Project Number Application D-2 Page 1 of 8

Size: px
Start display at page:

Download "Project Number Application D-2 Page 1 of 8"

Transcription

1 Page 1 of 8 Privacy Board The Johns Hopkins Medical Institutions Health System/School of Medicine/School of Nursing/Bloomberg School of Public Health 5801 Smith Avenue, Suite 235, Baltimore, MD , Fax Application for a Waiver of Authorization for Research Use or Disclosure of Protected Health Information (PHI) and Other Personal Information that is Protected by Law The Policies of the Johns Hopkins Medical Institutions foster open intellectual inquiry within the context of the law and the ethics of the health professions. Research of records, data, and information held by the Medical Institutions may be conducted when it is legally possible to permit access to and use of these materials. The Privacy Board of the Johns Hopkins Medical Institutions reviews applications to conduct research of institutional records and data that contain information that is protected by law. It is the charge of the Privacy Board to allow research of these institutional materials whenever it is legally possible and ethically responsible to do so. Privacy Board review includes, but is not limited to, applications for research in collections held by the following repositories: Alan Mason Chesney Medical Archives of the Johns Hopkins Medical Institutions Medical Records Division of the Johns Hopkins Hospital (for access to records that are more than 50 years old) Department of Art as Applied to Medicine Please refer to the policies of each individual repository for further limitations. Guidelines for Submission of Application 1. In preparing your application, please clearly define the measures you intend to take to safeguard any personal information protected by law* that you may encounter in your research. See the attached summary of laws protecting personal information. In reviewing applications, the Privacy Board is required to evaluate the following factors: Your intended use of the protected information, and the degree to which that information is necessary to your proposed research; The degree to which a waiver of individual authorization is necessary to your research; The specific legal terms of access that apply to the various types of protected information to which you seek access; The degree to which your use or disclosure of the information may jeopardize the right to privacy of the subjects of that information; The degree of risk of unlawful, unauthorized, or unethical use or disclosure, reuse or redisclosure of the private information of individuals; Your plan for disposing of the protected information at the conclusion of your research. 2. The application to the Privacy Board includes the attached form which includes a questionnaire and project abstract, along with the following supporting documents: A project abstract which includes a summary of the materials at the Johns Hopkins Medical Institutions that you wish to access (see Part 1 in the application form). Curriculum Vitae

2 Page 2 of 8 A letter of reference. Letters of reference may be waived for faculty and staff of the Johns Hopkins Medical Institutions. Students must have their academic advisors sign their application form as an additional investigator, in addition to providing a letter of reference. Determination regarding human subject research. In cases that might involve living subjects, applicants should seek a determination from their home institution s Institutional Review Board (IRB) or their institution s equivalent. Applicants from Johns Hopkins conducting human subject research should apply to a Johns Hopkins IRB instead of the Privacy Board. Applicants from outside of Johns Hopkins conducting human subject research should apply to their home institution IRB and the Johns Hopkins Privacy Board when research involves PHI located at Johns Hopkins. 3. The Privacy Board will consider your application upon receipt of your completed questionnaire and all supporting documents. Contact the Privacy Board staff for dates of scheduled meetings. Please contact the Privacy Board staff if you have questions or need assistance in the preparation of your application. *Protected Health Information (PHI) includes the following types of identifiers: Names Geographic information smaller than a state Elements of dates (birthdates, admission dates, dates of death, ages greater than 89 years) Telephone numbers Fax numbers Electronic mail addresses Social security numbers Medical record numbers Account numbers Certificate or license numbers Vehicle identifiers and serial numbers including license plate Device identifiers and serial numbers URLs IP addresses Biometric identifiers Full face photographic images and comparable images Health plan beneficiary numbers Any other unique identifying number, characteristic or code that meets the following criteria: o It is not derived from any other code (e.g., SSN, MRN) and is not used for any other purpose o Persons using the data for research have not access to the code key and the key is held by a source that is not part of the research team. An investigator (or her study team member) may not create the code for de-identified data that she will use in her own research.

3 Page 3 of 8 APPLICATION FOR A WAIVER OF AUTHORIZATION For Research Use or Disclosure of Protected Health Information (PHI) and Other Personal Information that is Protected by Law (Note that spaces will expand to fit.) Name of Applicant Title of Project Institution Mailing address Phone number address List the persons/entities with whom, for research purposes, you will need to share PHI/confidential information

4 Page 4 of 8 PART 1. PROJECT ABSTRACT Please describe the purpose of your research, summarize the materials at Johns Hopkins you wish to access, and describe the project you expect to result. If known, list the specific individuals or class of individuals whose PHI you wish to access as part of your research study. If these individuals have been deceased for more than 50 years and their information is excluded from the definition of PHI, do you anticipate disclosing their individually identifiable health information in publications or presentations? Space will expand to fit.

5 Page 5 of 8 PART 2. PROTECTIONS FOR PHI/CONFIDENTIAL INFORMATION 1. In order for the Privacy Board to grant a waiver of authorization, you must demonstrate that your research, as described in your project abstract, cannot practicably be carried out without access to the material and that your research cannot be practicably conducted without the waiver. a) State why the materials that you wish to access are necessary to your proposed research: b) Indicate why the study cannot be conducted without the waiver of authorization. Check all that apply. It would be difficult or impossible to find the persons whose personal information may be included. Materials contain information of both living and deceased individuals. Until I review the information I will not know whose personal information may be included. Other reasons: 2. Explain why your access to PHI and other Confidential Information poses no more than a minimal risk to the privacy of the subjects of that information. Since the materials you access may contain the confidential information of many individuals, your response should address whether your study poses a risk to specific individuals or groups, and the extent to which you will use confidential information about these individuals or groups in your research. 3. If you anticipate needing to record any PHI, you must describe what type of PHI you plan to record and in what format you plan to record it. If there is valid justification for obtaining photocopies of medical records, electronic copies of electronic medical records or digital copies (e.g., PDF) of other archival materials containing PHI, you may be asked to sign a Data Use Agreement prepared by Johns Hopkins legal counsel. a) Describe what type of PHI you may wish to record during the course of your proposed research and justify your need for recording PHI.

6 Page 6 of 8 b) Indicate in what format you plan to record PHI. Check all that apply. Be advised that the repository has limits on what materials may be reproduced. Photocopies of any material used in research, excluding medical records Digital copies of any materials used in your research, excluding medical records Photocopies of medical records Electronic copies of electronic medical records Notes collected as electronic documents stored on a computer or other electronic device. Handwritten notes on paper Other: 4. Following are required elements included in a typical plan to protect confidential information. Please check all those that are included in your plan and add any other privacy protections that you intend to use. If approved you will also be required to sign a Data Security Acknowledgement for research use of PHI governed by the Privacy Board of the Johns Hopkins Medical Institutions. Data may be shared only with Privacy Board-approved and (if applicable) IRB-approved members of your study team. You are responsible for ensuring that all users meet these requirements. You will access only the records specified in your approved protocol. You will use reasonable efforts to record only the minimum necessary PHI. You will maintain only a single copy (plus one backup) in electronic form. You will put data only on portable media (e.g., laptops or thumbdrives) or desktop computers that have been encrypted by IT at Johns Hopkins or your local institution. All of your storage devices will be password-protected, and only authorized users will have access to the password. Passwords will be changed on a regular basis. Computers on which PHI is maintained will have anti-virus and anti-intrusion (anti-spy) software. All paper files will be stored within a secured storage system to which only you and those persons indicated above will have access. You will extend these protections until you return or destroy any PHI that you remove from Johns Hopkins. You will consult with the Privacy Board staff before recording PHI as reproductions (paper or digital) or in electronic format to determine if a Data Use Agreement with Johns Hopkins is required. Additional protections:

7 Page 7 of 8 If any of the required elements listed above is not included in your data security plan, please explain: 5. Indicate how you will protect the PHI/Confidential Information you encounter if publications and/or oral presentations result from this research. Check all that apply. Omission of information from publication Redaction of information Modification of identifiers Other methods: 6. Please describe the procedures that you will follow to destroy your notes and data containing PHI/Confidential Information. Physical and/or electronic data will be shredded or deleted. Other methods: PART 3. HUMAN SUBJECTS RESEARCH DETERMINATION Indicate whether your research constitutes human subjects research and what steps you have taken for review of your research. Research does not constitute human subjects research. Research involves exclusively PHI of deceased individuals and it not subject to IRB review. Other reasons: If your research has been or will be reviewed by an IRB in your home institution or elsewhere, indicate the determination reached by the Board and attach documentation. Approved as human subjects research Approved as Exempt Approved as Not human subjects research Pending review Other: If your research has not been reviewed by or is not pending with an IRB, please explain the steps you are taking to obtain review of your research and your data collection plan.

8 Page 8 of 8 STATEMENT OF PRINCIPAL INVESTIGATOR As applicant, I make the following assurances to the Privacy Board: The information that I have provided in this request for a Waiver of Authorization is complete and accurate. I will access only the minimum amount of PHI/Confidential Information necessary to accomplish the research described in this application. I will not reuse the PHI/Confidential Information or disclose it to any person or entity other than those indicated in this application, except: 1. as required by law, 2. for authorized oversight of research, 3. In connection with other research for which the HIPAA Privacy Rule permits this PHI to be used or disclosed. If at any time I wish to reuse this information for other purposes or disclose the information to other individuals or entities, I will seek approval by the Privacy Board. I understand that I am ultimately responsible for protecting the private information of individuals. I assume responsibility to ensure that the additional investigators listed below use and disclose PHI only as permitted and protect its security and confidentiality as required by the Privacy Board. I acknowledge that it is not the intention of Johns Hopkins to disclose any confidential materials to me other than those described in this application. If I encounter such incidental confidential information, I agree not to review any such materials once I determine that such materials are or may be confidential. When in doubt about the confidentiality of any materials, I agree to consult with Johns Hopkins personnel before conducting further review of the material in question and I agree to abide by any decision of Johns Hopkins personnel regarding confidentiality. Signature of Principal Investigator Please print or type name Date Signature of Additional Investigator Please print or type name Date Signature of Additional Investigator Please print or type name Date Signature of Additional Investigator Please print or type name Date Note to applicant: If the Privacy Board or its designee approves a waiver of authorization, it is your responsibility to keep an accounting of those to whom you disclose PHI at any time during the research activity. Under the Privacy Rule, an individual whose PHI you obtain may request an accounting of disclosures for the six year period prior to the request or since the applicable compliance date. An accounting for disclosures of identifiable health information is not required when PHI is shared with a researcher who is an employee or workforce member of a Johns Hopkins covered entity.

9 Page 1 of 4 Privacy Board The Johns Hopkins Medical Institutions Health System/ School of Medicine/ School of Nursing/ Bloomberg School of Public Health 5801 Smith Avenue, Suite 235, Baltimore MD (410) / FAX (410) Summary of the Laws that Protect Personal Information HIPAA The Health Insurance Portability and Accountability Act of HIPAA Privacy Rule Under HIPAA, the privacy regulations went into effect on April 14, The purpose of the HIPAA Privacy Rule is to establish minimum Federal standards for safeguarding the privacy of individually identifiable health information. The privacy regulations allow access to protected health information (PHI) for research purposes under limited circumstances, and only when that research corresponds to the regulation s definition of research: Research - Research means a systematic investigation, including research development, testing, and evaluation, designed to develop or contribute to generalizable knowledge. In most circumstances, the researcher must obtain authorization from the individual whose PHI he/she wishes to use or disclose. However, a Privacy Board or Institutional Review Board may grant a waiver of the required individual authorization to use or disclose PHI. In order to be considered for this waiver, the researcher must demonstrate to the Privacy Board or IRB that the plan of research meets, in whole or in part, the following criteria: The use or disclosure of PHI involves no more than a minimal risk to the privacy of individuals, based on, at least, the presence of the following elements: 1. An adequate plan to protect the PHI from improper use and disclosure. 2. An adequate plan to destroy the PHI at the earliest opportunity consistent with conduct of the research, unless there is a health or research justification for retaining the protected health information or such retention is otherwise required by law. 3. Adequate written assurances that the PHI will not be reused or disclosed to any other person or entity, except as required by law, for authorized oversight of the research study, or for other research for which the use or disclosure of PHI would be permitted by HIPAA. The research could not practicably be conducted without the waiver or alteration; and The research could not practicably be conducted without access to the materials that may contain PHI. Form D-2 Supplement of Laws

10 Page 1 of 4 Minimal Risk The HIPAA Privacy Rule adopts the definition of minimal risk that was established under the Common Rule for human subjects research. By this definition, minimal risk means that the probability and magnitude of harm or discomfort anticipated in the proposed research are not greater, in and of themselves, than those ordinarily encountered in daily life or during the performance of routine physical or psychological examinations or tests. PHI (Protected Health Information) is defined as individually identifiable health information, held or maintained by a covered entity or its business associates acting for the covered entity, that is transmitted or maintained in any form or medium [ ]. This includes identifiable demographic and other information relating to the past, present, or future physical or mental health or condition of an individual, or the provision or payment of health care to an individual that is created or received by a health care provider, health plan, employer, or health care clearinghouse. This definition applies to living individuals and to deceased individuals who have died within the past 50 years. The HIPAA Privacy Rule excludes information related to individuals who have died more than 50 years ago from the definition of PHI. The HIPAA Privacy Rule requires covered entities to limit use and disclosure of PHI, specifically the 18 identifiers listed below but provides a safe harbor upon which a covered entity may rely to de-identify information (de-identified information is not subject to the Privacy Rule). Names Geographic information smaller than a state Elements of dates (birthdates, admission dates, dates of death, ages greater than 89 years) Telephone numbers Fax numbers Electronic mail addresses Social security numbers Medical record numbers Account numbers Certificate or license numbers Vehicle identifiers and serial numbers including license plate Device identifiers and serial numbers URLs IP addresses Biometric identifiers Full face photographic images and comparable images Health plan beneficiary numbers Any other unique identifying number, characteristic or code that meets the following criteria: o It is not derived from any other code (e.g., SSN, MRN) and is not used for any other purpose o Persons using the data for research have not access to the code key and the key is held by a source that is not part of the research team. An investigator (or her study team member) may not create the code for de-identified data that she will use in her own research. Note that the subjects of private information may have the ability to sue for damages in the case of breach of privacy or defamation, as those concepts are defined by state law. The Archives reserves the right to refuse access when access might harm the rights or welfare of an individual. Form D-2 Supplement of Laws

11 Page 1 of 4 For more information on the HIPAA Privacy Rule (45 CFR 160, 164) and the Common Rule (45 CFR 46 Subpart A), visit the following websites: U.S. Department of Health and Human Services, National Institutes of Health; HIPAA Privacy Rule Information for Researchers: Details on the 18 identifiers may be found at: National Institute of Health, Office of Human Subjects Research; Code of Federal Regulations: Maryland Medical Records Statute Maryland law governs the confidentiality of Medical Records. Under Maryland state statute, a medical record is defined as any oral, written or other transmission in any form or medium of information that: (1) is entered in the record of a patient or recipient; (2) identifies or can readily be associated with the identity of a patient or recipient; and (3) relates to the health care of the patient or recipient. See Md. Code Ann., Health-Gen. I (g) (1) (Supp. 1999); see also id (g) (2) (listing inclusive examples of medical records ). The code does allow for disclosures without authorization of person in interest for educational or research purposes, subject to the applicable requirements of an institutional review board. Researchers must sign an acknowledgement of the duty under the Act not to redisclose any patient identifying information. FERPA - The Family Educational Rights and Privacy Act (commonly referred to as the Buckley/Pell Amendment, 20 U.S.C. 1232g; 34 CFR Part 99) is a Federal law that protects the privacy of the education records of living individuals. Confidential Education Records - As defined in FERPA, Confidential Education Records are those records that are 1) directly related to a student; and 2) maintained by an educational agency or institution or by a party acting for the agency or institution. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education. Under this Act, confidential education information may be disclosed without the authorization of the subject of that information under only a very limited number of circumstances. Disclosure is allowed for limited research uses: To develop, validate, or administer predictive tests; To administer student aid programs; or To improve instruction This disclosure is only allowed, however, under the following conditions: Personally identifiable information is not shared; Personally identifiable information is not redisclosed; Form D-2 Supplement of Laws

12 Page 1 of 4 The information is used only for the reason for which it was disclosed; The information is destroyed when no longer needed for research. While FERPA only restricts disclosure of the educational records of living individuals, it is the policy of the Johns Hopkins Medical Institutions to not disclose grades or any evaluative information of all individuals, living or deceased. For information on FERPA, visit the following websites: United States Code, Title 20: [dead link] Code of Federal Regulations: Common law and institutional policy - While HIPAA protects health information and FERPA protects student information, common law protects other types of private information when that information is of a kind that 1) would be highly offensive to a reasonable person, and 2) is not of legitimate concern to the public (See Second Restatement of Torts at 652A 652I). Finally, it should be noted that the privacy policies of the Johns Hopkins Medical Institutions supplement all of the above-noted federal laws and regulations and that the policies of The Johns Hopkins Medical Institutions may be stricter, concerning certain aspects of privacy protection, than federal or state laws or regulations. The Privacy Board of The Johns Hopkins Medical Institutions reserves the right to refuse access to any information in all cases where it finds that such access may jeopardize the privacy of any individual. Form D-2 Supplement of Laws

EVMS Medical Group A. RESEARCH USE AND OR DISCLOSURE WITHOUT AUTHORIZATION:

EVMS Medical Group A. RESEARCH USE AND OR DISCLOSURE WITHOUT AUTHORIZATION: Page 1 of 8 Definitions: Research Research is defined as systematic investigation, including the research development, testing, and evaluation, designed to develop or contribute to generalizable knowledge

More information

COLUMBIA UNIVERSITY INSTITUTIONAL REVIEW BOARD POLICY ON THE PRIVACY RULE AND THE USE OF HEALTH INFORMATION IN RESEARCH

COLUMBIA UNIVERSITY INSTITUTIONAL REVIEW BOARD POLICY ON THE PRIVACY RULE AND THE USE OF HEALTH INFORMATION IN RESEARCH COLUMBIA UNIVERSITY INSTITUTIONAL REVIEW BOARD POLICY ON THE PRIVACY RULE AND THE USE OF HEALTH INFORMATION IN RESEARCH I. Background The Health Insurance Portability and Accountability Act of 1996 (as

More information

UNIVERSITY OF TENNESSEE HEALTH SCIENCE CENTER INSTITUTIONAL REVIEW BOARD USE OF PROTECTED HEALTH INFORMATION WITHOUT SUBJECT AUTHORIZATION

UNIVERSITY OF TENNESSEE HEALTH SCIENCE CENTER INSTITUTIONAL REVIEW BOARD USE OF PROTECTED HEALTH INFORMATION WITHOUT SUBJECT AUTHORIZATION UNIVERSITY OF TENNESSEE HEALTH SCIENCE CENTER INSTITUTIONAL REVIEW BOARD USE OF PROTECTED HEALTH INFORMATION WITHOUT SUBJECT AUTHORIZATION I. PURPOSE To provide guidance to investigators regarding the

More information

Human Research Protection Program (HRPP) HIPAA and Research at Brown

Human Research Protection Program (HRPP) HIPAA and Research at Brown Human Research Protection Program (HRPP) and Research at Brown Version Date: 12/03/2018 I. and Research at Brown A. The Health Insurance Portability and Accountability Act of 1996 () and its regulations,

More information

UAMS ADMINISTRATIVE GUIDE NUMBER: 2.1

UAMS ADMINISTRATIVE GUIDE NUMBER: 2.1 UAMS ADMINISTRATIVE GUIDE NUMBER: 2.1.12 DATE: 04/01/2003 REVISION: 3/1/2004; 12/28/2010; 01/02/2013 PAGE: 1 of 18 SECTION: HIPAA AREA: HIPAA PRIVACY/SECURITY POLICIES SUBJECT: HIPAA RESEARCH POLICY PURPOSE

More information

Standards for Privacy of Individually Identifiable Health Information

Standards for Privacy of Individually Identifiable Health Information Standards for Privacy of Individually Identifiable Health Information 45 CFR 160 and164 as amended: August 14, 2002 Eddie González-Vázquez, MD Research Privacy Officer Suite 622C Main Building PO Box 365067

More information

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy

Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Regenstrief Center for Healthcare Engineering HIPAA Compliance Policy Revised December 6, 2017 Table of Contents Statement of Policy 3 Reason for Policy 3 HIPAA Liaison 3 Individuals and Entities Affected

More information

HIPAA: What Researchers Need to Know

HIPAA: What Researchers Need to Know HIPAA: What Researchers Need to Know The Health Insurance Portability and Accountability Act (HIPAA) protects individuals medical records from unauthorized use. Medical records, however, are often integral

More information

HIPAA Insurance Portability Act HIPAA. HIPAA Privacy Rule - Education Module for Institutional Review Boards

HIPAA Insurance Portability Act HIPAA. HIPAA Privacy Rule - Education Module for Institutional Review Boards HIPAA Insurance Portability Act HIPAA HIPAA Privacy Rule - Education Module for Institutional Review Boards The HIPAA Privacy Rule protects the privacy and security of an individual s health information

More information

This form is to be used in conjunction with the Application for IRB Review

This form is to be used in conjunction with the Application for IRB Review This form is to be used in conjunction with the Application for IRB Review Study Title: Sponsor/Funding Agency (if funded): Principal Investigator Name: A. What is the purpose of this form? The HIPAA Privacy

More information

UBMD Policy for HIPAA Compliant Subject Recruitment

UBMD Policy for HIPAA Compliant Subject Recruitment UBMD Policy for HIPAA Compliant Subject Recruitment Approved by Executive Committee on December 5, 2016 I. Statement of Purpose This policy is applicable in the situation where the Principle Researcher

More information

Title: HP-53 Use and Disclosure of Protected Health Information for Purposes of Research. Department: Research

Title: HP-53 Use and Disclosure of Protected Health Information for Purposes of Research. Department: Research Title: HP-53 Use and Disclosure of Protected Health Information for Purposes of Research Department: Research I. STATEMENT OF POLICY In order for an investigator to use or disclose protected health information

More information

COLUMBIA UNIVERSITY DATA CLASSIFICATION POLICY

COLUMBIA UNIVERSITY DATA CLASSIFICATION POLICY COLUMBIA UNIVERSITY DATA CLASSIFICATION POLICY I. Introduction Published: October 2013 Revised: November 2014, April 2016, October 2017 As indicated in the Columbia University Information Security Charter

More information

City and County of San Francisco Department of Public Health DPH Health Information Data Use Agreement

City and County of San Francisco Department of Public Health DPH Health Information Data Use Agreement This form,, must be completed by researchers who propose to perform research using datasets generated from DPH sources. This Agreement is entered into by and between the City and County of San Francisco

More information

University of Mississippi Medical Center Data Use Agreement Protected Health Information

University of Mississippi Medical Center Data Use Agreement Protected Health Information Data Use Agreement Protected Health Information This Data Use Agreement ( DUA ) is effective on the day of, 20, ( Effective Date ) by and between University of Mississippi Medical Center (UMMC) ( Data

More information

COLUMBIA UNIVERSITY MEDICAL CENTER INSTITUTIONAL REVIEW BOARD (IRB)

COLUMBIA UNIVERSITY MEDICAL CENTER INSTITUTIONAL REVIEW BOARD (IRB) COLUMBIA UNIVERSITY MEDICAL CENTER INSTITUTIONAL REVIEW BOARD (IRB) PROCEDURES TO COMPLY WITH PRIVACY LAWS THAT AFFECT USE AND DISCLOSURE OF PROTECTED HEALTH INFORMATION FOR RESEARCH PURPOSES Procedures

More information

HIPPA Research Policy

HIPPA Research Policy I. Purpose The purpose of this policy is to clearly define the circumstances under which protected health information (PHI) may and may not be used internally or disclosed externally in connection with

More information

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies

Texas Tech University Health Sciences Center El Paso HIPAA Privacy Policies Administration Policy 1.1 Glossary of Terms - HIPAA Effective Date: January 15, 2015 References: http://www.hhs.gov/ocr/hipaa TTUHSC El Paso HIPAA website: http://elpaso.ttuhsc.edu/hipaa/ Policy Statement

More information

Texas Tech University Health Sciences Center HIPAA Privacy Policies

Texas Tech University Health Sciences Center HIPAA Privacy Policies Administration Policy 1.1 Glossary of Terms - HIPAA Effective Date: January 15, 2015 Reviewed Date: August 7, 2017 References: http://www.hhs.gov/ocr/hippa HSC HIPAA website http://www.ttuhsc.edu/hipaa/policies_procedures.aspx

More information

Limited Data Set Data Use Agreement For Research

Limited Data Set Data Use Agreement For Research Limited Data Set Data Use Agreement For Research This Data Use Agreement is dated,, and is between the ( Recipient ) and University of Miami, ( Covered Entity ). This Data Use Agreement is made in accordance

More information

HIPAA Policy 5032 Statement of Policy on Use and Disclosure of Protected Health Information for Research Purposes

HIPAA Policy 5032 Statement of Policy on Use and Disclosure of Protected Health Information for Research Purposes HIPAA Policy 5032 Statement of Policy on Use and Disclosure of Protected Health Information for Research Purposes Responsible Office Provost Effective Date 04/14/03 Responsible Official Privacy Officer

More information

University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim)

University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim) Group Insurance Regulations Administrative Supplement No. 19 April 2003 University of California Group Health and Welfare Benefit Plans HIPAA Privacy Rule Policies and Procedures (Interim) The University

More information

RELEASE OF PROTECTED HEALTH INFORMATION ( PHI ) FOR RESEARCH PURPOSES

RELEASE OF PROTECTED HEALTH INFORMATION ( PHI ) FOR RESEARCH PURPOSES RELEASE OF PROTECTED HEALTH INFORMATION ( PHI ) FOR RESEARCH PURPOSES PURPOSE The purpose of this policy is to establish guidelines for the release of Protected Health Information ( PHI ) for research

More information

Effective Date: 4/3/17

Effective Date: 4/3/17 HIPAA AND HITECH ADM 067.4 Attachment D Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and Security Rule Health Information Technology for Economic and Clinical Health (HITECH)

More information

UCLA Health System Data Use Agreement

UCLA Health System Data Use Agreement UCLA Health System Data Use Agreement The federal Health Insurance Portability and Accountability Act and the regulations promulgated thereunder (collectively referred to as the Privacy Rule ) permit the

More information

7 ATLzr UNIVERSITY OF CALIFORNIA. January 30, 2014

7 ATLzr UNIVERSITY OF CALIFORNIA. January 30, 2014 UNIVERSITY OF CALIFORNIA BEPKELEY DAVIS IRVINE LOS ANGELES MERCED RIVERSIDE SAN DIEGO SAN FRANCISCO 4 SANTA BAREARA SANTA CRUZ CHANCELLORS MEDICAL CENTER CHIEF EXECUTIVE OFFICERS LAWRENCE BERKELEY NATIONAL

More information

HIPAA Compliance Guide

HIPAA Compliance Guide This document provides an overview of the Health Insurance Portability and Accountability Act (HIPAA) compliance requirements. It covers the relevant legislation, required procedures, and ways that your

More information

HIPAA and Research at UB

HIPAA and Research at UB HIPAA and Research at UB Brian Murphy, MS Director, University at Buffalo HIPAA Compliance Office of the President Director, Health Professions IT Partnership Office of the VP for Health Affairs bwmurphy@buffalo.edu

More information

University of Wisconsin Milwaukee

University of Wisconsin Milwaukee University of Wisconsin Milwaukee Policies and Procedures for the Protection of Patient Health Information Under the Health Insurance Portability and Accountability Act ( HIPAA ) Published April 14, 2003

More information

HARVARD CATALYST DATA USE AGREEMENT FOR LIMITED DATA SETS

HARVARD CATALYST DATA USE AGREEMENT FOR LIMITED DATA SETS HARVARD CATALYST DATA USE AGREEMENT FOR LIMITED DATA SETS This template agreement is available for use by Harvard Catalyst institutions where there is not an Institution specific Data Use Agreement required.

More information

North Shore LIJ Health System, Inc. Facility Name. CATEGORY: Effective Date: 8/15/13

North Shore LIJ Health System, Inc. Facility Name. CATEGORY: Effective Date: 8/15/13 North Shore LIJ Health System, Inc. Facility Name POLICY TITLE: HIPAA Marketing and Sale of Protected Health Information Policy ADMINISTRATIVE POLICY AND PROCEDURE MANUAL POLICY #: 800.43 System Approval

More information

HIPAA Privacy Rule Policies and Procedures

HIPAA Privacy Rule Policies and Procedures County of Sacramento Health Insurance Portability and Accountability Act HIPAA Privacy Rule Policies and Procedures Issue Date: April 14, 2003 Effective Date: April 14, 2003 Revised Date: January 2, 2018

More information

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION)

DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) DELHAIZE AMERICA PHARMACIES AND WELFARE BENEFIT PLAN HIPAA SECURITY POLICY (9/1/2016 VERSION) Delhaize America, LLC Pharmacies and Welfare Benefit Plan 2013 Health Information Security and Procedures (As

More information

Secondary Use of Data and Specimens

Secondary Use of Data and Specimens Secondary Use of Data and Specimens Behavioral & Social Sciences Part 2: What type of Review is Required? Cheri Pettey, MA, CIP Quality Improvement Specialist Regulatory & Exempt Determinations Objectives

More information

HIPAA Basics For Clinical Research

HIPAA Basics For Clinical Research HIPAA Basics For Clinical Research Presented by Marilyn Windschiegl d.b.a. PFS Clinical, all rights reserved Caution HIPAA is huge State laws may trump or stand side by side with federal law, so your state

More information

E-Protocol Document Checklist and GPS IRB Guide - Students

E-Protocol Document Checklist and GPS IRB Guide - Students and GPS IRB Guide - Students Please use this checklist as a guide for the submission of your Exempt, Expedited, or Full Review IRB Applications through the e-protocol system. The following documents are

More information

~Cityof. ~~Corpu~ ~.--=.;: ChnstI City Policies HR29.0 NO.

~Cityof. ~~Corpu~ ~.--=.;: ChnstI City Policies HR29.0 NO. ~Cityof ~~Corpu~ ~.--=.;: ChnstI City Policies SUBJECT: Health Insurance Portability & Accountability Act (HIPPA) Privacy Policies & Procedures NO. HR29.0 Effective: 04/14/2003 Revised: 01117/2005 APPROVED:

More information

Effective Date: 08/2013

Effective Date: 08/2013 POLICY/GUIDELINE TITLE: HIPAA Marketing and Sale of Protected Health Information Policy POLICY #: 800.43 System Approval Date: 5/18/18 Site Implementation Date: 6/17/18 Prepared by: ADMINISTRATIVE POLICY

More information

HIPAA PRIVACY AND SECURITY AWARENESS

HIPAA PRIVACY AND SECURITY AWARENESS HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect

More information

SUNY DOWNSTATE MEDICAL CENTER UNIVERSITY HOSPITAL OF BROOKLYN POLICY AND PROCEDURE

SUNY DOWNSTATE MEDICAL CENTER UNIVERSITY HOSPITAL OF BROOKLYN POLICY AND PROCEDURE SUNY DOWNSTATE MEDICAL CENTER UNIVERSITY HOSPITAL OF BROOKLYN POLICY AND PROCEDURE Subject: USE OF LIMITED DATA SETS Page 1 of 3 No. HIPAA-27 Original Issue Date: 12/2003 Prepared by: Shoshana Milstein

More information

POLICY FOR THE PROTECTION OF HUMAN SUBJECTS IN RESEARCH

POLICY FOR THE PROTECTION OF HUMAN SUBJECTS IN RESEARCH PURPOSE: 1.01 The purpose of this policy is to formalize Oklahoma State University s (hereinafter referred to as OSU or the University) obligation to protect human subjects and confirm the University s

More information

UNIVERSITY POLICY. Adopted: 11/1/2016 Reviewed: 11/1/2016. Revised: Contact:

UNIVERSITY POLICY. Adopted: 11/1/2016 Reviewed: 11/1/2016. Revised: Contact: UNIVERSITY POLICY Policy Name: Hybrid Entity Declaration Section #: 100.1.12 Section Title: HIPAA Policies Approval Authority: Responsible Executive: Responsible Office: RBHS Chancellor/Executive Vice

More information

Executive Policy, EP HIPAA. Page 1 of 25

Executive Policy, EP HIPAA. Page 1 of 25 Executive Policy, EP 2.217 HIPAA Page 1 of 25 Executive Policy Chapter 2, Administration Executive Policy EP 2.217, HIPAA Policy Effective Date: June 2017 Prior Dates Amended: None Responsible Office:

More information

HIPAA Privacy Compliance Plan for Research. University of South Alabama IRB Guidance and Procedures

HIPAA Privacy Compliance Plan for Research. University of South Alabama IRB Guidance and Procedures HIPAA Privacy Compliance Plan for Research University of South Alabama IRB Guidance and Procedures Office of Research Compliance and Assurance CSAB 140 460-6625 Adopted: 4/2/2003 2 HIPAA PRIVACY COMPLIANCE

More information

2016 Business Associate Workforce Member HIPAA Training Handbook

2016 Business Associate Workforce Member HIPAA Training Handbook 2016 Business Associate Workforce Member HIPAA Training Handbook Using the Training Handbook The material in this handbook is designed to deliver required initial, and/or annual HIPAA training for all

More information

UPMC POLICY AND PROCEDURE MANUAL

UPMC POLICY AND PROCEDURE MANUAL UPMC POLICY AND PROCEDURE MANUAL POLICY: HS-EC1602 * INDEX TITLE: Ethics & Compliance SUBJECT: Use & Disclosure of Protected Health Information (PHI) Including: Fundraising, Marketing and Research DATE:

More information

ChoiceNet/InterCare Health Plans Getting Your Arms Around HIPAA Compliance

ChoiceNet/InterCare Health Plans Getting Your Arms Around HIPAA Compliance ChoiceNet/InterCare Health Plans Getting Your Arms Around HIPAA Compliance The enclosed packet includes basic HIPAA Privacy Rule information, Amendments for your health care plan, identified action items

More information

Record Management & Retention Policy

Record Management & Retention Policy POLICY TYPE: Corporate Divisional EFFECTIVE DATE: INITIAL APPROVAL DATE: NEXT REVIEW DATE: POLICY NUMBER: May 15, 2010 May - 2010 March 2015 REVISION APPROVAL DATE: 5/10, 3/11, 5/12, 9/13, 4/14, 11/14

More information

COVERED TRANSACTION means a Transaction for which the Secretary has adopted a standard under HIPAA.

COVERED TRANSACTION means a Transaction for which the Secretary has adopted a standard under HIPAA. UNIVERSITY OF MAINE SYSTEM HIPAA POLICY #1 DEFINITIONS Unless otherwise provided herein, capitalized terms shall have the same meaning as set forth in HIPAA, as amended, and its implementing regulations,

More information

"HIPAA RULES AND COMPLIANCE"

HIPAA RULES AND COMPLIANCE PRESENTER'S GUIDE "HIPAA RULES AND COMPLIANCE" Training for HIPAA REGULATIONS Quality Safety and Health Products, for Today...and Tomorrow OUTLINE OF MAJOR PROGRAM POINTS OUTLINE OF MAJOR PROGRAM POINTS

More information

Children s Hospital of Philadelphia SOP 707 Page Effective Date: Title: Requirements for and

Children s Hospital of Philadelphia SOP 707 Page Effective Date: Title: Requirements for and Page: 1 of 6 I. PURPOSE II. III. IV. The purpose of this SOP is to describe the general requirements for documentation of HIPAA authorization and to enumerate the situations where an authorization or waiver

More information

EXCERPT. Do the Right Thing R1112 P1112

EXCERPT. Do the Right Thing R1112 P1112 MD A n d e r s o n s S t a n d a r d s O f C o n d u c t: EXCERPT Do the Right Thing R1112 P1112 Privacy and Confidentiality At MD Anderson, we are committed to safeguarding the privacy of our patients

More information

ELECTRONIC TRADING PARTNER AGREEMENT

ELECTRONIC TRADING PARTNER AGREEMENT ELECTRONIC TRADING PARTNER AGREEMENT This Agreement is by and between all provider practices wishing to submit electronic claims to University Health Alliance ( UHA ). RECITALS WHEREAS, UHA provides health

More information

THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES

THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES THE CITY AND COUNTY OF SAN FRANCISCO SECTION 125 CAFETERIA PLAN HIPAA PRIVACY POLICIES & PROCEDURES Effective: November 8, 2012 Terms used, but not otherwise defined, in this Policy and Procedure have

More information

H E A L T H C A R E L A W U P D A T E

H E A L T H C A R E L A W U P D A T E L O U I S V I L L E. K Y S E P T E M B E R 2 0 0 9 H E A L T H C A R E L A W U P D A T E L E X I N G T O N. K Y B O W L I N G G R E E N. K Y N E W A L B A N Y. I N N A S H V I L L E. T N M E M P H I S.

More information

Presented by Marti Arvin Chief Compliance Officer UCLA Health Sciences

Presented by Marti Arvin Chief Compliance Officer UCLA Health Sciences Presented by Marti Arvin Chief Compliance Officer UCLA Health Sciences 1 Brief discussion of where we have been and where we are going Discussion of Federal Enforcement Actions Privacy and Security issue

More information

DuPont Company HIPAA Privacy Policies and Procedures

DuPont Company HIPAA Privacy Policies and Procedures DuPont Company HIPAA Privacy Policies and Procedures Originally Effective April 10, 2003 (Amended as of June 1, 2017) These Policies and Procedures have been created in order for the DuPont Health Plans*

More information

HIPAA FUNDAMENTALS For Substance abuse Treatment Industry

HIPAA FUNDAMENTALS For Substance abuse Treatment Industry HIPAA FUNDAMENTALS For Substance abuse Treatment Industry (c)firststepcounselingonline2014 1 At the conclusion of the course/unit/study the student will... ANALYZE THE EFFECTS OF TRANSFERING INFORMATION

More information

PLAN SPONSOR CERTIFICATION TO THE GROUP HEALTH PLAN

PLAN SPONSOR CERTIFICATION TO THE GROUP HEALTH PLAN PLAN SPONSOR CERTIFICATION TO THE GROUP HEALTH PLAN The self-funded group health plan (the Plan ) that you, as an employer, sponsor is a Covered Entity as defined by the Health Insurance Portability and

More information

HIPAA Privacy & Security Considerations Student Orientation

HIPAA Privacy & Security Considerations Student Orientation Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy & Security Considerations Student Orientation The information in this presentation is designed to provide an overview of the HIPAA

More information

PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN Telephone: (952) Facsimile: (952)

PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN Telephone: (952) Facsimile: (952) PsyBar, LLC 6600 France Avenue South, Suite 640 Edina, MN 55435 Telephone: (952) 285-9000 Facsimile: (952) 848-1798 Updated 1/28/2016 PSYBAR, L. L. C. INDEPENDENT CONTRACTOR AGREEMENT PsyBar attempts to

More information

AMERICAN CANCER SOCIETY, INC. FINANCIAL CONFLICT OF INTEREST POLICY FOR PROMOTING OBJECTIVITY IN RESEARCH

AMERICAN CANCER SOCIETY, INC. FINANCIAL CONFLICT OF INTEREST POLICY FOR PROMOTING OBJECTIVITY IN RESEARCH AMERICAN CANCER SOCIETY, INC. FINANCIAL CONFLICT OF INTEREST POLICY FOR PROMOTING OBJECTIVITY IN RESEARCH Introduction The American Cancer Society, Inc. ( ACS ) seeks excellence in the discovery and dissemination

More information

Data and Specimen Repositories

Data and Specimen Repositories Data and Specimen Repositories Behavioral and Social Sciences Cheri Pettey, MA, CIP Quality Improvement Specialist Regulatory & Exempt Determinations Objectives Review relevant definitions related to data

More information

USD #262 VALLEY CENTER HIPAA MEDICAL PRIVACY POLICIES AND PROCEDURES. HIPAA Privacy Policies and Procedures -1-

USD #262 VALLEY CENTER HIPAA MEDICAL PRIVACY POLICIES AND PROCEDURES. HIPAA Privacy Policies and Procedures -1- USD #262 VALLEY CENTER HIPAA MEDICAL PRIVACY POLICIES AND PROCEDURES HIPAA Privacy Policies and Procedures -1- USD #262 Valley Center Organized Health Care Arrangement HIPAA Privacy Policy and Procedures

More information

TEXAS SOUTHERN UNIVERSITY HIPAA BUSINESS ASSOCIATE AGREEMENT

TEXAS SOUTHERN UNIVERSITY HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement (this BA Agreement ) is made and entered into by ( Provider ), a, located at, and Texas Southern University, an agency and institution of higher education established

More information

Last Approval Date: April 2017

Last Approval Date: April 2017 Page 1 of 6 I. PURPOSE The purpose of this policy is to explain how workforce members of the Stanford University HIPAA Components (SUHC) must make reasonable efforts to limit their use or disclosure of

More information

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP

UNDERSTANDING HIPAA & THE HITECH ACT. Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP UNDERSTANDING HIPAA & THE HITECH ACT Heather Deixler, Esq. Associate, Morgan, Lewis & Bockius LLP 1 Objectives of Presentation Learn what HIPAA is Learn the purpose of HIPAA Understand who HIPAA regulates

More information

Health Insurance Portability and Accountability Act Category: Administration 04/30/2015 Vice President for Legal Prior Effective Date:

Health Insurance Portability and Accountability Act Category: Administration 04/30/2015 Vice President for Legal Prior Effective Date: Policy Title: Policy Number: Health Insurance 1.8.4 Portability and Accountability Act Category: Effective Date: Policy Owner: Administration 04/30/2015 Vice President for Legal Prior Effective Date: Affairs

More information

HIPAA Privacy & Security. Transportation Providers 2017

HIPAA Privacy & Security. Transportation Providers 2017 HIPAA Privacy & Security Transportation Providers 2017 HIPAA Privacy & Security As a non emergency medical transportation provider, you deal directly with Medicare and Medicaid Members healthcare information

More information

HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE

HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE HIPAA PRIVACY POLICY AND PROCEDURES FOR PROTECTED HEALTH INFORMATION THE APPLICABLE WELFARE BENEFITS PLANS OF MICHIGAN CATHOLIC CONFERENCE Policy Preamble This privacy policy ( Policy ) is designed to

More information

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES

HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES SALISH BHO HIPAA, 42 CFR PART 2, AND MEDICAID COMPLIANCE STANDARDS POLICIES AND PROCEDURES Policy Name: BREACH NOTIFICATION REQUIREMENTS Policy Number: 5.16 Reference: 45 CFR Parts 164 Effective Date:

More information

HIPAA Business Associate Agreement

HIPAA Business Associate Agreement HIPAA Business Associate Agreement ICANotes LLC doing business at 1600 St Margarets Rd, Annapolis MD 21409 and, doing business at are parties to a Business Associate arrangement as defined under the Health

More information

State Data Requests Memo Introduction Defining research

State Data Requests Memo Introduction Defining research Introduction The (CMS) is committed to better care, better health, and lower costs. As trusted partners in achieving these goals, we believe states should have access to Medicare data for research that

More information

AGREEMENT PURSUANT TO THE TERMS OF HIPAA ; HITECH ; and FIPA (Business Associate Agreement) (Revised August 2015)

AGREEMENT PURSUANT TO THE TERMS OF HIPAA ; HITECH ; and FIPA (Business Associate Agreement) (Revised August 2015) AGREEMENT PURSUANT TO THE TERMS OF HIPAA ; HITECH ; and FIPA (Business Associate Agreement) (Revised August 2015) THIS AGREEMENT made the day of, 20, by and between HOSPICE OF MARION COUNTY, INC., a Florida

More information

HIPAA. Privacy Compliance Manual

HIPAA. Privacy Compliance Manual HIPAA Privacy Compliance Manual 02/20/2014 Table of Contents Introduction... 3 Policy Statement... 4 Important Definitions and Concepts Used in These Policies and Procedures... 5 Privacy Standards I. Responsibilities

More information

Cover option 2. The Interplay of HIPAA, Privacy and Data Security Principles, and Health Information Interoperability. Subtitle or Company Name

Cover option 2. The Interplay of HIPAA, Privacy and Data Security Principles, and Health Information Interoperability. Subtitle or Company Name The Interplay of HIPAA, Privacy and Data Security Principles, and Health Information Interoperability Cover option 2 MedInnovation Boston Subtitle or Company Name June 25, 2018 Colin J. Zick Month Day,

More information

HIPAA COMPLIANCE. for Small & Mid-Size Practices

HIPAA COMPLIANCE. for Small & Mid-Size Practices HIPAA COMPLIANCE for Small & Mid-Size Practices Golden State Web Solutions 619.825.GSWS (4797) INTRODUCTION Most individuals reading this are interested in HIPAA, GSWS, or some combination of the two;

More information

Application for Approval of Projects Which Use Human Subjects

Application for Approval of Projects Which Use Human Subjects Application for Approval of Projects Which Use Human Subjects This application is used for projects/studies that cannot be reviewed through the exemption process. -- Applicant, Please fill out the application

More information

1. Does the plan exist for purposes of providing or paying for the cost of medical care?

1. Does the plan exist for purposes of providing or paying for the cost of medical care? HUMAN RESOURCES & BENEFITS INFORMATION HIPPA FLOW CHART Questions and Answers 1. Does the plan exist for purposes of providing or paying for the cost of medical care? A health plan could be an individual

More information

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules

Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules Saturday, April 28 Medical Ethics: HIPAA Privacy and Security Rules Gina Campanella, JD HIPAA & The Medical Practice Requirements for Privacy, Security and Breach Notification Gina L. Campanella, Esq.

More information

Application Checklist for Expedited or Full Review

Application Checklist for Expedited or Full Review NEW YORK INSTITUTE OF TECHNOLOGY Institutional Review Board for the Protection of Human Participants rthern Blvd, Old Westbury, NY 11568 516-686-7488 http://www.nyit.edu/ospar/irb/ Application Checklist

More information

HIPAA Background and History

HIPAA Background and History Agenda Jeffery P. Drummond Lawyers as HIPAA Business Associates: Ethical Obligations and Practical Tips for Compliance Dallas Bar Association January 17, 2018 Jamie Sorley An Overview of HIPAA The Privacy

More information

HIPAA Redux 2013 Kim Cavitt, AuD Audiology Resources, Inc. Expert e-seminar 4/29/2013. HIPAA Redux Presented by: Kim Cavitt, AuD

HIPAA Redux 2013 Kim Cavitt, AuD Audiology Resources, Inc. Expert e-seminar 4/29/2013. HIPAA Redux Presented by: Kim Cavitt, AuD HIPAA Redux 2013 Presented by: Kim Cavitt, AuD Moderated by: Carolyn Smaka, Au.D., Editor-in-Chief, AudiologyOnline Expert e-seminar TECHNICAL SUPPORT Need technical support during event? Please contact

More information

Johns Hopkins University. Policy on Individual Financial Interests and Financial Conflict of Interests 1, 2 in Research

Johns Hopkins University. Policy on Individual Financial Interests and Financial Conflict of Interests 1, 2 in Research Johns Hopkins University Policy on Individual Financial Interests and Financial Conflict of Interests 1, 2 in Research This policy applies to the Bloomberg School of Public Health, Krieger School of Arts

More information

104 Delaware Health Care Claims Database Data Access Regulation

104 Delaware Health Care Claims Database Data Access Regulation 104 Delaware Health Care Claims Database Data Access Regulation 1.0 Authority and Purpose 1.1 Statutory Authority. 16 Del.C. 10306 authorizes the Delaware Health Information Network (DHIN) to promulgate

More information

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule

Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule Hayden W. Shurgar HIPAA: Privacy, Security, Enforcement, HITECH, and HIPAA Omnibus Final Rule 1 IMPORTANCE OF STAFF TRAINING HIPAA staff training is a key, required element in a covered entity's HIPAA

More information

MEMORANDUM OF UNDERSTANDING for DATA SHARING BETWEEN DISTRICT AND SCCOE

MEMORANDUM OF UNDERSTANDING for DATA SHARING BETWEEN DISTRICT AND SCCOE MEMORANDUM OF UNDERSTANDING Pg. 1 of 3 DATA SHARING BETWEEN DISTRICT AND SCCOE MEMORANDUM OF UNDERSTANDING for DATA SHARING BETWEEN DISTRICT AND SCCOE This Memorandum of Understanding (MOU) is entered

More information

(a) Is created by or received from a health care provider, health plan, employer, or health care clearinghouse; and

(a) Is created by or received from a health care provider, health plan, employer, or health care clearinghouse; and HIPAA Compliance Beyond Health Care Organizations A Primer Peter Koso May 24, 2001 Introduction This review is intended to assist Security Officers with the first implementation steps for meeting any or

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Agreement dated as of is made by and between, on behalf of its (School/Department/Division) (hereinafter referred to as Covered Entity ) and, (hereinafter Business Associate

More information

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014.

HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule. Association of Corporate Counsel Houston Chapter October 14, 2014. HIPAA 2014: Recent Changes from HITECH and the Omnibus Rule Association of Corporate Counsel Houston Chapter October 14, 2014 Jeffery P. Drummond Jackson Walker L.L.P. 901 Main Street, Suite 6000 Dallas,

More information

BUSINESS ASSOCIATE AGREEMENT W I T N E S S E T H:

BUSINESS ASSOCIATE AGREEMENT W I T N E S S E T H: BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT ( this Agreement ) is made and entered into as of this day of 2015, by and between TIDEWELL HOSPICE, INC., a Florida not-for-profit corporation,

More information

State Farm Insurance Companies Flexible Compensation Plan for U.S. Employees. Summary Plan Description

State Farm Insurance Companies Flexible Compensation Plan for U.S. Employees. Summary Plan Description State Farm Insurance Companies Flexible Compensation Plan for U.S. Employees Effective January 1, 2018 Table of Contents Introduction... 4 Eligibility... 4 Who Is Eligible... 4 Who Is Not Eligible... 5

More information

HIPAA & The Medical Practice

HIPAA & The Medical Practice HIPAA & The Medical Practice Requirements for Privacy, Security and Breach Notification Gina L. Campanella, JD, MHA, CHA Founder & Principal, Campanella Law Office Of Counsel, The Beinhaker Law Firm BEINHAKER,

More information

1 Security 101 for Covered Entities

1 Security 101 for Covered Entities HIPAA SERIES Topics 1. 101 for Covered Entities 2. Standards - Administrative Safeguards 3. Standards - Physical Safeguards 4. Standards - Technical Safeguards 5. Standards - Organizational, Policies &

More information

Privacy and Security Standards

Privacy and Security Standards Contents Privacy and Security Standards... 3 Introduction... 3 Course Objectives... 3 Privacy vs. Security... 4 Definition of Personally Identifiable Information... 4 Agent and Broker Handling of Federal

More information

UNIVERSITY STANDARD. Title UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL STANDARD ON HIPAA SANCTIONS. Introduction

UNIVERSITY STANDARD. Title UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL STANDARD ON HIPAA SANCTIONS. Introduction UNIVERSITY STANDARD Title UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL STANDARD ON HIPAA SANCTIONS PURPOSE Introduction The University of North Carolina at Chapel Hill (The University or UNC-Chapel Hill

More information

HIPAA GUIDANCE: ALTERATION OR WAIVER OF AUTHORIZATION (AWA) Revised: July 9, 2004

HIPAA GUIDANCE: ALTERATION OR WAIVER OF AUTHORIZATION (AWA) Revised: July 9, 2004 HIPAA GUIDANCE: ALTERATION OR WAIVER OF AUTHORIZATION (AWA) Revised: July 9, 2004 This guidance addresses: 1. Criteria a covered function should employ for evaluating an IRB issued AWA to determine its

More information

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT

HIPAA AND ONLINE BACKUP WHAT YOU NEED TO KNOW ABOUT WHAT YOU NEED TO KNOW ABOUT HIPAA AND ONLINE BACKUP Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile

More information

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate?

HIPAA Information. Who does HIPAA apply to? What are Sync.com s responsibilities? What is a Business Associate? HIPAA Information Who does HIPAA apply to? HIPAA applies to all Covered Entities (entities that collect, access, use and/or disclose Protected Health Data (PHI) and are subject to HIPAA regulations). What

More information

This form cannot act as an authorization to assign commissions. Appointment Form Only. Steps to obtain an Appointment:

This form cannot act as an authorization to assign commissions. Appointment Form Only. Steps to obtain an Appointment: Appointment Form Only Steps to obtain an Appointment: Complete the Personal Information Sheet Entirely The Personal Information Sheet is used to obtain information necessary to establish an appointment

More information