Example: confidence

Privacy & Security Policies and Procedures Manual

Inscyte Corporation Privacy & Security Policies and Procedures Manual Date: September 30, 2011 Revision: Draft Privacy & Security Policies and Procedures Manual Inscyte Corp. & AIM Inc. Draft September 30, 2011 Page 1 of 288 Table of Contents Table of Contents ..1 Important Information about Privacy & Security ..6 The Law in Ontario ..7 About Inscyte Corporation ..8 About Artificial Intelligence In Medicine Inc..9 Important Information about this Manual .. 10 Scope of Applicability .. 11 Verb Usage .. 11 List of Abbreviations .. 11 Format of Policy & Procedures Documentation .. 12 Revision History .. 14 1 General Privacy Policies and Procedures .. 15 PS Existence of Policies and Procedures .. 16 PS Review of Policies and Procedures .

PS 1.1 Existence of Policies and Procedures .....16 PS 1.2 Review of Policies and Procedures .....18

Tags:

  Security, Policies, Procedures, Privacy, Security policies and procedures

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Privacy & Security Policies and Procedures Manual

1 Inscyte Corporation Privacy & Security Policies and Procedures Manual Date: September 30, 2011 Revision: Draft Privacy & Security Policies and Procedures Manual Inscyte Corp. & AIM Inc. Draft September 30, 2011 Page 1 of 288 Table of Contents Table of Contents ..1 Important Information about Privacy & Security ..6 The Law in Ontario ..7 About Inscyte Corporation ..8 About Artificial Intelligence In Medicine Inc..9 Important Information about this Manual .. 10 Scope of Applicability .. 11 Verb Usage .. 11 List of Abbreviations .. 11 Format of Policy & Procedures Documentation .. 12 Revision History .. 14 1 General Privacy Policies and Procedures .. 15 PS Existence of Policies and Procedures .. 16 PS Review of Policies and Procedures .

2 18 PS Amendment of Policies and Procedures .. 20 PS Creating New Statements of Policy and Procedure .. 22 PS Amending Statements of Policy and Procedure .. 25 PS Transparency of Policies and Procedures .. 27 2 Governance and Accountability .. 29 PS Governance Framework .. 30 PS Accountability for Privacy & Security .. 32 PS Terms of Reference .. 33 3 Implementation of Policies and Procedures .. 35 PS Publication of these Policies and Procedures .. 36 PS Privacy Document 38 PS Access to Privacy & Security Documentation .. 40 PS Employee/Contractee Confidentiality Agreements .. 41 PS Template Confidentiality Agreements .. 43 PS Executing Confidentiality Agreements .. 44 PS Privacy & Security Awareness Training .. 46 PS Maintaining Privacy Training Logs.

3 47 PS Monitoring Compliance with Policies and Procedures .. 49 PS Corrective Action for Non-Compliance .. 51 PS Actions at Termination of Employment or Contract .. 53 Privacy & Security Policies and Procedures Manual Page 2 of 288 Draft September 30, 2011 Inscyte Corp. & AIM Inc. 4 Collection of Personal Health Information .. 55 PS Limits on the Collection of PHI .. 56 PS Collection of PHI Paper Records .. 58 PS Collection of PHI Portable Media .. 60 PS Collection of PHI Mobile Devices .. 62 PS Collection of PHI Email .. 64 PS Collection of PHI Network 66 PS Maintaining Logs of Data Holdings .. 68 PS Maintaining Statements of Purpose .. 70 PS Maintaining Statements of Permitted Use .. 72 PS Maintaining Statements of Retention.

4 74 PS Unsolicited Receipt of PHI .. 76 5 Use of Personal Health Information .. 78 PS Limiting Access to and Use of PHI .. 79 PS Maintaining a Log of Authorized Personnel .. 81 6 Disclosure of Personal Health Information .. 83 PS Limits on Disclosure of PHI .. 84 PS Disclosure of PHI for Purposes other than Research .. 86 PS Disclosure of PHI for Research Purposes .. 88 PS Request by an Individual to Access his/her PHI .. 90 7 Data Sharing Agreements .. 94 PS Requirement for Data Sharing Agreements .. 95 PS Minimum Content of Data Sharing Agreements .. 97 PS Template Data Sharing Agreements .. 99 PS Log of Data Sharing Agreements .. 101 8 Agreements with Third Party Service Providers .. 103 PS Requirement for Third Party Service Agreements.

5 104 PS Minimum Content of Third Party Service Agreements .. 106 PS Template Third Party Service Agreements .. 108 PS Log of Third Party Service Agreements .. 110 9 Data Linkage, De-Identification and Aggregation .. 112 PS Handling Requests for Data Linkages .. 113 PS De-Identification of PHI Paper Records .. 115 PS De-Identification of PHI Digital Records .. 117 PS Limits on Aggregation of Data (Statistics) .. 119 10 Privacy Audit Program .. 121 PS Conducting Privacy Impact Assessments .. 122 PS Log of Privacy Impact Assessments .. 125 PS Conducting Privacy Audits .. 127 PS Log of Privacy Audits .. 129 PS Auditing Computer Servers .. 131 Privacy & Security Policies and Procedures Manual Inscyte Corp. & AIM Inc. Draft September 30, 2011 Page 3 of 288 PS Auditing Employee Computers and Workspaces.

6 133 11 Privacy Breaches, Complaints and Inquiries .. 135 PS Indentifying a Breach of Privacy .. 136 PS Reporting a Breach of Privacy .. 138 PS Actions Following a Breach of Privacy .. 140 PS Log of Privacy Breaches .. 143 PS Handling Privacy Complaints .. 145 PS Log of Privacy Complaints .. 149 PS Handling Privacy Inquiries .. 151 12 Physical Security .. 154 PS Physical Isolation of Personal Health Information .. 155 PS Physical Security Access Controls .. 157 PS Intrusion Detection Controls .. 158 PS Issuing of Keys, Pass Cards or Access Codes .. 160 PS Expiry of Pass Cards and Access Codes .. 162 PS Secure Storage of Keys and Pass Cards .. 163 PS Log of Individuals Having Access to Premises .. 164 PS Recovery of Keys, Pass Cards and Access Codes at Termination of Employment.

7 166 PS Reporting a Loss of Keys or Pass Cards .. 168 PS Actions in the Event of Loss of Keys or Pass Cards .. 169 PS Maintaining Entry/Exit Logs .. 170 PS Intrusion Detection Alarm .. 172 PS Intrusion Alarm Activation .. 174 PS Intrusion Alarm De-Activation .. 176 PS Accidental Activation of Intrusion Alarm .. 177 PS Actions in the Event of an Intrusion Alarm .. 178 PS Environmental Anomaly Alarms .. 179 PS Activation of Environmental Alarms .. 181 PS De-Activation of Environmental Alarms .. 183 PS Actions in the Event of an Environmental Alarm .. 184 13 Retention, Storage, Transfer, and Disposal of Personal Health Information .. 185 PS Appropriate Retention Periods for PHI .. 186 PS Storage of PHI Paper Records .. 188 PS Storage of PHI Portable Media.

8 190 PS Storage of PHI Mobile Devices .. 192 PS Storage of PHI Email Archives .. 193 PS Storage of PHI File/Database Systems .. 195 PS Transfer of PHI Paper Records .. 197 PS Transfer of PHI Portable Media .. 199 PS Transfer of PHI Mobile Devices .. 201 PS Transfer of PHI Email .. 203 PS Transfer of PHI Network Transfer .. 205 Privacy & Security Policies and Procedures Manual Page 4 of 288 Draft September 30, 2011 Inscyte Corp. & AIM Inc. PS Log of PHI Transfers .. 207 PS Disposal of PHI Paper Records .. 209 PS Disposal of PHI Portable Media .. 211 PS Disposal of PHI Files/Database Systems .. 213 PS Deleting Files from Re-usable Storage Devices .. 215 PS Destruction of Internal Computer Disk Drives .. 217 PS Destruction of Diskettes, CDs and DVDs.

9 219 PS Destruction of Tapes .. 221 PS Destruction of Flash Memory Devices (USB Keys) .. 223 14 Information Security .. 224 PS Isolation of PHI Computers and Networks .. 225 PS Issuing Network Accounts and Passwords .. 227 PS Issuing Application Specific Accounts and Passwords .. 229 PS Issuing Database System Accounts and Passwords .. 231 PS Requirements for Access Accounts .. 233 PS Requirements for Passwords .. 235 PS Mandatory Password Expiry .. 237 PS Limits on Password Re-Use .. 239 PS Log of Accounts Having Access to 241 PS Decommissioning of Accounts upon Termination of Employment .. 243 PS Maintaining Information Access Audit Logs .. 245 PS Failed Authentication Account Lockout .. 247 PS CytoBase Data Modification Audit Logs.

10 249 PS CytoBase Data Processing Audit Logs .. 250 PS CytoBase Transmission Audit Logs .. 251 PS Backup and Recovery .. 252 PS Off-Site Storage of Backup Media .. 253 PS Acceptable Use of Remote Network Access .. 254 PS Acceptable Use of Wireless Network Access .. 256 PS Requirements for Internet Applications Accessing PHI .. 258 15 Security Audit Program .. 260 PS Conducting Security Audits .. 261 PS On-going Review of Security Logs .. 264 PS Maintaining a Log of Security Audits .. 266 16 Security Breaches .. 267 PS Identifying a Breach of Security .. 268 PS Reporting a Breach of 270 PS Actions Following a Breach of Security .. 272 PS Log of Security Breaches .. 274 17 Risk Management and Business Continuity .. 276 PS Risk Management Framework.


Related search queries