On the Alert: Incident Response Plan for Healthcare 111/13/2017

Size: px
Start display at page:

Download "On the Alert: Incident Response Plan for Healthcare 111/13/2017"

Transcription

1 On the Alert: Incident Response Plan for Healthcare 111/13/2017

2 Presenter Introductions Nadia Fahim-Koster Managing Director, IT Risk Management Meditology Services Kevin Henry Senior Associate, IT Risk Management Meditology Services 2

3 Session Agenda

4 Agenda Meditology Overview Requirements behind an incident response program (IRP) Different components of an effective IRP Preparing for your testing exercise Developing meaningful testing scenarios How to conduct and document testing Questions 2017 Meditology Services, LLC. All Rights Reserved

5 Meditology Overview

6 Who is Meditology? Focused exclusively on the healthcare industry with a core competence in security, privacy, and HIPAA compliance. An average of 15+ years of combined Big 4 healthcare IT security and compliance leadership experience. Team has directly relevant operational experience as CISO s and Chief Privacy Officers of health systems Conducted hundreds of engagements for healthcare clients across the country ranging in size and complexity from community hospitals to bed health systems. Certifications include: CISSP, HCISPP, HITRUST (CCSFP), PMP, CCNA, CPHIMS, CISA, CEH, and CNSS. Worked with clients under OCR investigation, made multiple presentations to OCR, and very knowledgeable about the OCR audit process. Lead architect of the HITRUST Common Security Framework. Advisors to ONC / HHS on healthcare information security, ethical hacking, and medical device security 2016 Meditology Services, LLC. All Rights Reserved

7 Serving Healthcare Clients Coast to Coast 2016 Meditology Services, LLC. All Rights Reserved

8 Regulatory Requirements

9 Requirements behind an Incident Response Program The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires covered entities to identify and respond to suspected or known security incidents, as well as mitigate to the extent practicable, harmful effects of security incidents that are known to the covered entity, and document security incidents and their outcomes. Source: Department of Health & Human Services: HIPAA Security Series: Requirement (a)(6)(i) Response and Reporting Meditology Services, LLC. All Rights Reserved

10 Components of an Effective Incident Response Program (IRP)

11 Policy The National Institute of Standards and Technology (NIST) recommends that the following elements be included in the IRP policy: Statement of management commitment Purpose and objectives of the policy Scope of the policy Definition of security incidents and related terms Roles, responsibilities, and levels of authority Severity ratings of incidents Performance indicators Reporting and contact forms NIST Special Publication , Revision 2 Computer Security Incident Handling Guide 2017 Meditology Services, LLC. All Rights Reserved 11

12 Plan The plan should be tailored to the size, structure, and mission of your organization. NIST recommends that the following elements be part of your IRP plan: Senior management sponsorship and approval Goals and objectives for incident response Organizational structure of the various team members, their resource requirements, and their roles Communication process for internal and external entities Outline of the incident response methods for each classified incident from the policy Metrics for evaluating the effectiveness of the team and process Processes for annual review and evaluation 2017 Meditology Services, LLC. All Rights Reserved 12

13 Organizational Structure 2017 Meditology Services, LLC. All Rights Reserved 13

14 Statement of Management Commitment Management commitment and responsibilities include: Program management Program review and updates Development of a review panel or task force if hazards are identified, or for deployment after an event to assist in its review Assisting with training Enforcing disciplinary actions as needed Interaction and assistance with regulatory and response agencies 2017 Meditology Services, LLC. All Rights Reserved 14

15 Purpose and Objectives Purpose and objectives of the policy: To ensure that information security events, and weaknesses associated with information systems, are handled in a timely manner and allow corrective action to be taken. Governs the actions required for reporting and responding to security incidents involving client information assets. Ensures effective and consistent handling of such events to limit any potential impact to the confidentiality, availability and integrity of client information assets 2017 Meditology Services, LLC. All Rights Reserved 15

16 Scope Scope of the policy: Applies to all workforce members, users, and all personnel affiliated with third parties who access or use client information assets, regardless of physical location. Also applies to: Information technology administered in individual departments Technology administered centrally Personally-owned computing devices connected by wire or wireless to the client network Off-site computing devices that connect remotely to client network 2017 Meditology Services, LLC. All Rights Reserved 16

17 Definition of Security Incidents Scope of the policy: Security Incident: a violation, or imminent threat of a violation, of IT or Information Security policies, procedures, acceptable use policies, or standard security practices. Security Incident Response Team (SIRT): a group of individuals set up for the purpose of assisting in responding to security-related incidents. Unauthorized Access/theft: unauthorized access encompasses a range of incidents from improperly logging into a user's account (e.g., when a hacker logs in to a legitimate user's account) or unauthorized usage of logon credentials to obtaining unauthorized access to files and directories possibly by obtaining "super-user" privileges. Virus: self-replicating, malicious program segment that attaches itself to an application program or other executable system component and leaves no external signs of its presence Meditology Services, LLC. All Rights Reserved 17

18 Roles and Responsibilities 2017 Meditology Services, LLC. All Rights Reserved 18

19 Severity Ratings 2017 Meditology Services, LLC. All Rights Reserved 19

20 Procedures The most common procedures include the following elements: Communication both internal and external to your organization Escalation notification Incident tracking forms Incident reporting and documentation Investigation checklists by technology platform Remediation checklists by risk and threat classification Security information event management (SIEM) Evidence collection and handling chain of custody Forensics investigation and documentation Data retention and destruction Non-disclosure agreements 2017 Meditology Services, LLC. All Rights Reserved 20

21 Preparing for your Testing Exercise

22 Testing Preparation A good IRP test requires adequate preparation: Review every component of your IRP including your IRP Policy Assess your procedure documentation for potential improvements and/or changes Identify the different teams listed within the IRP to know who the participants of the exercise will be Determine whether you will involve every member of every team, or just a representative 2017 Meditology Services, LLC. All Rights Reserved 22

23 Testing Preparation Every role should have 2 tiers (primary and secondary) Roles to include: Internal communications External communications Human Resources Legal Executive Leadership Marketing 2017 Meditology Services, LLC. All Rights Reserved 23

24 Develop Meaningful Testing Scenarios

25 Meaningful Scenarios Create the scenarios that will be used during the exercise: Align the scenarios with the incident criticality levels as identified in the IRP plan Create scenarios that align with real-life incidents in the industry Scenarios should test for the effectiveness of your organization s HIPAA Breach Notification plan 2016 Meditology Services, LLC. All Rights Reserved

26 Low Incident Jessica in HR has been busy interviewing candidates for positions within Client. She mistakenly ed one of the candidates a document containing employee demographic information. She immediately notifies her manager. What next steps should be taken? 2016 Meditology Services, LLC. All Rights Reserved

27 Medium Incident Several employees have reported the following From: Smith, John Sent: Friday, July 15, :15PM Subject: System Administrator UPDATE YOUR MAIL BOX QUOTA Your mailbox has almost exceeded its storage limit. It will not be able to send or receive s if exceeded it limit and your account will be deleted from our servers. To avoid this problem you need to update your mailbox quota. By clicking on the link below and filling your login information for the update. If we do not receive a reply from you, your mailbox will be suspended. Thank you for your cooperation 2016 Meditology Services, LLC. All Rights Reserved

28 Critical Incident: Hacktivist Threat & Attack Receptionist receives a threatening phone call from Pro Life Radicals objecting to <CLIENT> s support of birth control and contraceptives. Pro Life Radicals state, YOU HAVE 7 DAYS TO PUBLICLY MAKE A STATEMENT PLEDGING <CLIENT> WILL NO LONGER PROVIDE ANY CARE THAT DOES NOT ALIGN WITH PRO LIFE IDEALS. <CLIENT> IS NOT TO PROVIDE BIRTH CONTROL, CONTRACEPTIVES, NOR ANY PREGNANCY ENDING PROCEDURES. FAILURE TO COMPLY WILL RESULT IN THE MARRING OF THE <CLIENT> BRAND AND REPUTION, ALONG WITH THE LOSS OF THE CONFIDENTIALITY PROMISED TO YOUR PATIENTS. THIS MESSAGE WILL BE DELIVERED DAILY UNTIL COUNTDOWN EXPIRES Meditology Services, LLC. All Rights Reserved

29 Conduct and Document the Testing

30 Conducting the Tabletop Exercise Designate a facilitator (akin to a Dungeon and Dragon game master) Facilitator should outline his/her role and responsibilities help participants step through the exercise in an organized manner ensure the active participation of all team members raise difficult questions make certain that the IRP is being followed verify that any identified issues are documented Ask members to introduce themselves and the areas they represent Have several copies of your organization s IRP on hand! 2016 Meditology Services, LLC. All Rights Reserved

31 Conducting the Tabletop Exercise Describe to the team what your organization intends to accomplish by conducting an IRP tabletop exercise Explain what an example scenario looks like and how you will walk the participants through the incident Describe the role of the scribe(s) Choose to begin with either a low-level incident or a critical-level incident Read the scenario to the team and give them a few minutes to digest the information before proceeding 2016 Meditology Services, LLC. All Rights Reserved

32 Conducting the Tabletop Exercise Get the team started by asking them some questions such as: How would you handle this incident? Who should the charge nurse notify? Who would be notified next? Be sure teams adhere to the IRP documents During the second scenario, introduce unexpected variables to throw the team off guard and see how they handle new, unexpected information 2016 Meditology Services, LLC. All Rights Reserved

33 Conducting the Tabletop Exercise HOTWASH: Summarize the events Run through the list of to-dos identified by the team during the exercise Perform a lessons learned session Survey participants: 1. Did you get what you needed? 2. Did everyone in your group participate? 3. What did you learn? 4. What would you change? 2016 Meditology Services, LLC. All Rights Reserved

34 Documenting the tabletop exercise Writing the report is probably the most difficult part of the tabletop exercise. Ensure the scenarios are described and include all the notes for each scenario, including candid conversations Include takeaways and a to-do list, as well as all associated notes Keep the report handy for the next time you conduct a tabletop exercise, because you will need it to verify that any required updates were made 2016 Meditology Services, LLC. All Rights Reserved

35 QUESTIONS? 2017 Meditology Services, LLC. All Rights Reserved

36 Thank you! Nadia Fahim-Koster Managing Director, IT Risk Management Kevin Henry Senior Associate IT, Risk Management 2017 Meditology Services, LLC. All Rights Reserved

GUIDELINES FOR IMPLEMENTING A PRIVACY MANAGEMENT PROGRAM For Privacy Accountability in Manitoba s Public Sector

GUIDELINES FOR IMPLEMENTING A PRIVACY MANAGEMENT PROGRAM For Privacy Accountability in Manitoba s Public Sector GUIDELINES FOR IMPLEMENTING A PRIVACY MANAGEMENT PROGRAM For Privacy Accountability in Manitoba s Public Sector TABLE OF CONTENTS INTRODUCTION... 2 Accountable privacy management 2 Getting started 3 A.

More information

SHRINERS HOSPITALS FOR CHILDREN CORPORATE COMPLIANCE PLAN

SHRINERS HOSPITALS FOR CHILDREN CORPORATE COMPLIANCE PLAN SHRINERS HOSPITALS FOR CHILDREN CORPORATE COMPLIANCE PLAN 1.0 INTRODUCTION Shriners Hospitals for Children ( SHC ) is committed to conducting itself according to applicable business ethical standards and

More information

HIPAA Compliance and Mistakes:

HIPAA Compliance and Mistakes: HIPAA Compliance and Mistakes: Let s just say what everyone is thinking: Trying to be compliant with the Health Insurance Portability and Accountability Act (HIPAA) is tough! At HIPAAgps, we get that.

More information

Preparing for an OCR Audit: What is Expected of You

Preparing for an OCR Audit: What is Expected of You Preparing for an OCR Audit: What is Expected of You Speakers Chuck Burbank CISO and Director of Managed Privacy Services FairWarning Robert Mireles, CIPM Sr. Healthcare Privacy Specialist for Managed Privacy

More information

AWS Life Sciences Competency Consulting Partner Validation Checklist

AWS Life Sciences Competency Consulting Partner Validation Checklist AWS Life Sciences Competency February 2018 Version 2.2 Table of Contents Introduction... 3 Competency Application and Audit Process... 3 Program Policies... 3 AWS Life Sciences Competency Program Prerequisites...

More information

3 Situations, 2 Lawyers, 1 Corporation, and So Many Features

3 Situations, 2 Lawyers, 1 Corporation, and So Many Features 3 Situations, 2 Lawyers, 1 Corporation, and So Many Features Using Relativity in a Data Breach, an Investigation, and Litigation legalweekshow.com legaltechshow.com #Legalweek17 #Legaltech Cathleen Peterson,

More information

How to Finish the HIPAA Security Risk Analysis and Meaningful Use Risk Assessment

How to Finish the HIPAA Security Risk Analysis and Meaningful Use Risk Assessment How to Finish the HIPAA Security Risk Analysis and Meaningful Use Risk Assessment Caroline Hamilton caroline.r.hamilton@gmail.com Risk & Security LLC As channeled by Dr. HIPAA Meaningful Use was the Hottest

More information

American Well Hosting Operations Guide for AmWell Customers. Version 7.0

American Well Hosting Operations Guide for AmWell Customers. Version 7.0 American Well Hosting Operations Guide for AmWell Customers Version 7.0 October 31, 2016 Contents Introduction... 4 Scope and Purpose... 4 Document Change Control... 4 Description of Services... 5 Data

More information

GUIDELINES. Corporate Compliance. Kenneth D. Gibbs President & Chief Executive. Martin A. Cammer Senior Vice President & Corporate Compliance Officer

GUIDELINES. Corporate Compliance. Kenneth D. Gibbs President & Chief Executive. Martin A. Cammer Senior Vice President & Corporate Compliance Officer GUIDELINES Corporate Compliance Kenneth D. Gibbs President & Chief Executive Martin A. Cammer Senior Vice President & Corporate Compliance Officer Joyce Leahy Executive Vice President for Legal Affairs

More information

UK SCHOOL TRIPS PRIVACY POLICY

UK SCHOOL TRIPS PRIVACY POLICY UK SCHOOL TRIPS PRIVACY POLICY Introduction Welcome to the UK School Trips privacy notice. UK School Trips respects your privacy and is committed to protecting your personal data. This privacy notice will

More information

Global Code of Business Conduct and Ethics

Global Code of Business Conduct and Ethics Global Code of Business Conduct and Ethics Message from the chairman Dear Colleagues: The Hay Group Global Code of Business Conduct and Ethics (the Code ) is our company s statement of commitment to the

More information

Compliance Auditing & Monitoring

Compliance Auditing & Monitoring November 16, Compliance Auditing & Monitoring 3.02 Auditing and Monitoring for Compliance Karen R. Lines, Esq. Associate General Counsel Genentech, Inc. South San Francisco, CA Sheryl Vacca, CHC West Coast

More information

Living Our Purpose and Core Values CODE. Code of Business Ethics and Conduct for Vendors

Living Our Purpose and Core Values CODE. Code of Business Ethics and Conduct for Vendors Living Our Purpose and Core Values CODE Code of Business Ethics and Conduct for Vendors December 2016 HCSC Vendor Code of Business Ethics and Conduct Since 1936, Health Care Service Corporation, a Mutual

More information

Developing an Integrated Anti-Fraud, Compliance, and Ethics Program

Developing an Integrated Anti-Fraud, Compliance, and Ethics Program Developing an Integrated Anti-Fraud, Compliance, and Ethics Program Establishing an Effective Anti-Fraud, Compliance, and Ethics Function 2018 Association of Certified Fraud Examiners, Inc. Discussion

More information

Supplier Security Directives

Supplier Security Directives Page 1 (8) Supplier Directives 1 Description This document (the Directives ) describes the security requirements applicable to Suppliers (as defined below) and other identified business partners to Telia

More information

ClickStaff Orientation Training. Presented to: Contingent Workers Presented by: <Supplier ABC> Version Effective Date: June 20, 2012 Version: 8FINAL

ClickStaff Orientation Training. Presented to: Contingent Workers Presented by: <Supplier ABC> Version Effective Date: June 20, 2012 Version: 8FINAL ClickStaff Orientation Training Presented to: Contingent Workers g Presented by: Version Effective Date: June 20, 2012 Version: 8FINAL Housekeeping reminders Session will take about 15-20

More information

North Shore LIJ Health System, Inc.

North Shore LIJ Health System, Inc. North Shore LIJ Health System, Inc. POLICY TITLE: Information System Review and Audit Controls Policy POLICY #: 900.27 System Approval Date: 1/15/2015 ADMINISTRATIVE POLICY AND PROCEDURE MANUAL CATEGORY:

More information

Outsourcing and the Need for Supplier Audits

Outsourcing and the Need for Supplier Audits Outsourcing and the Need for Supplier Audits John A. Gatto Retired April 3, 2017 Agenda Why Audit Suppliers Outsourcing Supplier Risks Minimum Security Standards Audit Focus 2 1 Definitions Third Party

More information

Identity Provider Policy. Identity and Authentication Services (IA Services)

Identity Provider Policy. Identity and Authentication Services (IA Services) Identity Provider Policy Identity and Authentication Services (IA Services) Table of Contents 1 Background... 1 1.1 ehealth Ontario Identity Federation... 1 1.2 Purpose... 1 1.3 Objectives... 1 1.4 Scope

More information

MODULE I: MEDICARE & MEDICAID GENERAL COMPLIANCE TRAINING

MODULE I: MEDICARE & MEDICAID GENERAL COMPLIANCE TRAINING MODULE I: MEDICARE & MEDICAID GENERAL COMPLIANCE TRAINING 2 0 1 4 A Message From Our CEO and Compliance Officer At PacificSource, we pride ourselves on maintaining a culture of compliance and high ethical

More information

Metso Code of Conduct

Metso Code of Conduct Metso Code of Conduct From the CEO Dear colleague, Metso is a big global company with more than 12,000 employees and operations in over 50 countries. It is important that we work as a team that shares

More information

From the Front Lines: Navigating the OCR Phase 2 HIPAA Audits

From the Front Lines: Navigating the OCR Phase 2 HIPAA Audits View the Replay From the Front Lines: Navigating the OCR Phase 2 HIPAA Audits June 16, 2016 Executive Series Webinar Today s Speakers Carla Wagner, HCISPP Privacy Officer Beacon Health System Trish A.

More information

Your Guide to the Compliance Process

Your Guide to the Compliance Process Your Guide to the Compliance Process Our Commitment and Your Responsibilities Disciplinary Action Guidelines Guidance for Managers Investigations Process Overview US Reporting Process Overview Corporate

More information

What is GDPR and Should You Care?

What is GDPR and Should You Care? What is GDPR and Should You Care? Ingram Micro Inc. 1 Overview of Privacy Climate & Concerns 2 2 Today We Live In A World Where Advertisers read key words in your Facebook posts and emails and decide what

More information

Top 5 Must Do IT Audits

Top 5 Must Do IT Audits Top 5 Must Do IT Audits Mike Fabrizius, Sharp HealthCare, VP, Internal Audit DJ Wilkins, KPMG, Partner, IT Advisory 2011 AHIA Annual Conference www.ahia.org Background on Sharp HealthCare Sharp s Co-sourcing

More information

The IT Risk Environment and Data Analytics. Parm Lalli Director, Focal Point Data Risk, LLC

The IT Risk Environment and Data Analytics. Parm Lalli Director, Focal Point Data Risk, LLC The IT Risk Environment and Data Analytics Parm Lalli Director, Focal Point Data Risk, LLC Parm Lalli Director, Data Analytics Focal Point Data Risk, LLC Parm is a Director with Sunera and leads our national

More information

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det. GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,

More information

STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS. April 25, 2018 In-House Counsel Conference

STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS. April 25, 2018 In-House Counsel Conference STEPS FOR EFFECTIVE MANAGEMENT OF VENDOR AND SUPPLIER CYBERSECURITY RISKS April 25, 2018 In-House Counsel Conference Presenters: Daniela Ivancikova, Assistant General Counsel, University of Delaware Evan

More information

PHILADELPHIA COLLEGE OF OSTEOPATHIC MEDICINE POLICIES AND PROCEDUES. Policy and Procedures Index

PHILADELPHIA COLLEGE OF OSTEOPATHIC MEDICINE POLICIES AND PROCEDUES. Policy and Procedures Index Employee and Student Acknowledgement Form General Information Function of Management Information Systems and Telecommunications Policy Number Computing Resources and Access 1.05 Computer Resource Usage

More information

Delta Dental of Michigan, Ohio, and Indiana. Compliance Plan

Delta Dental of Michigan, Ohio, and Indiana. Compliance Plan Delta Dental of Michigan, Ohio, and Indiana Compliance Plan Procedure #: 420-29 Issue Date: 5/15/2013 Last Revised Date: 5/23/2016 Last Review Date: 5/23/2016 Next Review Date: 5/23/2017 Title: Compliance

More information

Business Continuity Framework

Business Continuity Framework Business Continuity Framework A definition to the Components of Resiliency March, 1 Business Continuity Framework 1. INTRODUCTION... 3 2. PURPOSE... 3 3. THE FRAMEWORK... 4 4. STEERING COMMITTEE... 5 5.

More information

Securing Intel s External Online Presence

Securing Intel s External Online Presence IT@Intel White Paper Intel IT IT Best Practices Information Security May 2011 Securing Intel s External Online Presence Executive Overview Overall, the Intel Secure External Presence program has effectively

More information

Policy 2 Workforce Security Policy and Procedure

Policy 2 Workforce Security Policy and Procedure Policy 2 Workforce Security Policy and Procedure Policy: 1. Authorization and/or Supervision The practice s Security Officer will determine which individuals are authorized to access electronic protected

More information

Standard Statement and Purpose

Standard Statement and Purpose Personnel Security Standard Responsible Office: Technology Services Initial Standard Approved: 10/23/2017 Current Revision Approved: 10/23/2017 Standard Statement and Purpose Security of information relies

More information

Compliance Management Solutions from Novell Insert Presenter's Name (16pt)

Compliance Management Solutions from Novell Insert Presenter's Name (16pt) Compliance Solutions from Novell Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Issues Driving the Compliance Need Dealing with Compliance Requirements It's All about Balance Flexibility

More information

Human Research Protection Program Compliance Plan

Human Research Protection Program Compliance Plan Human Research Protection Program Compliance Plan May 1, 2016 Human Research Protections Program e 1313 21 st Ave. South, Room 504, Nashville, Tennessee 37232 4315 e phone 615-322-2918 e fax 615-343-2648

More information

Sharp HealthCare s 2017 Compliance Education. Compliance and Ethics Module 1

Sharp HealthCare s 2017 Compliance Education. Compliance and Ethics Module 1 Sharp HealthCare s 2017 Compliance Education Compliance and Ethics Module 1 1 Learning Objectives In this module you will learn about the following: Sharp HealthCare s Compliance and Ethics Program The

More information

Integrity & Compliance Officer. Trinity Senior Living Communities Livonia, Michigan

Integrity & Compliance Officer. Trinity Senior Living Communities Livonia, Michigan Integrity & Compliance Officer Trinity Senior Living Communities Livonia, Michigan Position Specification July 2016 TradeCenter, Suite 5900, Woburn, MA 01801 781-938-1975 www.zurickdavis.com Summary Trinity

More information

Atlas Financial Holdings, Inc. Code of Business Conduct & Ethics

Atlas Financial Holdings, Inc. Code of Business Conduct & Ethics Atlas Financial Holdings, Inc. Code of Business Conduct & Ethics TABLE OF CONTENTS 1. INTRODUCTION... 3 2. WHO IS COVERED... 3 3. DIRECTOR, OFFICER AND EMPLOYEE OBLIGATIONS... 4 4. CONFLICTS OF INTEREST...

More information

Thank you, Mark Mirelez. VP Supply Chain Management. DynCorp International, LLC

Thank you, Mark Mirelez. VP Supply Chain Management. DynCorp International, LLC Supplier Code of Ethics and Business Conduct It is DynCorp International s commitment to conduct business honestly, ethically, and in accordance with best practices and the applicable laws of the United

More information

Tampa Bay Information Network TBIN Audit Plan

Tampa Bay Information Network TBIN Audit Plan TBIN Audit Plan Updated: 1 TBIN Audit Plan Table of Contents Introduction.3 Definitions & Acronyms....4 Documents...5 Purpose...6 Guidelines...6 Privacy.6 Client Consent...6 Privacy Notice 7 Removing TBIN

More information

Vanderbilt University Medical Center

Vanderbilt University Medical Center Vanderbilt University Medical Center Performance Evaluation System Supervisor s Guide Provided by Vanderbilt Human Resources Table of Contents Overview... 3 VPES Evaluation Types... 4 VPES User Roles...

More information

Contents. Primer Series: HIPAA Privacy, Security, and the Omnibus Final Rule

Contents. Primer Series: HIPAA Privacy, Security, and the Omnibus Final Rule BEST PRACTICES Iron Mountain Document Conversion Services HEALTHCARE HIPAA Omnibus and the Implications for Document Conversion Primer Series: HIPAA Privacy, Security, and the Omnibus Final Rule Contents

More information

Coordinating Security Response and Crisis Management Planning

Coordinating Security Response and Crisis Management Planning Cognizant 20-20 Insights Coordinating Security Response and Crisis Management Planning Proper alignment of these two critical IT disciplines can mean the difference between an efficient response and a

More information

Operational Level Agreement: SQL Server Database Incidents and Requests

Operational Level Agreement: SQL Server Database Incidents and Requests Operational Level Agreement: SQL Server Database Incidents and Requests Version 0.4 02/19/2015 Contents Document Approvals Operational Level Agreement Overview Description of Services Services Included

More information

CODE OF BUSINESS CONDUCT PENN NATIONAL GAMING, INC.

CODE OF BUSINESS CONDUCT PENN NATIONAL GAMING, INC. CODE OF BUSINESS CONDUCT PENN NATIONAL GAMING, INC. (as amended March 27, 2015) INTRODUCTION The reputation and integrity of Penn National Gaming, Inc. and its subsidiaries (the Company ) are valuable

More information

Ethical Corporate Management Best Practice Principles of ASPEED Technology

Ethical Corporate Management Best Practice Principles of ASPEED Technology Ethical Corporate Management Best Practice Principles of ASPEED Technology Date:2015.06.03 ( Amended ) Article 1 These Principles are adopted to assist the Company and its affiliated companies to foster

More information

UNIVERSITY STANDARD. Title UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL STANDARD ON ENTERPRISE DATA GOVERNANCE. Introduction

UNIVERSITY STANDARD. Title UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL STANDARD ON ENTERPRISE DATA GOVERNANCE. Introduction UNIVERSITY STANDARD Issuing Office Responsible University Title UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL STANDARD ON ENTERPRISE DATA GOVERNANCE PURPOSE Introduction This Standard to the Policy on Enterprise

More information

Social Media Guidelines: King County 1

Social Media Guidelines: King County 1 Social Media Guidelines: King County 1 1. PURPOSE The role of technology in the 21st century workplace is constantly expanding and now includes social media communication tools that facilitate interactive

More information

This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers,

This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers, This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers, agents, vendors and sub-contractors). To help guide

More information

Impact. Data Privacy Statement. Outcomes-Based Learning. Introduction

Impact. Data Privacy Statement. Outcomes-Based Learning. Introduction Impact Outcomes-Based Learning Data Privacy Statement Introduction Medtronic (hereinafter referred to as we ) provides training, education and event management services to healthcare professionals, delivered

More information

REGULATORY HOT TOPIC Third Party IT Vendor Management

REGULATORY HOT TOPIC Third Party IT Vendor Management REGULATORY HOT TOPIC Third Party IT Vendor Management 1 Todays Outsourced Technology Services Core Processing Internet Banking Mobile Banking Managed Security Services Managed Data Center Services And

More information

ETHICAL CODE OF CONDUCT

ETHICAL CODE OF CONDUCT S E C U R I N G T H E F U T U R E ETHICAL CODE OF CONDUCT 1 TABLE OF CONTENT 1. THE ETHICAL CODE OF CONDUCT 4 1.1 Purpose 4 1.2 Commitment 5 1.3 Presentation of the Code of Conduct 5 2. GENERAL PRINCIPLES

More information

SOX 404 & IT Controls

SOX 404 & IT Controls SOX 404 & IT Controls IT Control Recommendations For Small and Mid-size companies by Ike Ugochuku, CIA, CISA TLK Enterprise 2006, www.tlkenterprise.com INTRODUCTION Small, medium, and large businesses

More information

LB35: Verifying IT and Business Continuity. Lucas G. Aimes & Terry DiVittorio, Project Performance Corporation (PPC)

LB35: Verifying IT and Business Continuity. Lucas G. Aimes & Terry DiVittorio, Project Performance Corporation (PPC) LB35: Verifying IT and Business Continuity Lucas G. Aimes & Terry DiVittorio, Project Performance Corporation (PPC) Introductions Lucas G. Aimes Deputy Practice Lead, Verification & Verification Practice

More information

Security Monitoring Service Description

Security Monitoring Service Description Security Monitoring Service Description Contents Section 1: UnderdefenseSOC Security Monitoring Service Overview 3 Section 2: Key Components of the Service 4 Section 3: Onboarding Process 5 Section 4:

More information

ESTERLINE ANTI-CORRUPTION PROGRAM CHARTER

ESTERLINE ANTI-CORRUPTION PROGRAM CHARTER ESTERLINE ANTI-CORRUPTION PROGRAM CHARTER Anti-Corruption Program Overview Introduction At Esterline, we win business based on the superiority of our products and services, and never as a result of bribery

More information

A COMPANION DOCUMENT TO THE GDPR READINESS DECISION TREE QUESTIONS AND ANALYSIS. April 19, 2017

A COMPANION DOCUMENT TO THE GDPR READINESS DECISION TREE QUESTIONS AND ANALYSIS. April 19, 2017 A COMPANION DOCUMENT TO THE GDPR READINESS DECISION TREE QUESTIONS AND ANALYSIS April 19, 2017 The General Data Protection Regulation (GDPR) represents perhaps the most sweeping changes to the protection

More information

Data Privacy Policy for Employees and Employee Candidates in the European Union

Data Privacy Policy for Employees and Employee Candidates in the European Union Data Privacy Policy for Employees and Employee Candidates in the European Union This Data Privacy Policy is effective as of February 1, 2014 1. Data Privacy Policy Overview 1.1 Under Armour, Inc. (the

More information

CFPB Examination Procedures

CFPB Examination Procedures Compliance Management Review General Principles and Introduction Institutions within the scope of the CFPB s supervision and enforcement authority include both depository institutions and non-depository

More information

Securing Access of Health Information Using Identity Management

Securing Access of Health Information Using Identity Management Securing Access of Health Information Using Identity Management Steve Whicker Manager Security Compliance HIPAA Security Officer AHIS Central Region St Vincent Health sawhicke@stvincent.org Chris Bidleman

More information

REQUEST FOR PROPOSALS: INFORMATION TECHNOLOGY SUPPORT SERVICES

REQUEST FOR PROPOSALS: INFORMATION TECHNOLOGY SUPPORT SERVICES REQUEST FOR PROPOSALS: INFORMATION TECHNOLOGY SUPPORT SERVICES Responses Due October 30, 2017 at 4:00 PM RFP 2017: INFORMATION TECHNOLOGY SERVICES PAGE 1 TABLE OF CONTENTS I. INTRODUCTION II. SUBMISSION

More information

PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE

PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers.

More information

Alameda Countywide. Care Council. Manual

Alameda Countywide. Care Council. Manual Alameda Countywide InHOUSE Alameda Countywide InHOUSE Alameda Countywide InHOUSE Alameda Countywide InHOUSE Alameda Countywide InHOUSE Alameda Countywide InHOUSE Alameda Countywide InHOUSE Alameda Countywide

More information

IBM Clinical Trial Management System for Sites

IBM Clinical Trial Management System for Sites Service Description IBM Clinical Trial Management System for Sites This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users

More information

2016 Cost of Data Breach Study: United States

2016 Cost of Data Breach Study: United States 2016 Cost of Data Breach Study: United States Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC June 2016 Ponemon Institute Research Report 2016 1 Cost of Data Breach

More information

IT Due Diligence in an Era of Mergers and Acquisitions

IT Due Diligence in an Era of Mergers and Acquisitions IT Due Diligence in an Era of Mergers and Acquisitions Session 49, March 6, 2018 Charlie Jones, Director of Project Management, University of Vermont Health Network 1 Conflict of Interest Charlie Jones;

More information

Depending on the circumstances, we may collect, store, and use the following categories of personal information about you:

Depending on the circumstances, we may collect, store, and use the following categories of personal information about you: Ignata Group Data Protection / Privacy Notice What is the purpose of this document? Ignata is committed to protecting the privacy and security of your personal information. This privacy notice describes

More information

Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System

Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System Human Resources Security Management towards ISO/IEC 27001:2005 accreditation of an Information Security Management System Professor PhD. Constantin MILITARU Polytechnic University of Bucharest, Romania

More information

ANNEX 2 Security Management Plan

ANNEX 2 Security Management Plan ANNEX 2 Page 1 of 24 The following pages define our draft security management plan (a complete and up to date shall be submitted to The Authority within 20 days of contract award as per Schedule 2.4, para

More information

INTRODUCTION. Overview of Compliance Program. I. Leadership and Structure. GSK Ethics & Compliance Program US Operations

INTRODUCTION. Overview of Compliance Program. I. Leadership and Structure. GSK Ethics & Compliance Program US Operations GSK Ethics & Compliance Program US Operations INTRODUCTION GlaxoSmithKline (GSK) is one of the world s leading research-based pharmaceutical and healthcare companies. GSK s global mission is to improve

More information

2017 Cost of Data Breach Study

2017 Cost of Data Breach Study 2017 Cost of Data Breach Study United States Benchmark research sponsored by IBM Security Independently conducted by Ponemon Institute LLC June 2017 Ponemon Institute Research Report 2017 Cost of Data

More information

ASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016

ASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016 ASSESSMENT AND EVALUATION OF THE CITY OF PHILADELPHIA S INFORMATION TECHNOLOGY GENERAL CONTROLS FISCAL 2016 Charles J. Brennan Chief Information Officer Office of Innovation and Technology 1234 Market

More information

Compliance Plans. Kelly S. McIntosh July 20, 2017

Compliance Plans. Kelly S. McIntosh July 20, 2017 Compliance Plans Kelly S. McIntosh July 20, 2017 Roadmap The importance of compliance and compliance programs Common compliance issues know your risk areas! Guidance for drafting or updating your compliance

More information

12.0 Business Continuity Management

12.0 Business Continuity Management Number 12.0 Policy Owner Information Security and Technology Policy Business Continuity Management Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 12. Business Continuity

More information

Referral Training Exercise 3: Review and Hiring Manager

Referral Training Exercise 3: Review and Hiring Manager Referral Training Exercise 3: Review and Hiring Manager Now that you have completed the online portion of training for Referral, it is time to log into the Stage environment of USA Staffing to practice

More information

EU General Data Protection Regulation, a new era in data protection

EU General Data Protection Regulation, a new era in data protection EU General Data Protection Regulation, a new era in data protection The European Union data privacy landscape is about to undergo dramatic change, with lasting enterprise wide implications for the way

More information

This position is in the Joint Office of Strategic Planning. This position is for the Medical School Campus.

This position is in the Joint Office of Strategic Planning. This position is for the Medical School Campus. Planning Associate - Joint Office of Strategic Planning 33673 Washington University School of Medicine in St. Louis MO This position is full-time and works approximately 40 hours per week. Department Name/Job

More information

Compliance Program Effectiveness Guide

Compliance Program Effectiveness Guide Compliance Program Effectiveness Guide June 2017 This Guide is a comparison of: Compliance Program Elements New York State, Social Services Law 363-D Office of Inspector General (OIG) Compliance Program

More information

Fourth Annual Pharmaceutical Regulatory and Compliance Congress

Fourth Annual Pharmaceutical Regulatory and Compliance Congress Fourth Annual Pharmaceutical Regulatory and Compliance Congress Preconference I A Compliance Primer for the Pharmaceutical Sector Michael P. Swiatocha November 12, 2003 Agenda for Preconference I Introduction

More information

Maximizing Your Return on Investment with HIPAA Compliance:

Maximizing Your Return on Investment with HIPAA Compliance: Maximizing Your Return on Investment with HIPAA Compliance: Using HIPAA to Drive Process Improvement March 27, 2003 Keith Olenik, MA, RHIA, CHP Chief Privacy Officer Saint Luke s Health System Objectives

More information

GOVERNANCE GUIDELINES OF THE NATIONAL ASSOCIATION OF CORPORATE DIRECTORS

GOVERNANCE GUIDELINES OF THE NATIONAL ASSOCIATION OF CORPORATE DIRECTORS GOVERNANCE GUIDELINES OF THE NATIONAL ASSOCIATION OF CORPORATE DIRECTORS TABLE OF CONTENTS Title Page 1. History 3 2. Foreword 4 3. Mission and Vision Statement 5 4. Board Membership 5 Size of Board Mix

More information

Update on Supply Chain Risk Management [SCRM] Standard

Update on Supply Chain Risk Management [SCRM] Standard Update on Supply Chain Risk Management [SCRM] Standard Dr. Joseph B. Baugh Senior Compliance Auditor, Cyber Security WECC Compliance Workshop Portland OR November 14, 2017 Speaker Credentials Electrical

More information

Privacy Incident Response & Reporting: Pre and Post HITECH

Privacy Incident Response & Reporting: Pre and Post HITECH Privacy Incident Response & Reporting: Pre and Post HITECH Erika Riethmiller-Bol, Director, Corporate Privacy-Incident Program, Anthem, Inc. HCCA Managed Care Compliance Conference February 16, 2015 Objectives

More information

China Airlines Ltd. Ethical Corporate Management Best Practice Principles

China Airlines Ltd. Ethical Corporate Management Best Practice Principles China Airlines Ltd. Ethical Corporate Management Best Practice Principles Amended and approved by the Shareholders Meeting on March 25, 2016 Article 1 These Principles are adopted to assist the Company

More information

Navigating the New Health Economy

Navigating the New Health Economy Navigating the New Health Economy How non-traditional healthcare players are using the HITRUST CSF to drive their security programs forward Speakers Dennis Quandt Risk Assurance Director, PwC Boston, MA

More information

ESOMAR 28 QUESTIONS COMPANY PROFILE SAMPLE SOURCES AND RECRUITMENT

ESOMAR 28 QUESTIONS COMPANY PROFILE SAMPLE SOURCES AND RECRUITMENT COMPANY PROFILE 1. What experience does your company have in providing online samples for market research? M3 Global research is an online community of healthcare professionals and healthcare consumers

More information

Brink's Modern Internal Auditing

Brink's Modern Internal Auditing Brink's Modern Internal Auditing A Common Body of Knowledge Seventh Edition ROBERT R. MOELLER WILEY John Wiley & Sons, Inc. Preface About the Author xix XXV PART ONE CHAPTER 1 FOUNDATIONS OF MODERN INTERNAL

More information

Standards for Excellence Program Organizational Self-Assessment Checklist

Standards for Excellence Program Organizational Self-Assessment Checklist Standards for Excellence Program Organizational Self-Assessment Checklist Instructions for using the checklist: if the organization has met the standard, X if the organization has not met the standard,

More information

Global Information Assurance Certification Paper

Global Information Assurance Certification Paper Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

CODE OF ETHICS FOR CHIEF EXECUTIVE OFFICER AND SENIOR FINANCIAL OFFICERS UGI CORPORATION

CODE OF ETHICS FOR CHIEF EXECUTIVE OFFICER AND SENIOR FINANCIAL OFFICERS UGI CORPORATION CODE OF ETHICS FOR CHIEF EXECUTIVE OFFICER AND SENIOR FINANCIAL OFFICERS OF UGI CORPORATION Introduction The reputation for integrity of UGI Corporation (the Company ) is a valuable asset that is vital

More information

* SAKURA Rules * (Code of Conduct for the Terumo Group)

* SAKURA Rules * (Code of Conduct for the Terumo Group) * SAKURA Rules * (Code of Conduct for the Terumo Group) Terumo Corporation TABLE OF CONTENTS Chapter1. Introduction...2 1.1 Objectives 1.2 Definitions 1.3 Scope of Application of the SAKURA Rules 1.4 Inquiries

More information

Introduction & Welcome

Introduction & Welcome Introduction & Welcome Thank you for your interest the Crafter s Choice Distributor Program. You will find that by offering the Crafter s Choice brand of products, you will be offering your customers the

More information

LIFEBRIDGE HEALTH INTEGRITY PROGRAM CODE OF EXCELLENCE

LIFEBRIDGE HEALTH INTEGRITY PROGRAM CODE OF EXCELLENCE LIFEBRIDGE HEALTH INTEGRITY PROGRAM CODE OF EXCELLENCE I. MESSAGE FROM THE PRESIDENT It is the mission of LifeBridge Health to provide a broad array of high quality, cost effective health and health related

More information

Benchmarking 101: Shaping your E&C Program for Maximum Value

Benchmarking 101: Shaping your E&C Program for Maximum Value Benchmarking 101: Shaping your E&C Program for Maximum Value Presented on November 15, 2016 Copyright 2016NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented by Mary Bennett Vice President, Advisory Services,

More information

AHIMA Information Governance & The Information Governance Adoption Model (IGAM )

AHIMA Information Governance & The Information Governance Adoption Model (IGAM ) AHIMA Information Governance & The Information Governance Adoption Model (IGAM ) Katherine Downing, MA, RHIA, CHPS, PMP Sr. Director AHIMA IG Advisors 2017 2017 Introductions and Welcome! Agenda Part Part

More information

DRIVER ADDENDUM TO SERVICES AGREEMENT. Last update: October 20, 2015

DRIVER ADDENDUM TO SERVICES AGREEMENT. Last update: October 20, 2015 DRIVER ADDENDUM TO SERVICES AGREEMENT Last update: October 20, 2015 This Driver Addendum to Services Agreement ( Addendum ) constitutes a legal agreement between an independent company in the business

More information

Fulfilling CDM Phase II with Identity Governance and Provisioning

Fulfilling CDM Phase II with Identity Governance and Provisioning SOLUTION BRIEF Fulfilling CDM Phase II with Identity Governance and Provisioning SailPoint has been selected as a trusted vendor by the Continuous Diagnostics and Mitigation (CDM) and Continuous Monitoring

More information

ICHWC Code of Ethics (Updated February 1, 2017)

ICHWC Code of Ethics (Updated February 1, 2017) ICHWC Code of Ethics (Updated February 1, 2017) ICHWC is committed to maintaining and promoting excellence in coaching. Therefore, ICHWC expects all credentialed health and wellness coaches (coaches, coach

More information