Privacy Policy 1

advertisement
Privacy Policy
Lastrev02272015
1
Navia Benefit Solutions Privacy Policy
Contents
I. Introduction ............................................................................................................................................... 3
II. Responsibilities as Business Associate ...................................................................................................... 6
A. Privacy Official and Contact Person ...................................................................................................... 6
B. Workforce Training ............................................................................................................................... 6
C. Safeguards and Firewall ........................................................................................................................ 7
D. Privacy Notice ....................................................................................................................................... 7
E. Complaints ............................................................................................................................................ 8
F. Sanctions for Violations of Privacy Policy ............................................................................................. 8
G. Mitigation of Inadvertent Disclosures of Protected Health Information ............................................. 9
H. No Intimidating or Retaliatory Acts; No Waiver of HIPAA Privacy ....................................................... 9
I. Plan Document ....................................................................................................................................... 9
J. Documentation .................................................................................................................................... 10
III. Policies on Use and Disclosure of Protected Health Information .......................................................... 11
A. Use and Disclosure Defined ................................................................................................................ 11
B. Workforce Must Comply With Plan's Policy and Procedures ............................................................. 11
C. Permitted Uses and Disclosures for Plan Administration Purposes ................................................... 11
D. Permitted Uses and Disclosures: Payment and Health Care Operations ........................................... 12
E. No Disclosure of Protected Health Information for Non-Health Plan Purposes................................. 13
Lastrev02272015
2
F. Mandatory Disclosures of Protected Health Information................................................................... 14
G. Other Permitted Disclosures of Protected Health Information ......................................................... 14
H. Disclosures of Protected Health Information Pursuant to an Authorization ..................................... 14
I. Complying With the "Minimum-Necessary" Standard ........................................................................ 15
J. Disclosures of Protected Health Information to Business Associates ................................................. 16
K. Disclosures of De-Identified Information............................................................................................ 17
L. Breach Notification Requirements ...................................................................................................... 17
IV. Policies on Individual Rights .................................................................................................................. 17
A. Access to Protected Health Information and Requests for Amendment ........................................... 17
B. Accounting .......................................................................................................................................... 18
C. Requests for Alternative Communication Means or Locations .......................................................... 19
D. Requests for Restrictions on Use and Disclosure of Protected Health Information .......................... 19
Appendix A to Privacy Policy: Workforce Member Confidentiality Agreement ......................................... 20
Appendix B to Privacy Policy: Reportable Breach Notification Policy ........................................................ 21
Security Response Plan ............................................................................................................................... 34
Appendix C Miscellaneous Policy Standards............................................................................................... 37
HIPAA Privacy Policy for Self-funded Plans
I. Introduction
Navia administers its own self-funded group health plan and self-funded group health plans for it’s
employer clients.
For purposes of this Privacy Policy, Plans listed above are referred to collectively and singularly as the
"Plan".
Lastrev02272015
3
Members of Navia’s workforce have access to protected health information of Plan participants of
Navias administered by Navia; and of Navia’s own benefits, for administrative functions of Navia
performed by Navia and other purposes permitted by the HIPAA privacy rules.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and its implementing
regulations restrict Navia's and Navia’s ability to use and disclose protected health information.
Protected Health Information. Protected health information means information that is
created or received by Navia and relates to the past, present, or future physical or
mental health or condition of a participant; the provision of health care to a
participant; or the past, present, or future payment for the provision of health care to
a participant; and that identifies the participant or for which there is a reasonable
basis to believe the information can be used to identify the participant. Protected
health information includes information of persons living or deceased.
For purposes of this Policy, protected health information does not include the following, referred to in
this Policy as "Exempt Information". This information must be received by Navia in its role as an
employer. If the following information is received by Navia in it’s role as a third-party administrator
then it may be PHI as defined by HIPAA :
1. summary health information, as defined by HIPAA's privacy rules, that is disclosed to Navia solely
for purposes of obtaining premium bids, or modifying, amending, or terminating Navia;
2. enrollment and disenrollment information concerning Navia that does not include any substantial
clinical information;
3. protected health information disclosed to Navia or Navia under a signed authorization that meets
the requirements of the HIPAA privacy rules;
4. health information related to a person who has been deceased for more than 50 years;
5. information disclosed to Navia by an individual for functions that Navia performs in its role as an
employer and not as sponsor of Navia or in providing administrative services to Navia.
Lastrev02272015
4
6. information disclosed directly to Navia for functions that Navia performs in its role as an claims
administrator of Navia or in providing administrative services to Navia.
7. Fraudulent claims or documentation submitted by individuals where the provider has no record
of the patient or services/product rendered or purchased or the services and or values or other
relevant information on the documentation has been altered.
Navia also sponsors and/or administers other benefits such as health savings accounts and
transportation plans, which are not subject to this Privacy Policy. This Privacy Policy will govern the
circumstances, if any, that Plan protected health information may be shared with plan sponsors, covered
entities, providers, benefit advisors, vendors, other business associates and sub-business associates, and
others as required or permitted by law.
Navia shall comply with HIPAA's requirements for the privacy of protected health information. To that
end, all members of Navia’s workforce who have access to protected health information must comply
with this Privacy Policy. For purposes of this Policy and Navia’s more detailed Privacy Use and Disclosure
Procedures, Navia’s workforce includes individuals who would be considered part of the workforce
under HIPAA, such as employees, volunteers, contractors, trainees, leased employees and other persons
whose work performance is under the direct control of Navia, whether or not they are paid by Navia.
The term "workforce member" includes all of these types of workers.
No third-party rights (including but not limited to rights of Plan participants, beneficiaries, or covered
dependents, subcontractors, employers and agents) are intended to be created by this Policy. Navia
reserves the right to amend or change this Policy at any time (and even retroactively) without notice. To
the extent this Policy establishes requirements and obligations above and beyond those required by
HIPAA, the Policy shall be aspirational and shall not be binding upon Navia. This Policy does not address
requirements under other federal laws or under state laws. To the extent this Policy is in conflict with
the HIPAA privacy rules, the HIPAA privacy rules shall govern.
Lastrev02272015
5
II. Responsibilities as Business Associate
A. Privacy Official and Contact Person
Tina Davis will be the Contact Person for Navia. The Contact Person will be responsible for the
development and implementation of Navia’s policies and procedures relating to privacy of protected
health information as the laws apply to Navia, including but not limited to this Privacy Policy and the
Navia's Privacy Use and Disclosure Procedures. The Contact Person will also serve as the contact for
Navia employees and Plan participants who have questions, concerns, or complaints about the privacy
of their protected health information.
Each Plan administered by Navia must designate a Privacy Official. The Privacy Official will be
responsible for the development and implementation of policies and procedures relating to privacy of
Navia's protected health information as the laws apply to the Employer and the Employer’s plan,
including but not limited to adopting and managing a Privacy Policy and Navia's Privacy Use and
Disclosure Procedures. The Privacy Official will also serve as the contact for our client’s employees who
have questions, concerns, or complaints about the privacy of their protected health information.
The Privacy Official is responsible for ensuring that their Plan complies with all provisions of the HIPAA
privacy rules, including the requirement that Navia have a HIPAA-compliant Business Associate Contract
in place. The Privacy Official shall also be responsible for monitoring compliance by all Business
Associates with the HIPAA privacy rules and the terms of their Business Associate Contracts. Tina Davis
will be the Privacy Official for Navia’s Plans (Navia’s Flexible Benefit Plan and Heath Reimbursement
Arrangement).
B. Workforce Training
It is Navia’s policy to train all members of its workforce who have access to protected health information
for familiarity and compliance with Navia's Policy and its Privacy Use and Disclosure Procedures. The
Contact Person is charged with developing training schedules and programs so that all workforce
members receive the necessary and appropriate training to permit them to carry out their job functions
Lastrev02272015
6
in compliance with HIPAA. Workforce training will be updated as necessary to reflect any changes in
policies or procedures and to ensure that workforce members are appropriately aware of their
obligations.
C. Safeguards and Firewall
Navia will establish internal administrative, technical, and physical safeguards to prevent Plans
protected health information from intentionally or unintentionally being used or disclosed in violation of
HIPAA's requirements. Administrative safeguards include implementing procedures for use and
disclosure of protected health information. See Navia's Privacy Use and Disclosure Procedures. Technical
safeguards include limiting access to information by creating computer firewalls. Physical safeguards
include locking doors or filing cabinets. The fact that Navia will establish the above safeguards does not
relieve employers from adopting their own policies, procedures and safeguards as the law applies to
plan sponsors and their respective plans.
Firewalls will ensure that only Navia’s authorized workforce members will have access to protected
health information, that they will have access to only the minimum amount of protected health
information necessary for the administrative functions they perform, and that they will not further use
or disclose protected health information in violation of HIPAA's privacy rules.
D. Privacy Notice
Each employer Plan shall develop and distribute their own privacy notice and policy and Navia may
provide a boilerplate policy attached to our boilerplate summary plan description for the employer to
review and amend. The Privacy Official of each Plan is responsible for developing and maintaining a
notice of Navia's privacy practices that complies with the HIPAA privacy rules and describes:
•
the uses and disclosures of protected health information that may be made by Navia;
•
the rights of individuals under HIPAA privacy rules;
•
Navia's legal duties with respect to the protected health information; and
•
other information as required by the HIPAA privacy rules.
Lastrev02272015
7
The privacy notice will inform participants that the employer will have access to protected health
information in connection with its plan administrative functions. The privacy notice will also provide a
description of Navia's complaint procedures, the name and telephone number of the employer’s contact
person for further information, and the effective date of the notice. The effective date will not be earlier
than the date the notice is published.
The notice of privacy practices may be placed on the employer’s Plan website or otherwise made
available or distributed. The notice also will be individually delivered by the employer:
•
at the time of an individual's enrollment in Navia;
•
to a person requesting the notice; and
•
to participants within 60 days after a material change to the notice. However, if the employer posts
its notice on a Plan specific website and there is a material change to the notice, the employer will
prominently post the change or the revised notice on its website by the effective date of the change,
and provide the change or information about the change and how to obtain the revised notice, in its
next annual mailing to individuals—such annual mailing will likely be facilitated through the
distribution of Navia documents.
Navia or employer will also provide notice of availability of the privacy notice (or a copy of the privacy
notice) at least once every three years in compliance with the HIPAA privacy regulations.
E. Complaints
Tina Davis will be Navia’s contact person for receiving complaints; however, each employer must
designate a Privacy Official to receive complaints.
The Privacy Official is responsible for creating a process for individuals to lodge complaints about Navia's
privacy procedures and for creating a system for handling such complaints.
F. Sanctions for Violations of Privacy Policy
Sanctions for using or disclosing protected health information in violation of HIPAA or this HIPAA Privacy
Policy will be imposed in accordance with Navia’s confidentiality agreement and at the discretion of
Lastrev02272015
8
Navia, up to and including termination of employment. In the event PHI is disclosed the individual(s)
causing the disclosure will be formally written up and a record of such report will be retained in their
employment records. Navia retains the discretion to terminate employment, based upon the
circumstances, due to a single violation or multiple violations of the policies.
All Navia’s workforce members with access to protected health information of Navia must sign the
Confidentiality Agreement.
G. Mitigation of Inadvertent Disclosures of Protected Health Information
Navia shall mitigate, to the extent possible, any harmful effects that become known to it from a use or
disclosure of an individual's protected health information in violation of HIPAA or the policies and
procedures set forth in this Policy. As a result, if a Navia workforce member becomes aware of an
unauthorized use or disclosure of protected health information, either by a workforce member, a
sub-business Associate or the employer client, the workforce member must immediately contact the
Contact Person so that appropriate steps to mitigate harm to the participant can be taken.
H. No Intimidating or Retaliatory Acts; No Waiver of HIPAA Privacy
No workforce member may intimidate, threaten, coerce, discriminate against, or take other retaliatory
action against individuals for exercising their rights, filing a complaint, participating in an investigation,
or opposing any improper practice under HIPAA. No individual shall be required to waive his or her
privacy rights under HIPAA as a condition of treatment, payment, enrollment, or eligibility under Navia.
I. Plan Document
Navia document shall include provisions to describe the permitted and required uses by, and disclosures
to, employer’s workforce of protected health information for plan administrative or other permitted
purposes. Specifically, Navia document shall require employer to:
•
not use or further disclose protected health information other than as permitted by Navia
documents or as required by law;
Lastrev02272015
9
•
ensure that any agents to whom it provides protected health information agree to the same
restrictions and conditions that apply to Navia;
•
not use or disclose protected health information for employment-related actions or for any other
benefit or employee benefit plan of Navia;
•
report to the Privacy Official any use or disclosure of the information that is inconsistent with the
permitted uses or disclosures;
•
make protected health information available to Plan participants, consider their amendments, and,
upon request, provide them with an accounting of protected health information disclosures in
accordance with the HIPAA privacy rules;
•
make Navia’s internal practices and records relating to the use and disclosure of protected health
information received from Navia available to the Department of Health and Human Services (HHS)
upon request; and
•
if feasible, return or destroy all protected health information received from Navia that Navia still
maintains in any form and retain no copies of such information when no longer needed for the
purpose for which disclosure was made, except that, if such return or destruction is not feasible,
limit further uses and disclosures to those purposes that make the return or destruction of the
information infeasible.
Navia document must also require Navia to (1) certify to the Privacy Official that Navia documents have
been amended to include the above restrictions and that Navia agrees to those restrictions; and (2)
provide adequate firewalls in compliance with the HIPAA privacy rules.
J. Documentation
Navia's privacy policies and procedures shall be documented and maintained for at least six years from
the date last in effect. Policies and procedures must be changed as necessary or appropriate to comply
with changes in the law, standards, requirements and implementation specifications (including changes
and modifications in regulations), and Navia's practices and processes. Any changes to policies or
Lastrev02272015
10
procedures must be promptly documented.
Navia shall document certain events and actions (including authorizations, requests for information,
sanctions, and complaints) relating to an individual's privacy rights. Navia shall also document the dates,
content, and attendance of workforce members at training sessions.
The documentation of any policies and procedures, actions, activities, and designations may be
maintained in either written or electronic form. Navia will maintain such documentation for at least six
years.
III. Policies on Use and Disclosure of Protected Health Information
A. Use and Disclosure Defined
Navia will use and disclose protected health information only as permitted under HIPAA. The terms
"use" and "disclosure" are defined as follows:
•
Use. The sharing, employment, application, utilization, examination, or analysis of protected health
information by any Company workforce member working within the [benefits department] of Navia,
or by a Business Associate of Navia.
•
Disclosure. The release, transfer, provision of access to, or divulging in any other manner of
protected health information to persons who are not Company workforce members working within
the [benefits department] of Navia, or to a person or entity who is not a Business Associate of Navia.
B. Workforce Must Comply With Plan's Policy and Procedures
All members of Navia’s workforce who have access to Plan protected health information must comply
with this Policy and with Navia's Privacy Use and Disclosure Procedures, which are set forth in a separate
document. [Ed. Note: Some smaller companies may wish to expand the scope of this paragraph to all
workforce members.]
C. Permitted Uses and Disclosures for Plan Administration Purposes
Navia may disclose Exempt Information to Navia. Exempt Information is not governed by this Policy, and
Navia may use and disclose it for any lawful purpose.
Lastrev02272015
11
Navia may disclose protected health information to the following Company workforce members to
perform Plan administrative functions ("workforce members with access"):
•
[describe workforce members by name, title, or department (e.g. "Mr. John Doe," "members of
appeals committee," "payroll manager," "all members of employee benefits department")] [Ed.
Note: It is usually preferable to designate the individuals by title or department rather than by
name, to avoid having to revise the document each time an employee with access is terminated,
transferred, or hired. However, in the event of a reorganization of Company functions that includes
title changes, be sure to reflect any relevant title changes here.]
Workforce members with access may disclose protected health information to other workforce
members with access for plan administrative functions (but the protected health information disclosed
must be limited to the minimum amount necessary to perform Navia administrative function).
Workforce members with access may not disclose protected health information to workforce members
(other than workforce members with access) unless a valid, signed authorization is in place or the
disclosure otherwise is in compliance with this Policy and Navia's Privacy Use and Disclosure Procedures.
Workforce members with access must take all appropriate steps to ensure that the protected health
information is not disclosed, available, or used for employment purposes. For purposes of this Policy,
"plan administrative functions" include the payment and health care operation activities described in
section III.D of this Policy.
D. Permitted Uses and Disclosures: Payment and Health Care Operations
Protected health information may be disclosed for Navia's own payment purposes, and protected health
information may be disclosed to another Business Associate for the payment purposes of that Business
Associate.
Payment. Payment includes activities undertaken to obtain Plan contributions or to determine or fulfill
Navia's responsibility for provision of benefits, or to obtain or provide reimbursement for health care.
Payment also includes:
•
eligibility and coverage determinations including coordination of benefits and adjudication or
Lastrev02272015
12
subrogation of health benefit claims;
•
risk-adjusting based on enrollee status and demographic characteristics;
•
billing, claims management, collection activities, obtaining payment under a contract for
reinsurance (including stop-loss insurance and excess loss insurance) and related health care data
processing; and
•
any other payment activity permitted by the HIPAA privacy regulations.
Protected health information may be disclosed for purposes of Navia's own health care operations.
Protected health information may be disclosed to another Business Associate for purposes of the other
Business Associate's quality assessment and improvement, case management, or health care fraud and
abuse detection programs, if the other Business Associate has (or had) a relationship with the
participant and the protected health information requested pertains to that relationship.
Health Care Operations. Health care operations means any of the following activities:
•
conducting quality assessment and improvement activities;
•
reviewing health plan performance;
•
underwriting and premium rating;
•
conducting or arranging for medical review, legal services, and auditing functions;
•
business planning and development;
•
business management and general administrative activities; and
•
other health care operations permitted by the HIPAA privacy regulations.
E. No Disclosure of Protected Health Information for Non-Health Plan Purposes
Protected health information may not be used or disclosed for the payment or operations of Navia’s
"non-health" benefits (e.g., disability, workers' compensation, life insurance), unless the participant has
provided an authorization for such use or disclosure (as discussed in "Disclosures Pursuant to an
Authorization") or such use or disclosure is required or allowed by applicable state law and all applicable
requirements under HIPAA are met.
Lastrev02272015
13
F. Mandatory Disclosures of Protected Health Information
A participant's protected health information must be disclosed, in accordance with Plan's Privacy Use
and Disclosure Procedures, in the following situations:
•
The disclosure is to the individual who is the subject of the information (see the policy for "Access to
Protected Information and Request for Amendment" that follows);
•
The disclosure is required by law; or
•
The disclosure is made to HHS for purposes of enforcing HIPAA.
G. Other Permitted Disclosures of Protected Health Information
Protected health information may be disclosed in the following situations without a participant's
authorization, when specific requirements are satisfied. Navia's Privacy Use and Disclosure Procedures
describe specific requirements that must be met before these types of disclosures may be made. The
requirements include prior approval of Navia's Privacy Official. Permitted are disclosures•
about victims of abuse, neglect, or domestic violence;
•
to a health care provider for treatment purposes;
•
for judicial and administrative proceedings;
•
for law-enforcement purposes;
•
for public health activities;
•
for health oversight activities;
•
about decedents;
•
for cadaveric organ-, eye-, or tissue-donation purposes;
•
for certain limited research purposes;
•
to avert a serious threat to health or safety;
•
for specialized government functions; and
•
that relate to workers' compensation programs.
H. Disclosures of Protected Health Information Pursuant to an Authorization
Lastrev02272015
14
Protected health information may be disclosed for any purpose if an authorization that satisfies all of
HIPAA's requirements for a valid authorization is provided by the participant. All uses and disclosures
made pursuant to a signed authorization must be consistent with the terms and conditions of the
authorization.
I. Complying With the "Minimum-Necessary" Standard
HIPAA requires that when protected health information is used, disclosed, or requested, the amount
disclosed generally must be limited to the "minimum necessary" to accomplish the purpose of the use,
disclosure, or request.
The "minimum-necessary" standard does not apply to any of the following:
•
uses or disclosures made to the individual;
•
uses or disclosures made pursuant to a valid authorization;
•
disclosures made to HHS;
•
uses or disclosures required by law; and
•
uses or disclosures required to comply with HIPAA.
Minimum Necessary When Disclosing Protected Health Information. Navia, when disclosing protected
health information subject to the minimum-necessary standard, shall take reasonable and appropriate
steps to ensure that only the minimum amount of protected health information that is necessary for the
requestor is disclosed. More details on the requirements are found in Navia's Privacy Use and Disclosure
Procedures. All disclosures not discussed in Navia's Privacy Use and Disclosure Procedures must be
reviewed on an individual basis with the Privacy Official to ensure that the amount of information
disclosed is the minimum necessary to accomplish the purpose of the disclosure.
Minimum Necessary When Requesting Protected Health Information. Navia, when requesting protected
health information subject to the minimum-necessary standard, shall take reasonable and appropriate
steps to ensure that only the minimum amount of protected health information necessary for Navia is
requested. More details on the requirements are found in Navia's Privacy Use and Disclosure
Lastrev02272015
15
Procedures. All requests not discussed in Navia's Privacy Use and Disclosure Procedures must be
reviewed on an individual basis with the Privacy Official to ensure that the amount of information
requested is the minimum necessary to accomplish the purpose of the disclosure.
Minimum necessary regarding pulling files. To assist our team with complying with the minimum
necessary requirement and all requirements under our privacy policy and use and disclosure policy
Navia has a policy of only accessing or downloading data that is absolutely necessary to accomplish the
task. Specifically, when accessing or pulling files Navia employees shall only pull files related to a
specific company. It is best practice and our policy to only pull or query data related to a specific
company. If cross company data must be aggregated, pulled, queried, or otherwise this should be the
EXCEPTION. When providing files outside of Navia employees must check the contents for employee
counts, spot check, check tabs, and take any other steps to ensure that only the data that is necessary to
allow the recipient to accomplish their task is provided.
Minimum Necessary regarding participant banking information. Full bank account information is
restricted from view in Navia360.
J. Disclosures of Protected Health Information to Business Associates
Workforce members may disclose protected health information to Navia's Business Associates and allow
Navia's Business Associates to create, receive, maintain, or transmit protected health information on its
behalf. However, prior to doing so, Navia must first obtain assurances from the Business Associate, in
the form of a business associate contract, that it will appropriately safeguard the information. Before
sharing protected health information with outside consultants or contractors who meet the definition of
a "Business Associate," workforce members must contact the Privacy Official and verify that a Business
Associate contract is in place.
A Business Associate is an entity that:
•
creates, receives, maintains, or transmits protected health information on behalf of Navia (including
for claims processing or administration, data analysis, underwriting, etc.); or
Lastrev02272015
16
•
provides legal, accounting, actuarial, consulting, data aggregation, management, accreditation, or
financial services to or for Navia, where the performance of such services involves giving the service
provider access to protected health information.
K. Disclosures of De-Identified Information
Navia may freely use and disclose information that has been "de-identified" in accordance with the
HIPAA privacy regulations. De-identified information is health information that does not identify an
individual and with respect to which there is no reasonable basis to believe that the information can be
used to identify an individual.
L. Breach Notification Requirements
Navia will comply with the Reportable Breach Notification Policy set forth in Appendix B of this Policy.
IV. Policies on Individual Rights
A. Access to Protected Health Information and Requests for Amendment
HIPAA gives participants the right to access and obtain copies of their protected health information that
Navia (or its Business Associates) maintains in designated record sets. HIPAA also provides that
participants may ask to have their protected health information amended. Navia will provide access to
protected health information, and it will consider requests for amendment that are submitted in writing
by participants.
A Designated Record Set is a group of records maintained by or for Navia that includes:
•
the enrollment, payment, and claims adjudication record of an individual maintained by or for
Navia; or
•
other protected health information used, in whole or in part, by or for Navia to make coverage
decisions about an individual.
If information in one or more designated record sets is maintained electronically, and an individual
Lastrev02272015
17
requests an electronic copy of such information, Navia will provide the individual with access to the
requested information in the electronic form and format requested by the individual, if it is readily
producible in such form and format; if the requested information is not readily producible in such form
and format, the requested information will be produced in a readable electronic form and format as
agreed by Navia and the individual. If Navia and the individual are unable to agree on the form and
format, Navia will provide a paper copy of the information to the individual.
B. Accounting
An individual has the right to obtain an accounting of certain disclosures of his or her own protected
health information. This right to an accounting extends to disclosures made in the last six years, other
than disclosures:
•
to carry out treatment, payment, or health care operations;
•
to individuals about their own protected health information;
•
incident to an otherwise permitted use or disclosure;
•
pursuant to an authorization;
•
to persons involved in the individual's care or payment for the individual's care or for certain other
notification purposes;
•
to correctional institutions or law enforcement when the disclosure was permitted without
authorization;
•
as part of a limited data set;
•
for specific national security or law-enforcement purposes; or
•
disclosures that occurred prior to the compliance date.
Navia shall respond to an accounting request within 60 days. If Navia is unable to provide the accounting
within 60 days, it may extend the period by 30 days, provided that it gives the participant notice
(including the reason for the delay and the date the information will be provided) within the original
60-day period.
Lastrev02272015
18
The accounting must include the date of the disclosure, the name of the receiving party, a brief
description of the information disclosed, and a brief statement of the purpose of the disclosure that
reasonably informs the individual of the basis for the disclosure (or a copy of the written request for
disclosure, if any). If a brief purpose statement is included in the accounting, it must be sufficient to
reasonably inform the individual of the basis of the disclosure.
The first accounting in any 12-month period shall be provided free of charge. The Privacy Official may
impose reasonable production and mailing costs for subsequent accountings.
C. Requests for Alternative Communication Means or Locations
Participants may ask to receive communications regarding their protected health information by
alternative means or at alternative locations. For example, participants may ask to be called only at work
rather than at home. Navia may, but need not, honor such requests. The decision to honor such a
request shall be made by the Privacy Official.
However, Navia must accommodate such a request if the participant clearly states that the disclosure of
all or part of the information could endanger the participant. The Privacy Official has responsibility for
administering requests for confidential communications.
D. Requests for Restrictions on Use and Disclosure of Protected Health
Information
A participant may request restrictions on the use and disclosure of the participant's protected health
information. Navia may, but need not, honor such requests. However, Navia will comply with a
restriction request if (1) except as otherwise required by law, the disclosure is to a health plan for
purposes of carrying out payment or health care operations (and is not for purposes of carrying out
treatment); and (2) the protected health information pertains solely to a health care item or service for
which the health care provider involved has been paid in full by the individual or another person, other
than Navia. The decision to honor restriction requests shall be made by the Privacy Official.
Lastrev02272015
19
Appendix A to Privacy Policy: Workforce Member Confidentiality Agreement
I, _____, have read and understand the Privacy Policy of Navia’s Plan, for the protection of the privacy of
protected health information, as mandated by the Health Insurance Portability and Accountability Act of
1996 (HIPAA). In addition, I acknowledge that I have received training in Navia's policies concerning
protected health information use, disclosure, storage, and destruction as required by HIPAA.
In consideration of my employment or compensation by Navia, I hereby agree that I will not at any
time-either during my employment or association with Navia or Plan or after my employment or
association ends-use, access, or disclose protected health information to any person or entity, internally
or externally, except as is required and permitted in the course of my duties and responsibilities with
Navia, as set forth in Navia's privacy policies and procedures or as permitted under HIPAA. I understand
that this obligation extends to any protected health information that I may acquire during the course of
my employment or association with Navia or Navia, whether in oral, written, or electronic form and
regardless of the manner in which access was obtained.
I understand and acknowledge my responsibility to apply Navia's policies and procedures during the
course of my employment or association. I also understand that any unauthorized use or disclosure of
protected health information will result in disciplinary action, up to and including the termination of
employment or association with Navia and the imposition of civil penalties and criminal penalties under
applicable federal and state law, as well as disciplinary sanctions as appropriate.
I understand that this obligation will survive the termination of my employment or end of my
association with Navia, regardless of the reason for such termination.
Or Version II
I, ___________________, acknowledge that I have received training in the policies concerning PHI use,
disclosure, storage, and destruction as required by HIPAA. In consideration of my employment or
compensation by Navia, I hereby agree that I will not at any time—either during my employment or
association with Navia or after my employment or association ends—use, access, or disclose PHI to any
Lastrev02272015
20
person or entity, internally or externally, except as is required and permitted in the course of my duties
and responsibilities with Navia, as set forth in Navia’s privacy policies and procedures or as permitted
under HIPAA.
I understand that this obligation extends to any PHI that I may acquire during the course of my
employment or association with Navia, whether in oral, written or electronic form and regardless of the
manner in which access was obtained. I understand and acknowledge my responsibility to apply Navia’s
policies and procedures during the course of my employment or association.
I also understand that any unauthorized use or disclosure of PHI will result in disciplinary action, up to
and including the termination of employment. I understand that this obligation will survive the
termination of my employment or end of my association with Navia, regardless of the reason for such
termination.
Signed: _____________ Date: _________
Appendix B to Privacy Policy: Reportable Breach Notification Policy
I. Introduction
This Reportable Breach Notification Policy is intended to comply with the final HITECH regulations at 45
CFR §164.400 et seq. for breaches occurring on or after September 23, 2013 ("Breach Regulations").
Under the Breach Regulations, if a Reportable Breach of unsecured protected health information has
occurred, Navia must comply with certain notice requirements with respect to the affected individuals,
HHS, and, in certain instances, the media (depending on the business associate agreement).
II. Identifying a Reportable Breach
The first step is to determine whether a Reportable Breach has occurred. If a Reportable Breach has not
occurred, the notice requirements do not apply.
Lastrev02272015
21
The Privacy Official is responsible for reviewing the circumstances of possible breaches brought to his or
her attention and determining whether a Reportable Breach has occurred in accordance with this
Reportable Breach Notification Policy and the Breach Regulations. All sub-business Associates, and all
Navia workforce members are required to report to the Privacy Official any incidents involving possible
breaches.
Acquisition, access, use, or disclosure of unsecured protected health information in a manner not
permitted under the privacy rules is presumed to be a Reportable Breach, unless the Privacy Official
determines that there is a low probability that the privacy or security of the protected health
information has been or will be compromised.
The Privacy Official's determination of whether a Reportable Breach has occurred must include the
following considerations:
•
Was there a violation of HIPAA Privacy Rules? There must be an impermissible use or disclosure
resulting from or in connection with a violation of the HIPAA Privacy Rules by Navia or a Business
Associate of Navia. If not, then the notice requirements do not apply.
•
Was protected health information involved? If not, then the notice requirements do not apply.
•
Was the protected health information secured? For electronic protected health information to be
"secured," it must have been encrypted to NIST standards or destroyed. For paper protected health
information to be "secured," it must have been destroyed. If yes, then the notice requirements do
not apply.
•
Was there unauthorized access, use, acquisition, or disclosure of protected health information? The
violation of HIPAA Privacy Rules must have involved one of these. If it did not, then the notice
requirements do not apply.
•
Is there a low probability that privacy or security was compromised? If the Privacy Official
determines that there is only a low probability of compromise, then the notice requirements do not
apply. [for breaches discovered on or after September 23, 2009 and before September 23, 2013, the
"significant risk of harm" standard applies.]
To determine whether there is only a low probability that the privacy or security of the protected health
information was compromised; the Privacy Official must perform a risk assessment that considers at
least the following factors:
Lastrev02272015
22
•
The nature and extent of the protected health information involved, including the types of identifiers
and the likelihood of re-identification. For example, did the disclosure involve financial information,
such as credit card numbers, Social Security numbers, or other information that increases the risk of
identity theft or financial fraud; did the disclosure involve clinical information such as a treatment
plan, diagnosis, medication, medical history, or test results that could be used in a manner adverse
to the individual or otherwise to further the unauthorized recipient's own interests.
•
The unauthorized person who used the protected health information or to whom the disclosure was
made. For example, does the unauthorized recipient of the protected health information have
obligations to protect the privacy and security of the protected health information, such as another
entity subject to the HIPAA privacy and security rules or an entity required to comply with the
Privacy Act of 1974 or the Federal Information Security Management Act of 2002, and would those
obligations lower the probability that the recipient would use or further disclose the protected
health information inappropriately? Also, was the protected health information impermissibly used
within a Business Associate or business associate, or was it disclosed outside a Business Associate or
business associate? Did we receive written and or oral confirmation from the recipient that the
information was destroyed and not further disclosed?
•
Whether the protected health information was actually acquired or viewed. If there was only an
opportunity to actually view the information, but the Privacy Official determines that the
information was not, in fact, viewed, there may be a lower (or no) probability of compromise. For
example, if a laptop computer with was lost or stolen and subsequently recovered, and the Privacy
Official is able to determine (based on a forensic examination of the computer) that none of the
information was actually viewed, there may be no probability of compromise.
•
The extent to which the risk to the protected health information has been mitigated. For example, if
Navia can obtain satisfactory assurances (in the form of a confidentiality agreement or similar
documentation) from the unauthorized recipient of that the information will not be further used or
disclosed or will be destroyed, the probability that the privacy or security of the information has
been compromised may be lowered. The identity of the recipient (e.g., another Business Associate)
may be relevant in determining what assurances are satisfactory.
•
Upon suspected Breach caused by Navia, employer, broker or employer’s TPA (incorrect file upload,
incorrect employee entered into a company, employer/broker provides erroneous file etc.) review all
of the following communications, databases, reports and information to ensure that the information
involved in the error has been fully corrected/scrubbed.
The expectation is that all data is secured the day the use or disclosure is discovered. Secured
means the information is not available to anyone outside of Navia (employer and employee facing)
until further notice. If you are unable to secure/scrub the data by the end of the day please notify
the Privacy Officer and your manager so that others can assist.
Lastrev02272015
23
•
•
•
•
•
•
Determine whether immediate suspension of access to data is necessary—if so, restrict
all access.
Determine the date the error was made and email your 1) manager 2) Privacy Officer
and 3) the individual that caused the error (if any). Provide as many details as you can
with regard to how the error was discovered.
Conduct an employer login query "M:\Programs\Queries\Navia.com\Logins by User.sql"
Request an employee log-in report from Development from the time the error was
made until the time the data was scrubbed (including online and phone application).
Check all document downloads in the Company Documents Tab during the time in
question.
If the duration of time the information was available was short (hours-couple days)
request a log of pages visited by HR from Development.
ER Facing Information
•
•
•
•
•
•
•
•
•
•
•
Review and remove all participant information from all benefits (FSA, Day Care FSA,
HSA, HRA, GoNavia, COBRA, and Retiree Administration). This requires correcting
documents in Doc Lib. (Updating any spreadsheets in the Doc Lib means removing the
bad data, and recalculating the spreadsheet totals – column totals and participant
counts.) The Doc Lib address is: \\FILE4SVR\DocLib
YTD reports
Disbursement reports
EDR – Check for any pending EDRs created for the employer that have not yet been
submitted to us. If EDRs have already been submitted with the bad data on them,
Development will need to be notified so that they can scrub the EDR history.
Check for shared documents that may have been uploaded and make sure that they are
expired so that they are no longer accessible.
Payroll deduction report (GoNavia)
GoNavia export files
This may require recalculating the participant count, contributions amounts or other
totals listed on the reports.
Determine whether any administration fees need to be refunded.
Determine whether any funding corrections need to be made (for both the incorrect
company and the correct company).
We may need to request the employer destroy any downloaded reports and
communicate the name of the individual to ensure.
EE Facing Information
•
•
Review all communications that could have been sent out during the time in question.
Welcome emails – FSA, HRA, HSA, GoNavia, COBRA
Lastrev02272015
24
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
PEST statements
End of the year reminder emails
Claims notifications
Denials
Reimbursement notifications
Debit card related emails
Review all account information
Review debit card activity (all correspondence)
Term debit card (and any dependent issued cards)
Reissue debit card
Adjust out all debit card activity out of wrong account and into correct account.
Correct and enter all correct data in the correct company.
Review all paid claims (direct deposits and hard copy checks)
Review all denials
Review phone application activity
Check for pending claims in the phone application – need Megan’s help
Check for pending claims online – need Megan’s help
Check for mailed/emailed/faxed claims a few days later (won’t have metadata to
search)
Other general corrective measures
•
•
•
•
•
•
Check the employee as “Do Not Use”
Zero out election and record a termination date equal to the eligibility date.
Remove email and date of birth from incorrect account (use dummy SSN) click “apply”
then save to send information to Alegeus.
Insert “dummy” SSN in the Emp ID and SSN fields.
Click ‘apply’ to ensure that the data update is sent over to Alegeus.
Click Save.
Wrap up
• Keep track of all the corrections made and use that information to fill out the incident
report.
• If communications, debit card, or online activity has been generated, CSR team will need
to be notified so that any corrections may be communicated to the participant.
• Once all steps of clean up have been taken and the form has been filled out return it to
the Privacy Officer.
•
Upon suspected Breach caused by external factors (compromise, worm, hacker see “SECURITY
RESPONSE PLAN).
Lastrev02272015
25
If the Privacy Official determines that there is only a low probability that the privacy or security of the
information was compromised, the incident will be documented in writing, and no notice will be sent.
However, as a curtesy, notices may be provided to the employer and if agreed a notice to the employee
provided. On the other hand, if the Privacy Official is not able to determine that there is only a low
probability that the privacy or security of the information was compromised, Navia will provide
notifications in the following order:
-
Notice to the employer/client with a specific description of the occurrence.
-
Notice to the affected individual upon approval of communication by employer.
-
Notice to HHS, media, and other agencies (consumer credit, FBI, etc.) by client with Navia’s
assistance.
If an exception applies, then a Reportable Breach has not occurred, and the notice requirements are not
applicable.
•
Exception 1: A Reportable Breach does not occur if the breach involved an unintentional access, use,
or acquisition of protected health information by a workforce member or Business Associate, if the
unauthorized access, use, acquisition, or disclosure-(a) was in good faith; (b) was within the scope of
authority of the workforce member or Business Associate; and (c) does not involve further use or
disclosure in violation of the HIPAA privacy rules. For example, the exception might apply if an
employee providing administrative services to Navia were to access the claim file of a participant
whose name is similar to the name of the intended participant; but if the same employee
intentionally looks up protected health information of his neighbor, the exception does not apply.
•
Exception 2: A Reportable Breach has not occurred if the breach involved an inadvertent disclosure
from one person authorized by Navia to have access to protected health information to another
person at the same Business Associate or Business Associate also authorized to have access to the
protected health information, provided that there is no further use or disclosure in violation of the
HIPAA privacy rules. For example, the exception might apply if an employee providing administrative
services to Navia inadvertently emailed protected health information to the wrong co-worker; but if
the same employee emailed the information to an unrelated third party, the exception likely does
not apply.
•
Exception 3: A Reportable Breach has not occurred if the breach involved a disclosure where there is
a good faith belief that the unauthorized person to whom the disclosure was made would not
reasonably have been able to retain the protected health information. For example, the exception
Lastrev02272015
26
may apply to an EOB mailed to the wrong person and returned to Navia unopened, or if a report
containing protected health information is handed to the wrong person, but is immediately
retrieved before the person can read it. However, the exception does not apply if an EOB was
mailed to the wrong person and the unintended recipient opened the envelope before realizing the
mistake.
III. If a Reportable Breach Has Occurred: Notice Timing and Responsibilities
If the Privacy Official determines that a Reportable Breach has occurred, the Privacy Official will
determine (in accordance with the Breach Regulations) the date the breach was discovered in order to
determine the time periods for giving notice of the Reportable Breach. Navia has reasonable systems
and procedures in place to discover the existence of possible breaches, and workforce members are
trained to notify the Privacy Official or other responsible person immediately so Navia can act within the
applicable time periods.
The Privacy Official [and if applicable, the employer] is responsible for the content of notices and for the
timely delivery of notices in accordance with the Breach Regulations. However, the Privacy Official will
work with the employer to ensure that any communications are reviewed and approved by the
employer.
The Breach Regulations may require a breach to be treated as discovered on a date that is earlier than
the date Navia had actual knowledge of the breach. The Privacy Official will determine the date of
discovery as the earlier of-(1) the date that a workforce member (other than a workforce member who
committed the breach) knows of the events giving rise to the breach; and (2) the date that a workforce
member or agent of Navia, such as a Business Associate (other than the person who committed the
breach) would have known of the events giving rise to the breach by exercising reasonable diligence.
Except as otherwise specified in the notice sections that follow, notices must be given "without
unreasonable delay" and in no event later than 60 calendar days after the discovery date of the breach.
Accordingly, the investigation of a possible breach, to determine whether it is a Reportable Breach and
the individuals who are affected, must be undertaken in a timely manner that does not impede the
Lastrev02272015
27
notice deadline.
There is an exception to the timing requirements if a law-enforcement official asks Navia to delay giving
notices. If a law enforcement official states that a notification, notice, or posting would impede a
criminal investigation or cause damage to national security, Navia shall:
-
If the statement is in writing and specifies the time for which a delay is required, delay such
notification, notice, or posting for the time period specified by the official; or
-
If the statement is made orally, document the statement, including the identity of the official
making the statement, and delay the notification, notice, or posting temporarily and no longer
than 30 days from the date of the oral statement, unless a written statement as described
above is submitted during that time.
Navia will review employer’s business associate agreement to determine whether the parties have
negotiated a shorter timeframe for reporting breaches to the employer.
IV. Business Associates
If a sub-Business Associate commits or identifies a possible Reportable Breach relating to Plan
participants, the sub-Business Associate must give notice to Navia. Navia may agree to be responsible
for providing required notices of a Reportable Breach to individuals, although the employer is
responsible for reporting to HHS, and (if necessary) the media, Navia may assist in that process.
Unless otherwise required under the Breach Regulations, the discovery date for purposes of Navia's
notice obligations is the date that Navia receives notice from the Business Associate.
In its Business Associate contracts, Navia will require Business Associates to•
report incidents involving breaches or possible breaches to the Privacy Official in a timely manner;
•
provide to Navia any and all information requested by Navia regarding the breach or possible
breach, including, but not limited to, the information required to be included in notices (as
described below); and
Lastrev02272015
28
•
establish and maintain procedures and policies to comply with the Breach Regulations, including
workforce training.
V. Notice to Individuals
Notice to the affected individual(s) is always required in the event of a Reportable Breach. Notice will be
given without unreasonable delay and in no event later than 60 calendar days after the date of
discovery (as determined above) unless some other earlier date is determined by contract.
A. Content of Notice to Individuals
Notices to individuals will be written in plain language and contain all of the following, in accordance
with the Breach Regulations:
•
A brief description of the incident.
•
If known, the date of the Reportable Breach and the Discovery Date.
•
A description of the types of unsecured protected health information involved in the Reportable
Breach (for example, full name, Social Security numbers, address, diagnosis, date of birth, account
number, disability code, or other). (Ed. Note: It is not required-and probably not appropriate-to
include the unsecured information itself in the notice. That is, Navia might say that Social Security
numbers or credit card numbers were included in an unauthorized disclosure, but it does not have
to include the Social Security or credit card numbers themselves in the notice.)
•
The steps individuals should take to protect themselves (such as contacting credit card companies
and credit monitoring services).
•
A description of what Navia is doing to investigate the Reportable Breach, such as filing a police
report or reviewing security logs or tapes.
•
A description of what Navia is doing to mitigate harm to individuals.
•
A description of what measures Navia is taking to protect against further breaches (such as
sanctions imposed on workforce members involved in the Reportable Breach, encryption, and
installation of new firewalls).
•
Contact information for individuals to learn more about the Reportable Breach or ask other
Lastrev02272015
29
questions, which must include at least one of the following: Toll-free phone number, email address,
website, or postal address.
B. Types of Notice to Individuals
Navia will deliver individual notices using the following methods, depending on the circumstances of the
breach and Navia's contact information for affected individuals.
Actual Notice will be given in all cases, unless Navia has insufficient or out-of-date addresses for the
affected individuals. Actual written notice•
will be sent via mail to last known address of the individual(s);
•
may be sent via email instead, if the individual has agreed to receive electronic notices;
•
will be sent to the parent on behalf of a minor child or parent of an adult child for benefit or tax
purposes; and
•
will be sent to the next-of-kin or personal representative of a deceased person, if Navia knows the
individual is deceased and has the address of the next-of-kin or personal representative.
Substitute Notice will be given if Navia has insufficient or out-of-date addresses for the affected
individuals.
•
If addresses of fewer than ten living affected individuals are insufficient or out-of-date, substitute
notice may be given by telephone, an alternate written notice, or other means.
•
If addresses of ten or more living affected individuals are insufficient or out-of-date, substitute
notice must be given via either website or media. Substitute notice via website. Conspicuous
posting on home page of the website of Navia or Plan Sponsor for 90 days, including a toll-free
number that remains active for at least 90 days where individuals can learn whether the individual's
unsecured information may have been included in the breach. Contents of the notice can be
provided directly on the website or via hyperlink. Substitute notice via media. Conspicuous notice in
major print or broadcast media in the geographic areas where the affected individuals likely reside,
including a toll-free number that remains active for at least 90 days where individuals can learn
Lastrev02272015
30
whether the individual's unsecured information may have been included in the breach. It may be
necessary to give the substitute notice in both local media outlet(s) and statewide media outlet(s)
and in more than one state.
•
Substitute Notice is not required if the individual is deceased and Navia has insufficient or
out-of-date information that precludes written notice to the next-of-kin or personal representative of
the individual.
Urgent Notice may be given, in addition to other required notice, in circumstances where imminent
misuse of unsecured protected health information may occur. Urgent notice must be given by telephone
or other appropriate means.
•
Example: Urgent notice is given to an individual by telephone. Navia must also send an
individual notice via first-class mail.
VI. Notice to HHS
Notice of all Reportable Breaches will be given to HHS by the client unless agreed by the employer and
Navia otherwise. The time and manner of the notice depends on the number of individuals affected. The
Privacy Official may work with the employer for both types of notice to HHS.
Immediate Notice to HHS. If the Reportable Breach involves 500 or more affected individuals, regardless
of where the individuals reside, notice will be given to HHS without unreasonable delay, and in no event
later than 60 calendar days after the date of discovery (as determined above). Notice will be given in the
manner directed on the HHS website.
Annual Report to HHS. The Privacy Official will report Breaches that involve fewer than 500 affected
individuals, to the employer to report to HHS. The reports are due within 60 days after the end of the
calendar year. The reports will be submitted as directed on the HHS website.
VII. Notice to Media (Press Release)
Notice to media (generally in the form of a press release) will be given if a Reportable Breach affects
Lastrev02272015
31
more than 500 residents of any one state or jurisdiction. For example:
•
If a Reportable Breach affects 600 individuals who are residents of Oregon, notice to media is
required.
•
If a Reportable Breach affects 450 individuals who are residents of Oregon and 60 individuals who
are residents of Idaho, notice to media is not required.
If notice to media is required, the employer will give notice to prominent media outlets serving the state
or jurisdiction. For example:
•
If a Reportable Breach involves residents of one city, the prominent media outlet would be the city's
newspaper or TV station.
•
If a Reportable Breach involves residents of various parts of the state, the prominent media outlet
would be a statewide newspaper or TV station.
•
If a Reportable Breach affects 600 individuals who are residents of Oregon, and 510 individuals
who are residents of Washington, notice to media in both states is required.
If notice to media is required, it will be given without unreasonable delay, and in no event more than 60
calendar days after the date of discovery (as determined above). The content requirements for a notice
to media are the same as the requirements for a notice to individuals.
VII. Reporting to Law Enforcement (California)
Sacramento Valley Hi-Tech Crimes Task Force
Telephone: 916-874-3002
www.sachitechcops.org
Southern California High Tech Task Force
Telephone: 562-347-2601
Northern California Computer Crimes Task Force
Telephone: 707-253-4500
www.nc3tf.org
Rapid Enforcement Allied Computer Team (REACT)
Telephone: 408-494-7186
http://reacttf.org
Lastrev02272015
32
Computer and Technology Crime High-Tech Response Team (CATCH)
Telephone: 619-531-3660
http://www.catchteam.org/
FBI
Local Office: http://www.fbi.gov/contact/fo/fo.htm
National Computer Crime Squad
Telephone: 202-324-9164
E-mail: nccs@fbi.gov
www.emergency.com/fbi-nccs.htm
U.S. Secret Service
Local Office: www.treas.gov/usss/index.shtml
Cyber Threat/Network Incident Report: www.treas.gov/usss/net_intrusion_forms.shtml
Procedures for Prior to Becoming a Computer Crime Victim and After a Violation Has Occurred--Guidance from the FBI National Computer Crime Squad
www.emergency.com/fbi-nccs.htm
•
•
•
•
•
•
•
•
•
•
•
Consider complete shut down while internal assessment is made.
Place a login banner to ensure that unauthorized users are warned that they may be subject to
monitoring.
Ensure audit trails are turned on.
Consider keystroke level monitoring if adequate banner is displayed.
Request trap and tracing from your local telephone company.
Consider installing caller identification.
Make backups of damaged or altered files.
Maintain old backups to show the status of the original.
Designate one person to secure potential evidence
Evidence can consist of tape backups and printouts. These should be initialed by the person obtaining the evidence. Evidence should be retained in a locked cabinet with access limited.
Keep a record of resources used to reestablish the system and locate the perpetrator.
Be prepared to provide the following information when reporting a computer crime:
· Name and address of the reporting agency.
· Name, address, e-mail address, and phone number(s) of the reporting person.
· Name, address, e-mail address, and phone number(s) of the Information Security Officer (ISO).
· Name, address, e-mail address, and phone number(s) of the alternate contact (e.g., alternate ISO, system administrator, etc.).
· Description of the incident.
Lastrev02272015
33
· Date and time the incident occurred.
· Date and time the incident was discovered.
· Make/model of the affected computer(s).
· IP address of the affected computer(s).
· Assigned name of the affected computer(s).
· Operating System of the affected computer(s).
· Location of the affected computer(s).
Security Response Plan
This section of the policy discusses the steps taken during an incident response plan. The person who
discovers the incident will call FPS Owners, IT or legal. Once notice has been provided to one of the below named individuals they will contact the others on the list.
1) Matt Aitken cell (206) 2950523, work (425) 452-3456
2) Hilarie Aitken cell (206) 390-6809, work (425) 452-3506
3) James Aitken cell (425) 503-7511, work (425) 452-3502
4) Tina Davis cell (206) 351-6207, work (425)452-3510
IT will determine the following:
•
•
•
•
•
Does the incident affect critical business operations?
What is the severity of the potential impact?
Name of system being targeted, along with operating system, IP address, and location.
IP address and any information about the origin of the attack.
Are there any ancillary systems, processes, website, access points, or links that may be affected?
Review the website, vendor, and subcontractor log for a complete list.
Contacted members of the response team will meet or discuss the situation and determine a response
strategy.
•
•
•
•
•
•
•
•
•
•
Is the incident real or perceived?
Is the incident still in progress? If so, shall we halt/stop/cease certain operations?
What data or property is threatened and how critical is it?
What is the impact on the business should the attack succeed? Minimal, serious, or critical?
What system or systems are targeted, where are they located physically and on the network?
Is the incident inside the trusted network?
Is the response urgent?
Can the incident be quickly contained?
Will the response alert the attacker and do we care?
What type of incident is this? Example: virus, worm, intrusion, abuse, damage.
Lastrev02272015
34
The incident will be categorized into the highest applicable level of one of the following categories:
•
•
•
•
Category one - A threat to public safety or life.
Category two - A threat to sensitive data
Category three - A threat to computer systems
Category four - A disruption of services
Team members will establish and follow one of the following procedures basing their response on the
incident assessment:
•
•
•
•
•
•
•
•
•
•
Worm response procedure
Virus response procedure
System failure procedure
Active intrusion response procedure - Is critical data at risk?
Inactive Intrusion response procedure
System abuse procedure
Property theft response procedure
Website denial of service response procedure
Database or file denial of service response procedure
Spyware response procedure.
The team may create additional procedures which are not foreseen in this document. If there is no applicable procedure in place, the team must document what was done and later establish a procedure for
the incident.
Team members will use forensic techniques, including reviewing system logs, looking for gaps in logs,
reviewing intrusion detection logs, and interviewing individuals to determine how the incident was
caused. Only authorized personnel should be performing interviews or examining evidence, and the authorized personnel may vary by situation and the organization.
Team members will recommend changes to prevent the occurrence from happening again or infecting
other systems. Upon management approval, the changes will be implemented.
Team members will restore the affected system(s) to the uninfected state. They may do any or more of
the following:
•
•
•
•
•
•
Re-install the affected system(s) from scratch and restore data from backups if necessary. Preserve evidence before doing this.
Make users change passwords if passwords may have been sniffed.
Be sure the system has been hardened by turning off or uninstalling unused services.
Be sure the system is fully patched.
Be sure real time virus protection and intrusion detection is running.
Be sure the system is logging the correct events and to the proper level.
Lastrev02272015
35
Documentation—the following shall be documented:
•
•
•
•
•
•
•
•
How the incident was discovered.
The category of the incident.
How the incident occurred, whether through email, firewall, etc.
Where the attack came from, such as IP addresses and other related information about the attacker.
What the response plan was.
What was done in response?
Whether the response was effective.
Was notice required to be made to individuals, employers, brokers, subcontractors, or other
service providers? If so see breach notification procedures.
Evidence Preservation—make copies of logs, email, and other communication. Keep lists of witnesses.
Keep evidence as long as necessary to complete prosecution and beyond in case of an appeal.
Notify proper external agencies—review privacy policy for list of contacts (i.e. credit monitoring agencies, FBI, other law enforcement).
Assess damage and cost—assess the damage to the organization and estimate both the damage cost
and the cost of the containment efforts. Review response and update policies—plan and take preventative steps so the intrusion can't happen again.
Consider whether an additional policy could have prevented the intrusion.
Consider whether a procedure or policy was not followed which allowed the intrusion, and then consider what could be changed to ensure that the procedure or policy is followed in the future.
•
•
•
•
•
•
•
•
Was the incident response appropriate? How could it be improved?
Was every appropriate party informed in a timely manner?
Were the incident-response procedures detailed and did they cover the entire situation? How
can they be improved?
Have changes been made to prevent a re-infection? Have all systems been patched, systems
locked down, passwords changed, anti-virus updated, email policies set, etc.?
Have changes been made to prevent a new and similar infection?
Should any security policies be updated?
What lessons have been learned from this experience?
Review Breach notice requirements.
Lastrev02272015
36
Appendix C Miscellaneous Policy Standards
I. Introduction
This section of the Privacy Policy relates to specific actions or duties that are subject to modification or
improvement.
II. Procedures for Ad-Hoc Query and Report Requests (Development Team)
External Queries – ad-hoc query requests from other internal users to provide a list of data based specified criteria that will be shared externally. Output is typically Excel or a text file.
•
•
•
•
Query should have a standard comment header
o Author, Date, Description
Query should be unit tested by spot checking results and looking at total row count
Query is code reviewed and executed by another person on the team
Query is checked into SVN, with a name that describes the purpose of the query
M drive queries – requests to create a query that will be executed by other users via a Sql Client
•
•
Same as above
It is better to modify an existing report than to create new ad-hoc queries. Most reports are
easy to modify to add a data column or filter. This should be considered before creating a new
query
Data update queries – requests to update production data, including updates we may need to make to
resolve a bug or functional issue
•
•
•
•
Same as above
One-off data fixes do not need to be saved to SVN
Updates must be done inside a transaction with rollback if there is an error or expected row
count doesn’t match (see next page)
Data updates that will be repeated should be encapsulated into a sproc, all sprocs are checked
into SVN
SVN folder structure
•
DB
o
Navia
 DBMods – schema changes related to a bug or enhancement
Lastrev02272015
37
o
•
Projects
 ProjectName – schema changes and conversion scripts related to a project
Queries
o Daily Queries – Run daily or weekly by the dev team to look for inconsistent data
o Data Updates – Data update queries
o External Queries - Query request where data will be shared externally
o Mdrive – Queries run by internal users in Sql Query Analyzer
o Utilities – Dev infrastructure scripts
USE NAVIA
DECLARE @EXPECTEDROWCOUNT INT
-- SET THE NUMBER OF ROWS EXPECTED TO BE AFFECTED BY INSERT/UPDATE/DELETE STATEMENT
HERE
SET @EXPECTEDROWCOUNT = 0
BEGIN TRAN txn
-- PASTE INSERT/UPDATE/DELETE STATEMENT HERE
IF @@ROWCOUNT <> @EXPECTEDROWCOUNT
GOTO errLabel
GOTO doneLabel
errLabel:
BEGIN
ROLLBACK TRAN txn
Print 'Rolled back'
Return
END
doneLabel:
COMMIT TRAN txn
Print 'Done'
III. Policy Regarding Change Files—Navia360 Bundled Information Functionality
and Tracking
Employees shall upload the file, and bundled the original file and the change file, and upload them into
Navia360.
This eliminates the need to email the files and retains the critical ability to gather all necessary information in one area for auditing purposes. New upload capabilities have been added to the Company
Correspondence tab. If the Upload Email button is clicked and the browser window is cancelled, an
email form will open up with From and To lines defaulted to the current user’s email address. Documents can be dragged and dropped onto this form as attachments and saved. This will allow users to
Lastrev02272015
38
save multiple files in a single package in the Correspondence tab without having to consolidate them all
via Outlook. Allowed file types include pdf, doc, docx, csv, xls, xlsx, zip, txt, msg, jpg, jpeg, bmp, gif, tif,
png, html, edi, and pgp.
IV. File Share Policy
Sharing data with the employer is essential to accurately administer employee benefits. Our policy at
Navia is to upload files to a secure site and not email files. Files may be emailed as an exception to the
rule of uploading files. Files are uploaded, they are available within an hour to allow time to pull back
data, and the files drop off the site after a specified timeframe.
The following details this process:
Under the Company Documents tab you will find a document type called Shared File. If this doc type is
selected, the expiry date field auto-populates 10 days from today. Shared file documents become available on the employer portal one hour after they are added, but checking the Override Delay box will
make them available immediately. You may only override the delay if the circumstances necessitate the
override. Any notes entered into the Notes field will also be available online. Note that if you add the
document using the Quick Add feature, you will have to reopen the document record to complete the
upload process.
If you check the Override Delay box or update the expiration date, a pop-up will appear.
Lastrev02272015
39
A new menu item has been added to the Tools and Resources menu on the employer portal.
Clicking it opens the File Sharer page, where any non-expired Shared File documents are available.
Clicking the little icon next to the document name will download the document. Each time a document
is downloaded, that download is tracked in the database. Download history for each Shared File document can be found by clicking the View Downloads button on the Document form in Navia360.
Lastrev02272015
40
Once a document’s expiration date passes, the document will no longer be available on the ER portal,
though it will still be available in Navia360. If no Shared File documents are available, the ER portal page
renders as below.
Internal File Sharing
When sharing files internally (among Navia employees) files are not attached to email but placed in the
employee Drop Box. Employee A then emails a link to the file contained in their drop box to Employee
B. The file is processed accordingly. This link is not accessible to any recipient outside of Navia and
prevents accidental disclosures.
V. Remote Access Policy
VPN is provided to IT, the Development Team, management as needed, and other employees as needed
to accomplish a particular task. Use of the tools is monitored and logged. ID & authentication requirements are found in the Password Policy below and employees must sign a VPN Agreement (see below).
Remote access terminates after 10 minutes of inactivity. Except as indicated in the preceding sentences,
no Navia employee has capability to access to our network.
VPN Agreement
Lastrev02272015
41
Navia’s VPN POLICY
Approved employees may utilize the benefits of VPNs. In order to access the VPN you agree as follows:
1. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not
allowed access to FPS internal networks.
2. VPN use is to be controlled using either a one-time password authentication such as a token device
or a public/private key system with a strong pass phrase.
3. When actively connected to the corporate network, VPNs will force all traffic to and from the PC
over the VPN tunnel: all other traffic will be dropped.
4. Dual (split) tunneling is NOT permitted; only one network connection is allowed.
5. VPN gateways will be set up and managed by FPS IT.
6. All computers connected to FPS internal networks via VPN or any other technology must use the
most up-to-date anti-virus software that is FPS approved; this includes personal computers.
7. VPN users will be automatically disconnected from FPS’s network after 10 minutes of inactivity.
The user must then logon again to reconnect to the network. Pings or other artificial network
processes are not to be used to keep the connection open.
8. The VPN concentrator is limited to an absolute connection time of 24 hours.
9. All computers used to access the VPM must either personal computers reviewed by IT or computers issued by FPS. Users of computers that are not FPS owned equipment must configure the
equipment to comply with FPS's VPN and Network policies.
10. By using VPN technology with personal equipment, users must understand that their machines are
a de facto extension of FPSs network, and as such are subject to the same rules and regulations
that apply to FPS-owned equipment.
11. VPN access may be permitted on a temporary or full-time basis depending on the duties of the
employee and needs of FPS.
12. If you are permitted administrative rights due to access, control, your roll at FPS, or otherwise then
you agree not to adjust or disable any security features enabled or implemented by FPS IT.
13. All computers used to access the VPN must be encrypted.
Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and including
termination of employment.
Employee Name: _________________________________________
Signature:
__________________________________________
Date:
__________________________________________
Lastrev02272015
42
VI. Password Policy
Navia employees: Passwords expire every 90 days. Employees cannot replicate last 15 passwords.
Complexity Requirements are: at least 8 characters, at least 3 of the 4 following groups [uppercase,
lowercase, numeric character, and special character]. Upon termination of a Navia employee, their Navia360 username is deactivated within one month of the date of termination by the former employee’s
department head. Note that the Navia360 username cannot be used outside of the office, because access to the Admin site it limited to internal use and a few special IP addresses only (company laptops
and Development VPN primarily). Upon termination the following is conducted by the client support
manager:
• Remove access to systems:
o Navia360, Wealthcare Admin, Wired Commute, FTP, Benaissance
• Phones
o Review all voice mail
o IT disables the extension and resets the password
• Computer
o Password reset by IT and computer is wiped.
• Email
o OOO set prior to departure
o redirect emails to designated contact
o review and clear all old email
o Disable email after 2 weeks.
• Immediately collect FPS badge/FOB
• IT disables remote access to Outlook
Clients and Brokers: Upon notice of employer termination (termination of contact at employer), that
employer’s Navia.com username is deactivated immediately and all communications to that employer
contact cease. The accounting team terminates the online access of a client contact for terminated clients (clients that terminate services with Navia but contact is still employed with employer). Under this
procedure any client contact is completely restricted from online access. Specifically, the accounting
team deactivates online access for client contacts 90 days after the end of the claims run-out period of a
terminated plan. Additionally, the accounting team deactivates online access for any client contact upon receipt of notice of termination of employment. Complexity Requirements are: at least 8 characters,
at least 3 of the 4 following groups [uppercase, lowercase, number, and alpha-numeric punctuation].
If an employer contact is also enrolled as a participant, they may use the same username and password
to access both the employer and employee portals. This can be done during the employer portal registration process.
Lastrev02272015
43

Plan years are available on the employer portal for management from the moment of creation (in
Pending status) until 90 days after the posted claim runout period.
Participants: Participants are restricted from accessing plan level information for all expired plans. Plans
are expired 90 days after the end of the claims run-out period. Complexity Requirements are: at least 8
characters, at least 3 of the 4 following groups [uppercase, lowercase, number, and alpha-numeric
punctuation]. Participants do not have access to online accounts for terminated plans (clients no longer
using our services).
Username Requirements
Usernames must be unique amongst all Navia360 and Navia.com employer and employee usernames.
Password Requirements
All Navia.com passwords must be at least six characters in length and contain at least three of the following:
•
•
•
•
One uppercase letter
One lowercase letter
One number
One special character
Failed Logins
Both Navia360 and Navia.com employee and employer usernames may be locked out after five (5) failed
login attempts.
Lastrev02272015
44
Forgot Password
If an employee or employer user initiates a forgot password request through Navia.com, their password
is reset with a temporary password and a setting on their account is updated so that the next time the
participant successfully logs in, they will be required to reset their password. The username and password are emailed to the participant’s current email address in separate email messages.
Employers resetting their password must enter a company code and email address. If there are two
contacts within the same company that share an email address, they will be not be able to reset their
password online and will be advised to contact customer service.
Participants are required to enter their email address and date of birth. If a match cannot be found, they
will be advised to contact customer service.
If the participant forgets their username or password (or both) we will guide them to the website and
aid them in clicking on “Help” below the login section, and clicking “Forgot Username and/or Password”.
They should receive a temporary password and their username via email. If participant fails to receive
an email with the temporary password and username, after checking their spam/junk folder, then we
can set a temporary password for them only after verifying identify fully
If the participant cannot access the email address associated with the account we must first verify their
identity (see Verifying Identity rules).
•
After verifying their identity, we email them with the following template:
Please confirm the below information:
Old email:
Name:
Employer:
Month and day of birth:
Home zip code:
Once we receive a reply from the new email address we update the email in the participants account.
The CSR then updates the email address on file so the participant can use the “Forgot
Username/Password” link to get this information sent to an accessible email address.
The employee should also send any changes to their employer to ensure the employer does not override
their data. If the participant can access the email on file, they would complete step 1.
Lastrev02272015
45
If the participant would like their username changed the CSR must contact a supervisors to then contact
development. Navia employees do not change participant username unless there is a special circumstance such as divorce or marriage.
Account Creation and Maintenance
The creation of Navia360 usernames is permission-based (supervisors and Development only). Employees may change their own Navia360 passwords while logged in, but if they are locked out due to failed
logins, only those with the aforementioned permissions may reset the password. Usernames may only
be updated by a member of Development.
Navia.com employee and employer usernames may only be created via online registration. Only users
with the Change Password permission in Navia360 may update passwords for employers and employees, though any user may reset the login fail count, update the username, or change the username status (Active, Deleted, or Disabled) for an employee or employer.
Navia360 – Unique username and password. Application only available from within network (after
signing into the desktop).
Alegeus Monitor - Unique username and password. Application only available from within network (after signing into the desktop). Passwords do not expire. Password requirements are:
•
•
•
•
•
•
8-13 characters
Must contain at least 3 of the following:
Upper case
Lower case
Numeric character
Special character
Wired Commute - Single sign on via the Participant portal, see password requirements below
Person to person communions (call in) require verification using our Identification Verification Policy.
Banking – Password + key fob. You must login with a company ID, user name, and a password that requires at least 8 characters (at least 1 letter and 1 number) to get general access to the site. This password is changed every 60 days. Anything that prompts changes (adding a user, changing user access,
uploading debit files or check issue reports) also requires a 4 digit unique pin number plus a key fob
number from an individually assigned fob (this number changes every 60 seconds).
VPN – Access is provided to the development team and IT. It is also provided to management as needed
and others as needed for a limited duration (duration to complete the particular task). Password and
key fob required. The Password requirements are the same as desktop passwords.
Lastrev02272015
46
FPS Laptop Computers/tablets - Password protected + key fob. Password requirements are:
•
8-13 characters long
•
Contain at least 3 of the following character types:
•
Uppercase letter
•
Lowercase letter
•
Numeric character
•
Special Character
•
Passwords do not expire
VI. Physical Security Policy
All doors locked after normal business hours (between 6 pm – 6 am). 1st level entry requires photo
badge. 2nd level entry requires FPS issued fob. Fob logs are maintained and monitored by IT.
One to two persons at the front desk at all times during normal business hours.
All visitors must sign in at the front desk.
All visitors are accompanied by a Navia employee while in the back office area
Screening and background checks for all new employees
a. Washington courts (public records files).
b. Background check conducted by Almond Associates and completed before 1st day of
employment
c. All employees go through HIPAA training and sign confidentiality agreement before access to systems is permitted.
d. Server room secured by additional physical security controls [two locked doors, entry
logged]
No PHI left in plain view after normal business hours unless a supervisor present. Secure access to monitor displays and printers.
Hard copy mailed claims and documents retained onsite in locked filing cabinet in locked storage room
for 30 days until destroyed. All documents are scanned and retained in soft copy for 8 years. All documents containing PHI are shred by offsite shred service.
Flash drives or other data download devices are prohibited onsite and FPS desktop drives disabled.
All key fob owners are tracked by IT. IT immediately deactivates terminated employee fob.
Employee computers are locked at all times while the employee is away from their work space. Unlocked computers are reported to the HIPAA Privacy Officer and locked immediately. Employee penalty
may be imposed on employee who leaves a computer unlocked. Employees working after hours not
permitted unless supervisor present.
Mail containing PHI sent to employers is marked “confidential” and sent only to the designated contact.
Lastrev02272015
47
Electronic data is provided to plan sponsors in secure method (file upload or FTP) including but not limited to password protected or secure FTP site.
US Mail containing PHI:
e. Scanned on same day as received
f. Soft copy stored for 8 years
g. Hard copies stored for 30 days in secure storage room then shred
Secure destruction of hardware and equipment. Desktops are electronically wiped to DOD data destruction standard DoD 5220.22-M. Server drives are wiped and then physically shredded. We have a
policy of not saving or downloading PHI on laptops, tablets, or other mobile devises.
Lastrev02272015
48
Download