Information Security Risk Acceptance Document

advertisement
Information Security Risk Acceptance
HIPAA Security Compliance Exception and Risk Acceptance for: _____________________________
I understand that compliance with East Carolina University HIPAA Security policies and standards and Federal
HIPAA Privacy and Security requirements is expected for all organizational units (e.g. schools and departments),
business processes and the related information and communication systems. I have read the attached HIPAA
Security Compliance Report for the ____________________ and I believe that the control(s) described therein
should not be required for the following organizational unit, business process, or information system,
_____________________________________________________________________________________________
_____________________________________________________________________________________________
I understand that a control deficiency in one business process or system could possibly jeopardize other processes or
systems, possibly lead to a compromise in privacy, and/or possibly result in a data security breach.
I understand that an exception to University policies and standards and / or state or Federal statues is appropriate
only when compliance would:
 adversely affect the accomplishment of East Carolina University business
 cause a major adverse financial impact that would not be offset by the reduced risk occasioned by
compliance
 adversely reflect upon the University’s reputation
An exception to this policy or standard is warranted because:
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
A written security compliance review has been prepared of possible risks associated with being out of
compliance with the above mentioned policy, standard or statue. A review can never identify all risks, but
the known risks associated with this application, system, or hardware is listed in the attached report.
I, as department head for _____________________________, acknowledge the risks associated with this exception
to information security policies and/or standards on behalf of the institution. I have reviewed the security concerns
associated with this installation, but have determined this exception is necessary for the stated business purposes
listed above. I understand that the risks include penalties described in HITECH Act of the American Recovery
Reinvestment Act and/or other state and federal compliance requirements. I understand it is my responsibility to
communicate the risks and acceptance of risks to the appropriate University senior management and to review the
risks associated with this system at minimum annually, or as changes to the system or organization warrant.
I approve the installation of the system for which this compliance exception refers.
_______________________________________
Printed name of University Approver
_______________________________________
University Approver Signature
Date
_______________________________________
Data Owner Signature
Date
Information Risk Acceptance #
1
Keep copy for your record and return completed and signed form to IT Security; Mailstop 229, ITCS Cotanche Bldg
CC: Mr. Tim Wiseman, University Enterprise Risk Management Office
Download