Information Technology) anymore. Speed is an essential component of business practices which

More information

WELCOME. 1

WELCOME.  1 WELCOME 1 The AML Risk Conundrum What Does AML Risk Really Mean? BSA Coalition Training Event November 17, 2016 2 Opening Remarks: Amanda Tucker, BSA Coalition Board Member Executive Vice President I Chief

More information

Medicare Parts C and D General Compliance Training

Medicare Parts C and D General Compliance Training Medicare Parts C and D General Compliance Training Developed by the Centers for Medicare & Medicaid Services Martin Health System Annual Compliance Education Rev. 10/2016 PREFACE The Centers for Medicare

More information

BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS

BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS September 2003 BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business principles to guide all directors, officers and associates

More information

RSM US CODE OF CONDUCT GROUNDED IN OUR VALUES - RESPECT, INTEGRITY, TEAMWORK, EXCELLENCE AND STEWARDSHIP

RSM US CODE OF CONDUCT GROUNDED IN OUR VALUES - RESPECT, INTEGRITY, TEAMWORK, EXCELLENCE AND STEWARDSHIP RSM US CODE OF CONDUCT GROUNDED IN OUR VALUES - RESPECT, INTEGRITY, TEAMWORK, EXCELLENCE AND STEWARDSHIP MESSAGE FROM JOE ADAMS RSM US MANAGING PARTNER & CEO At RSM US LLP (RSM), we ve spent nearly 90

More information

Mapping ISO/IEC 27001:2005 -> ISO/IEC 27001:2013

Mapping ISO/IEC 27001:2005 -> ISO/IEC 27001:2013 Mapping ISO/IEC 27001:2005 -> ISO/IEC 27001:2013 Carlos Bachmaier http://excelente.tk/ - 20140218 2005 2013 In 2005 0 Introduction 0 Process approach PDCA In 2013 0 No explicit process approach ISMS part

More information

Responding to Media Requests: A How To Guide

Responding to Media Requests: A How To Guide Prepare, Respond, and Follow Up In a perfect world, we would be able to generate exactly the media coverage we want for our organizations, in exactly the way we want it. We would be able to schedule interviews

More information

NYSARC/CP Compliance Seminar: Risk Assessments. May 2, 2016 Robert Hussar and Melissa Zambri

NYSARC/CP Compliance Seminar: Risk Assessments. May 2, 2016 Robert Hussar and Melissa Zambri NYSARC/CP Compliance Seminar: Risk Assessments May 2, 2016 Robert Hussar and Melissa Zambri rhussar@barclaydamon.com mzambri@barclaydamon.com Agenda Introductions Compliance Risk Assessment Process OMIG

More information

September White Paper Series. Implementing a mobile health solution in the clinical setting

September White Paper Series. Implementing a mobile health solution in the clinical setting September 2014 White Paper Series Implementing a mobile health solution in the clinical setting Table of contents Introduction / 02 Step 1: Identify a clinical champion and project team / 03 Step 2: Engage

More information

"Finnair" and "Finnair Group" as used herein refer to Finnair Plc and its subsidiaries.

Finnair and Finnair Group as used herein refer to Finnair Plc and its subsidiaries. Code of Conduct 1 INTRODUCTION 1.1 Purpose and scope of this document Finnair is an iconic national airline and a respected member of the international aviation community with a solid reputation in safety,

More information

Social Media Guidelines

Social Media Guidelines Social Media Guidelines Protect proprietary business information Be thoughtful about helping our customers Remember, you are always visible on Social Media Acknowledge you are a Progressive employee Be

More information

CODE OF ETHICS/CONDUCT

CODE OF ETHICS/CONDUCT CODE OF ETHICS/CONDUCT This Code of Ethics/Conduct ( Code ) covers a wide range of business practices and procedures. It does not cover every possible issue that may arise, but rather provides information

More information

Data Protection (internal) Audit prior to May (In preparation for that date)

Data Protection (internal) Audit prior to May (In preparation for that date) Data Protection (internal) Audit prior to May 2018. (In preparation for that date) For employers without a dedicated data protection or compliance function, a Data Protection Audit can seem like an overwhelming

More information

BUSINESS CONTINUITY MANAGEMENT

BUSINESS CONTINUITY MANAGEMENT Loss Control BUSINESS CONTINUITY MANAGEMENT Preparing for the Unexpected Preparing your organization for a disaster can be an overwhelming task, but the risk of being unprepared can be even more devastating.

More information

Appendix 8. M&T BANK CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS

Appendix 8. M&T BANK CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS Appendix 8. M&T BANK CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS Introduction. This ( Code ) covers a wide range of business practices and procedures. There are, of course, many corporate policies

More information

ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS

ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not cover every issue that

More information

The way we do business

The way we do business a b The way we do business Our Code of Conduct and Ethics Our Code of Conduct and Ethics In this Code, the Board of Directors and the Group Executive Board set out the principles and practices that define

More information

Six Steps to Improving Corporate Performance with a Communication Plan

Six Steps to Improving Corporate Performance with a Communication Plan TALK POINTS COMMUNICATION Six Steps to Improving Corporate Performance with a Communication Plan How to develop a clear identity and communicate with your internal and external customers A Higher Level

More information

GUIDED GROUP DISCOVERY PARTICIPANT WORKBOOK

GUIDED GROUP DISCOVERY PARTICIPANT WORKBOOK GUIDED GROUP DISCOVERY PARTICIPANT WORKBOOK A journey in self-exploration for job seekers with disabilities who are ready to take control of their employment search 2017 EDITION The National Center on

More information

Compliance Program Start Up: What are the Basics Needed for your Infrastructure?

Compliance Program Start Up: What are the Basics Needed for your Infrastructure? Compliance Program Start Up: What are the Basics Needed for your Infrastructure? Debbie Troklus, CHC-F, CHRC, CCEP-F, CHPC, CCEP-I Managing Director, Aegis Compliance & Ethics Center Sheryl Vacca, CHC-F,

More information

A Risk Management Process for Information Security and Business Continuity

A Risk Management Process for Information Security and Business Continuity A Risk Management Process for Information Security and Business Continuity João Carlos Gonçalves Fialho Instituto Superior Técnico - Taguspark joaogfialho@gmail.com ABSTRACT It was from the DNS.PT internship

More information

Computershare Group Code of

Computershare Group Code of Computershare Group Code of Conduct A Message from the President & CEO Underpinning everything we do as a business are our three core values: Certainty: to deliver our services and solutions right first

More information

Contract and Procurement Fraud. Detection and Prevention

Contract and Procurement Fraud. Detection and Prevention Contract and Procurement Fraud Detection and Prevention Introduction Procurement schemes have certain characteristics that make them particularly difficult to detect and prevent. Organizations can protect

More information

Will Your Company Pass a Privacy Audit?

Will Your Company Pass a Privacy Audit? Will Your Company Pass a Privacy Audit? by Tammi K. Franke The Issue - Companies that collect personal information are under increasing scrutiny by both consumers and governments in the United States and

More information

HOW TO HIRE A SECURITY TEAM STRONG AND EFFECTIVE HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM - 1

HOW TO HIRE A SECURITY TEAM STRONG AND EFFECTIVE HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM - 1 HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM HOW TO HIRE A STRONG AND EFFECTIVE SECURITY TEAM - 1 Introduction Your organization is thinking about building a dedicated security team, but do you know

More information

Forming Effective Groups for Advocacy. Nabz Iran Amplifying Iranian Voices

Forming Effective Groups for Advocacy. Nabz Iran Amplifying Iranian Voices Forming Effective Groups for Advocacy Nabz Iran Amplifying Iranian Voices Effective advocacy groups are essential drivers for addressing needs and bringing about positive change in your community. As you

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Contents 1. Purpose and scope... 2 2. Background... 2 3. Principles... 2 4. Aims and commitments... 3 5. Roles and responsibilities... 3 6. Breaches of data privacy legislation...

More information

ACCOUNTABILITY FRAMEWORK FOR HUMAN RESOURCE MANAGEMENT

ACCOUNTABILITY FRAMEWORK FOR HUMAN RESOURCE MANAGEMENT ACCOUNTABILITY FRAMEWORK FOR HUMAN RESOURCE MANAGEMENT All Deputy Ministers, Associate Deputy Ministers, Executives, Senior Officials, supervisors, and human resource professionals in the BC Public Service

More information

Marketing Best Practice Records Management. Kemal Hasandedic MBII GDDM MRMA National President RMAA

Marketing Best Practice Records Management. Kemal Hasandedic MBII GDDM MRMA National President RMAA Marketing Best Practice Records Management Kemal Hasandedic MBII GDDM MRMA National President RMAA RM an excellent product to Market Questions: 1. Why do we need to sell to senior management? 2. What are

More information

Managers at Bryant University

Managers at Bryant University The Character of Success for Managers at Bryant University Interviewing Guide (Revised 8/25/04) Career Strategies, Inc. Boston, MA A New Approach to Interviewing for Managers at Bryant University An interviewer

More information

HSE Integrated Risk Management Policy. Part 1. Managing Risk in Everyday Practice Guidance for Managers

HSE Integrated Risk Management Policy. Part 1. Managing Risk in Everyday Practice Guidance for Managers HSE Integrated Risk Management Policy Part 1 Managing Risk in Everyday Practice Guidance for Managers HSE Integrated Risk Management Policy Part 1 Managing Risk in Everyday Practice Guidance for Managers

More information

THE AODA: UNLOCKING. Landlords Obligations Under The Accessibility For Ontarians With Disabilities Act. A ToolKit For Landlords In Ontario

THE AODA: UNLOCKING. Landlords Obligations Under The Accessibility For Ontarians With Disabilities Act. A ToolKit For Landlords In Ontario UNLOCKING THE AODA: Landlords Obligations Under The Accessibility For Ontarians With Disabilities Act A ToolKit For Landlords In Ontario An EnAbling Change Partnership project with the Government of Ontario

More information

Social Media Guidelines: King County 1

Social Media Guidelines: King County 1 Social Media Guidelines: King County 1 1. PURPOSE The role of technology in the 21st century workplace is constantly expanding and now includes social media communication tools that facilitate interactive

More information

Acceleron Pharma Inc. Code of Business Conduct and Ethics

Acceleron Pharma Inc. Code of Business Conduct and Ethics I. INTRODUCTION Acceleron Pharma Inc. Code of Business Conduct and Ethics (Amended & Restated as of March 1, 2018) This Code of Business Conduct and Ethics ( Code ) provides a general statement of the

More information

Managing Third Party Compliance and Ethics Risk

Managing Third Party Compliance and Ethics Risk Managing Third Party Compliance and Ethics Risk London, England 20 21 May 2010 As global supply chains grow larger and more interconnected, no company can survive, let alone thrive, without depending upon

More information

Enterprise Risk Management: Ways to Prepare for and What to Do During a Recall

Enterprise Risk Management: Ways to Prepare for and What to Do During a Recall Enterprise Risk Management: Ways to Prepare for and What to Do During a Recall The creation and implementation of an enterprise risk management ( ERM ) plan at your company is integral to minimizing and

More information

Risk Management and Safety in Health Care Organizations. DAY 3 Fadi El-Jardali, MPH, PhD November 2016

Risk Management and Safety in Health Care Organizations. DAY 3 Fadi El-Jardali, MPH, PhD November 2016 Risk Management and Safety in Health Care Organizations DAY 3 Fadi El-Jardali, MPH, PhD November 2016 1 Developing and Implementing Risk Management and Safety Plan 2 Why is a Risk Management Plan an essential

More information

Breaking Out of the Security Metrics Matrix: Steps in the Right Direction

Breaking Out of the Security Metrics Matrix: Steps in the Right Direction SESSION ID: LAB2-W11 Breaking Out of the Security Metrics Matrix: Steps in the Right Direction Tim Crothers Vice President, Security Solutions Target @soinull James Stanger Chief Technology Evangelist

More information

The Language of Accountability

The Language of Accountability The Language of Accountability What s good, what s bad, and what it means PRACTICAL TOOLS The Language of Accountability / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /

More information

Incident [Accident] Investigations

Incident [Accident] Investigations Incident [Accident] Investigations 1. Preserve/ Document Scene 2. Collect Information 3. Determine Root Causes 4. Implement Corrective Actions Objectives for Today Discuss the importance of why all incidents,

More information

ADDING VALUE BY AUDITING HEALTH INFORMATION IMPLEMENTATIONS ALEX ROBISON DAVID ZAVALA

ADDING VALUE BY AUDITING HEALTH INFORMATION IMPLEMENTATIONS ALEX ROBISON DAVID ZAVALA 1 ADDING VALUE BY AUDITING HEALTH INFORMATION EXCHANGE IMPLEMENTATIONS ALEX ROBISON DAVID ZAVALA PROTIVITI AHIA 31 st Annual Conference August 26-29, 2012 Philadelphia PA www.ahia.org Speakers Alex Robison

More information

Adopting HITRUST as the Backbone of Your Information Security Program. Mangoné Fall, Kelly Robertson, Sean Murphy

Adopting HITRUST as the Backbone of Your Information Security Program. Mangoné Fall, Kelly Robertson, Sean Murphy Adopting HITRUST as the Backbone of Your Information Security Program Mangoné Fall, Kelly Robertson, Sean Murphy Overview of Topics Discuss the process your organization went through to select an information

More information

Seven Key Success Factors for Identity Governance

Seven Key Success Factors for Identity Governance WHITE PAPER Seven Key Success s for Identity Governance Insights and Advice from Real-World Implementations You have been given a high-profile mission: address urgent audit and compliance requirements

More information

Allegheny County Airport Authority ADMINISTRATIVE POLICY HANDBOOK Business Code of Conduct and Ethics Policy (Effective 04/01/06)

Allegheny County Airport Authority ADMINISTRATIVE POLICY HANDBOOK Business Code of Conduct and Ethics Policy (Effective 04/01/06) PURPOSE The concept of "ethical behavior" is hard to define. But, all of us know it when we see it and we know it when we don't. We'd all agree that ethical behavior is fair, honest, proper and legal and

More information

10 Illegal Interview Questions to avoid at all costs

10 Illegal Interview Questions to avoid at all costs 10 Illegal Interview Questions to avoid at all costs Introduction If you re in the process of recruiting new staff members for your business, you ll know that the interview process can be more than just

More information

ISO & ISO TRAINING DAY 4 : Certifying ISO 37001

ISO & ISO TRAINING DAY 4 : Certifying ISO 37001 ISO 19600 & ISO 37001 TRAINING DAY 4 : Certifying ISO 37001 2017 SLIDE 1 DAY 4 Program Part 1 : Audit rules 1. Audit principles 2. Types of findings Part 2 : Audit process 3. The steps of an audit 4. Audit

More information

Walter E. Johnson Director of Compliance & Ethics Kforce Government Solutions

Walter E. Johnson Director of Compliance & Ethics Kforce Government Solutions GAMING THE SYSTEM! 2016 HCCA Compliance Institute Walter E. Johnson Cindy Hart Adam Weinstein Dawn Lambert Panelists Walter E. Johnson Director of Compliance & Ethics Kforce Government Solutions Email:

More information

TECHNICAL RELEASE TECH 05/14BL. Data Protection Handling information provided by clients

TECHNICAL RELEASE TECH 05/14BL. Data Protection Handling information provided by clients TECHNICAL RELEASE TECH 05/14BL Data Protection Handling information provided by clients ABOUT ICAEW ICAEW is a world leading professional membership organisation that promotes, develops and supports over

More information

CONTENTS. 03 Introduction. 04 The Code. 07 Compliance with the Code. 08 Who to Contact. 08 Whistleblowing policy. -Ensuring we do not act corruptly

CONTENTS. 03 Introduction. 04 The Code. 07 Compliance with the Code. 08 Who to Contact. 08 Whistleblowing policy. -Ensuring we do not act corruptly Code of Ethics CONTENTS 03 Introduction 04 The Code -Ensuring we do not act corruptly -Hospitality and gifts -Respecting international trade rules -Conflicts of interest -Buying and selling shares insider

More information

Text. What the Heck is a HIPAA AUDIT? Presented by Sue Miller

Text. What the Heck is a HIPAA AUDIT? Presented by Sue Miller Text What the Heck is a HIPAA AUDIT? Presented by Sue Miller What to do before you are Audited? What to do after you are Audited? AGENDA Types of Enforcement Review 2016 OCR HIPAA Audits, Phase 2 Effective

More information

Straumann Code of Conduct

Straumann Code of Conduct Straumann Code of Conduct PREFACE As a global leader in implant dentistry and dental tissue regeneration, Straumann respects laws and regulations. Apart from these obligations, there are numerous voluntary

More information

Keys to Creating a Culture of Preparedness

Keys to Creating a Culture of Preparedness Use existing culture to build readiness throughout the organization UNPREPARED Whether you call it business continuity, disaster recovery or risk management, it all leads towards the same thing a culture

More information

Understanding and Mitigating IT Project Risks BY MIKE BAILEY AND MIKE RIFFEL

Understanding and Mitigating IT Project Risks BY MIKE BAILEY AND MIKE RIFFEL Understanding and Mitigating IT Project Risks BY MIKE BAILEY AND MIKE RIFFEL Technology projects can present organizational challenges, and the associated risk is one of the finance officer s primary concerns

More information

Office Move. The essential guide to moving your communications.

Office Move. The essential guide to moving your communications. Office Move. The essential guide to moving your communications. The next step on your journey It s time to change your comms and connectivity So you ve found the perfect office. That s great! Now is the

More information

Privacy and Information Security Sanction Policy

Privacy and Information Security Sanction Policy Effective Date: November 2018 Policy Statement Privacy and Information Security Sanction Policy All workforce members, including faculty, staff, and students, are expected to comply with the organization

More information

5 BEST PRACTICES FOR ENTERPRISE MONITORING AND MANAGEMENT. How to Successfully Gain a Comprehensive Overview of IT Operations

5 BEST PRACTICES FOR ENTERPRISE MONITORING AND MANAGEMENT. How to Successfully Gain a Comprehensive Overview of IT Operations 5 BEST PRACTICES FOR ENTERPRISE MONITORING AND MANAGEMENT How to Successfully Gain a Comprehensive Overview of IT Operations TABLE OF CONTENTS INTRODUCTION Bringing Together Disparate Technology Functions

More information

MassMutual Code of Conduct for Temporary Personnel. The Winning Way

MassMutual Code of Conduct for Temporary Personnel. The Winning Way MassMutual Code of Conduct for Temporary Personnel The Winning Way MassMutual Code of Conduct for Temporary Personnel Contents 1 Introduction 2 Principles of Conduct 4 Speaking Up 5 Seeking Guidance Last

More information

Strathclyde Partnership for Transport

Strathclyde Partnership for Transport APPENDIX 3 Strathclyde Partnership for Transport Information Management Strategy Action Date Version Owner Review Created 22/01/2019 0.6 HM Updated 12/02/2019 1.0 HM Updated Contents 1. Information is

More information

HIPAA Compliance. Mandatory for 7 MILLION Covered Entities (CE) & Business Associates (BA) 70% of the market is NOT compliant!

HIPAA Compliance. Mandatory for 7 MILLION Covered Entities (CE) & Business Associates (BA) 70% of the market is NOT compliant! 1 HIPAA compliance Mandatory for 7 MILLION Covered Entities (CE) & Business Associates (BA) 70% of the market is NOT compliant! HITECH/EHR incentive requires: Stage 1. Risk Assessment for Meaningful Use

More information

GUIDELINES FOR IMPLEMENTING A PRIVACY MANAGEMENT PROGRAM For Privacy Accountability in Manitoba s Public Sector

GUIDELINES FOR IMPLEMENTING A PRIVACY MANAGEMENT PROGRAM For Privacy Accountability in Manitoba s Public Sector GUIDELINES FOR IMPLEMENTING A PRIVACY MANAGEMENT PROGRAM For Privacy Accountability in Manitoba s Public Sector TABLE OF CONTENTS INTRODUCTION... 2 Accountable privacy management 2 Getting started 3 A.

More information