C , D T

advertisement
CATHOLIC CHARITIES, DIOCESE OF TRENTON
POLICIES AND PROCEDURES MANUAL
HIPAA POLICIES AND PROCEDURES
TABLE OF CONTENTS
Section 1.00 Confidentiality and Privacy
HP-1.01
Overview of Confidentiality and Privacy Section
HP-1.02
Distribution of Notice of Privacy Practices
Attachment to HP-1.02: Notice of Privacy Practices
Notice of Privacy Practices - Spanish Version
HP-1.03
Client’s Request for Access to Health Information
Attachment A to HP-1.03: Client Request to Review or Obtain
Copy of Health Information
Attachment B to HP-1.03: Notice of Denial of Client Request to
Review or Obtain Copy of Health Information
HP-1.04
Designated Record Set
HP- 1.05 Client’s Request to Amend Health Information
Attachment A to HP-1.05: Client Request to Amend Health
Information
Attachment B to HP-1.05: Notice of Denial of Client Request to
Amend Health Information
HP-1.06
Client Requests for Restriction of Uses/Disclosures of Private Health
Information and/or Confidential Communications
Attachment to HP-1.07: Client Request for Restriction of
Uses/Disclosures of Private Health Information and/or Confidential
Communications Form
HP-1.07
Client’s Request for Accountings of Disclosures of Health Information
Attachment A to HP-1.07: Disclosure Sheet
Attachment B to HP-1.07: Records Release Authorization
HP-1.08
Application of “Minimum Necessary” Criteria for Use and Disclosure
of Health Information
HP-1.09
Subpoenas and Court Orders
HP-1.10
Client Privacy Complaints
Attachment A to HP-1.10: Privacy Complaint Form
Attachment B to HP-1.10: Complaint/Comment Log
1
HP-1.11
Workforce Privacy Training and Sanctions for Violations of Privacy
Policies
HP-1.12
Retention of Health Information and Documentation of Compliance
with HIPAA Privacy Regulations, and Appropriate Destruction of
Client Health Information
HP-1.13
Storage of Protected Health Information
HP-1.14
Disclosure of De-Identified Information
HP-1.15
Computer, E-Mail, and Internet Usage Policies (aka AP-4.05)
Section 2.00 Safety and Security
HP-2.01
Overview of Safety and Security Section
Attachment to HP-2.01: Incident Log
HP-2.02
HIPAA Security Plans
Attachment A to HP-2.02: Privacy and Security Plan
Attachment B to HP-2.02: Disaster Prevention Plan
Attachment C to HP-2.02: Disaster Recovery and Emergency
Operation Plan
Attachment D to HP-2.02: Disaster Recovery Teams
Attachment E to HP-2.02: Data Security Backup Plan/Staff Training
Plan
HP-2.03
Security – Passwords
HP-2.04
Data Classification Policy
HP-2.05
Software/Hardware Policy
HP-2.06
Policy on Workstation Use
HP-2.07
Virus Prevention Policy
HP-2.08
Access, Control, and Validation
HP-2.09
Termination Process
HP-2.10
Computer, E-Mail, and Internet Usage Policies
Attachment A to HP-2.10: Acknowledgment of Understanding
Attachment B to HP-2.10: Request for Internet Access
Section 3.00 Risk Analysis
HP-3.01
Risk Analysis
Attachment to HP-3.01: Risk Analysis Form
2
HP-1.01
HIPAA Policies and Procedures
OVERVIEW OF CONFIDENTIALITY AND PRIVACY SECTION
OF THE HIPAA POLICIES AND PROCEDURES
1. Purposes and Importance of Confidentiality
The primary purpose of the client record is to document the course of the client’s health care
treatment and to provide a medium of communication among health care professional for current and
future care of the client. In order to fulfill these purposes, significant amounts of data must be
revealed and recorded. The client must be assured that the information shared with us will remain
confidential; otherwise the client may withhold critical information, which could affect the quality of
care provided. Catholic Charities is committed to protecting the confidentiality of all client
information from unauthorized disclosure at all stages of collection, use, storage, release of
information and destruction.
2. Health Insurance Portability and Accountability Act (HIPAA)
The Health Insurance Portability and Accountability Act (HIPAA) were implemented on April 14,
2003. HIPAA’s purpose was to improve the efficiency and effectiveness of the health care system.
The law requires the adoption of security and privacy standards in order to protect personal health
information.
3. Protected Health Information (PHI)
Protected Health Information (PHI) means individually identifiable health information maintained in
any form or medium. The following are examples for Protected Health Information:
 Name
 Address
 Date of birth
 Social Security number
 Services provided
 Other personal information
 Reason for visit
 Treatment and/or medications
 Past and present health conditions
 Past treatment provided by our agency
 Past treatment elsewhere
4. Penalties for Violations of the HIPAA Law
Criminal Penalties


Fines and imprisonment for wrongful disclosure of PHI (sell PHI for money)
Penalties increase with the severity of the offense (fines up to $250,000 and/or 10 years in
prison
Civil Penalties


Fines for inadvertent violations (not for personal gain)
$100.00 per violation up to $25,000
3
5. Ownership of Records
The information, not the physical record, contained in the client record belongs to the client and the
client is entitled to have this information protected. All client information is regarded as confidential
and made available only to those authorized by the patient or his/her legal representative.
The client record is the property of Catholic Charities, is maintained to serve the client and health
care providers, and will be maintained in accordance with legal, regulatory, and accrediting agency
requirements. The record will be available at all times for client care and treatment. Any data
collection on a client, whether by interview, observation or review of documents is conducted in a
setting that provides maximum privacy and protects the information from unauthorized individuals.
6. Notice of Privacy Practices
Under HIPAA, clients served must be given a written Notice of Privacy Practices. This notice
outlines the uses and disclosures of protected health information that may be made and notifies the
clients of their rights and our legal duties with respect to protected health information.
6.1
The Notice of Privacy Practice must be given to each client upon admission, or in the event
of an emergency, the therapist will provide the notice at the first opportunity available.
6.2
Receipt of the notice will be maintained in the client’s record.
6.3
The Notice of Privacy Practice will be posted in a prominent and public location at each
facility.
6.4
Reference: Policy/Procedure on Notice of Privacy Practice.
7. Intimidating or Retaliatory Acts and Waiver of Rights Prohibited
Neither the Agency, nor any division, department, office, program facility or workforce member shall
intimidate, threaten, coerce, discriminate against or take other retaliatory action against any client for
the exercise of his/her rights or participation in any process relating to HIPAA or against any person
for filing a compliant with the Secretary of U.S. Department of Health and Human Services,
participating in a HIPAA investigation, compliance review, proceeding or hearing or engaging in
reasonable opposition to any acts or practice that the person in good faith believes to be unlawful
under HIPAA regulations as long as the action does not involve disclosure or protected health
information in violation of the regulations.
8. Prohibition on Waiver of Rights
No division, department, office, program, facility, or workforce member shall require individuals to
waive any of their rights under HIPAA as a condition for treatment.
9. Client Right to Access Protected Health Information
Clients have a right to access and obtain a copy of their protected health information and any
information in their designated record set. All client requests for access and/or copying will be
processed within 30 days of receipt of the request. Whenever access is permitted, it will be provided
in the form or format requested if it is readily producible in such format, or in a readable hard copy.
Catholic Charities may charge a reasonable fee for photocopying. (Reference: Policy/Procedure:
Client Right to Access)
9.1
Denial of Access
Access to clients protected health information may be denied where, using professional
judgment:
4





Access to the information is reasonably likely to endanger the life or physical safety
of the client or another
Access is likely to cause substantial harm to a non healthcare provider referenced in
the record
Access is likely to cause substantial harm to the client or another person
Access has a significant risk of exacerbating the client’s symptoms and would be
harmful to the client’s treatment and health. This denial may be temporary until the
client symptoms decrease and the client is stable.
Information consist of psychotherapy notes which are not accessible under HIPAA
In the case of denial of a client’s request to access his/her protected health information; the
professional denying access will inform the client in writing and will document such rationale
in the client’s record. The client, under certain circumstances, may request a denial review. A
licensed profession who was not involved in the client’s treatment would do this review.
He/she would do an objective review to determine the appropriateness of the denial of access.
Access may or may not be granted based on the independent review.
9.2
Denial of Access to Psychotherapy Notes
Catholic Charities may not disclose psychotherapy notes, except in specific situations or as
otherwise required by law. A client does not have the right to inspect or copy psychotherapy
notes. A client may not request a review of a denial of access to psychotherapy notes.
(Reference: Policy/procedure on Client’s Right to Access)
10. Client Right to Amendment of Protected Health Information
The client has a right to request an amendment of their health information maintained within the
designated record set. This request must be done in writing and it will be processed within 40 days of
receipt.
10.1
Approval of Request
If the request is approved, Catholic Charities will clearly identify the records within the
designated record set that are affected by the amendment with a clearly documented link
between the documents. The client will be informed of the acceptance of the amendment and
Catholic Charities will obtain the client’s agreement to have Catholic Charities notify such
person who may have relied on, or may likely rely in the future, on the information that is the
subject of the amendment.
10.2
Denying the Amendment
If the request to amend records is denied by Catholic Charities, the client will be notified with
the reason for denial. Denial may be due to:
 The information is accurate and complete.
 The information was not created by Catholic Charities.
 The information is not part of the designated record set.
 The information would not be available for inspection under HIPAA.
Under HIPAA the client has the right to write a statement of disagreement, which will be
included in the record. (Reference: Policy/Procedure on Client’s Right to Amend)
11. Client’s Right to Restrict Protected Health Information
5
The client has a right to request a restriction on the uses and disclosures of his/her protected health
information. Catholic Charities does not have to agree to this request and cannot agree to a restriction
relating to disclosure required under law.
11.1
Approval of Request to Restrict
If Catholic Charities agrees to the requested restriction(s), the healthcare professional must
document the agreed upon restriction and abide by the restriction unless the individual is in
need of emergency treatment, the information is need for treatment and the disclosure is to
another provider only for the purposes of such treatment. Catholic Charities must request that
the other provider agree not to further disclose the protected health information.
11.2
Denial of Request to Restrict
Catholic Charities will notify the client, in writing of any denial to restrict access.
(Reference: Policy/Procedure on Clients Right to Restrict PHI)
12. Client’s Right to an Accounting of Disclosures
The client has the right to obtain an accounting of disclosures of their protected health information by
Catholic Charities for a period of time of up to six years prior to the date of the request for such an
accounting. The request will be processed within 60 days of the actual request. The accounting will
include a listing of the:
 Date of the disclosure
 Name and address of the recipient of the information
 A general description of the information disclosed
 The purpose of the disclosure.
The first accounting in any 12-month period must be provided to the client free of charge. A
reasonable fee may be charged for additional accountings within the twelve-month period.
(Reference: Policy/Procedure: Client’s Right to an Accounting)
13. Authorization for Use or Disclosure of Protected Health Information
13.1
Mental Health Information on a Minor. A minor client, 14 years or older, may authorize the
disclosure of his/her records in the same manner as an adult.
13.2
Substance Abuse Treatment for a Minor. A minor can consent to substance abuse treatment
without the need of parental or guardians consent. As a consequence, a minor who consents
to substance abuse treatment without parental or guardian consent has the sole authority to
disclose protected health information relating to substance abuse treatment.
13.3
Authorization. An authorization must be obtained prior to using or disclosing mental
health/substance abuse/HIV related information. The authorization must contain ALL of the
following elements:

A description of the information to be used or disclosed that identifies the information in
a specific and meaningful fashion

The name of the person or class of persons to whom the information is to be released or
disclosed to.

The name of the person or class of persons who are authorized to release or disclosure the
information.

A description of the purpose of the requested use or disclosure
6

Authorization expires 90 days or an event that is time limited and does not exceed one
year and is updated during treatment plan review preceding expiration date.

Signature of the individual and date. If a personal representative, legal guardian signs the
authorization, then a description of such representative’s authority is documented.

Witness signature.

A revocation clause and a description on how the individual can revoke the authorization
(in writing)

A statement to reflect that treatment is not condition on the authorization.

Confidentiality Statement to reflect that Federal and State law protects the information.

A copy is offered to the client and documented on the authorization form.

Client’s name and date of birth or social security number

A statement that the client has the right to inspect information.
Reference: Policy/Procedure on Verification of Identity
13.4
Family Therapy Records. Information cannot be disclosed to third parties without
authorization of all individuals receiving therapy.
13.5
Minimum Necessary. When using or disclosing protected health information or when
requesting protected health information from another entity, reasonable efforts will be made
to limit the protected health information used or disclosed to the minimum necessary to
accomplish the purpose of the use/disclosure. Information released or disclosed will be
limited to only that information that is necessary to fulfill the purpose stated in the
authorization to release information. (Reference: Policy/Procedure on Minimum Necessary
Standard)
13.6
Access to Client’s Record. Access to client’s record by Catholic Charities employees is
limited to personnel who:

Are involved in the direct care of a client

Are involved in the supervision of this care

Have essential administrative functions including file maintenance, data entry, billing
or

Are responsible for the maintenance of the MIS system, and

Have signed an agreement to abide by the Agency’s confidentiality policy
Client records may also be made available to auditors without an authorization as stipulated
in State and Federal Law:

Professional Standards Review Organizations participants

Quality Management and Utilization Review committees clinical audit teams
7

Monitoring and site review from the Department of Human Services, Department of
Health, New Jersey Department of Health and Senior Services, Division of Youth
and Family Services

Authorized personnel of the Division of Youth and Family Services or other legal
child protective agency supervising care of abused or neglected children may have
access to record of those minor children wherever possible, names of clients shall be
deleted from records being reviewed.
14. Subpoenas and Court Orders
Catholic Charities will respond to subpoenas in a manner consistent with applicable state and federal
law. Protected health information shall not be released pursuant to a subpoena unless instructed to do
so in writing by counsel for the Agency. Staff shall not provide testimony in response to a subpoena
unless instructed to do so in writing by counsel for the agency.
Upon receipt of a court order, the staff member will immediately provide a copy to the Program
Director and the Division Director. The Division Director will contact counsel for the agency to
obtain advice. (Reference: Policy/Procedure Subpoena and Court Orders)
15. Complaints
Any client or other individual wishing to make a complaint concerning Catholic Charities HIPAA
policies and procedures and/or the Agency’s compliance with those policies and procedures shall be
offered a Privacy Complaint Form to document their complaint, suggestion and or other comments.
The complaints will be forwarded to the Division Director and the Director of Compliance. Catholic
Charities will review each complaint and will document appropriate corrective action. (Reference:
Policy/Procedure on Privacy Complaints)
16. Sanctions
Catholic Charities will apply and document application of appropriate corrective against staff that
fails to comply with HIPAA policies and procedures. (Reference: Policy/Procedure Human
Resources Employee Discipline)
17. Emergency Situations
In life threatening situations, pertinent protected health information may be released to health care
providers responsible for the clients care without consent of the client. The caller will be asked to
identify himself/herself, their credentials, location, and telephone number and where he/she is calling.
This assists in verifying the caller and where he/she is calling. Only the minimum necessary
information shall be released for the immediate care of the client. This release of information must be
documented in the record.
18. Public Responsibility
State and Federal law permit and/or require certain uses and disclosures of protected health
information for various purposes related to public responsibility. Such uses and disclosures may be
made without the authorization of the client. The following uses and disclosures fall into this
category:

A public health authority authorized by law to collect or receive information for the purpose
of preventing or controlling disease, conducting public health surveillance etc.

A public health or other government authority authorized by law to receive reports of child
abuse or neglect.
8

A person subject to the jurisdiction of the Food and Drug Administration (FDA) regarding
his/her responsibility for quality, safety, or effectiveness of an FDA regulated product, to
report adverse events, product defects or problems, recalls, repairs etc.

Serious threats to Health or Safety – consistent with applicable law and ethical standards,
protected health information may be used or disclosed if the licensed health professional
believes in good faith that the use or disclosure is necessary to prevent or lessen a serious and
imminent threat to another person or the public. Disclosure is limited to:
- Arranging for client to be admitted voluntarily to a psychiatric unit or facility
- Advising a local law enforcement authority of the client’s threat and the identity of the
intended victim
-Warning the intended victim of the threat, or in case of an intended victim who is under
the age of 18, warning the parent or guardian of the intended victim.
-If the client is under the age of 18 and threatens to commit suicide or bodily injury upon
himself/herself, warning the parent or guardian of the client.
-The disclosure is documented in the record.
19. Retention and Destruction of Protected Health Information
Catholic Charities will maintain all protected health information in accordance with Federal
and State Laws. Destruction of protected health information will be done in accordance with
standards of practice for record destruction. (Reference: Policy/Procedure on
Retention/Destruction of Health Information)
20. Storage of Protected Health Information
All client record and protected health information will be maintained in a secure room,
locked file cabinets or other similar secured area when not in use. Safeguards are taken to
prevent loss from fire, water, damage, theft, and any breaches of confidentiality. (Reference:
Policy/Procedure on Storage of PHI)
21. Computers, E-mail, Internet, Telephones and Fax
Password and user logins are unique to each authorized user and will be assigned by the
Information Technology Department. Passwords are maintained confidentially, are not
revealed or shared, are not coded into programs or written down where unauthorized access
could occur. Employees utilize the computer, email, Internet, and telephone system only for
the business purposes of Catholic Charities.
21.1
Computers: Password and User Login Identification are required in order to access
the computer system. Users must keep confidential all references and resource labels
of Catholic Charities’ computer system including but not limited to internal domain
names, server names, printer names, IPA addresses, and Directory services. No
employee may download software without the approval of the IT Department. All
remote access to the computer system, whether dial-up or Internet access, must use
encryption services to protect the confidentiality of the session.
9
21.2
E-mail: Catholic Charities reserves the right to review files and communications to
maintain system integrity and ensure that users are using the system appropriately,
responsibly and in accordance with Catholic Charities policies and procedures. At no
time should any protected health information of any clients be transmitted via
electronic mail outside of Catholic Charities network, unless it is encrypted. Due care
shall be used when transmitting private health information of any client by electronic
mail within Catholic Charities internal network, to prevent the transmittal and/or
receipt of such information to any staff member not authorized to have access to the
information. Staff member shall not forward to any third party outside of Catholic
Charities any email messages that contain any form of individually identifiable health
information, unless expressly authorized by the client on a signed authorization for
use/disclosure of health information form. Catholic Charities will incorporate e-mail
messages sent or received that concern the diagnosis or treatment of a client, or
payment for treatment, into the client’s chart and/or billing file and shall maintain
such information with the same degree of confidentiality as the remainder of the
client’s chart and billing file.
21.3
Telephone: All employees will use caution to protect the confidentiality of a client’s
protected health information in the course of a telephone discussion with a client or
any third party. Telephone discussions should be conducted away from people,
preferably in an office or conference room with the door closed. Whenever a
telephone call is placed to a client, a staff member shall make a reasonable attempt to
confirm that the person, with whom they are speaking, is in fact, the client, and prior
to the commencement of a discussion of any protected health information. At no time
shall any staff member leave any detailed health information in a message on any
answering machine, in a voice mail message, with an answering service or with a
family member, friend, colleague, or any other third party answering the telephone.
21.4
Internet: Any employee accessing the Internet from a Catholic Charities site is
responsible for all on-line activities which take place through the use of his/her login
and password.
21.5
Facsimile (Fax) Machines: All incoming faxes should be immediately removed from
each fax machine and placed in a folder or envelop for the intended recipient. Each
office will coordinate the assignment and programming of the fax numbers of those
healthcare providers, health plans, and other payers to whom Catholic Charities
regularly faxes the protected health information of its clients, uniformly into the
memory of each fax machine. The “speed dial” numbers shall be reserved for the
healthcare providers, health plans, or other payers. Each such programmed number
shall be tested prior to transmission of any protected health information. A directory
of these speed dial numbers shall be maintained and made available to staff members
and may be posted near each fax machine. All staff members are to use those speed
dial numbers when faxing protected health information. Should it be determined, or
suspected, at any point, that a fax transmission containing the protected health
information of one or more clients, may have been transmitted to an unintended
recipient, a telephone call shall immediately be placed, or if necessary, an additional
fax shall be sent, to make arrangements to retrieve the errant fax.
(Reference: Policy/Procedure Information Technology, Computer, E-mail, and Internet)
10
22. Privacy Officer
The Director of Compliance has been designated as the individual to be the Privacy Officer.
The Privacy Officer is responsible for the development, implementation, and maintenance of
the Agency’s policies and procedures covering the privacy of, and access to client health
information in compliance with federal and state laws.
Approved 12-03
Revised 12-04
Reviewed 6-05
11
HP-1.02
HIPAA Policies and Procedures
DISTRIBUTION OF NOTICE OF PRIVACY PRACTICES
Policy
It is the policy of Catholic Charities to provide our clients with written notice of our privacy
practices, including among other things a statement of each client’s rights as set out by the
HIPAA Privacy Regulations. The written Notice of Privacy Practices adopted by Catholic
Charities shall be distributed to each client, parent/guardian or their legal representative pursuant
to the guidelines set forth below:
1. Each client, parent/guardian and/or their legal representative shall be provided a copy of the
most current Notice of Privacy Practices at the time of their initial intake, unless
impracticable in the case of emergency treatment. In the case of emergency treatment, it shall
be the responsibility of therapist to provide this notice and take the further steps described
below, at the first opportunity available.
2. Each client, parent/guardian or their legal representative shall be asked to sign Consent for
Treatment, and an Acknowledgement of Receipt of Notice of Privacy Practices to
acknowledge that they received a copy of the Notice of Privacy Practices. If the client or legal
representative is unwilling or unable to acknowledge receipt in this way, the staff member
shall document his/her effort to obtain this acknowledgement and the refusal or the reason the
client or legal representative did not sign the acknowledgement on the Notice of Privacy
Practice form with the date and the workforce member’s signature.
3. The acknowledgement form and/or the documentation of refusal or inability to sign shall be
immediately placed in the client’s chart in the intake section. A copy of the Notice of Privacy
Practice will be given to the client/guardian/custodian.
4. The Notice of Privacy Practices shall also be posted upon on bulletin boards in client areas.
5. The Notice of Privacy Practice is also posted on the Catholic Charities, Diocese of Trenton's
website.
Approved 12-03
Revised 12-04
Approved 6-05
12
Attachment to HP-1.02
Notice of Privacy Practice - Spanish Version
Please see page 123 – 127.
Revised 12-04
Approved 6-05
13
Attachment to HP-1.02
HIPAA Policies and Procedures
Catholic Charities, Diocese of Trenton
NOTICE OF PRIVACY PRACTICES
This Notice describes how health information about you may be used and disclosed and
how you can get access to this information. This document will be explained to you during
the admission process, however, please review it carefully.
We have a legal duty to safeguard your protected health information. We will protect the
privacy of the personal health information that we maintain that identifies you, whether it deals
with the provision of health care to you or the payment for health care. We are required by law to
provide you with this Notice about our privacy practices. It explains how, when and why we may
use and disclose your health information. With some exceptions, we will avoid using or
disclosing any more of your health information than is necessary to accomplish the purpose of
the use or disclosure. We are legally required to follow the privacy practices that are described in
this Notice, which is currently in effect. (Reference: Health Insurance Portability and
Accountability Act of 1996).
However, we reserve the right to change the terms of this Notice and our privacy practices at any
time. Any changes will apply to any of your health information that we already have. Before we
make an important change to our policies, we will promptly change this Notice and post a new
Notice on the bulletin board on your unit/program. You may also request, at any time, a copy of
our Notice of Privacy Practices that is in effect at any given time, from your therapist.
We would like to take this opportunity to answer some common questions concerning our
privacy practices:
QUESTION: HOW WILL THIS ORGANIZATION USE AND DISCLOSE MY PROTECTED HEALTH
INFORMATION?
Answer: We use and disclose health information for many different reasons. For some of these
uses or disclosures, we need your specific authorization. Below, we describe the different
categories of our uses and disclosures and give you some examples of each.
1. Uses and Disclosures Relating to Treatment, Payment, or Healthcare Operations. We
may, by federal law, use and disclose your health information for the following reasons:
1.1
For Treatment. We may disclose necessary health information to other health care
providers who are involved in your care. For example, we may disclose your medical
history to a hospital if you need medical attention while at our facility or to a
residential care program we are referring you to. Reasons for such a disclosure may
be: to get them the medical history information they need to appropriately treat your
condition, to coordinate your care or to schedule necessary testing.
1.2
To Obtain Payment for Treatment. We may use and disclose necessary health
information in order to bill and collect payment for the treatment that we have
provided to you. For example, we may provide certain portions of your health
14
information to your health insurance company, Medicare or Medicaid, in order to get
paid for taking care of you.
1.3
For Health Care Operations. We may, at times, need to use and disclose your
health information to run our organization. For example, we may use your health
information to evaluate the quality of the treatment that our staff has provided to you.
We may also need to provide some of your health information to our accountants,
attorneys, and consultants in order to make sure that we’re complying with law.
2. Certain Other Uses and Disclosures are permitted by Federal Law. We may use and
disclose your health information without your authorization for the following reasons:
2.1
When a Disclosure is required by Federal, State, or Local Law, in Judicial or
Administrative Proceedings or by Law Enforcement. For example, we may
disclose your protected health information if we are ordered by a court, or if a law
requires that we report that sort of information to a government agency or law
enforcement authorities, such as in the case of a dog bite, suspected child abuse or a
gunshot wound.
2.2
For Public Health Activities. Under the law, we need to report information about
certain diseases, and about any deaths, to government agencies that collect that
information. With the possible exception of information concerning mental health
disorders and/or treatment, drug and alcohol abuse and/or treatment, and HIV status
(for which we may need your specific authorization), we are also permitted to provide
some health information to the coroner or a funeral director, if necessary, after a
client’s death.
2.3
For Health Oversight Activities. For example, we will need to provide your health
information if requested to do so by the County and/or the State, when they oversee
the program in which you receive care. We will also need to provide information to
government bodies, such as New Jersey Division of Mental Health Services, New
Jersey Department of Health and Senior Services, Division of Youth and Family
Services, etc. that have the right to inspect our offices and/or investigate healthcare
practices.
2.4
For Organ Donation. If one of our clients wished to make an eye, organ or tissue
donation after their death, we may disclose certain necessary health information to
assist the appropriate organ procurement organization.
2.5
For Research Purposes. In certain limited circumstances (for example, where
approved by an appropriate Privacy Board or Institutional Review Board under
federal law), we may be permitted to use or provide protected health information for a
research study.
2.6
To Avoid Harm. If one of our counselors, physicians, or nurses believes that it is
necessary to protect you, or to protect another person or the public as a whole, we
may provide protected health information to the police or others who may be able to
prevent or lessen the possible harm.
15
2.7
For Specific Government Functions. With the possible exception of information
concerning mental health disorders and/or treatment, drug and alcohol abuse and/or
treatment, and HIV status (for which we may need your specific authorization), we
may disclose the health information of military personnel or veterans where required
by U.S. military authorities. Similarly, we may also disclose a client’s health
information for national security purposes, such as assisting in the investigation of
suspected terrorists who may be a threat to our nation.
2.8
For Workers’ Compensation. We may provide your health information as described
under the workers’ compensation law, if your condition was the result of a workplace
injury for which you are seeking workers’ compensation.
2.9
Appointment Reminders and Health-Related Benefits or Services. Unless you tell
us that you would prefer not to receive them, we may use or disclose your
information to provide you with appointment reminders or to (give you information
about/send to you newsletters about) alternative programs and treatments that may
help you.
2.10
Fundraising Activities. For example, if our Organization program chose to raise
funds to support one or more of our programs or facilities, or some other charitable
cause or community health education program, we may use the information that we
have about you to contact you. If you do not wish to be contacted as part of any
fundraising activities, please contact your therapist.
3. Certain Uses and Disclosures Require You to Have the Opportunity to Object.
3.1
Disclosures to Family, Friends, or Others Involved in Your Care. We may
provide a limited amount of your health information to a family member, friend or
other person known to be involved in your care or in the payment for your care,
unless you tell us not to. For example, if a family member comes with you to your
appointment and you allow them to come into the treatment room with you, we may
disclose otherwise protected health information to them during the appointment,
unless you tell us not to.
3.2
Disclosures to Notify a Family Member, Friend, or Other Selected Person. When
you first started in our program, we asked that you provide us with an emergency
contact person in case something should happen to you while you are at our facilities.
Unless you tell us otherwise, we will disclose certain limited health information about
you (your general condition, location, etc.) to your emergency contact or another
available family member, should you need to be admitted to the hospital, for example.
4. Other Uses and Disclosures Require Your Prior Written Authorization. In situations
other than those categories of uses and disclosures mentioned above, or those disclosures
permitted under federal law, we will ask for your written authorization before using or
disclosing any of your protected health information. In addition, we need to ask for your
specific written authorization to disclose information concerning your mental health, drug
and alcohol abuse and/or treatment, or to disclose your HIV status. If you choose to sign an
authorization to disclose any of your health information, you can later revoke it to stop
further uses and disclosures to the extent that we haven’t already taken action relying on the
authorization, so long as it is revoked in writing.
16
QUESTION: WHAT RIGHTS DO I HAVE CONCERNING MY PROTECTED HEALTH
INFORMATION?
Answer: You have the following rights with respect to your protected health information:
1. The Right to Request Limits on Uses and Disclosures of Your Health Information. You
have the right to ask us to limit how we use and disclose your health information. We will
certainly consider your request, but you should know that we are not required to agree to it. If
we do agree to your request, we will put the limits in writing and will abide by them, except
in the case of an emergency. Please note that you are not permitted to limit the uses and
disclosures that we are required or allowed by law to make.
2. The Right to Choose How We Send Health Information to You or How We Contact
You. You have the right to ask that we contact you at an alternate address or telephone
number (for example, sending information to your work address instead of your home
address) or by alternate means (for example, by [e-mail/mail] instead of telephone). We must
agree to your request so long as we can easily do so.
3. The Right to See or to Get a Copy of Your Protected Health Information. In most cases,
you have the right to look at or get a copy of your health information that we have, but you
must make the request in writing. A request form is available from your therapist. We will
respond to you within 30 days after receiving your written request. If we do not have the
health information that you are requesting, but we know who does, we will tell you how to
get it. In certain situations, we may deny your request. If we do, we will tell you, in writing,
our reasons for the denial. In certain circumstances, you may have a right to appeal the
decision.
If you request a copy of any portion of your protected health information, we will charge you
for the copy on a per page basis, only as allowed under New Jersey state law. We need to
require that payment be made in full before we will provide the copy to you. If you agree in
advance, we may be able to provide you with a summary or an explanation of your records
instead. There will be a charge for the preparation of the summary or explanation.
4. The Right to Receive a List of Certain Disclosures of Your Health Information That We
Have Made. You have the right to get a list of certain types of disclosures that we have made
of your health information. This list would not include uses or disclosures for treatment,
payment, or healthcare operations, disclosures to you or with your written authorization, or
disclosures to your family for notification purposes or due to their involvement in your care.
This list also would not include any disclosures made for national security purposes,
disclosures to corrections or law enforcement authorities if you were in custody at the time,
or disclosures made prior to April 14, 2003. You may not request an accounting for more
than a six (6) year period.
To make such a request, we require that you do so in writing; a request form is available
upon asking your therapist. We will respond to you within 60 days of receiving your request.
The list that you may receive will include the date of the disclosure, the person or
organization that received the information (with their address, if available), a brief
description of the information disclosed, and a brief reason for the disclosure. We will
provide such a list to you at no charge; but, if you make more than one request in the same
calendar year, you will be charged $10.00 for each additional request that year.
17
5. The Right to Ask to Correct or Update Your Health Information. If you believe that
there is a mistake in your health information or that a piece of important information is
missing, you have a right to ask that we make an appropriate change to your information.
You must make the request in writing, with the reason for your request, on a request form
that is available from your therapist. We will respond within 60 days of receiving your
request. If we approve your request, we will make the change to your health information, tell
you when we have done so, and will tell others that need to know about the change.
We may deny your request if the protected health information:
 Is correct and complete
 Was not created by us
 Is not allowed to be disclosed to you
 Is not part of our records.
Our written denial will state the reasons that your request was denied and explain your right
to file a written statement of disagreement with the denial. If you do not wish to do so, you
may ask that we include a copy of your request form, and our denial form, with all future
disclosures of that health information.
6. The Right to Get a Paper Copy of This Notice. You have the right to a copy of this notice.
QUESTION: HOW DO I COMPLAIN OR ASK QUESTIONS ABOUT THIS ORGANIZATION’S
PRIVACY PRACTICES?
Answer: If you have any questions about anything discussed in this Notice or about any of our
privacy practices, or if you have any concerns or complaints, please contact the Compliance
Director at Catholic Charities of Trenton, 383 West State Street, Trenton, New Jersey 08607 or
call (609) 394-5181 extension 150. You also have the right to file a written complaint with the
Secretary of the U.S. Department of Health and Human Services. We may not take any
retaliatory action against you if you lodge any type of complaint.
QUESTION: WHEN DOES THIS NOTICE TAKE EFFECT?
Answer: This Notice takes effect on June 1, 2003.
18
STATEMENT OF ACKNOWLEDGEMENT/UNDERSTANDING
I, __________________________________ , have read, reviewed, and had explained to me my
rights regarding the use/disclosure of my Personal Health Information collected during the
therapeutic process by Catholic Charities. I have asked and have had answered any questions I
may have concerning the use/disclosure of said information. I am satisfied that I understand its
contents and significance and acknowledge receipt of a copy of these rights as established by the
HIPAA of 1996.
_________________________________________
Client Signature
______________________________
Date
_________________________________________
Parent/Guardian Signature
______________________________
Date
_________________________________________
Witness
______________________________
Date
Copy: Client
Original: Chart
Approved 12-03
Reviewed 6-05
19
HP-1.03
HIPAA Policies and Procedures
CLIENT'S REQUEST FOR ACCESS TO HEALTH INFORMATION
Policy
It is the policy of Catholic Charities to provide for an appropriate level of access to an individual
client’s own private health information maintained within a designated record set, consisting of
mental health, medical and billing records prepared by, or on behalf of, Catholic Charities. The
term “designated record set” shall exclude any records prepared and maintained by another
health care provider, unless a treating physician within Catholic Charities documents his/her
intention to incorporate such records as a part of Catholic Charities’ designated record set.
It shall be the duty of the Program Director or designee, under the direction of the Privacy
Officer, to receive and process all client requests for access pursuant to the procedure set forth
below and the federal privacy regulations adopted pursuant to the Health Insurance Portability
and Accountability Act of 1996 (“HIPAA”).
Personal Representative
A personal representative is any adult that has decision-making capacity and who is willing to
act on behalf of a patient. A personal representative would include an individual who authority,
by law or by written agreement from the individual receiving treatment, to act in the place of the
individual. This includes parents, legal guardians or properly appointed agents, like those
identified in documents like Durable Power of Attorney with a Healthcare Proxy or Standby
medical Guardian for a minor. In stances where there is any doubt that an adult is acting as a
personal representative, the healthcare practitioner in a direct treatment relationship with the
client shall obtain written documentation (i.e. Court Order, Healthcare Proxy or Standby
Medical Guardian) indicating that the adult is a personal representative of the client.
A person acting in the role of personal representative must be treated as the individual regarding
access unless:
 The individual is an un-emancipated minor, but is authorized to give lawful consent, or
may obtain the health care without consent of the personal representative, and minor has
not requested that the person be treated as a personal representative, or the personal
representative has assented to agreement of confidentiality between the provider and the
minor.
 Minors over the age of 14 can object to the release of protected health information
maintained in a community based mental health program even if the personal
representative authorizes the release of protected health information; or
 There is a reasonable basis to believe that the individual has been or may be subjected to
domestic violence, abuse or neglect by the personal representative or that treating that
person as a personal representative could endanger the individual, and, in the exercise of
professional judgment, it is determined not to be in the best interests of the individual to
treat that person as a personal representative.
20
Procedure
1. All client requests for access to the client’s own health information shall be made in writing
and signed by the client, or the client’s legal representative, on the form entitled “Client
Request to Review or Obtain Copy of Health Information.” The blank forms shall be
maintained at the record room and distributed upon request by the client’s therapist.
2. Upon receipt of the request, Program Directors or designee shall document receipt of the
request, upon the Client Request form by indicating the date received. The Client Request
form and any corresponding forms shall thereafter be maintained as a part of the client’s
chart.
3. All processing of client requests for access shall be completed within thirty (30) days of
receipt, unless the designated record set is maintained offsite. In the case of offsite records,
the processing of the request shall be completed within a total of sixty (60) days, with a
written explanation of the reason for the delay and the date by which the processing will be
completed, being sent to the client.
4. Whenever access is permitted, it shall be provided in the form requested by the client, if
readily producible in that form; if not, then it shall be provided in a readable hard copy form.
Access, if appropriate, shall be provided in the manner requested by the client, whether by
mailing a copy to the client’s stated address and/or by allowing review of the record(s) by
appointment at the record room of Catholic Charities. Prior to mailing a copy of the
requested record(s) to the client, the Program Director or designee shall compute and obtain
payment from client for all copying and postage charges permitted by law, and document the
same upon the Client Request form. If unable or unwilling to pay such charges, the client
shall be permitted to schedule an appointment to review the requested record(s) at the record
room of Catholic Charities. Program Director or designee upon the Client Request form shall
document confirmation of the grant of access and the date(s) upon which copies of the
requested record(s) were mailed and/or were reviewed by the client. In order to protect the
original medical record from defacement or destruction, the client may review the original
record only under supervision of staff. If staff cannot supervise the review of the original
medical record, then a copy of the record should be provided for the client to review.
5. In the case of any denial of a client’s request for access to his/her own health information,
Program Director or designee, under the direction of the Privacy Office, will issue the
“Notice of Denial of Client Request to Review or Obtain Copy of Health Information,”
maintaining a copy of this form in the client’s chart and documenting the mailing of this form
upon the Client Request form.
5.1
Non-reviewable grounds for denial of access under the HIPAA privacy regulations
include:

No right to access psychotherapy notes, unless part of the designated record set.

No right to access information compiled in reasonable anticipation of civil,
criminal or administrative proceedings.

No right to access information protected under the Clinical Laboratory
Improvements Amendments of 1988 or corresponding regulations.
21
5.2

The direction to deny access to an inmate, made by the correctional facility in
which the client is incarcerated.

The record(s) requested are subject to the Federal Privacy Act, 5 U.S.C. §552a.

The information requested was obtained from someone other than a health care
provider under a promise of confidentiality and access would likely reveal the
source of the information.

The client agreed to a temporary denial of access to this information by
consenting to participate in a research study in which treatment is being provided.

Catholic Charities does not maintain the requested record(s), in which case,
record room staff must tell the client where to direct his/her request, if known.
Any licensed health care professional within Catholic Charities who is involved with
the treatment and/or care of the client, may indicate the need to deny access to any
portion or all of a record within the designated record set, for any one of the reasons
set forth below, by placing in the pertinent portion of the chart a readily visible red
flag, marked with the professional’s name or initials to indicate that client access to
the record shall not be granted without the express permission of that licensed health
care professional. Such re-viewable grounds for denial of access include:

A determination has been made, using professional judgment, that access to the
information requested is reasonably likely to endanger the life or physical safety
of the client or another,

A determination has been made, using professional judgment, that access to the
information requested is reasonably likely to cause substantial harm to a nonhealthcare provider referenced within the record(s),

A determination has been made, using professional judgment, that access to the
information requested by the client’s legal representative is reasonably likely to
cause substantial harm to the client or another person, or

Based on professional judgment, the review of health information or medical
record has a significant risk of exacerbating the client’s symptoms and would be
harmful to the client’s treatment and health. This denial maybe temporary until
the client symptoms are decreased and client is stable.
6. Prior to the granting of client access to any record, Program Director or designee, shall
thoroughly inspect all requested record(s) for the placement of a [red flag] for access denial,
and shall discuss the continued validity of any such [red flags] with the treating professional.
Access to such portions of the designated record set shall not be granted without the express
authorization of the treating professional who noted the denial by placement of the [red flag]
upon the chart.
7. Written requests for review of such re-viewable denials of access are to be made by the client
by signing and dating the statement at the bottom of the Notice of Denial form, and returning
22
the form to Catholic Charities. Upon receipt of the request for a review of such a denial, the
date received shall be documented upon the original Client Request form.
8. Upon receipt of a request for review of a re-viewable denial of access, the Program Director/
Privacy Officer shall immediately designate a reviewing official who shall be a licensed
health care professional (Medical Director or designee) who did not participate in any way in
the making of the underlying access denial decision.
9. The reviewing official shall immediately be granted access to any portion of the chart and/or
other record(s) deemed necessary to make a proper assessment and determination of whether
the underlying access denial was proper. Any treating professional involved in the underlying
decision shall cooperate in the reviewing official’s investigation.
10. The designated reviewing official shall reach a prompt decision upon whether the access
denial was proper, but in any case no later than thirty (30) days from receipt of the appeal,
and shall mail a letter stating the decision to the client, providing a copy to the Catholic
Charities for its records. Upon receipt of this determination letter, the Program Director, shall
document its date upon the original Client Request form. The decision of the reviewing
official shall be binding upon Catholic Charities, and, if awarded by the reviewing official,
access shall be provided to the client in the manner requested as soon as reasonably possible.
11. Catholic Charities may not disclose psychotherapy notes, except in specific situations or as
otherwise required by law. A client does not have the right to inspect or copy psychotherapy
notes. A client may not request a review of a denial of access to psychotherapy notes.
11.1
Staff members may not disclose psychotherapy notes, except in the following
situation:
 For use by the originator of the psychotherapy notes for the purposes of treatment
 Use or disclosure by Catholic Charities for its own training programs in which
students, interns in mental health learn under supervision to practice or improve
their skills in group, join, family or individual counseling.
 Use or disclosure by Catholic Charities to defend itself in a legal action or other
proceeding brought by the client
 Use and disclosure required by law
 Use and disclosure to health oversight agency for oversight activities authorized
by law, including audits.
 Uses or disclosures to avert a serious threat to health or safety (duty to warn)
12. Copy Fees. (N.J.A.C.42G-15.3)
12.1
The fee copying for records shall not exceed $1.00 per page or $100.00 per record for
the first 100 pages. For records, which contain more than 100 pages, a copying fee of
no more than 25 cents per page may be charged for pages in excess of the first 100
pages up to a maximum of $200.00 for the entire records.
12.2
In addition to per page cost, the following charges may be permitted:
 A search fee of no more than $10.00 per patient per request; and
 A postage charge of actual cost for mailing, not to exceed cost of mailing, not to
exceed $5.00
23
12.2
No other charges shall be assessed other than those permitted in 12.1 and 12.2 above.
Approved 12-03
Revised 12-04
Reviewed 6-05
24
Attachment A to HP-1.03
HIPAA Policies and Procedures
Catholic Charities, Diocese of Trenton
CLIENT REQUEST TO REVIEW OR OBTAIN COPY OF HEALTH INFORMATION
Please complete the following information, printing clearly:
Your Name:
_______________________ Date of Birth: ____________
(first)
(middle)
(last)
Address:
(street)
Telephone:
_______________________________________
(state) (zip code)
(city)
_______________ Name of Your Case Manager/Counselor:
Which of the following are you requesting? (Please check all that apply.)
 Healthcare/Treatment Records
 Billing Information
 Other:
__________
____________
Purpose: ______________________________________________________________________
Please describe the information that you wish to look at or get a copy of, including the date(s) of
the information (date of visit, treatment, or other health care service):
__________________________________________
__________________________________________
If you would like a copy of these records, you will need to pay for copying and postage, as
allowed by law. Payment will be required prior to the copy being made and sent to you. If
you do not wish to pay for a copy of the records, you may make an appointment to come in
to look at these record(s) at our records department office. Please note that we need at least
five (5) full business days to get these records together for you.
Please check at least one of the following:
 I would like you to send these records to me.
 I would like to make an appointment to look at these records at this office.
Signature (of Client or Legal Representative): _________________________Date:
For Office Use Only
Date Request Received
 Access Granted
Cost: $
 Record(s) Mailed on
 Record(s) Reviewed by Client on
Payment Received 
 Denial Notice Mailed on
 Request for Review Received on
 Review Decision Mailed on
25
___
Attachment B to HP-1.03
HIPAA Policies and Procedures
Catholic Charities, Diocese of Trenton
NOTICE OF DENIAL OF CLIENT REQUEST TO REVIEW
OR OBTAIN COPY OF HEALTH INFORMATION
We have received your Request to Review or Obtain a Copy of Health Information dated
___________________. There are certain reasons set forth under federal law that allow us to
deny your request. We must deny your request for access for the reason(s) that we have checked
off below:
 1. You do not have a right to access psychotherapy notes.
 2. You do not have a right to access information created or put together in reasonable
anticipation of civil, criminal, or administrative proceedings.
 3. You do not have a right to access information, which is protected under the Clinical
Laboratory Improvements Amendments of 1988, or corresponding regulations.
 4. We have been directed by the correctional facility in which you are an inmate to deny your
request.
 5. The record(s) requested are subject to the federal Privacy Act, 5 U.S.C. §552a.
 6. The information requested was obtained from someone other than a health care provider
under a promise of confidentiality and access is not permitted in that it would likely reveal
the source of the information.
 7. Your psychiatrist/psychologist/a licensed healthcare professional involved in your
treatment/care] has determined, in his/her professional judgment, that access to the
information requested is reasonably likely to endanger the life or physical safety of the client
or another person, to cause substantial harm to a non-healthcare provider noted within the
record(s), or, if requested by the client’s personal representative, to cause substantial harm to
the client or another person.
 8. This facility does not maintain the requested record(s) within its designated record set.
You must direct your request to:
 9. You previously agreed to a temporary denial of access to this information when you
consented to participate in the research study in which you are receiving treatment.
*If the reason that that we have denied you access to these records is the reason listed as number
seven (7) above, you have a right to appeal this decision to a reviewing official, who must, by
law, be a licensed healthcare professional who did not participate in the underlying decision. To
request such a review of the decision, please indicate this below and sign and return a copy of
this document to this organization within ten (10) days of the date of this Notice. Please note
that you have the right to lodge a complaint with this office by contacting the Privacy Officer at
26
609-394-5181, extension 150, or complaints may be lodged with the Secretary of the U.S.
Department of Health and Human Services.
Catholic Charities, Diocese of Trenton
By:
Date:
Request for Appeal (only applicable for reason number seven (7) above)
 I am requesting an appeal of the denial of access.
Signature of Client of Personal Representative _____________________________________
Date: ____________________________
27
HP-1.04
HIPAA Policies and Procedures
DESIGNATED RECORD SET
Policy
To ensure consistency of client information, all Catholic Charities programs will maintain client
related information in a similar chart format. The designated record set, which is different from
the chart format, consists of mental health, medical and billing records prepared by, or on behalf
of, Catholic Charities. The term “designated record set” shall exclude any records, prepared and
maintained by another health care provider, unless a treating licensed health care professional of
Catholic Charities documents his/her intention to incorporate such records as part of the Catholic
Charities’ designated record set.
Procedure
The designated record set will consist of the following documents:
1. INITIAL INFORMATION
1.1
Client Rights and Responsibilities/Grievance Policy
1.2
Notice of Privacy Practice
1.3
Authorization to Release Information
1.4
Information sheets requiring client signature
1.5
Fee agreement
1.6
Medical and income documentation
2. ASSESSMENT AND SERVICE PLANNING
2.1
Discharge form (if closed case)
2.2
Service Plans (updates and reviews)
2.3
Comprehensive Service Plan
2.4
Other Assessment Material
2.5
Intake Assessment
3. MEDICAL/PSYCHIATRIC/NURSING
3.1. Medication log sheets
3.2
Psychiatric evaluations and monitoring
3.3
Psychiatric evaluation/diagnostic
3.4
Medical/Nursing assessment (where required)
3.5
Laboratory work related to psychotropic medications
3.6
Medical history self report questionnaire
4. SERVICE DOCUMENTATION
4.1
Progress notes
4.2
Contact reports
6. PROGRAM SPECIFIC INFORMATION
6.1
Vocational
6.2
Financial
28
6.3
6.4
6.5
Personal care
Homework assignments
Program specifics (Please define)
Note: Correspondence is NOT part of the designated record set.
Note: The chart format (Attachment A to CP-2.02) is similar to the above but includes the
Correspondence Section which would be information created by outside agencies, court orders,
subpoenas, and other correspondence.
Approved 12-03
Reviewed 6-05
29
HP-1.05
HIPAA Policies and Procedures
CLIENT'S REQUEST TO AMEND HEALTH INFORMATION
Policy
It is the policy of Catholic Charities to guarantee the right of our clients to request an amendment
of their health information maintained within the designated record set by Catholic Charities,
pursuant to the requirements of the HIPAA Privacy Regulations. Copies of all written requests
for amendment of health information and any corresponding documentation shall be maintained
within the client’s chart.
It shall be the duty of the Program Director or designee, under the direction of the Privacy
Officer to process all client requests for amendment of that client’s health information pursuant
to the procedure set forth below and the federal privacy regulations adopted pursuant to the
Health Insurance Portability and Accountability Act of 1996 (“HIPAA”).
Procedure
1. A client’s request for amendment shall be made in writing on the Client Request to Amend
Health Information form. Blank copies of which are to be maintained in the record room.
Forms must be filled out completely, and signed by the client or the client’s legal
representative.
2. Upon receipt of the Request to Amend, the recipient of the request form shall document the
date of its receipt upon the request form and immediately forward the request form to the
Program Director or Designee for processing.
3. Within 10 days after receipt of the request, the Program Director or designee shall
acknowledge in writing such a request.
4. All Requests to Amend shall be processed, with action being taken (whether that action is a
grant or denial of access) and the response being sent to the client or legal representative,
within forty (40) days of the date of the Catholic Charities receipt of the Request, absent
extenuating circumstances. Under extenuating circumstances only, the Program Director or
designee and/or Privacy Officer may extend this deadline by no more than an additional
fifteen (15) days, so long as a letter explaining the reason for the delay and the date that the
requestor can expect the response to the request.
5. Upon receiving the Request, the Program Director or designee and/or Privacy Officer shall,
wherever possible, discuss the Request to Amend with those members of the Catholic
Charities staff who were originators of the particular health information at issue, for purposes
of determining whether the information was complete and accurate as documented.
6. Wherever amendment is granted, in whole or in part, the Program Director or designee
and/or Privacy Officer, or the originator of the health information at the request of the
Program Director, shall make the appropriate amendment to the client’s chart or billing
30
record. The amendment shall clearly identify the records in the designated record set that are
affected by the amendment, with a clearly documented link being provided to the location of
the amendment within the chart or billing record. The date upon which the amendment was
made shall be documented upon the Request for Amendment form.
7. Immediately upon amending the record, the Program Director or designee and/or the Privacy
Officer shall notify the client for the following purposes:
 To inform the client that the action has been taken;
 To ask the client to identify any persons who had previously received the health
information that is the subject of the amendment, and who may need the amendment; and
 To obtain the client’s agreement to have Catholic Charities notify such persons who may
have relied, or may likely rely in the future, on the information that is the subject of the
amendment.
The date of the notification of the client shall be documented upon the Request for
Amendment form.
8. The Program Director or designee and/or Privacy Officer shall take all reasonable steps to
provide the amendment in writing to the following persons, within a reasonable time under
the circumstances of the amendment:
 All persons identified by the client as having received health information about the client
and as needing the amendment; and
 All persons, including business associates, known to have the information at issue that
may have relied, or may likely rely in the future, on the original information, to the
detriment of the client.
The names and addresses of all persons other than the client who have been provided with
the amendment shall be documented on the reverse side of the Request for Amendment form
(or an attached sheet, if necessary), along with each date of notification.
9. Grounds for denial of a request for amendment under the HIPAA privacy regulations
include:
 The information is accurate and complete.
 The information was not created by Catholic Charities. (Should the client provide a
reasonable basis to believe that the originator of the health information is no longer
available to act upon a request to amend, the request should be granted if there are no
other applicable grounds for denial.)
 The information is not part of the Catholic Charities designated record set.
 The information would not be available for inspection under the HIPAA Privacy
Regulations, as explained in more detail in Catholic Charities Policy and Procedure for
Client Requests for Access to Health Information.
In the case of any denial of a client’s request for amendment, the Program Director or
designee and/or Privacy Officer shall complete and mail to the client the form entitled
“Notice of Denial of Client Request to Amend Health Information,” maintaining a copy of
this form in the client’s chart and documenting the date of the mailing of this form upon the
Request for Amendment form.
10. The Program Director or designee and/or Privacy Officer shall accept any written statement
of disagreement that is submitted by the client whose request for amendment was denied, so
31
long as that statement of disagreement does not exceed one side of an 8½ x 11 inch piece of
paper. A copy of any such statement of disagreement should be immediately forwarded to
each staff member who was an originator of the health information at issue in the request for
amendment.
In the alternative, the client may request that Catholic Charities provide a copy of the client’s
Request to Amend Health Information and the denial form with any future disclosures of the
health information requested to be amended. All such requests shall be honored. Whether or
not an express request has been made to do this, the client’s Request to Amend Health
Information and the denial form shall become part of the designated record set and shall be
included whenever the health information at issue in the Request for Amendment is
disclosed.
11. The Program Director or designee and/or Privacy Officer shall work with any staff member
who was an originator of the health information at issue in the request for amendment, in the
preparation of an appropriate rebuttal statement on behalf of Catholic Charities, to be made a
part of the chart or billing record, along with the client’s statement of disagreement. Upon
incorporating the rebuttal statement into the chart or billing record, a copy of the rebuttal
statement shall immediately be mailed to the client by the Program Director or
designee/Privacy Officer, and the dates of such actions shall be documented upon the
Request for Amendment form.
12. Copies of the client’s Request to Amend Health Information form and all corresponding
documentation concerning the grant or denial of the request, including any denial form, any
statement of disagreement and any rebuttal statement, shall be maintained within the client’s
chart. Where no amendment was made, each portion of the chart or billing record at issue as
the result of the Request to Amend shall be marked [with the phrase “Client Request for
Amendment” in the margin] to link the information to the portion of the designated record set
containing the request form, denial form, statement of disagreement and/or rebuttal form.
13. Should Catholic Charities be informed of an amendment to a client’s health information by
another health care provider, health plan or healthcare clearinghouse, the Program Director,
or designee/Privacy Officer shall ensure that the amendment is appropriately incorporated
into Catholic Charities designated record set.
Approved 12-03
Reviewed 6-05
32
Attachment A to HP-1.05
HIPAA Policies and Procedures
Catholic Charities, Diocese of Trenton
CLIENT REQUEST TO AMEND HEALTH INFORMATION
Please complete the following information, printing clearly:
Client Name:
Date of Birth:
(last)
(first)
(middle)
Address:
(street)
Telephone:
(city)
(state) (zip code)
Name of Your Counselor/Case Manager:
What health information or record are you requesting to be amended? (Please include the date of
each record.)
Please state the reason for your request:
Please explain exactly how you would like to see the record amended (continue on reverse side if
necessary):
Signature of Client or Legal Representative ___________________________Date:
For Office Use Only
Date Request to Amend Received
 Amendment Granted: Date of Amendment
Date of Notice
 Denial Notice Mailed on
 Statement of Disagreement:
Date Received:
Date Added to Record:
 Request to Attach Request & Denial
Date Requested:
Date Added to Record:
 Rebuttal Statement: Date Added to Record:
33
Attachment B to HP-1.05
HIPAA Policies and Procedures
Catholic Charities, Diocese of Trenton
NOTICE OF DENIAL OF CLIENT REQUEST TO AMEND HEALTH INFORMATION
To:
(name of client)
We have received your Request to Amend Health Information form, dated ________________.
There are certain reasons set forth under federal law, which allows us to deny your request. We
are denying your request to amend your health information or record for the reason(s) that we
have checked off below:
 1. The information is accurate and complete.
 2. The information was not created by Catholic Charities, Diocese of Trenton.
 3. The information is not part of our designated record set.
 4. The information would not be available for your inspection under the HIPAA Privacy
Regulations.
You have the right to submit a written statement of disagreement about this decision. This
statement may not be any longer than one side of an 8½ x 11 inch piece of paper, and must be
sent or delivered to the Program Director/Privacy Officer of Catholic Charities within thirty (30)
days of the date of this letter. If you choose not to submit such a statement of disagreement, you
may request that we provide a copy of your Request to Amend Health Information and this
denial form with any future disclosures of the information that you requested to be amended. All
such requests should be directed to the Program Director/Privacy Officer. Please note that you
have the right to lodge a complaint with this office by contacting the Privacy Officer, at 609-3945181, extension 150 or complaints may be lodged with the Secretary of the U.S. Department of
Health and Human Services.
Catholic Charities, Diocese of Trenton
By: ____________________________________
34
Date ______________________
HP-1.06
HIPAA Policies and Procedures
CLIENT REQUESTS FOR RESTRICTION OF USES/DISCLOSURES OF PRIVATE
HEALTH INFORMATION AND/OR CONFIDENTIAL COMMUNICATIONS
Policy
It is the policy of Catholic Charities to provide our clients with a process by which they may
request the restriction of uses and disclosures of their private health information for purposes of
treatment, payment and health care operations, as well as the restriction of any disclosures that
may be otherwise permitted for purposes of providing limited information to family or others
involved in the client’s care or for notification purposes, in accordance with the HIPAA Privacy
Regulations. Catholic Charities will consider all such requests, although Catholic Charities is in
no way mandated by the federal HIPAA Privacy Regulations to agree to any such requests.
It is also the policy of Catholic Charities to accommodate reasonable requests by clients to
receive communications of private health information from Catholic Charities by alternative
means or at an alternative location, without explanation from the client as to the reason.
It shall be the duty of the Program Director/ Privacy Officer to review, make a determination as
to disposition of, and to respond to all such client requests, under the guidelines set forth below:
1. Any client or other individual wishing to make such a request shall do so in writing, upon a
Client Request Form for Restriction of Uses/Disclosures of Private Health Information or for
Confidential Communications (“Request Form”). Blank Request Forms shall be maintained
at the record room and shall be provided to any client (or any legal representative) that
indicates a desire to request any such restriction or to request confidential communications.
2. Upon receipt of a Request Form, the recipient of the form shall document the date of its
receipt upon it and immediately forward it to the Program Director/Privacy Officer.
3. All Request Forms shall be immediately reviewed by the Program Director/Privacy Officer.
A response shall be made by Catholic Charities to any such request as soon as reasonably
possible, but, in any event, no later than ten (10) days of the date of the Catholic Charities
receipt of the Request Form. The date the response is provided to the client shall be
documented by the Privacy Officer upon the Request Form.
4. Copies of all Request Forms shall be maintained by Catholic Charities.
5. The ultimate disposition of the request shall be documented by the Program Director/Privacy
Officer upon the Request Form, with any restrictions clearly documented both on the Request
Form and in the client’s chart, where appropriate.
6. If such a request is granted, Catholic Charities shall not use nor disclose the applicable health
information in violation of the restriction, unless the information is necessary to treat the
client in an emergency. If the information is disclosed to another healthcare provider under
such emergency circumstances, the staff member making the disclosure shall request that that
healthcare provider not further uses nor discloses the information. The disclosure, the nature
of the disclosure, the name of the person and agency to whom the disclosure was made, the
35
information disclosed, the staff member’s name, title, and date of disclosure must be
documented in the record.
7. Notwithstanding any granted request for a restriction of uses or disclosures, Catholic
Charities is permitted to disclose the information:
 To the client, or the client’s legal representative, where permitted under an approved
request for access; or
 To an appropriate party under any of the provisions of Section 164.512 of the HIPAA
Privacy Regulations (45 C.F.R. §164.512), concerning permitted uses and disclosures for
which a consent, an authorization, or opportunity to agree or object, is not required.
8. To terminate any restriction that has been granted, Catholic Charities shall do at least one of
the following:
 Obtain the written agreement of the client, or the client’s legal representative;
 Obtain the verbal agreement of the client, or the client’s legal representative, and
document that verbal agreement in the client’s chart; or
 Inform the client, or the client’s legal representative, that Catholic Charities is
terminating its agreement to the restriction with regard only to health information created
or received after the date upon which the client or his/her legal representative is informed
of the termination.
The date and manner of such a termination of restriction shall be documented upon the
Request Form.
9. At no time shall the Program Director/Privacy Officer, or any other staff member receiving a
request to receive confidential communications by an alternative means or at an alternative
location, require an explanation from the client as to the basis for the request as a condition
of providing such communications on a confidential basis.
10. No request to receive confidential communications by an alternative means or at an
alternative location shall be granted without the client providing both of the following:
 The client’s specification of an alternative address or other method of contact; and
 Information as to how payment will be handled, if appropriate.
11. All granted requests for confidential communications shall be documented clearly within the
front section of the client’s chart and the front section of the client’s billing file.
Approved 12-03
Reviewed 6-05
36
Attachment to HP-1.06
HIPAA Policies and Procedures
Catholic Charities, Diocese of Trenton
CLIENT REQUEST FOR RESTRICTION OF USES/DISCLOSURES OF PRIVATE
HEALTH INFORMATION OR FOR CONFIDENTIAL COMMUNICATIONS FORM
Please complete the following information, printing clearly:
Client Name:
Date of Birth:
(last)
(first)
(middle)
Address:
(street)
Telephone:
(city)
(state) (zip code)
Name of Your Counselor/Case Manager:
 I am requesting that Catholic Charities restrict the use or disclosure of my private health
information in the following way:
________________________________________________________________________
(Please note that Catholic Charities has no obligation to grant this request.)
 I am requesting that Catholic Charities only contact me by the following alternative means or
at the following alternative location:
________________________________________________________________________
Signature of Client or Legal Representative ___________________________Date:
If you are the legal representative of the client, please check off the basis for your authority:
 Power of Attorney (attach copy)
 Guardianship Order (attach copy)
 Parent of Minor
 Other_______________________
Date Received:
By:
FOR OFFICE USE ONLY
Date and Manner Client Informed of Decision:
Disposition:
 Restriction terminated? Date and Manner of Termination:
37
By:
HP-1.07
HIPAA Policies and Procedures
CLIENT'S REQUEST FOR ACCOUNTINGS OF DISCLOSURES
OF HEALTH INFORMATION
Policy
It is the policy of Catholic Charities to guarantee the right of our clients to obtain an accounting
of disclosures of their health information, by Catholic Charities and/or Catholic Charities
business associates, pursuant to the requirements of the HIPAA Privacy Regulations. In order to
be able to account for disclosures under these regulations, it is the policy of Catholic Charities
that staff members document within the client’s chart [upon the Disclosure Sheet] the following
information about each disclosure of health information: (a) the date of the disclosure, (b) the
name and address of the recipient of the information, (c) a brief description of the information
disclosed, and (d) the general purpose of the disclosure of health information. Copies of all
authorizations and/or other written requests for disclosures shall be maintained within the client’s
chart. Documentation of the following types of disclosures is not required:

Disclosures to carry out treatment, payment, and/or health care operations of the
Organization;

Disclosures of health information to the client or to the client’s legal representative;

Disclosures made pursuant to an Authorization signed by the client or the client’s legal
representative;

Disclosures permitted under the HIPAA Privacy Regulations to be made to family
members or other persons involved in the client’s care (and/or payment for care) and/or
to family members or other persons for notification purposes;

Disclosures for national security or government intelligence purposes;

Disclosures to correctional institutions and/or law enforcement officials, where the client,
at the time, was in custody;

Disclosures occurring prior to April 14, 2003.
It shall be the duty of Program Director or designee under the direction of the Privacy Officer to
process all client requests for accountings of disclosures of that client’s health information, and
to prepare a complete accounting under the HIPAA Privacy Regulations and the guidelines set
forth below:
1. A client’s request for an accounting shall be made in writing on the Client Request
Accounting of Disclosures form, blank copies of which are to be maintained in the record
room. Forms must be filled out completely, and signed by the client or the client’s legal
representative.
2. A client does not have the right to receive an accounting of any disclosures made prior to
April 14, 2003, or made more than six (6) years prior to the date of the Request.
38
3. Upon receipt of the request, the recipient of the request shall document the date of its receipt
upon the request form and immediately forward the request to Program Director or designee
and the Privacy Officer.
4. Each Request for Accounting shall be processed, with an accounting being prepared and sent
to the client or legal representative, within sixty (60) days of the date of Catholic Charities
receipt of the request, absent extenuating circumstances. Under extenuating circumstances
only, the Program Director/Privacy Officer may extend this deadline by no more than an
additional thirty (30) days, so long as a letter explaining the reason for the delay and the date
that the requestor can expect the accounting to be completed, is sent to the requestor prior to
the expiration of the usual sixty (60) day deadline.
5. Each client has the right to one accounting within each calendar year, free of charge. The
cost of each additional accounting for that client within the same calendar year, shall be
$10.00, which is based upon the cost of preparing such an accounting. Whenever this charge
is applicable to a Request for Accounting, the requestor shall be notified of this charge in
writing, and no such request shall be processed further until payment has been made.
Documentation of this notification of the charge shall be made upon the request form.
6. Upon receiving the request, the Program Director or designee shall review the client’s chart
for documentation of disclosures (other than the types described above) for which an
accounting may be prepared. The Program Director or designee shall contact each business
associate to whom protected health information of the client has been disclosed; a list of all
disclosures made during the relevant period (other than the types described above) by each
such business associate shall be obtained from that business associate.
A written accounting shall be prepared for the client or the client’s legal representative listing
the following information about each disclosure of health information by Catholic Charities
and/or its business associates: (a) the date, (b) the name and address of the recipient of the
information, (c) a general description of the information disclosed, and (d) the general
purpose of the disclosure.
7. Copies of the client’s Request for Accounting and the written accounting shall be maintained
within the client’s chart.
Approved 12-03
Reviewed 6-05
39
Attachment A to HP-1.07
HIPAA Policies and Procedures
Catholic Charities, Diocese of Trenton
DISCLOSURE SHEET
Client Name:
Date of
Disclosure
Social Security Number:
Name and address of
recipient of information
Brief description of
information disclosed
40
Purpose of disclosure
Staff
Initials
Attachment B to HP-1.07
HIPAA Policies and Procedures
RECORDS RELEASE AUTHORIZATION
Client Name:_____________________ Date of Birth:_____________ SS#:_______________
I, ________________________________________________________, hereby authorize
______________________________________________________________________________
(Name)
(Organization)
______________________________________________________________________________
(Street Address)
(City/State)
(Zip Code)
To Obtain: _____ Release: _____ the following information (Please check all that apply):
___Medical History
___Treatment Plans
___Summary of Treatment/Progress
___Psychiatric History ___Medication History
___Attendance and Cooperation
___Laboratory Tests
___Psychiatric Evaluation
___Student Evaluation/Records
___Psychological Tests ___Social Work Assessment
___HIV/AIDS
___Admission Record
___Service History
___Other: ___________________
___Diagnosis
This information is to be released to: _______________________________________________
Obtained from:_________________________________________________________________
Person Name: __________________________________________________________________
Organization: __________________________________________________________________
Street Address: ________________________________________________________________
City, State, Zip Code: ___________________________________________________________
The purpose or need for such disclosure is: ___________________________________________
______________________________________________________________________________
This information may be given (indicate frequency):____________________________________
This authorization expires (specify one option):
in 90 days ________________ If selected, this date will not exceed 1 year & will be
(specify date)
updated at service plan review preceding expiration date.
____________________________ (specify event or condition)
I understand I have the right to revoke this authorization at any time. I may not revoke it to the
extent that action has been taken in reliance thereon. In order to revoke this authorization, I
understand I must revoke it in writing to Catholic Charities. Catholic Charities has forms to use
if you wish to revoke this authorization before it expires.
I understand that Catholic Charities may not require that I sign this authorization in order to
obtain treatment, and that with certain limited exceptions I have the right to inspect the
information disclosed subject to provision NJAC 10.37-6.79,4ii, respecting client access to
records.
I understand that information used or disclosed under this authorization could potentially be redisclosed by the person receiving the information and may no longer be subject to the privacy
protections provided to me by law. I understand that my records may be protected under the
41
federal regulations governing Confidentiality of Alcohol and Drug Abuse Client Records (42
CFR, Part 2).
I have read this authorization, or had it explained to me and understand its contents:
___________________________________________________________ _________________
Signature of Patient or Person Authorized by Law to Give Consent
Date
___________________________________________________________ _________________
Signature of Witness
Date
If you are the legal representative of the person listed above, please check the basis of your
authority:
__Power of attorney (attach copy)
___Parent of minor
__Guardianship order (attach copy)
___Other: ______________________________
Additional witness signature for verbal consent: ________________________ _____________
Signature
Date
COPY OFFERED: __________Accepted _________Rejected
Approved 12-03
Revised 12-04
Approved 6-05
42
HP-1.08
HIPAA Policies and Procedures
APPLICATION OF "MINIMUM NECESSARY" CRITERIA FOR USE AND
DISCLOSURE OF HEALTH INFORMATION
Policy
It is the policy of Catholic Charities to ensure that its staff members only request, use and/or
disclose the minimum amount of a client’s individually identifiable health information that is
necessary to achieve the intended purpose of the permitted use or disclosure. This Policy does
not apply to:



Disclosures to, or requests or use by, a health care provider for purposes of treatment;
Disclosures to the client, the client’s legal representative, or anyone designated to receive
such information in an Authorization form signed by the client or the client’s legal
representative; or
Disclosures required to be made to the Secretary of the Department of Health and Human
Services or its agent.
1. For all other requests, uses and/or disclosures of individually identifiable health information
by any member of Catholic Charities staff, the following criteria shall be applied prior to
making such a request, use or disclosure:

There must be a determination that the information to be used or disclosed does not
include any information beyond that which is specifically requested, in terms of scope of
time, type of information, etc.;

There must be a determination that the information to be requested, used or disclosed
does not include any information beyond what a reasonable person would believe is
needed for the stated purpose; and

There must be a determination that the amount and type of information to be requested,
used or disclosed cannot be reduced or limited any further without adversely affecting the
ability to use the information for its stated purpose.
2. Each member of Catholic Charities staff may only access the minimum information that is
necessary to perform that workforce member’s particular job functions, as defined in his/her
job description.
3. At no time shall any staff member review any portion of any client’s chart or billing
information that is not required by his/her specific job duties.
Reviewed 12-4
Approved 12-03
Reviewed 6-05
43
HP-1.09
HIPAA Policies and Procedures
SUBPOENAS AND COURT ORDERS
Policy
Catholic Charities will respond to subpoenas and court orders in a manner consistent with State
and Federal law.
Subpoena Procedure
Protected health information shall not be released pursuant to a subpoena unless instructed to do
so by counsel for the agency. Staff shall not provide testimony in response to a subpoena unless
instructed to do so my counsel of the agency.
1. Upon receipt of a subpoena, the staff member will immediately notify his immediate
supervisor/Program Director
2. The Program Director will notify the Division Director immediately and/or Director of
Behavioral Health Services after Division Director.
3. The Division Director shall contact legal counsel for advice.
Note: If there is any disclosure in response to the subpoena, the Program Director shall
document this disclosure on the subpoena or attach the cover letter maintained in the client’s
record.
Court Order Procedure
1. Upon receipt of a court order, the staff member shall immediately provide a copy to the
Program Director and Division Director.
2. The Division Director shall contact Legal Counsel for advice.
3. The Program Director shall disclose only the protected health information expressly
requested in the court order, unless advised to the contrary. The Program Director shall
document this disclosure in the cover letter or document on the court order in the client’s
record.
Revised 12-04
Approved 12-03
Revised 12-04
Approved 6-05
44
HP-1.10
HIPAA Policies and Procedures
CLIENT PRIVACY COMPLAINTS
Policy
It is the policy of Catholic Charities to provide our clients with a process by which they may
complain and/or make suggestions or other comments about our privacy policies and procedures
and our compliance with the requirements of the HIPAA Privacy Regulations.
Catholic Charities will in no way discriminate against, or take any form of retaliatory action
against, any individual for exercising his/her right to file a complaint pursuant to this process, for
exercising any other right described in the HIPAA Privacy Regulations, for filing a complaint
with the Secretary of the U.S. Department of Health and Human Services, or for assisting in any
way with any investigation, compliance review, proceeding or hearing under the HIPAA Privacy
Regulations.
Catholic Charities will never require any individual to waive his/her right to file a complaint
pursuant to this process, or any other right described in the HIPAA Privacy Regulations, as a
condition for treatment.
It shall be the duty of Privacy Officer to receive and to process all client complaints, and to
respond to clients’ requests for information about Catholic Charities privacy practices, under the
guidelines set forth below:
1. Any client or other individual wishing to make a complaint shall, whenever possible, be
offered a Privacy Complaint Form upon which their complaint, suggestions and/or other
comments may be fully explained. Blank Privacy Complaint Forms shall be maintained at
the record room.
2. Each privacy complaint made verbally shall be documented by the Privacy Officer on a blank
Privacy Complaint Form/in a Complaint Log. Such documentation shall include: the date the
complaint was made; the name of the complainant; whether the complainant was a client,
legal representative, a client’s family member, or an unrelated person; a description of the
discussion in which the complaint was voiced; any suggestions made by the complainant;
and the name of the staff member receiving the complaint.
3. Upon receipt of a Privacy Complaint Form, the recipient of the complaint shall document the
date of its receipt upon the complaint form and immediately forward the complaint form to
Privacy Officer.
4. All complaints, whether written or oral, shall be immediately reviewed by Privacy Officer. A
response shall be made by Catholic Charities to any privacy complaint within thirty (30) days
of the date of Catholic Charities receipt of the complaint, absent extenuating circumstances.
Under extenuating circumstances, the Privacy Officer may extend this deadline as necessary,
so long as a letter explaining the reason for the delay and the date that the complainant can
expect a disposition on the complaint, is sent to the complainant prior to the expiration of the
45
thirty (30) day deadline. The date the response is sent shall be documented by Privacy
Officer upon the Privacy Complaint Form.
5. Copies of all written Privacy Complaint Forms shall be maintained by Catholic Charities.
6. The ultimate disposition of the complaint shall be documented by the Privacy Officer upon
the Privacy Complaint Form, whenever a complaint form exists. Whenever a verbal
complaint is received and documented in the Complaint Log, the ultimate disposition of the
complaint, as well as the date of the response, shall also be documented within the Complaint
Log.
7. Client complaints about privacy issues shall not be documented within the client’s
chart.
8. All requests for information about Catholic Charities privacy practices, shall be
responded to by Privacy Officer as soon as reasonably possible, but, in any event, no
later than ten (10) days from the date of the request.
Reviewed 12-04
Approved 12-03
Reviewed 6-05
46
Attachment A to HP-1.10
HIPAA Policies and Procedures
Catholic Charities, Diocese of Trenton
Address:
PRIVACY COMPLAINT FORM
Name:
_________
Telephone:
Mailing Address:
City/State/Zip Code:
Are you a client of Catholic Charities?
 Yes  No
If you answered “No", what is your relationship to Catholic Charities (family member of
client, legal representative of client, etc.)?
Please explain your complaint about our privacy practices, providing details as appropriate
(continue on reverse side, if necessary):
Please provide us with any suggestions as to how we may improve our privacy practices:
Signature: ____________________________________________ Date: _____________
Date Received:
By:
Disposition:
FOR OFFICE USE ONLY
Date Response Sent:
47
Attachment A to HP-1.10
HIPAA Policies and Procedures
Catholic Charities, Diocese of Trenton
COMPLAINT/COMMENT LOG
Date
Name of
Complainants
Relationship to
Client
Nature of the Complaint
48
Suggestions to
Improve
Staff
Member
Receiving
Complaint
Disposition
HP-1.11
HIPAA Policies and Procedures
WORKFORCE PRIVACY TRAINING AND SANCTIONS
FOR VIOLATIONS OF PRIVACY POLICIES
Policy
It is the policy of Catholic Charities to safeguard the private health information of its clients by
imposing appropriate sanctions for any breaches of confidentiality, or violations of Catholic
Charities information privacy policies, committed by any member of Catholic Charities
workforce. This policy shall apply to all employees, volunteers, and any other persons
designated as members of Catholic Charities workforce, whether or not receiving payment from
Catholic Charities.
Catholic Charities shall mitigate, to the extent practical, any harmful effects or unauthorized uses
or disclosures of protected health information by the entity or any of its business associates.
It is further the policy of Catholic Charities that each member of its workforce shall receive
training on the privacy policies of Catholic Charities applicable to his/her job functions,
including but not limited to this policy as it relates to sanctions. Privacy training shall be
conducted, under the supervision of the Privacy Officer, under the guidelines set forth below:
1. Training shall be provided to each new member of Catholic Charities staff on the privacy
policies of Catholic Charities applicable to his/her job functions. Such training shall be
completed within the staff member’s orientation period prior to the staff member’s
unsupervised access to clients’ private health information.
2. Completion of the privacy training for each staff member shall be documented within the
staff member’s personnel file, and shall include a statement of the scope of training, the date
completed, and the signature of the staff member supervising the training.
3. Should any material change be made to any privacy policies that would require the
publication of a revised Notice of Privacy Practices under the federal HIPAA Privacy
Regulations, each staff member shall receive training on the revised privacy policies
applicable to his/her job functions. Wherever possible, this training shall be completed prior
to the effective date of the revised Notice of Privacy Practices, but, in any event, within 30 of
the effective date of the revised Notice of Privacy Practices.
4. Upon completion of privacy training, all workforce members shall sign a confidentiality
agreement, acknowledging completion of the training and understanding of Catholic
Charities privacy policies. This will be filed in the personnel file.
5. It shall be the duty of the Privacy Officer to make a recommendation to the Director of
Human Resources and the Associate Executive Vice President, as to sanctions to be imposed
for any breach of client confidentiality and/or for violation of any information privacy policy
by any member of the staff of Catholic Charities, considering the severity of the particular
breach or violation.
49
6. Sanctions shall be imposed within the appropriate sanctions range by the Director of Human
Resources or, where appropriate, the Privacy Officer in conjunction with the Director of
Human Resources and Associate Executive Director, upon finding that any of the following
categories of breaches of client confidentiality and/or violations of information privacy
policies had been committed by any workforce member:
Negligent or Unintentional Breach of
Sanctions Range A
Client Confidentiality and/or Violation
of Privacy Policy
Actions Demonstrating Intent or
Willfulness to Breach Client
Confidentiality and/or to Violate
Privacy Policy
Sanctions Range B
Breach of Client Confidentiality or
Violation of Privacy Policy, Resulting
in (or with the Intention to Result in)
Pecuniary Gain to the Workforce
Member or the Organization
Sanctions Range C
Knowingly Participating in an Action
of Another that Breaches Client
Confidentiality and/or Violates
Privacy Policy
Sanctions Range C
Participation in Intimidating or
Threatening Acts Against Any
Individual who Exercises any Right
Provided by the federal HIPAA
Privacy Regulations, and/or
Threatening and/or Coercing an
Individual to Waive any Right
Provided by the federal HIPAA
Privacy Regulations
Sanctions Range C
Particular sanctions imposed shall be at the discretion of the Human Resources Director, with
the recommendation of the Privacy Officer, but must always fall within the applicable
sanctions range:
Sanctions Range A





Written Warning
Probation (3 month, 6 month or 1 year) (the terms of
which shall include immediate termination upon any
breach of client confidentiality or violation of privacy
policy during term of probation)
Suspension with Pay
Suspension without Pay
Termination (with or without immediate removal from
premises)
50
Sanctions Range B




Sanctions Range C


Probation (1 year) (the terms of which shall include
immediate termination upon any breach of client
confidentiality or violation of privacy policy during term
of probation)
Suspension with Pay
Suspension without Pay
Termination (with or without immediate removal from
premises)
Suspension without Pay
Termination (with immediate removal from premises)
All such sanctions imposed shall be consistent with the terms of (and imposed pursuant to the
processes set forth in) any applicable collective bargaining agreement and/or employment
contract in place at the time.
7. Should a staff member receive two written warnings, the lowest minimum sanction that may
be imposed is a one-year probation, the terms of which shall include immediate termination
upon any breach of client confidentiality or violation of any privacy policy during the term of
the probation.
8. Breaches of confidentiality and/or violations of privacy policies shall be sanctioned pursuant
to these guidelines, whether occurring within or outside of the workplace.
9. All written warnings and documentation of sanctions imposed shall be maintained in the staff
member’s personnel file.
10. Any staff member against whom sanctions have been imposed pursuant to this policy shall
have the right to submit a written statement of disagreement or explanation to the Director of
Human Resources and/or the Privacy Officer. All such statements shall be maintained within
the staff member’s personnel file for so long as the documentation of the sanction is
maintained.
11. The Director of Human Resources, or the Privacy Officer acting in conjunction with the
Associate Executive Director shall at all times have the ability to lift a previously imposed
sanction should the allegation later be determined to be unfounded. Should any such
sanction be lifted, all documentation of the sanction shall be removed from the personnel file
of the staff member, and shall be placed in a confidential file maintained by the Privacy
Officer to be used only for purposes of compliance with the documentation requirements of
the federal HIPAA Privacy Regulations.
Approved 12-03
Reviewed 6-05
51
HP-1.12
HIPAA Policies and Procedures
RETENTION OF HEALTH INFORMATION AND DOCUMENTATION OF
COMPLIANCE WITH HIPAA PRIVACY REGULATIONS, AND APPROPRIATE
DESTRUCTION OF CLIENT HEALTH INFORMATION
Policy
It is the policy of Catholic Charities to retain clients’ health information and documentation of
compliance with the HIPAA Privacy Regulations, pursuant to the following schedule:
Client’s Medical/Treatment Chart




Minimum of 7 years from last date of treatment
If the client is under the age of 18, the chart shall
be retained for at least 7 years after the client’s
18th birthday
Drug and Alcohol records - minimum 10 years
from last date of treatment
Drug and Alcohol records – if client is under the
age of 18, then the record is maintained for 10
years after the clients 18th birthday
Client’s Billing File


Minimum of 7 years from last date of treatment
If the client is under the age of 18, the billing file
shall be retained for at least 7 years after the
client’s 18th birthday
Psychotherapy Notes

Minimum of 7 years from last date of treatment,
whichever is later

If request involves a client under the age of 18,
request form shall be retained for at least 7 years
after the client’s 18th birthday
Each Version of Notice of Privacy
Practices

7 years from last date in effect
Authorization Forms


7 years from expiration date
If request involves a client under the age of 18,
request form shall be retained for at least 7 years
after the client’s 18th birthday
Responses to Requests for Release of
Client Information Pursuant to
Authorization Form

7 years from date of response to request for
release of information
If request involves a client under the age of 18,
request form shall be retained for at least 7 years
after the client’s 18th birthday

52
Warrants, Subpoenas, Court Orders
and/or Administrative/Governmental
Requests Concerning Release of Client
Information


7 years from date of response
If request involves a client under the age of 18,
request form shall be retained for at least 7 years
after the client’s 18th birthday
Responses to Warrants, Subpoenas,
Court Orders and/or
Administrative/Governmental Requests
Concerning Release of Client
Information


7 years from date of response
If request involves a client under the age of 18,
request form shall be retained for at least 7 years
after the client’s 18th birthday
Requests for Accounting


Minimum of 7 years from date of accounting
If request involves a client under the age of 18,
request form shall be retained for at least 7 years
after the client’s 18th birthday
Disclosure Sheets [Client’s Disclosure
Information Maintained in
Computerized Database and/or PrintOut Form]


Minimum of 7 years from last date of treatment
If disclosure sheets involve a client under the age
of 18, all disclosure sheets shall be retained for at
least 7 years after the client’s 18th birthday
Accountings of Disclosures


Minimum of 7 years from date of accounting
If accounting involves a client under the age of
18, all accountings produced shall be retained for
at least 7 years after the client’s 18th birthday
Requests for Restriction on Uses and/or
Disclosures and/or for Confidential
Communications

Minimum of 7 years from date of response to or
denial of request
If request involves a client under the age of 18,
request forms shall be retained for at least 7
years after the client’s 18th birthday
Denials of Requests for Restriction on
Uses/Disclosures and/or for
Confidential
Communications

Responses to Requests for Restriction
on Uses/Disclosures and/or for
Confidential Communications, where
Request has been Granted


Minimum of 7 years from last date of treatment
If request involves a client under the age of 18,
request form shall be retained for at least 7
years after the client’s 18th birthday
Complaint Forms Concerning Privacy
Practices

Minimum of 7 years from date of response to
complaint
If complaint involves a client under the age of
18, complaint forms shall be retained for at
least 7 years after the client’s 18th birthday



Minimum of 7 years from date of denial of
request
If response involves a client under the age of
18, response shall be retained for at least 7
years after the client’s 18th birthday
53
Responses to Complaint Forms
Concerning Privacy Practices


Requests for Amendment of Health
Information


Responses to or Denials of Requests for
Amendment of Health Information


Minimum of 7 years from date of response to
complaint
If complaint involves a client under the age of
18, response to complaint shall be retained for
at least 7 years after the client’s 18th birthday
Minimum of 7 years from date of response to
request
If request involves a client under the age of 18,
request form shall be retained for at least 7
years after the client’s 18th birthday
Minimum of 7 years from date of response to
complaint
If complaint involves a client under the age of
18, response to request for amendment shall be
retained for at least 7 years after the client’s 18th
birthday
Requests for Access to Health
Information by Clients and/or Legal
Representative

7 years from date of response to or denial of
request, or from date of reviewing official’s
letter of decision (if review requested)
Responses to or Denials of Requests for
Access to Health Information by Clients
and/or Legal Representative, with or
without Requests for Review of Access
Denial

7 years from the date of response to or denial of
request, or from date of reviewing official’s
letter of decision (if review requested) or 7
years past the client’s 18th birthday.
Decisions of Reviewing Official on
Review of Access Denial

7 years from the date of reviewing official’s
letter of decision or 7 years past the client’s 18th
birthday.
Copies of Powers of Attorney,
Guardianship Orders, Letters of
Administration, Letters Testamentary,
Custody Orders, or Other Proof of
Status of Legal Representative

As long as the client’s medical chart and/or
billing record [or consent for use/disclosure for
treatment, payment or healthcare operations
and/or acknowledgment of receipt of notice of
privacy practices] is maintained
Policies and Procedures Concerning
Maintaining, Retaining, Safeguarding,
Requesting, Using and/or Disclosing
Health Information and Related
Documentation

7 years from last date policy or procedure was
in effect
All versions of [Job Descriptions]
[Schedule/Table of Workforce Access
Determinations pursuant to Minimum
Necessary Standard]

7 years from last date each version of [job
description/table of workforce access
determinations] was in effect
54
All Versions of Personnel and Other
Designations Made Pursuant to the
HIPAA Privacy Regulations

7 years from last date each version of personnel
or other designation was in effect
Contracts with “Business Associates” as
defined by HIPAA Privacy Regulations

7 years from expiration date of contract or from
termination of contract, whichever occurs first
Correspondence to and/or Received
from HIPAA Business Associates
Concerning Breach, Accounting of
Disclosures, Amendment of
Information, Termination of Agreement
Due to Breach, Destruction or Return of
Information, or Other HIPAA-related
Obligations

7 years from date of most recent
correspondence
Certificates of Destruction by Third
Party (including HIPAA Business
Associates)

Indefinitely
Destruction Log

Indefinitely
Documentation of Completion of
Workforce Training

7 years from last date of employment
Personnel File Documentation of
Workforce Privacy Sanctions Applied

7 years from date of completion of workforce
sanction
It is further the policy of Catholic Charities that whenever destruction of client health
information of any sort, or other related documents, is permitted pursuant to this retention
schedule, destruction shall be completed pursuant to the following guidelines:
1. Documents shall only be destroyed by a process of [cross-cut] shredding [and/or
incinerating] each document, leaving no readily readable portion of the document.
2. Immediately upon destruction of any documentation listed in the schedule above, the
workforce member charged with the duty of destruction shall immediately document in the
Destruction Log:
 the date of destruction,
 description of the documents destroyed consistent with the titles in the schedule above,
including where appropriate the name of the client(s) to whom individually identifiable
health information relates,
 admission and discharge date,
 the manner of destruction, and
 the signature of the person completing the destruction.
3. When destruction of any such documentation is completed by anyone other than a member of
the workforce of Catholic Charities, including a business associate of the Organization, a
55
Certificate of Destruction shall be obtained including the information required in Paragraph
2, above.
3. It shall be the responsibility of all staff members to deposit, for appropriate destruction any
and all copies of documents containing individually identifiable health information, as soon
as this information is no longer in use. Covered containers for such deposits shall be
maintained [in the copy room, in the printer access area, etc.]. It shall be the duty of [the
receptionist/the runner/etc.] to shred all documents placed into each such covered container
daily.
Approved 12-03
Reviewed 6-05
56
HP-1.13
HIPAA Policies and Procedures
STORAGE OF PROTECTED HEALTH INFORMATION
Policy
All client records and protected health information shall be maintained in a secure room, locked
file cabinet, or other similar secured area when not in use. Safeguards are taken to prevent loss
from fire, water, damage, theft and any breaches of confidentiality.
Procedure
1. All client records and protected health information are stored in a locked file cabinet in a
secured location.
2. Records may be filed according to medical record number or alphabetically in order to
facilitate retrieval by authorized staff.
3. Access to client records and protected health information shall be limited to staff members on
a need to know basis and as otherwise permitted by law or these policies and procedures.
4. Records may be removed from secured locations for treatment, payment and healthcare
operations purposes through the use of a sign out sheet/log book system or similar process
wherein information is recorded indicating the location, the date and the borrower of the
record.
5. All client records and protected health information shall not be removed from Catholic
Charities, except for purpose relating to treatment and healthcare operations, with the
permission of the Division Director/Program Director.
6. All staff and volunteers who are designated to come in contact with protected health
information will read, understand and be able to ask questions about the Agency Policies on
disclosure, confidentiality, access to records and other HIPAA documents. Each
staff/volunteer will sign a confidentiality statement.
7. Outside of working hours, staff members must clean desks and working areas such that all
protected health information is properly secured, unless the immediate area can be secured
from unauthorized access.
8. When not in use, protected health information shall always be protected from unauthorized
access. When left in an unattended room, such information must be appropriately secured.
If protected health information is secured on a disk or other components of a personal
computer, it must be protected by a password or encryption. Unless encrypted, when not in
use, the media must be secured from unauthorized access. If protected health information is
stored on diskettes or CD-ROM or other removable data storage media, it cannot be
commingled with other electronic information.
9. Printing and Copying of Protected Health Information.
57
9.1 Printed version of protected health information should not be copied indiscriminately or
left unattended and open to compromise.
9.2 Printers and copiers used for printing protected health information should be in a secure,
non-public location. If equipment is in a public location, the information being printed or
copied should be strictly monitored. (see policy on fax/copiers)
9.3 Protected health information printed to a shared printer shall be promptly removed.
Approved 12-03 (Replaces CP 2.01 and 2.03)
Reviewed 6-05
58
HP-1.14
HIPAA Policies and Procedures
DISCLOSURE OF DE-IDENTIFIED INFORMATION
Policy
Catholic Charities has the option to use protected health information in a de-identified format.
Once protected health information is de-identified it is not subject to the privacy rule.
Note: If Catholic Charities discloses a key or another mechanism for re-identification of the
protected health information, the exemption to the privacy rules no longer applies and a client
authorization is required prior to use.
Procedure
Protected health information may be considered not individually identifiable in the following
circumstances:
 A person with appropriate knowledge and experience with generally acceptable statistical
and scientific principles and methods determines that the risk is very small that the
information could be used, alone or with other reasonable available information, to identify
the individual who is the subject of the information; or
 The following identifiers of the individual (and relatives, employers or household members)
are removed: names; information relating to the individual’s geographic subdivision if it
contains fewer than 20,000 people; elements of dates (except year) directly related to the
individual, and all ages and elements of dates that indicate age for individuals over 89, unless
aggregated into a single category of age 90 and older; telephone numbers, fax numbers,
email addresses; social security, medical record numbers; health plan beneficiary numbers;
account numbers, certificate or license numbers; vehicle identifiers and serial numbers,
including license plate numbers; device identifiers and serial numbers; Web Universal
Resource Locators (URLs); Internet protocol (IP) address number; biometric identifiers; full
face photographic images; and any other unique identifying numbers, characteristic or code.
1. Protected health information can be de-identified as follows:
1.1 The following data must be removed:
 Name
 Location of the client (can use state, but nothing more specific)
 Dates (admission dates, birth dates, encounter dates/service dates, etc.)
 Numerical identifiers (addresses, telephone, email, fax numbers, zip codes, social
security numbers etc.)
1.2 The following data may be used:
 Age
 Race
 Ethnicity
 Marital Status
2. Catholic Charities is prohibited from disclosing the mechanism for re-identification.
Approved 12-03
Reviewed 6-05
59
HP-1.15
HIPAA Policies and Procedures
(aka AP-4.05)
COMPUTER, E-MAIL, AND INTERNET USAGE POLICIES
This document sets forth Catholic Charities’ policies with regard to computer, e-mail, and
Internet usage, including access to, review or disclosure of e-mail messages sent or received by
Catholic Charities’ employees, and Internet access and usage. Catholic Charities reserves the
right to modify or update these policies at any time. Use of the computer system, e-mail system,
or the Internet in violation of these policies or other Catholic Charities’ policies is a serious
violation and can result in a loss of access, disciplinary action (including termination), or other
legal actions. All employees and volunteers will be required to read the Computer, E-Mail, and
Internet Usage Policies and sign the Acknowledgement of Understanding (Attachment A).
1. Use for Business Purposes Only; Catholic Charities’ Access and Review
1.1 Catholic Charities’ Computer Systems.
The Catholic Charities computer system, e-mail system, and Internet access are provided
to approved employees at Catholic Charities’ expense solely to assist them in carrying
out Catholic Charities’ business. The e-mail system permits employees to communicate
with each other internally and with selected outside individuals and companies. Internet
access permits approved employees to use resources at appropriate Internet sites to help
them perform their duties and carry out Catholic Charities’ business.
Catholic Charities owns, maintains and is responsible for the computer system.
Employees must limit use the computer system, including e-mail and access to the
Internet, to the business purposes of Catholic Charities and only to obtain and transmit
information in accordance with Catholic Charities’ policies and procedures.
1.1.1
In order to maintain the integrity and the security of Catholic Charities’
Information Technology (IT) infrastructure, software and databases, Internet
access will be used only for the business purposes of Catholic Charities’ business.
Access to Anasazi and Outlook e-mail is available to all Catholic Charities’
employees. Any staff member requiring access to the Internet beyond Anasazi and
Outlook e-mail will require justification and approval from the Program Director,
the Division Director/Department Head, and the IT Manager. (See Attachment B:
Request for Internet Access form.)
1.2 Access and Review of E-Mail Communications and Internet Usage.
Catholic Charities treats all messages sent, received or stored in the e-mail system as
business messages.
Catholic Charities has the capability to access, review, copy, and delete any messages
sent, received, or stored on the e-mail system. Catholic Charities has the ability to access
deleted messages. Catholic Charities has the capability to monitor employees’ Internet
usage, including the time spent on-line and the sites accessed.
Catholic Charities reserves the right to monitor, access, review, audit, intercept, use,
copy, or delete e-mail messages of any kind for any purpose and to disclose them to any
60
party (inside or outside Catholic Charities). Catholic Charities reserves the right to
review files and communications to maintain system integrity and ensure that users are
using the system appropriately, responsibly and in accordance with Catholic Charities’
policy and procedures.
1.3 E-Mail Etiquette.
Employees should bear in mind that their e-mail messages may be read by someone other
than the person to whom they are addressed and may even someday have to be disclosed
to outside parties or a court in connection with litigation. Accordingly, employees are
directed to ensure that their messages are courteous, professional and businesslike.
E-mail messages, once sent, are usually irretrievable. Employees should be sensitive to
the fact that, in the absence of an explanation, e-mail messages may be ambiguous and
convey the wrong impression. This is of specific concern when a message is being
forwarded to multiple recipients. Rather than quickly sending messages without adequate
review, employees should consider printing the messages and reading them prior to
distribution to ensure that their content is completely appropriate. The
“everyone@cctrenton.org” is to be used for business purpose only.
1.4 E-mail and Confidentiality of Protected Health Information.
At no time should any protected health information of any clients be transmitted via
electronic mail outside of Catholic Charities network, unless it is encrypted. Due care
shall be used when transmitting private health information of any client by electronic
mail within Catholic Charities internal network, to prevent the transmittal and/or receipt
of such information to any staff member not authorized to have access to the information.
Staff member shall not forward to any third party outside of Catholic Charities any email
messages that contain any form of individually identifiable health information, unless
expressly authorized by the client on a signed authorization for use/disclosure of health
information form. Catholic Charities will incorporate e-mail messages sent or received
that concern the diagnosis or treatment of a client, or payment for treatment, into the
client’s chart and/or billing file and shall maintain such information with the same degree
of confidentiality as the remainder of the client’s chart and billing file.
1.5 Storing and Deleting E-Mail Messages.
Catholic Charities strongly discourages the storage of large numbers of e-mail messages
for a number of reasons. First, because e-mail messages may contain confidential
information, it is desirable to limit the number, distribution, and availability of such
messages. Second, retention of messages consumes storage space on the network and
personal computer hard disks, and can slow down the performance of both the network
and individual personal computers. Finally, in the event that Catholic Charities needs to
search the network server, back-up tapes or individual hard disks for important
documents, the fewer documents it has to search through, the easier the search will be.
Accordingly, employees should regularly delete any e-mail messages they send or receive
that no longer require action or are not necessary to an ongoing project. Employees
should audit their stored e-mail messages periodically to identify messages that are no
longer needed and should be deleted.
2. Permitted and Prohibited Uses
2.1 Use Limited to Catholic Charities’ Business Purposes.
61
The computer system, e-mail system, and Internet access may be used only to support
and promote Catholic Charities business objectives. The use of computers and Internet
access through the Catholic Charities’ system is a privilege, not a right, and may be
revoked. Use of the computer system, e-mail system, or the Internet in violation of these
policies can result in disciplinary action.
Therefore, for example, employees may not:
2.2
2.3
2.1.1
intentionally waste limited computer resources;
2.1.2
engage in activities that have the potential to disrupt the business environment of
the workplace;
2.1.3
engage in actions that damage computers, computer systems, or computer
networks;
2.1.4
use the computer system for commercial purposes, for personal gain or profit, or
to engage in illegal activity;
2.1.5
use the e-mail system to copy and/or transmit any documents, software, or other
information protected by the copyright laws;
2.1.6
use their Catholic Charities’ provided Internet address when communicating
personal viewpoints on the Internet, unless approved by Catholic Charities’
Senior Management; or
2.1.7
use the computer system to access, view, store or distribute obscene, offensive,
harassing, discriminatory, or otherwise objectionable files.
E-Mail Use.
E-mail messages, whether created inside Catholic Charities or created outside Catholic
Charities and transmitted within Catholic Charities or from Catholic Charities to other
sites, can generate claims of defamation, harassment, and discrimination. Therefore,
employees may not:
2.2.1
use the e-mail system to engage in any communications that are in violation of
any policy; or
2.2.2
use the e-mail system to transmit or display defamatory, obscene, intimidating,
offensive or harassing messages or pictures, or messages that disclose personal
information without authorization.
Internet Use.
An approved employee accessing the Internet from a Catholic Charities’ site is
responsible for all on-line activities that take place through the use of his or her login and
password. When using another organization’s networks or computing resources,
employees must comply with the rules appropriate for that network.
62
Those employees with Internet access privileges may not:
2.3.1
access inappropriate websites, including those involving gambling,
pornography, or obscene materials;
2.3.2
obligate Catholic Charities financially to any commercial web-sites without
the express permission of the IT Manager; or
2.3.3
use the Internet from a Catholic Charities’ site to engage in the practice of
moonlighting or for any commercial purposes, advertising, or other similar
activities.
3. Computer System Security
3.1 Importance of System Security.
Catholic Charities is obligated to maintain the confidentiality of its own information, of
client information and of communications with clients. As a consequence, all users of the
computer system must take steps to ensure the security of the system and to maintain the
confidentiality of all information on the system or communicated through the use of the
system. Each employee is responsible for what happens under his or her log in name.
Violations of security policies are considered serious violations and can result in
disciplinary action.
3.2 System Access.
Password and User Logon ID’s are unique to each authorized user and will be assigned
by the IT Department. Passwords must be kept private. They should not be shared, coded
into programs, or written down.
In order to protect against dissemination of confidential information, employees should
not access their e-mail messages for the first time in the presence of others. E-mail
windows should not be left open on the screen when the computer is unattended. E-mail
passwords (as well as other computer passwords) should be routinely changed.
3.3 Computer Viruses.
Computer viruses can be injected into the system through the receipt of e-mails, e-mail
attachments or files from other systems. Exercise particular care when opening files
attached to e-mails from unknown senders. Employees must pay attention to and strictly
comply with all warnings and instructions of the IT Department relating to viruses.
Employees must immediately inform the IT Department of the presence of any virus on
any Catholic Charities computer. Any computer that is infected or suspected of being
infected must immediately be disconnected from the network to reduce the risk of
spreading a virus. Employees are prohibited from disabling or interfering with any virus
scanning software installed on their system.
3.4 Installing or Downloading Software.
The IT Department must approve and install all software on any Catholic Charities
computer. No employee may download software without the approval of the IT
Department. When and if authorized to download software, employees must comply
with all restrictions and procedures for downloading software, including mandatory virus
scanning and detection procedures. Employees must inform the IT Department of any
63
virus, configuration change, or different behavior of a computer or application, especially
after the addition of new software to the environment.
All employees must obey and follow all licensing agreements and procedures with regard
to the use and installation of all software. The IT Department will inspect computers
periodically to verify that all software has been approved and licensed properly.
3.5 Remote Access.
All remote access to the computer system, whether via dial-up or Internet access, must
use encryption services to protect the confidentiality of the session. Information regarding
access to the computer system, such as dial-up phone numbers, is confidential. This
information must not be posted on electronic bulletin boards, listed in telephone
directories, placed on business cards or made available to third parties without express
authorization.
3.6 Confidentiality.
Users must keep confidential all references and resource labels of Catholic Charities’
computer system including but not limited to internal domain names, server names,
printer names, IP addresses, and directory services.
4. Confidentiality of Communications
4.1 Importance of Confidentiality.
Employees must exercise a greater degree of caution in transmitting information through
e-mail than they take with other means of communicating information (e.g., written
memoranda, letters or phone calls) because of the reduced human effort required to
redistribute such information and the security considerations on the Internet. Confidential
information of Catholic Charities or its clients should never be transmitted or forwarded
to outside individuals or companies not authorized to receive that information.
Employees should always use care in addressing e-mail messages to make sure that
messages are not inadvertently sent to outsiders or the wrong person within Catholic
Charities. In particular, employees should exercise care when using distribution lists to
make sure that all addressees are appropriate recipients of the information. Lists may not
always be kept current and individuals using lists should take measures to ensure that the
lists are current. Employees should refrain from routinely forwarding messages
containing confidential information to multiple parties unless there is a clear business
needs to do so.
Employees may contact the IT Department with any questions concerning this policy or
procedure.
Approved 5-97
Revised and approved 12-03
Reviewed 6-05
64
Attachment A to HP-1.15
HIPAA Policies and Procedures
(aka Attachment A to AP-4.05)
ACKNOWLEDGMENT OF UNDERSTANDING
COMPUTER, E-MAIL, AND INTERNET USAGE POLICIES
I acknowledge that I have read and will abide by Catholic Charities’ policies regarding
computer, e-mail, and Internet usage. In particular:
1. I understand that Catholic Charities has the complete authority to monitor my computer
usage, e-mail communications, and Internet usage, and that Catholic Charities may monitor
on a routine and/or special case basis.
2. I will accept personal responsibility for all activities occurring under my password/login.
3. I will keep confidential my password/login and will not utilize another’s password/login to
access any system.
4. I will keep confidential all client information, regardless of the medium – computer, email,
etc.
5. I understand that the computer system, the e-mail system, and the Internet system are to be
used for business purposes only.
6. I understand that I cannot install or download software and/or programs, screen savers,
firewalls, etc. without written approval of the IT Manager.
7. I understand that any violation by me of Catholic Charities’ computer, e-mail, or Internet
policies may result in a loss of access, disciplinary action (including termination), or other
legal action.
______________________________________________
Signature
______________________________________________
Name (please print)
Original: Personnel file
65
______________________
Date
Attachment B to HP-1.15
HIPAA Policies and Procedures
(aka Attachment B to AP-4.05)
REQUEST FOR INTERNET ACCESS
Name _____________________________________
Title ____________________________
Program ___________________________________
Division _________________________
Location
_______________________________________________________________________
Date of Request _______________________
Justification for access to the Internet:
Program Director’s Signature ___________________________
Date __________________
------------------------------------------------------------------Division Director/Department Head Review and Approval
( ) approved ( ) not approved
Signature ___________________________________________
Date ________________
------------------------------------------------------------------IT Manager’s Signature _______________________________
Original: IT Office
Copy: Program Director
66
Date ___________________
HP-2.01
HIPAA Policies and Procedures
OVERVIEW OF SAFETY AND SECURITY SECTION
OF THE HIPAA POLICIES AND PROCEDURES
1. Introduction
The final HIPAA security rule, published in the February 20, 2003 Federal Register
(68Fed.Reg.8334-8381) provides a series of implementation specifications for the security of
protected health information in electronic form. Catholic Charities strives to:
 Ensure the confidentiality, integrity, and availability of all electronic protected health
information that it creates, receives, maintains, or transmits.
 Protect against any reasonably anticipated threat or hazard to the security and integrity of
such information.
 Protect against any reasonably anticipated uses or disclosures of such information that are
not otherwise permitted or required.
 Ensure compliance by its workforce.
2. Document Description
This document describes Catholic Charities’ policies and procedures relative to the Security part
of the Health Insurance Portability and Accounting Act (HIPAA) of 1996. By having this
document in place, and exercising the steps required to implement required activities, Catholic
Charities declares that it has made its best efforts to be compliant with the Security part of
HIPPA, as it applies to Catholic Charities.
3. Purpose
The purpose of this document is to list the policies and procedures Catholic Charities has
documented and follows to remain compliant with the Security part of HIPAA. This document is
used as a set of statements and instructions for Catholic Charities workforce to follow, and as a
training guide.
4. Revisions
The Catholic Charities HIPAA Compliance Officer and Security Officer are responsible for
revisions and updates to this document. This is a “living” document. Updates that are a result of
new discoveries, such as changing regulations or processes, will be added as needed.
5. Administrative Safeguards
Catholic Charities has implemented administrative policies and procedures to prevent, detect,
contain, and correct security violations. These policies and procedures are described in the
following sections.
5.1
Risk Analysis and Management
Catholic Charities conducts accurate and thorough assessments of the potential risks
and vulnerabilities to the confidentiality, integrity, and availability of electronic
protected health information held in its computer systems, on a regular basis. When
67
Catholic Charities Compliance Officer and Security Officer believes any risks exist,
the Compliance Officer and the Security Officer addresses each risk and completes a
risk mitigation report.
Catholic Charities has implemented security measures sufficient to reduce risks and
vulnerabilities to a reasonable and appropriate level to comply with the HIPAA
Security Rule. These measures are described in detail in Sections 3.01 and Risk
Analysis of this document.
5.2
Sanction Policy
Catholic Charities will apply appropriate sanctions against employees and others who
fail to comply with the security policies and procedures, as detailed in the Catholic
Charities Policy and Procedure Manual, which is available for review in your
division.
5.3
Information System Activity Review, Login Monitoring
Catholic Charities has implemented the following procedures to regularly review
records of information system activity:
 The Security Officer reviews files contained on Catholic Charities’ computers
weekly.
 Such reviews include unsuccessful logins, unauthorized access, breaking the
glass and security incident tracking reports.
5.4
Assigned Security Responsibility
Catholic Charities has named the Information Technology Manager and the
Compliance Officer as the security officials who are responsible for the development
and implementation of the policies and procedures required by this HIPAA Rule.
5.5
Workforce Security, Authorization, Supervision, Clearance Procedure
Catholic Charities policies and procedures ensure that all members of its workforce:
 Have appropriate access to electronic protected health information,
 Prevent those workforce members who do not have access from obtaining
access to electronic protected health information,
 Authorize and/or supervise workforce members who work with electronic
protected health information, and
 to determine that the access of a workforce member to electronic protected
health information is appropriate.
Safeguards utilized are as follows:
 All employees who are allowed access to PHI are assigned passwords by the
IT staff to Catholic Charities computers. See password policy.
 Access to electronic protected health information is based on a need to know
basis with approval from the Program Director/Division Director.
 Employees who do not have access cannot obtain access, as they do not have
the passwords
 Employees with access to PHI are trained in the importance of protecting
electronic PHI.
 The Security Officer determines what workforce members appropriately have
access to PHI, based upon thorough review and understanding of Catholic
68
Charities Policies and Procedures, which are contained in the Administrative
and Division Policies and Procedure Manuals.
5.6
Termination Procedures
When the employment of a workforce member ends, or they no longer need access to
PHI as determined by the Security Officer/Compliance Officer, that workforce
member’s access to electronic PHI is terminated by removing his or her user ID, user
account and access permissions from Catholic Charities computers. In the case of a
resignation, the Information Technology Department can enter in an expiration date
(last day of employment) into the system and the Anasazi system will automatically
terminate access as of 12 midnight on that day.
5.7
Security Awareness, Training and Reminders
Catholic Charities has security awareness/reminders and training program for all
members of its workforce. Training sessions will be done on the HIPAA Security
Policies and Procedures at orientation. During regular staff meetings, Catholic
Charities Directors inform their staff of periodic security updates.
5.8
Protection from Malicious Software
Catholic Charities computers have anti-virus scanning software installed, and updates
to this software are purchased and installed when available. This ensures that Catholic
Charities reasonably guards against, detects, and reports malicious software.
5.9
Security Incident Procedures, Response and Reporting
Catholic Charities Security Officer and Compliance Officer notes any security issues
he/she is aware of in the agencies’ Compliance Officer Incident Log, contained in the
Policy and Procedure Manual and addresses them on a case-by-case basis.
5.10
Contingency, Data Backup, Disaster Recovery, Emergency Mode Operations, Testing
and Revisions
Catholic Charities backs up its computer systems making a copy of the files from a
hard disk to tape for the purpose of retrieval in case the original is erased, copied
over, damaged, or destroyed. The backup methods utilized include a full level
backup, an incremental level backup, and a differential level backup. The Security
Officer or designee takes the backup to a safe, off-site location nightly. Should an
emergency or other occurrence (for example, fire, vandalism, system failure, and
natural disaster) damage Catholic Charities’ systems, the Security Officer (or
designated representative) takes the backup copy and restores the system to its last
operational state.
5.11
Evaluation
Catholic Charities Security Officer performs a technical and non-technical evaluation
of the procedures in this document yearly, or any time there are significant
environmental or operational changes affecting the security of electronic protected
health information.
5.12
Business Associate Contracts and Other Arrangements
Catholic Charities has business associate agreements in place with its business
associates who create, receive, maintain, or transmit electronic protected health
information on our behalf. This gives us satisfactory assurances that the business
69
associate will appropriately safeguard the information. A template copy of this
agreement can be found in the office of the Associate Executive Director of Fiscal
Affairs. We realize that this standard does not apply with respect to:
 Transmission by a covered entity of electronic protected health information to
a health care provider concerning the treatment of an individual,
 Transmission of electronic protected health information by a group health plan
or an HMO or health insurance issuer on behalf of a group health plan to a
plan sponsor, to the extent that the relevant HIPAA requirements apply and
are met, or
 Transmission of electronic protected health information from or to other
agencies providing the services when the covered entity is a health plan that is
a government program providing public benefits, if the relevant HIPAA
requirements are met.
6. Physical Safeguards
Catholic Charities has implemented physical safeguard-related policies and procedures to
prevent, detect, contain, and correct security violations. These policies and procedures are
described in the following sections.
6.1
Facility Access Controls
Catholic Charities has implemented the following policies and procedures to limit
physical access to its electronic information systems and the facility or facilities in
which they are housed, while ensuring that properly authorized access is allowed:
 Computers are kept in offices and private areas.
 Only personnel requiring access to these systems are authorized to use them.
 Passwords are required for access to electronic information system,
 Visitors are required to sign in and be escorted to their designation.
6.2
Contingency Operations
Catholic Charities has established procedures that allow facility access in support of
restoration of lost data under the disaster recovery plan. See Disaster Recovery Plan
for details.
6.3
Facility Security Plan
Catholic Charities has implemented policies and procedures to safeguard its facilities
and the equipment therein from unauthorized physical access, tampering, and theft.
Computers are kept in offices, private locations and the building are secure from
unauthorized access. Clients and visitors are required to sign in and out of the facility.
Visitors are escorted through critical areas of the facilities at all time.
6.4
Access Control and Validation Procedures
Catholic Charities has implemented procedures to control and validate a person’s
access to facilities based on their role or function, including visitor control, and
control of access to software programs for testing and revision. The Security
Officer/Compliance Officer and Division Directors oversee access to facilities and
computers.
70
6.5
Maintenance Records
Catholic Charities has implemented policies and procedures to document repairs and
modifications to the physical components of its facility, related to security. The
Division Directors ensures, on a daily basis, that the physical facility is in working
order and documents any deficiencies for follow-up and repair.
6.6
Workstation Use
Catholic Charities has implemented policies and procedures that specify the proper
functions to be performed, the manner in which those functions are to be performed,
and the physical attributes of the surroundings of its specific workstation or class of
workstation that can access electronic protected health information. Catholic Charities
computers are kept in private areas. Only personnel requiring access to these systems
are authorized to use them.
6.7
Workstation Security
Catholic Charities has implemented physical safeguards for all workstations that
access electronic protected health information, and has restricted access to authorized
users. Only personnel requiring access to these systems are authorized to use them.
6.8
Device and Media Controls
Catholic Charities has implemented policies and procedures that govern the receipt
and removal of hardware and electronic media that contain electronic protected health
information into and out of a facility, and the movement of these items within the
facility. The Security Officer oversees the movement, receipt, and removal of all
hardware and electronic media on an as-needed basis. Staff utilizing disks have all
disk password protected.
6.9
Disposal
Catholic Charities has implemented policies and procedures to address the final
disposition of electronic protected health information, and/or the hardware or
electronic media on which it is stored. The Security Officer oversees the final
disposition of any hardware or electronic media, and erases disks and other media as
needed upon disposal.
6.10
Media Re-Use
Catholic Charities has implemented procedures for removal of electronic protected
health information from electronic media before the media are made available for reuse. The Security Officer oversees the erasure of any electronic media prior to reuse,
as applicable. Staff erases all disks prior to re-use.
6.11
Accountability
The Security Officer maintains a record of the movements of hardware and electronic
media per site.
6.12
Data Backup and Storage
The Security Officer or designated authorized representative creates a retrievable,
exact copy of electronic protected health information, when needed, before movement
of equipment. Routinely data is backed up by three methods: full backup,
incremental back-up, and differential back up. All backups are stored off site.
71
7. Technical Safeguards
Catholic Charities has implemented technical safeguard-related policies and procedures in the
following areas to prevent, detect, contain, and correct security violations, as described in the
following sections.
7.1
Access Control
Catholic Charities has implemented technical policies and procedures for electronic
information systems that maintain electronic protected health information to allow
access only to those persons or software programs that have been granted access
rights.
7.2
Unique User Identification
Catholic Charities assigns a unique name and/ or number for identifying and tracking
user identities by setting up login IDs and passwords to each employee, as applicable.
7.3
Emergency Access Procedure
Catholic Charities has established procedures for obtaining necessary electronic
protected health information during an emergency. See Disaster Recovery for more
details.
7.4
Automatic Logoff
Catholic Charities has implemented electronic procedures that terminate an electronic
session after a predetermined time of inactivity (5 hours) and emphasis is placed on
employees logging off their computer when they leave their workstation. A screen
saver is activated on each computer after 5 minutes of inactivity.
7.5
Encryption, Decryption, and Security
Catholic Charities has implemented a mechanism to encrypt and decrypt electronic
protected health information whenever it is transmitting this information
electronically. This mechanism utilizes a software program for encryption and
authentication of transmitted data.
7.6
Audit Controls
Catholic Charities has implemented procedural mechanisms that record and examine
activity in information systems that contain or use electronic protected health
information. See Workstation Use, for details.
7.7
Integrity
Catholic Charities has implemented policies and procedures to protect electronic
protected health information from improper alteration or destruction, to corroborate
that electronic protected health information has not been altered or destroyed in an
unauthorized manner, and to verify that a person or entity seeking access to electronic
protected health information is the one claimed. See Access, Control and Validation
Policy and Workstation Use, for details.
72
8. Organizational and Documentation Requirements
Catholic Charities has implemented the organizational and documentation requirements
mandated by the HIPAA Security Rule. These requirements, and Catholic Charities compliance
declarations, are described in more detail in the following sections.
8.1
Business Associate Contracts
Catholic Charities has ensured that its contracts with its Business Associates address
all necessary safeguards required by the HIPAA Security Rule. Contracts between
Catholic Charities and its Business Associates provide that the business associate
will:
 Implement administrative, physical, and technical safeguards that reasonably
and appropriately protect the confidentiality, integrity, and availability of the
electronic protected health information that it creates, receives, maintains, or
transmits on behalf of Catholic Charities.
 Ensure that any agent, including a subcontractor, to whom it provides such
information agrees to implement reasonable and appropriate safeguards to
protect it.
 Report to Catholic Charities any security incident of which it becomes aware.
Business Associate contracts will also authorize termination of the contract by
Catholic Charities, if Catholic Charities determines that the business associate has
violated a material term of the contract
8.2
Documentation Form, Retention, Availability, and Updates
Catholic Charities maintains these policies and procedures implemented to comply
with the HIPAA Security Rule in written and/or electronic form. Catholic Charities
retains the documentation required by HIPAA Security Rule for seven years from the
date of its creation or the date when it last was in effect, whichever is later. Catholic
Charities makes documentation available to those persons responsible for
implementing the procedures to which the documentation pertains. Catholic Charities
reviews documentation periodically, and updates it as needed, in response to
environmental or operational changes affecting the security of the electronic protected
health information.
9. Reporting and Investigating Security Breaches
Questions about breach of privacy issues will be presented initially to the Compliance Officer
and/or Security Officer of Catholic Charities.
Employees and/or clients who report possible security issues in good faith will not be subjected
to retaliation or harassment because of the report. Concerns about possible retaliation or
harassment will be reported to the Compliance Director.
Whenever a security issue has been identified, through monitoring, reporting of possible issues,
investigations, or otherwise, the Security Officer and the Compliance Officer, with the support of
the Associate Executive Director of Program Services, shall have the responsibility and authority
to take or direct appropriate action to address that issue. The corrective action will be set forth in
writing.
73
Corrective actions will be designed to ensure that the specific issues are addressed and similar
problems do not occur in the future.
Employees who have engaged in willful misconduct will be subject to disciplinary action, up to
and including termination in appropriate cases, in accordance with company policies, procedures,
and codes of conduct.
All employees are directed to cooperate fully with any inquiries undertaken pursuant to this plan.
To the extent practical and appropriate, efforts will be made to maintain the confidentiality of
such inquiries and the information gathered.
The Compliance Officer and the Security Officer will maintain an incident log of security
concerns that are reported, as described in this document. The log will record the issues, the
individuals or departments affected, and the resolutions.
Catholic Charities and its employees are aware of the seriousness of security breaches and
understand that appropriate action must be taken to prevent similar instances from occurring.
Approved 12-03
Revised 12-04
Approved 6-05
74
Attachment to HP-2.01
HIPAA Policies and Procedures
INCIDENT LOG
Date &
Initials
Issue
Department/
Division/Site
75
Resolution
HP-2.02
HIPAA Policies and Procedures
HIPAA SECURITY PLANS
Privacy and Security Plan (See Attachment A)
Disaster Prevention Plan (See Attachment B)
Disaster Recovery and Emergency Operation Plan (See Attachment C)
Disaster Recovery Teams (See Attachment D)
Data Security Backup Plan\Staff Training Plan (See Attachment E)
Approved 12-03
Reviewed 6-05
76
Attachment A to HP-2.02
HIPAA Policies and Procedures
PRIVACY AND SECURITY PLAN
Background
The use of computers and computer networks has become an integral part of the behavioral
health and human services industry. These technologies have brought and will continue to bring
enormous advantages to our industry and will continue to enable us to innovate the means of
delivering services to clients. These technologies have also brought significant risks regarding
client confidentiality and privacy. Catholic Charities has established both security and privacy
policies that give specific guidelines on an employee’s use of these technologies, in all locations.
These policies and procedures have been written in coordination with the requirements of the
Health Insurance Portability and Accountability Act of 1996 (HIPAA).
Purpose
It is the policy of Catholic Charities that all personnel must preserve the integrity and the
confidentiality of medical, mental health, substance abuse, HIV data, and other sensitive
information pertaining to our clients. The purpose of this policy is to ensure that Catholic
Charities and its officers, employees, volunteers and agents have the necessary clinical
information and other pertinent information, in order to provide the highest quality service
possible while protecting the confidentiality of that information. To that end, Catholic Charities
and its officers, employees, and agents will:
1. Collect and use individual clinical information only for the purposes of providing services
and for supporting the delivery, payment, integrity, and quality of those services. Catholic
Charities and its officers, employees, and agents will not use or release individual clinical
information without the proper authorization of our clients. Our staff, volunteers, and agents
will have access to client information on a need to know basis only.
2. Collect and use individual protected health information only:
2.1
To provide proper diagnosis and treatment.
2.2
With the individual’s knowledge and consent.
2.3
To receive reimbursement for services provided.
2.4
For research and similar purposes designed to improve the quality and to reduce the
cost of health care.
2.5
As a basis for required reporting of health information.
3. Recognize that medical, mental health, substance abuse, HIV information collected about
clients must be accurate, timely, complete, and available when needed. Catholic Charities
and its officers, employees, and agents will:
77
3.1
Use their best efforts to ensure the accuracy, timeliness, and completeness of data and
to ensure that authorized personnel can access it when needed.
3.2
Complete and authenticate medical records in accordance with the law, medical
ethics, and standards of practice and accreditation standards.
3.3
Maintain medical records for the retention periods required by law and professional
standards.
3.4
Not alter or destroy an entry in a record, but rather designate it as an error while
leaving the original entry intact and create and maintain a new entry showing the
correct data.
3.5
Implement reasonable measures to protect the integrity of all data maintained about
clients.
4. Recognize that clients have a right of privacy and security of their information. Catholic
Charities and its officers, employees, and agents will respect clients’ individual rights,
dignity, privacy and confidentiality at all times.
5. Act as responsible information stewards and treat all individual medical record data and
related financial, demographic, and lifestyle information as sensitive and confidential.
Consequently, Catholic Charities and its officers, employees, and agents will:
5.1
Treat all individual medical record data as confidential in accordance with
professional ethics, accreditation standards, and legal requirements.
5.2
Not divulge medical record data unless the client (or his or her authorized
representative) has properly consented to the release or the release is otherwise
authorized by law, such as communicable disease reporting, child abuse reporting,
and the like.
5.3
When releasing medical record data, take appropriate steps to prevent unauthorized
re-disclosures, such as specifying that the recipient may not further disclose the
information without client consent or as authorized by law.
5.4
Implement reasonable measures to protect the confidentiality of medical and other
information maintained about clients.
5.5
Remove client identifiers when appropriate, such as in statistical reporting and in
medical research studies.
5.6
Not disclose financial or other client information except as necessary for billing or
other authorized purposes as authorized by law.
6. All officers, agents, and employees of Catholic Charities must adhere to this policy. Catholic
Charities will not tolerate violations of this policy. Violation of this policy is grounds for
disciplinary action, up to and including termination of employment and criminal or
professional sanctions in accordance with Catholic Charities medical information sanction
policy and personnel rules and regulations.
78
The management structure for this Plan is outlined below. These individuals have primary
responsibility for the development, deployment, and ongoing management of the Plan and all
associated policies and procedures.
Executive Director
Associate Executive Director/
Program Services
Associate Executive Director/Fiscal Affairs
Division Directors
Program Directors
Compliance Director
Human Resources
Privacy and
Security Policies
and Procedures
Information Technology
Information Technology
Manager
Reporting Security Problems
If confidential information is lost, disclosed to unauthorized parties, or suspected of being lost or
disclosed to unauthorized parties, the Privacy Officer and the Security Officer must be notified
immediately. Catholic Charities will mitigate to the extent possible any harmful effects of the
security incident.
If any unauthorized use of Catholic Charities information systems has taken place, or is
suspected of taking place, the Security Officer and Chief Privacy Officer must be notified
immediately. Similarly, whenever passwords or other system access control mechanisms are lost,
stolen, or disclosed, or are suspected of being lost, stolen, or disclosed, the Security Officer and
Privacy Officer must be notified immediately.
All unusual systems behavior, such as missing files, frequent system crashes, misrouted
messages, and the like must also be immediately reported to the Security Officer and the Privacy
Officer. This may indicate a computer virus infection or similar security problem. The specifics
of security problems should not be discussed widely but should instead be shared on a need-toknow basis.
Users must not "test the doors" (probe) security mechanisms at either Catholic Charities or other
Internet sites unless they have first obtained permission from the Information Technology
Manager. If users probe security mechanisms, alarms will be triggered and resources will
needlessly be spent tracking the activity. Depending on the nature of the probing, employee may
be subject to disciplinary actions, up to and including termination.
Additional Responsibilities
As defined below, Catholic Charities Information Technology Department is responsible for
Internet security. Employees are responsible for any activity under their password.
79
1. Information Technology will establish an Internet security infrastructure consisting of
hardware, software, policies, and standards, and department staff will provide technical
guidance on computer security to all Catholic Charities staff. The IT department will also
organize an emergency response team to respond to virus infestations, hacker intrusions, and
similar events. The Emergency Response Team is identified in the Catholic Charities
Disaster Recovery Plan.
2. IT staff will monitor compliance with Internet security requirements, including hardware,
software, and data safeguards. Program directors must ensure that their staffs are in
compliance with the Internet security policy established in this document. IT staff will also
provide administrative support and technical guidance to management on matters related to
Internet security.
3. IT staff will periodically, and no less than semi-annually conduct a risk assessment of each
production information system they are responsible for to determine both risks and
vulnerabilities.
4. IT staff will check that appropriate security measures are implemented on these systems in a
manner consistent with the level of information sensitivity.
5. IT staff will check that user access controls are defined on these systems in a manner
consistent with the need-to-know.
6. Catholic Charities Division Directors/Program Directors will see to it that the sensitivity of
data is defined and designated on these systems in a manner consistent with in-house
sensitivity classifications.
7. Catholic Charities program directors will ensure that:
7.1
Employees, under their supervision, implement security measures as defined in this
document.
7.2
Employees under their supervision delete sensitive (confidential) data from their disk
files when the data is no longer needed or useful.
7.3
Employees under their supervision who are authorized to use personal computers are
aware of and comply with the policies and procedures outlined in all Catholic
Charities documents that address information security.
7.4
Employees under their supervision complete the pre-exit clearance process upon their
official termination of employment or contractual agreement.
8. Users of Catholic Charities Internet connections must:
8.1
8.2
8.3
Know and apply the appropriate Catholic Charities policies and practices pertaining
to Internet security.
Not permit any unauthorized individual to obtain access to Catholic Charities Internet
connections.
Not use or permit the use of any unauthorized device in connection with Catholic
Charities personal computers.
80
8.4
Not use Catholic Charities Internet resources (software/hardware or data) for other
than authorized company purposes.
8.5
Maintain exclusive control over and use of his/her password, and protect it from
inadvertent disclosure to others.
8.6
Select a password that bears no obvious relation to the user, the user's organizational
group, or the user's work project, and that is not easy to guess. (See Password
Protection policy)
8.7
Ensure that data under his/her control and/or direction is properly safeguarded
according to its level of sensitivity.
8.8
Report to the Security Officer and the Privacy Officer any incident that appears to
compromise the security of Catholic Charities information resources. These include
missing data, virus infestations, and unexplained transactions.
8.9
Access only the data and automated functions for which he/she is authorized in the
course of normal business activity.
8.10
Obtain IT Manager’s authorization for any uploading or downloading of information
to or from Catholic Charities multi-user information systems if this activity is outside
the scope of normal business activities.
8.11
Make backups of all sensitive, critical, and valuable data files as often as is deemed
reasonable by their program director.
Contact Point
Questions about this policy may be directed to the Information Technology Manager.
Disciplinary Process
Violation of these policies may subject employees to disciplinary procedures up to and including
termination.
81
Attachment B to HP-2.02
HIPAA Policies and Procedures
.
DISASTER PREVENTION PLAN
Policy
As important as having a disaster recovery plan, the measures taken to prevent a disaster or to
mitigate its effects beforehand is even more important. This plan reviews the various threats that
can lead to a disaster, where our vulnerabilities are, and steps we are taking to minimize our risk.
The threats covered here are both natural and human created.
 Fire
 Flood
 Tornados and High Winds
 Earthquake
 Computer Crime
FIRE
The threat of a fire in the Central Administrative Services building is very real and poses the
highest risk factor of all the types of disasters. The building is filled with electrical devices and
connections that could overheat or short out and cause a fire. The computers within the facilities
also pose a quick target for arson from anyone wishing to disrupt operations.
Preventive Measures
Fire alarms
The facilities area equipped with fire alarm systems and with ceiling mounted smoke/heat
detectors, which are located throughout the buildings.
Fire Extinguishers
Hand-held fire extinguishers are required and are placed in visible locations throughout the
buildings.
Recommendations

Install Halon gas system, place fire extinguisher in phone room/computer rooms.

Review fire/safety procedures with staff.
FLOOD
In some locations, several water pipes/drains run directly above the computer/phone system.
These factors can create the threat of flooding. This threat includes potential disruption of power,
equipment damage due to dirty particles in the water, and destruction of sensitive electrical
components. In addition, the presence of water in a room with high voltage electrical equipment
can pose a threat of electrical shock to personnel within the computer/phone room.
Recommendation
82
Move main computer/phone system to a more suitable location.
TORNADOS AND HIGH WINDS
Although Catholic Charities may not be in any immediate danger resulting from tornados,
gusting winds can cause trees to fall causing damage to the building or underground cabling.
EARTHQUAKES
No threat of earthquakes in this area.
COMPUTER CRIME
Computer crime is becoming more of a threat as IT systems become more complex and access is
more highly distributed. With the new networking technologies, more potential for improper
access is present than ever before. Computer crime usually does not affect hardware in a
destructive manner. It may be more insidious and may often come from within an organization.
A disgruntled employee can build viruses or time bombs into applications and systems code. A
well-intentioned employee can make coding errors that affect data integrity.
Preventive Measures
All systems have security products installed to protect against unauthorized entry. All systems
are protected by passwords, especially those permitting updates to data. All users should are
required to change their passwords on a regular basis (every 180 days). All security systems log
invalid attempts to access data and the IT Manager or Network Administrator reviews these logs
on a regular basis.
Recommendations

Continue to improve security functions on all platforms.

Strictly enforce policies and procedures when violations are detected.

Regularly let users know the importance of keeping their passwords a secret.

Let users know how to choose strong passwords that are very difficult to guess.
83
Attachment C to HP-2.02
HIPAA Policies and Procedures
DISASTER RECOVERY AND EMERGENCY OPERATIONS PLAN
Policy
Over the years, dependence upon the use of computers in the day-to-day business activities of
many organizations has become the norm. Catholic Charities is no exception to this trend. Very
powerful computers are located in every department/program within Catholic Charities. These
machines are linked together by a sophisticated network that provides communication with other
machines across the divisions and around the world. Catholic Charities vital functions are
dependent on the availability of this network of computer.
Disaster Recovery Plan Focus
The primary focus of this document is to provide a plan to respond to a disaster that destroys or
severely cripples Catholic Charities computer systems operated by the IT Department. The intent
is to restore operations as quickly as possible with the latest and most up-to-date data available.
System Access
In the event of a major disaster, access to the system will be restricted to the IT department, until
such time the IT Manager deems it appropriate to permit additional access.
In the event that the disaster creates a critical shortage of resources that do not permit all users to
simultaneously access the system, restriction on access will be initiated by the IT Department
and priorities will focus on mission critical functions. The IT Department will work with Senior
Management and the Division Directors to identify key users to grant immediate access in order
to conduct critical business and clinical operations. The IT Department may utilize time blocks
for access or restrict the number of users at any given time.
Risks
The disaster recovery plan assumes a certain amount of risk, the primary one being how much
data is lost in the event of a disaster. There are compromises between the amount of time, effort
and money spent in the planning and preparation of a disaster and the amount of data loss you
can sustain and still remain operational following a disaster. Depending on the need, the
recovery effort may focus on a quick recovery or even zero down time, by duplicating and
maintaining their computer systems in separate facilities. The techniques for backup and
recovery used in this plan do NOT guarantee zero data loss. The administration is willing to
assume the risk of data loss and do without computing for a period of time in a disaster situation.
In a fiscal sense, the plan is saving dollars in up-front disaster preparation cost and then relying
upon business interruption and recovery insurance to help restore computer operations after a
disaster.
Data recovery efforts in this plan are targeted at getting the systems up and running with the last
available off-site backup tapes. Significant effort will be required after the system operation is
restored to:
 Restore data integrity to the point of the disaster.
84

Synchronize that data with any new data collected from the point of the disaster forward.
Plan Objectives
The Disaster Recovery Plan has the following primary objectives:
1. Present an orderly course of action for restoring critical computing capability to the network
within 5 days of the plan.
2. Set criteria for making the decision to recover at a cold site or repair the affected site.
3. Describe an organization structure for carrying out the plan
4. Provide information concerning personnel that will be required to carry out the plan and the
computing expertise required.
5. Identify the equipment, floor plan, procedures, and other items necessary for recovery.
Plan
1. Personnel
Immediately following the disaster, a planned sequence of events begins. Key personnel are
notified and recovery teams are grouped to implement the plan. See attached list of personnel
and their expertise. The plan has been designed to be usable even if some of the personnel are
unavailable.
2. Salvage Operations at the Disaster Site
Early efforts are targeted at protecting and preserving the computer equipment. In particular,
any magnetic storage media (hard drives, magnetic tapes, diskettes) are identified and either
protected from the elements or removed to a clear, dry environment away form the disaster
site.
3. Designated Recovery Site
At the same time, the appropriate personnel to estimate the amount of time required to put
the facility back into working order do a survey of the disaster scene. A decision is then made
whether to use the Cold Site, a location some distance away from the scene of the disaster
where computing and networking capabilities can be temporarily be restored until the
primary site is ready. Work begins immediately at repairing or rebuilding the primary site.
4. Purchase New Equipment
The recovery process relies on vendors to quickly provide replacements for the resources that
cannot be salvaged. The IT Director will rely upon emergency procurement procedures so
orders for equipment, supplies, software and any other needs are met quickly.
5. Begin Reassembly at Recovery Site
Salvaged and new components are reassembled at the recovery site according to the
instructions contained in this plan. If vendors cannot provide a certain piece of equipment on
a timely basis, it may be necessary for the recovery personnel to make last-minute
substitutions. After the equipment reassembly phase is complete, the work turns to
concentrate on the data recovery procedures.
85
6. Restore Date from Backups
Data recovery relies entirely upon the use of backups stored in locations off-site. Backups
can take the form of magnetic tape, CD ROMS, disk drives, and other storage media. Early
data recovery efforts focus on restoring the operating system(s) for each computer system. In
addition, software programs as well as a copy of operating user manual will be maintained at
an off-site location. Next, first line recovery of application and user data from the backup
takes is done. Individual application owners may need to be involved at this point, so teams
are assigned for each major application area to ensure that data is restored properly.
7. Restore Application Data
Since some time may have elapsed between the time that the off-site backups were made and
the time of the disaster, application owners must have a means for restoring each running
application database to the point of the disaster. They must take all new data collected since
that point and input it into the application databases. When this process is complete, the
computer systems can reopen for business. Some applications may be available only to a
limited few key personnel, while others may be available to anyone who can access the
computer systems.
8. Move Back to Restored Permanent Facility
It the recovery process has taken place at the Cold Site, physical restoration of the disaster
site will have begun. When that facility is ready for occupancy, the systems assembled at the
Cold site are to be moved back to their permanent home.
Testing
Testing of the plan to simulate an actual disaster will be done once a year. The Security Officer
and the Privacy Officer will declare a test disaster. The test disaster would include the
identification of the type of the disaster, the time, and place of the disaster and the plan will be
implemented. This test disaster will determine the agency’s readiness and completeness of the
plan if an actual disaster has taken place. Although there may be some inconvenience to the users
during the test, there will be no prolonged outage to the user.
The test will cover the following activities:
 notifying the disaster recovery team
 assemble the team in one location
 visit the site of the disaster
 retrieve back up tapes
 determine alternate site and inspect site
 send notice to all users
 record events and evaluate
 revise plan as necessary
The results of the test disaster will be reviewed with Senior Management.
86
Attachment D to HP-2.02
HIPAA Policies and Procedures
DISASTER RECOVERY TEAMS
Policy
Teams, in order to function in an efficient manner and to allow independent tasks to proceed
simultaneously, will handle the recovery process. This plan calls for eight teams that work
together to achieve recovery.
Disaster Recovery Teams
1. Recovery Management Team
2. Damage Assessment Team
3. Administrative Support Team
Disaster Recovery Team Responsibilities
1. Recovery Management Team
The Disaster Recovery Team consists of the following skilled people:
1.1
1.2
1.3
1.4
1.5
IT Manager
Network Administrator
IT Technicians
IT Trainer
DDS Consultant
The Recovery Manager is part of the Recovery Management Team and has the final authority
regarding decisions during the recovery process. Each of the remaining individuals will be the
leader of a specialized team that will address a portion of the recovery task. As the recovery
process gets underway, there will likely be overlap between teams and close communication will
be required. The Recovery Management Team will have regular meetings scheduled to provide
for communication. A first meeting agenda might include:
 Reviewing the current status of the recovery operation
 Emphasizing what the team’s responsibilities are
 Making sure that members are aware of any changes to the original recovery plan.
 Assigning tasks to individual team members
 Setting up time and location for future meetings.
2. Damage Assessment Team
The Recovery Manager will lead the Damage Assessment Team. He will be responsible for
selecting the other team members. Likely choices would be a member (s) from facilities,
Operations, Network Services, Telephone Service, and technical Services. This tem will not be
responsible for a detailed damage assessment for insurance purpose. The purpose of this team is
to do two things:
87


Provide information for the Recovery Management Team to be able to make the choice
of the recovery site.
Provide an assessment of the salvage ability of major hardware components. Based on
this assessment the Recovery Management Team can begin the process of acquiring
replacement equipment for the recovery.
3. Administrative Support Team
The Administrative Coordinator will lead the Administrative Support Team. He/she will not be
responsible for selecting the other team members. The Recovery manager will assign or allocate
internal or sub-contracted resources. This team will provide:
 Administrative support to the other recovery teams as well as support to employees
 Take the burden of administrative details so that the technicians who are responsible for
systems recovery can concentrate on their recovery work.
 Be a liaison to Administration and the Finance Department.
 Provide support for executing acquisition paperwork.
 Assist with the detailed damage assessment and insurance procedures.
Team members, depending on their area of expertise will be assigned one or some of the
tasks listed below:
 Preparation of recovery site to accommodate the hardware, supplies and personnel
necessary for recovery
 Oversight activities for the repair and/or rebuilding of the system
 Overseeing the restoration of the network and all network connections
 Work with vendor on installation of equipment
 Coordinate food and sleeping arrangement of the recovery staff as necessary.
 Provide support to track time and expenses related to the disaster.
 Provide delivery and transportation services to the Cold Site or other locations as
required. (Cold Site: Area physically separate from the primary site where space has been
identified for use as the temporary home for the computer and network systems while the
primary site is being repaired.)
 Assist in contracting with outside parties for work to be done in the recovery process.
88
Attachment E to HP-2.02
HIPAA Policies and Procedures
DATA SECURITY BACKUP PLAN
Policy
Data Security Backup will occur daily, weekly and monthly.
(Note: No matter how reliable the system, it is not possible to restore data that has been deleted,
overwritten, or corrupted unless it has been backed up.)
Definitions
Backup: making a copy of files from a hard disk to tape for the purpose of retrieval in case the
original is erased, copied over, damaged, or destroyed. In the event of a problem, the files can be
restored from the tape back onto the disk. Backup disks are maintained off site at the end of the
day.
Archive: the method of long-term or legally required storage of important information that is
usually an extra backup copy kept securely offsite.
Business Continuity: also called Disaster Recovery, is similar to secure offsite archiving,
however, information and sometimes equipment are used temporarily for business continuance in
the event of a disaster.
Backup Methods
Full Level
A full backup usually includes the entire system and all its files. Weekly, monthly, and quarterly
backups constitute a full backup. The first weekly is a full backup, made on Friday. Subsequent
Monday through Thursday backups, until the next full backup, can be either incremental or
differential to save time and backup media space.
Incremental Level
With incremental backup, only the files that have changed since the last full or incremental
backup are backed up. Subsequent incremental backups only back up those files that have
changed since the previous incremental backup. On average, incremental backups take less time
because there are fewer files backed up. However, it takes longer to restore data since data from
the last full backup, plus data from all the incremental backups, must be restored.
Differential Level
With differential backup, every file that has changed since the last full backup is backed up each
time. It is faster to restore a differential backup. All you need is the last full and last differential
backup. Differential backup is gaining in popularity because it traps files at points in time, for
example, prior to virus corruption.
89
Storage of Backup Tapes
The backup tapes are taken off-site at the end of the business day.
Tape Rotation Method
The most commonly used media rotation scheduled is “Grandfather-Father-Son”. This scheme
uses daily (Son), weekly (Father), and monthly (Grandfather) backup sets.
Four backup media are labeled for the day of the week each backs up, for example Monday
through Thursday. Typically, incremental backups are performed on the “Son” group of media.
This media is reused each week on the day matching its label. A set of up to five weekly backup
media is labeled “Week 1”, Week 2” and so on.
Full backups are recorded weekly, on the day that a “Son” media is not used. This “Father”
media is reused monthly.
The final set of three media is labeled “Month 1”, “Month 2”, and so on, according to which
month of the quarter they will be used. This “grandfather” media records full backup on the last
business day of each month is reused quarterly.
Each of the “media” may be a single tape or a set of tapes, depending on the amount of data to
back up. A total of 12 media sets are required for this basic rotation scheme, allowing for a
history of two to three months. Because a longer history is often required, archive tapes are
periodically pulled from the rotation and replaced with new tapes.
Backup (Software Specific)
Catholic Charities uses tapes to backup software. This software does:
 Multi-platform server operating support…
 Tape rotation…
 Notification of backup failure
Staff Training Plan for Security and Privacy
1. Catholic Charities will train all members of its staff on the policies and procedures with
respect to the privacy and security of protected health information as necessary and
appropriate for the members of the staff to carry out their function within the agency. This
training will:
 Be provided to each member of Catholic Charities staff,
 Be provided to all new hires during orientation, and
 Be provided to each staff member whose functions are affected by a material change
in the policies or procedures of Catholic Charities within a reasonable period after the
material change becomes effective.
2. Catholic Charities will document that the training has been provided through maintenance of
one of the following:
 Certificate of Training.
 Staff Testing Document.
90
3. The Staff Certificate of Training and/or the staff-testing document will also be filed in the
personnel file. A copy will be maintained in the Compliance Office.
4. The training on security and privacy will include the following topics:
4.1
General awareness of security and privacy issues, including specific awareness of
HIPAA regulations and requirements.
4.2
Catholic Charities policies and procedures with respect to protected health
information and information security.
4.3
Vulnerabilities of health information in Catholic Charities environment.
4.4
Security responsibilities of each staff member:
 General security awareness and responsibility
 Password protection
 Virus prevention
 Data backup procedures
 Remote access
 Removal of information from Catholic Charities
 Client records outside of the official medical records
 Proper authorization and consent to release procedures
 Workstation acceptable use policies and practices
 Client rights and responsibilities regarding medical records
 Procedures to follow in case of a suspected breach of security or privacy
 Disaster plan and emergency procedures
5. Once this training has been received and acknowledged by all current staff, Catholic
Charities will deploy a continuing training plan that includes the following features:
5.1
Basic security awareness training as outlined above will be repeated for all staff at
least once every three years after the initial training. Staff members receiving this
follow-up training will complete another acknowledgement of training receipt form.
5.2
At least every three months, the Information Technology Department and the
Compliance Director, will publish a security reminder newsletter/flyer that will be
distributed to all staff via the following means:
 Email to all staff
Revised 12-04
Approved 6-05
91
HP-2.03
HIPAA Policies and Procedures
SECURITY - PASSWORDS
Policy
Password protection is one of the most important principles of network, e-mail, and voice mail
security. Catholic Charities provides access to the network, electronic mail and voice mail to all
staff in order to support its mission. Passwords are assigned for access to each of these systems
in order to authenticate a user’s identity, to protect network users and to provide security.
Definitions
Password: Authorized individual password assigned by the Information Technology (IT)
Department for access to its network, e-mail, and voice mail.
Proxy: Person authorized by user to request password change on user’s behalf. Proxy must be a
supervisor.
User: Anyone who holds a valid account on the network, e-mail, and/or voice mail system.
Procedure
1. Request for new, changed, or forgotten password
1.1
Request must be made in person at the IT Department from 9:00 a.m. to 5:00 p.m.
Monday through Friday.
1.2
Users unable to request password in person, may designate a proxy to authenticate the
request.
1.3
IT Department staff will issue password.
1.4
IT Manager or designee must approve any password changes requested by a user’s
supervisor.
2. Password Protection Responsibilities
2.1
System Administrator and user assumes the following responsibilities:
 System administrator must protect confidentiality of user’s password.
 User is responsible for all actions and functions performed by his/her account
 Suspected password compromise must be reported to the IT Director or designee
immediately
3. Password Guidelines
3.1
Select a wise password – to minimize password compromises:
 Do not use any part of the account identifier (username, login ID etc.)
92

Do not use a proper name or any word in the dictionary without altering it in some
way
3.2
A password is harder to crack if you utilize several of these selection techniques:
 Use a minimum of 6 alphanumeric and a maximum of 20 characters.
 Use mixed case.
 Use two or three short words that are unrelated.
 Deliberately misspell words.
 Take the first letter from each word of a phrase.
 Include at least two digits or punctuation characters.
3.3
Keep our Password Safe
 Do not tell your password to anyone.
 Do to let anyone observe you entering your password.
 Do not display your password in your work area or any other highly visible place.
 Change your password periodically.
 Do not reuse old passwords.
3.4
Additional Security Practice
 Ensure your workstation is reasonable secure in your absence from your office.
 Always log off your system when leaving your computer unattended.
 Passwords will be changed every 180 days.
 The system will “warn staff” of required password change 7 days in advance
 The minimum number of characters for password field is six alphanumeric
characters.
 The system will automatically disallow passwords that contain four contiguous
characters from a staff member’s first or last name or social security number.
(reference Anasazi Manual pg 26-27)
 After five failed attempts to log on to the system, the system will refuse to permit
access and will generate a notice to the Security Officer/Compliance Officer.
Approved 12-03
Revised 12-04
Approved 6-05
93
HP-2.04
HIPAA Policies and Procedures
DATA CLASSIFICATION POLICY
Purpose
The purpose of this data classification policy is to provide a system for protecting information
that is critical to the organization. All employees who may encounter confidential information
are expected to familiarize themselves with this data classification policy and to consistently use
it.
Policy
The organizations data classification system has been designed to support the need to know so
that information will be protected from unauthorized disclosure, use, modification, and deletion.
Consistent use of this data classification system will facilitate business activities and help keep
the costs for information security to a minimum. Without the consistent use of this data
classification system, Catholic Charities unduly risks loss of customer relationships, loss of
public confidence, internal operational disruption, excessive costs, and competitive disadvantage.
Applicable Information
This data classification policy is applicable to all information in the Catholic Charities
possession. For example, medical records on Clients, confidential information from suppliers,
business partners and others must be protected with this data classification policy.
Consistent Protection
Information must be consistently protected throughout its life cycle, from its origination to its
destruction. Information must be protected in a manner commensurate with its sensitivity,
regardless of where it resides, what form it takes, what technology was used to handle it, or what
purpose(s) it serves. Although this policy provides overall guidance, to achieve consistent
information protection, workers will be expected to apply and extend these concepts to fit the
needs of day-to-day operations.
Classification Labels
Public: This classification applies to information that is available to the general public and
intended for distribution outside the organization. This information may be freely disseminated
without potential harm. Examples include product and service brochures, advertisements, job
opening announcements, and press releases.
For Internal Use Only: This classification applies to all other information that does not clearly fit
into the other classifications. The unauthorized disclosure, modification, or destruction of this
information is not expected to seriously or adversely impact the organization, its Clients, its
employees, or its business partners. Examples include the company telephone directory, new
employee training materials, and internal policy manuals.
94
Confidential: This classification applies to the most sensitive medical and business information
that is intended strictly for use within the organization. Its unauthorized disclosure could
seriously and adversely impact the organization, its Clients, its employees, and its business
partners. For example, statutorily protected medical information such as, mental health
treatment, and HIV testing, sexually transmitted diseases, and alcoholism or substance abuse
treatment data. Other examples are personnel files or correspondence with legal counsel.
95
HP-2.05
HIPAA Policies and Procedures
SOFTWARE/HARDWARE POLICY
Policy
The success our organization depends on the quality and upkeep of our software and hardware.
Without an effective software/hardware policy in place, Catholic Charities cannot adequately
protect these expensive and vital investments. With this in mind, Catholic Charities has created
this software/hardware policy that outlines the acceptable use of both software and hardware,
defines standard software and hardware equipment, and explains the penalties for inappropriate
use of organizational software and hardware.
Acceptable Use
This section defines the boundaries for the “acceptable use” of Catholic Charities electronic
resources, including software, hardware devices, and network systems. Hardware devices,
software programs, and network systems purchased and provided by Catholic Charities are to be
used only for creating, researching, and processing Catholic Charities related materials. By using
Catholic Charities hardware, software, and network systems you assume personal responsibility
for their appropriate use and agree to comply with this policy and other applicable Catholic
Charities policies, as well as state, and federal laws and regulations, including the Health
Insurance Portability and Accountability Act of 1996 (HIPAA).
Software
All software acquired for or on behalf of Catholic Charities or developed by Catholic Charities
employees or contract personnel on behalf of Catholic Charities is and shall be deemed Catholic
Charities property. All such software must be used in compliance with applicable licenses,
notices, contracts, and agreements.
Purchasing
All purchasing of Catholic Charities software shall be centralized with the Information
Technology Department to ensure that all applications conform to corporate software standards
and are purchased at the best possible price. All requests for corporate software must be
submitted to the Program Director/Division Director of that department for approval. The request
must then be sent to the Information Technology Manager, who will then determine the standard
software that best accommodates the desired request.
All software must be purchased and installed by the IT Department.
Licensing
All software is licensed to Catholic Charities and Catholic Charities will follow all
applicable licenses, contracts, and agreements regarding software utilization.
96
Software standards
The following list shows the standard suite of software installed on Catholic Charities computers
(excluding test computers) that is fully supported by the Information Technology Department:
 Microsoft Office Suite (Excel, Word, Access & PowerPoint)
 Anasazi
 Blackbaud
 ABRA
 Microsoft Outlook
Employees needing software other than those programs listed above must request such software
from the Information Technology Manager. Each request will be considered on a case-by-case
basis in conjunction with the software-purchasing section of this policy.
Hardware
All hardware devices acquired for or on behalf of Catholic Charities or developed by Catholic
Charities employees or contract personnel on behalf of the Catholic Charities is and shall be
deemed Catholic Charities property. All such hardware devices must be used in compliance with
applicable licenses, notices, contracts, and agreements.
Purchasing
All purchasing of Catholic Charities computer hardware devices shall be centralized with the
Information Technology Department to ensure that all equipment conforms to corporate
hardware standards and is purchased at the best possible price. All requests for corporate
computing hardware devices must be submitted to the Program Director/Division Director of that
department for approval. The request must then be sent to the Information Technology Manager,
which will then determine standard software that best accommodates the desired request.
All hardware must be purchased and installed by the IT Department.
Hardware Standards
Hardware standards: Current market standards.
Employees needing computer hardware other than what is stated above must request such
hardware through their Division Director and then from the Information Technology
Department. Each request will be considered on a case-by-case basis in conjunction with the
hardware-purchasing section of this policy.
Outside Equipment
No outside equipment may be plugged into Catholic Charities network without the Information
Technology Manager’s permission.
97
Re-use of Media
The Information Technology Department is responsible for re-furbishing computer media prior
to re-use. Staff is responsible for erasing disks prior to re-use. This process will assure that reused media is free of confidential information.
Disposal of Hardware and Software
The Information Technology Department will utilize current industry standards for disposal of
hardware and software.
Encryption and Decryption
The IT Department utilizes 128-bit encryption/decryption as well as firewalls in order to
safeguard information.
Confidentiality
It is the policy of Catholic Charities that all personnel must preserve the integrity and the
confidentiality of all client information regardless of the media utilized. Personnel will treat all
client information in accordance with all Catholic Charities Policies, professional standards,
federal, state, and accrediting agencies requirements governing confidentiality and privacy.
Personnel will use their best effort to ensure the accuracy, timeliness, and completion of data in
order to ensure the integrity of the data as well as the privacy and confidentiality.
Violations and penalties
Penalties for violating the Software/Hardware Policy will vary depending on the nature and
severity of the specific violation. Any employee who violates the Software/Hardware Policy will
be subject to:
Disciplinary action as described in Catholic Charities employee handbook, including but not
limited to reprimand, suspension, and/or termination of employment.
Civil or criminal prosecution under federal and/or state law.
Acknowledgment of Software/Hardware Policy
This form is used to acknowledge receipt of and understanding of Catholic Charities Software/
Hardware Policy.
Procedure
Complete the following steps:
1. Read the Software/Hardware Policy.
98
HP-2.06
HIPAA Policies and Procedures
POLICY ON WORKSTATION USE
Introduction
Catholic Charities has adopted this Policy on Workstation Use to protect the confidentiality and
integrity of confidential Protected Health Information as required by law, professional ethics,
HIPAA and accreditation requirements. All personnel of Catholic Charities that use computer
terminals must be familiar with the contents of this policy and follow its guidance, as
appropriate, when using computer equipment. Familiarity with the plan and demonstrated
competence in the requirements of the plan are an important part of every employee’s
responsibilities.
Assumptions

Every computer workstation in Catholic Charities is vulnerable to environmental threats,
such as fire, water damage, power surges, and the like.

Any computer workstation in Catholic Charities can access confidential patient information
if the user has the proper authorization.

All computer screens cannot be visible to individuals who do not have access to confidential
information that may appear on the screen.
Preventative Measures

All computer users will monitor the computers operating environment and report potential
threats to the computer and to the integrity and confidentiality of data contained in the
computer system. For example, if air conditioning fails and the temperature around the
computer could exceed a safe level, the user must immediately notify the Information
Technology Department and the person in your program responsible for maintenance.

All computers plugged into an electrical power outlet will use a surge suppressor approved
by the Information Technology Department.

All personnel using computers will familiarize themselves with, comply with Catholic
Charities disaster plans, and take appropriate measures to protect computers and data from
disasters.

Personnel using computers will not eat nor drink at the terminal to prevent damage due to
spills and food debris.

Personnel logging onto the system will ensure that no one observes the entry of their
password.
99

Personnel will neither log onto the system using another’s password nor permit another to log
on with their password. Personnel will not enter data under another person’s password.
Please refer to the Password Protection Policy.

After five failed attempts to log on, the system will refuse to permit access and generate a
notice to the system administrator.

Each person using Catholic Charities computers is responsible for the content of any data he
or she inputs into the computer or transmits through the agency’s system. No person may
hide his or her identity as the author of the entry or represent that someone else entered the
data or sent the message. All personnel will familiarize themselves with and comply with the
agency’s computer, e-mail, telephone, Internet, and fax policy.

No employees may access any confidential client information or other information that they
do not have a need to know. No employee may disclose confidential patient or other
information unless properly authorized (see the Confidentiality Policy and the Disclosure
Policy).

Employees must not leave printers unattended when they are printing confidential client
information or other information. This rule is especially important when two or more
computers share a common printer or when the printer is in an area where unauthorized
personnel have access to the printer.

Employees may not use the Catholic Charities system to solicit for outside business ventures,
organizational campaigns, or political or religious causes. Nor may they enter, transmit, or
maintain communications of a discriminatory or harassing nature or materials that are
obscene or x-rated. No person shall enter, transmit, or maintain messages with derogatory or
inflammatory remarks about an individual's race, age, disability, religion, national origin,
physical attributes, sexual preference, or health condition. No person shall enter, maintain, or
transmit any abusive, profane, or offensive language. Such transaction will result in
disciplinary actions, up to and including termination.

Personnel using the computer system will not write down their password and place it at or
near the terminal, such as putting their password on a yellow “sticky” note on the screen or
on a piece of tape under the keyboard.

Each computer will be programmed to generate a screen saver when the computer receives
no input for a specified period. Supervisors may specify an appropriate period to protect
confidentiality while keeping the computer available for use.

Users must log off the system if he or she leaves the computer terminal for more than 30
minutes and must log off if he/she is leaving the premises.

No personnel may download data from Catholic Charities system onto diskette, CD, hard
drive, fax, scanner, any network drive or any other hardware, software, or paper without the
express permission of the department head with notice to the Information Technology
Manager.

No personnel may download any software without express written permission of the
Information Technology Manager. The Information Technology Manager must approve any
100
software that an employee wishes to download. This rule is necessary to protect against the
transmission of computer viruses into Catholic Charities’ system.
Enforcement
All supervisors are responsible for enforcing this policy. Employees who violate this policy are
subject to disciplinary actions, up to and including termination from employment, professional
discipline, or criminal prosecution in accordance with the Catholic Charities Sanction Policy.
Approved 12-03
Revised 12-04
Approved 6-05
101
HP-2.07
HIPAA Policies and Procedures
VIRUS PREVENTION POLICY
Purpose
This policy is designed to protect Catholic Charities equipment and networks from the potential
threat of software virus intrusion and infection. The policy is specifically designed to deal with:
 Boot track and partition table viruses.
 Executable file viruses.
 Multipartite, parasitic, stealth, polymorphic and other viruses.
 Conventional macro viruses.
 Active communication-enabled viruses, trojans, and worms as well those that may utilize
future vectors.
 Malicious code, which has been compressed by a 32-bit compressor.
 Self-updating malicious code.
Controls outlined in this policy are characterized as either primary controls or synergistic
controls.
Primary controls are the most important and effective stand-alone preventative technique and
constitute Catholic Charities principal policy recommendations for organizations.
Synergistic controls function in a way that is analogous to the military strategy of defense-indepth, which provides for redundancy and failure of particular controls. When operating alone,
individual policies, controls or screens may have limited value, but synergistically can be quite
effective. When used in conjunction with other synergistic controls, serial screens tend to behave
according to Baye’s theorem. Their cumulative effect tends to improve with the use of each
control and their use tends to enhance the effectiveness of other, primary, controls. Catholic
Charities recommends the use of all synergistic controls that a site can easily implement without
infringing on other business or clinical productivity.
Desktop Systems
1. Catholic Charities Recommended Primary Controls at Desktop Anti-Virus Level
These controls will be implemented by the Information Technology Department unless
otherwise indicated:
1.1
Install certified anti-virus software on all desktop and laptop PCs and workstations.
1.2
Subscribe to the alert service and virus definition file update service provided by the
software vendor. Continuous monitoring of the software vendor’s site for updates will
be the responsibility of a designated Information Technology Department staff
member.
1.3
Desktop anti-virus software (virus signatures) will be updated automatically through
the use of network software policies. No user intervention will be required.
102
1.4
Perform emergency updates within one business day after an alert.
1.5
Implement the following desktop/laptop/workstation anti-virus software
configuration:
 Enable full-time, background, real time, auto-protect or similar mode
 Enable start-up scanning of memory, master / boot records, system files
 Configure scanning/checking options to include checking for all files.
 Enable logs for all desktop virus-related activity.
1.6
Subscribe to alert services from office productivity suite vendors and install all
recommended security updates automatically through the use of network software
policies.
1.7
Additional notes on desktop level policies:
 Alerts to users are neither recommended nor discouraged. However, system
administrator alerts, logs, or other advisories are to be continuously enabled. If
user alerts are enabled, User controls over the anti-virus software will be set to
minimum levels to prevent users from “canceling” a virus alert.
 User-driven scanning policies such as requesting users to scan floppies,
downloads or hard drives are not recommended as they are generally more
expensive and infringing than useful.
2. Catholic Charities Recommended Synergistic Controls at the Desktop-Level
These controls will be implemented by the Information Technology Department unless
otherwise indicated:
2.1
Enable Macro Virus Protection in Microsoft Office© Programs.
2.2
Use the anti-virus software heuristic controls (in full-time background mode where
available).
3. Synergistic Controls at the E-Mail Client Level
3.1
Turn off auto-open attachments
3.2
Configure for Plain text only
3.3
Configure to challenge execution of all *.EXE, *.HTA, *.VBS and other executables
attachments
3.4
Configure to challenge opening of all *.doc, *.xls (and potentially *.ppt files)
3.5
Configure to challenge double click of all attachments
3.6
Do not store “ALL” Company alias in local email lists
Network File and Print Servers
1. Primary Control at Inside Server level
103
1.1
Run anti-virus Scanner in full time, background, automatic, auto-protect or similar
mode on any file server which potentially stores files which are potentially infect-able
such as*.doc files and executables which run on desktops.
1.2
Update server signature as notified via software vendor’s subscription service/alert
service.
2. Synergistic Controls at the Inside Server Level
2.1
Utilize centralized anti-virus management
2.2
Utilize centralized desktop management
2.3
Manage Internet Explorer© and Visual Basic© Scripting centrally
E-Mail Gateways, Firewalls, Other Gateways and Anti-Spam Tools
1. Catholic Charities Primary Control at the Gateway Level
1.1
Install e-mail gateway antivirus software configured for full-time active mode.
1.2
Configure anti-virus software to check/scan all files
1.3
Filter all arriving (and departing if possible) e-mail traffic by subject line /header.
1.4
Be prepared to rapidly adjust filtering rules based on security notices, software
vendor alerts, user reports, etc.
2. Gateway Level, Potential Synergistic Controls
2.1
Filter all arriving and departing e-mail by Spam threshold (greater than 40 identical
messages blocked and source traced, if inside).
2.2
Filter all *.exe attachments and similar
2.3
Filter ActiveX© and JavaScript©
Human Factors Potential Synergistic Controls
1. Educate users to consider e-mail attachments and links potentially dangerous and to treat
them very cautiously. Specifically recommend education: Open only expected attachments
and links from known and trusted sources. Delete or question all others before opening.
2. Keep system managers updated and informed.
3. Reinforce the message to users to never double click an e-mail attachment that is not
expected. This policy is difficult since the affected (malicious) email will normally come
“From” a trusted person. (Well informed users can be taught that *.doc, *.exe, *.doc, *.vbs,
and *.hta extensions are the most likely to be dangerous). Desktop anti-virus software will
104
normally work if it is kept updated and properly configured to operate full-time in the
background.
4. Users that experience more than 2 anti-virus alerts in a 30-day period may be categorized as
“high risk” users. Depending upon the source and nature of the infection, High Risk users
will be subject to the following policy:
 Disabling of email and/or Internet access
 Disabling of external drives such as CD-ROM drives, floppy drives, ZIP drives, tape
drives, etc.
Contact point
Questions about this policy may be directed to the Information Technology Manager.
Disciplinary process
Violation of these policies may subject employees or contractors to disciplinary procedures up to
and including termination.
Approved 12-03
Approved 6-05
105
HP-2.08
HIPAA Policies and Procedures
ACCESS, CONTROL, AND VALIDATION
Policy
To protect PHI (protected health information) from improper access, unauthorized access,
disclosure, and destruction by defining a user based/role based access that is based on a need-toknow. This policy defines policies and procedures for verifying access prior to granting physical
access and will validate the access privileges of an employee prior to granting such privileges.
Need to Know
A user has access only to data that he or she needs to perform a particular function.
Privacy and Security Hierarchy
The Anasazi Central System accommodates the following privacy/security functionality:
1. Level 1A: ability to designate which staff member can login
The staff that are permitted to Login are established through the Staff Maintenance view.
This view allows for the entering future login dates. This view also permits the entering of a
future Login and Expiration Date. For example, staff member will terminate employment
next Wednesday, the system will proactively set his/her Login expiration date which will
expire on that Wednesday at midnight.
2. Level 1B: ability to designate which staff members can have client activity recorded for
them
This would indicate if they performed a service, signed an assessment or are the primary
server for an assignment.
3. Level 2B: ability to designate which views each staff member can access and the degree of
access to each.
These views can only be launched by staff that are specifically designated as having access to
Security Views and further requires the Staff Password in order to be launched. The system
allows for entering a future Expiration Date for this access.
4. Level 3: ability to designate which clients each staff member can access
The system supports the need to know concept as it relates to access to client information.
The following client access designations are available:
 All clients (Restricted category – System Administrator approval only)
 Only clients that are currently open to a Unit/Subunit to which the staff member has
access
106

Staff utilizing the report writer does not have access to all clients. If a report is
queried for a range of clients, the message “Clients constrained by Staff Access” will
print in the heading.
5. Level 4: ability to designate which units/subunits each staff member can access
This limits staff’s access to their unit/subunits only.
This control will prevent certain client activity from being entered, displayed, processed and
reported at Units/subunits to which the staff members does not have access.
6. Level 5A: ability to designate which staff members can add clients
Only a defined set of staff members has the capacity to add new clients. This approval is
done through the System Administrator.
7. Level 5B: ability to designate which staff members can and cannot add treatment sessions
and Assignments for clients. Adding treatment sessions and assignments has special
consideration related to the fact that staff members commonly cannot access clients that are
not on their caseload, and as such cannot put clients on their caseload. The following
designations are permitted for staff:
 Staff may add treatment sessions and assignment for all clients
8. Level 5C: ability to designate which staff member can carry a caseload
The staff members who may carry a caseload are established through the Staff Maintenance
view. This control allows or prevents the staff member from being designated as a Primary
Server for and Assignment and further allows or prevents the staff from being made a
member of a treatment team.
9. Level 6A: ability to designate which client assessment can be accessed by staff members.
Within the Assessment and Treatment Planning View, staff members have access to the
clients on their Home page. The category of treatment functionality controls which
Assessments the staff member can display/access for those clients. For each category of
Treatment to which a staff member has access, the degree of access is designated as Show or
Add.
10. Level 6B: ability to designate which pages on the Client Assessments can be accessed by
staff members.
The Assessment and Treatment Planning provides for designating the credentials that a staff
member must have in order to access Pages on Assessments.
11. Level 6C: ability to designate which questions on the client assessment can be accessed by
staff members. Parameters are established as follows:
 Administrative Access: staff can neither access clinical questions nor final approve
Assessments/Treatment Plans with Clinical Questions.
 Clinical access: Staff can access clinical questions and final approve
Assessments/Treatment Plans with clinical questions
107

Transcription Access: staff can access clinical questions but cannot final approve
Assessments/Treatment Plans with Clinical Questions.
Reporting
A record of every report that has been run is permanently saved.
Staff Homepage Access
Staff may navigate to another Staff member’s Homepage (i.e. vacation coverage, etc.). The
ability to do so is controlled as follows:
 Clinical Administrators may navigate to any Staff member’s Homepage
 Staff may navigate to the Homepage of a subordinate in the Supervisor Tree
 Staff may navigate to the Homepage of a staff member to whom they have been granted
Homepage Guest Access.
Intake Workers
Before an assignment is opened for a new client or for a client that was previously closed, the
client is not displayed on any staff member’s caseload or Homepage. Clients are generally
initially entered through an Intake Process and intakes are performed by a defined set of Intake
Workers at a defined setoff Units/Subunits.
The system allows the Intake Worker at each Unit/Subunit to be designated. Staff members are
designated as Intake Workers and have the ability to record a “Pre Intake” for a client. Clients
which are in the Pre Intake process will display on the Intake Workers’ Homepage and will be
displayed on the Refer to Pre-Intake Staff member’s Homepage, which will grant rights to that
Staff member to open an Assignment for the client and as such to permanently place the client on
a Caseload/Homepage.
Treatment Teams
Establishing Treatment teams is a means to indicate that more than one staff member is treating a
client. The system provides for establishing a Permanent Treatment Teams for which a team
leader and team members are designated.
Supervisory Tree
The Supervisory Tree is a means to indicate the line of supervision. The usage is as follows:
 Supervisor can access a subordinate’s Homepage
 A supervisor can grant both Homepage and Client Guest Access to a subordinates
Homepage/Clients
 A single staff can be subordinate to multiple supervisors.
Breaking the Glass
The Assessment and Treatment Planning system provides a means to “Break the Glass”.
Breaking the Glass is a means to, in a crisis situation, put a particular client on a staff member’s
Homepage who ordinarily would not be displayed. This Break the Glass will appear on the
108
Privacy/Security Officer’s Homepage along with any other abnormal disclosure authorization
etc.
Password (see password policy)









Requirement that passwords are to be changed every 180 days.
Warns staff of required password change in 14 days.
Minimum number of characters for a password is 6.
Utilizes restricted password – automatically disallows password that contain four contiguous
characters from the staff members first or last name
Maximum number of login attempts – 3 attempts only. (After that, they will need to contact
the Point Person and the Point Person will contact the System Administrator for a new
temporary Anasazi Live/Train password).
Generates reports concerning any security issues (failed login attempts, breaking the glass…)
Maximum Days for a Temporary Guest Privilege is 7.
Guest Access Latency Days is 7.
Assignment close Latency Day is 7.
Monitoring and Audit Control
The System Administrator will monitor the following:
 Login attempts failures
 Break the Glass
 Unauthorized Users in Anasazi
 Anasazi Security Incidents
 Anasazi Use and Management Report
The IT Department will monitor the following:
 Login attempts failures
 Unauthorized Users
 Security Incidents
 Staff accessing inappropriate sites
 Internet Usage
The Security Officer and the Privacy Officer will review any security incidents and will review
such incidents with Senior Management.
Approved 12-03
Revised 12-04
Approved 6-05
109
HP-2.09
HIPAA Policies and Procedures
TERMINATION PROCESS
Purpose
To protect the privacy and security of client related information as well as Catholic Charities
business information, all employees whose employment ends or job classification changes so
they do not have access to client information or business information, will have his/her user ID’s,
user accounts and access permissions immediately removed from the system.
Procedure
1. Upon knowledge of an employee's termination or change in job description that no longer
requires access to client information and Catholic Charities business information, the
employee's immediate supervisor is responsible for immediately notifying the Information
Technology (IT) Department.
2. The New Employee Hire/Termination email form will be completed and emailed to the IT
Department.
3. The Information Technology staff will immediately remover the employee’s user ID, user
account and access permissions from the system.
4. If the employee has in his/her possession any of Catholic Charities equipment, it shall be
returned to the IT department prior to the employee’s last day of employment or last day in
the position that required the equipment.
5. The IT Department staff will check all equipment to assure it is in good repair and to assure
the return of all equipment.
6. The IT Department will check with the Program Director prior to deleting any information
from the equipment.
Approved 12-03
Reviewed 6-05
110
HP-2.10
HIPAA Policies and Procedures
(aka AP-4.05)
COMPUTER, E-MAIL, AND INTERNET USAGE POLICIES
This document sets forth Catholic Charities’ policies with regard to computer, e-mail, and
Internet usage, including access to, review or disclosure of e-mail messages sent or received by
Catholic Charities’ employees, and Internet access and usage. Catholic Charities reserves the
right to modify or update these policies at any time. Use of the computer system, e-mail system,
or the Internet in violation of these policies or other Catholic Charities’ policies is a serious
violation and can result in a loss of access, disciplinary action (including termination), or other
legal actions. All employees and volunteers will be required to read the Computer, E-Mail, and
Internet Usage Policies and sign the Acknowledgement of Understanding (Attachment A).
1. Use for Business Purposes Only; Catholic Charities’ Access and Review
1.1
Catholic Charities’ Computer Systems.
The Catholic Charities computer system, e-mail system, and Internet access are
provided to approved employees at Catholic Charities’ expense solely to assist them
in carrying out Catholic Charities’ business. The e-mail system permits employees to
communicate with each other internally and with selected outside individuals and
companies. Internet access permits approved employees to use resources at
appropriate Internet sites to help them perform their duties and carry out Catholic
Charities’ business.
Catholic Charities owns, maintains and is responsible for the computer system.
Employees must limit use the computer system, including e-mail and access to the
Internet, to the business purposes of Catholic Charities and only to obtain and
transmit information in accordance with Catholic Charities’ policies and procedures.
1.1.1
1.2
In order to maintain the integrity and the security of Catholic Charities’
Information Technology (IT) infrastructure, software and databases, Internet
access will be used only for the business purposes of Catholic Charities’ business.
Access to Anasazi and Outlook e-mail is available to all Catholic Charities’
employees. Any staff member requiring access to the Internet beyond Anasazi and
Outlook e-mail will require justification and approval from the Program Director,
the Division Director/Department Head, and the IT Manager. (See Attachment B:
Request for Internet Access form.)
Access and Review of E-Mail Communications and Internet Usage.
Catholic Charities treats all messages sent, received or stored in the e-mail system as
business messages.
Catholic Charities has the capability to access, review, copy, and delete any messages
sent, received, or stored on the e-mail system. Catholic Charities has the ability to
access deleted messages. Catholic Charities has the capability to monitor employees’
Internet usage, including the time spent on-line and the sites accessed.
111
Catholic Charities reserves the right to monitor, access, review, audit, intercept, use,
copy, or delete e-mail messages of any kind for any purpose and to disclose them to
any party (inside or outside Catholic Charities). Catholic Charities reserves the right
to review files and communications to maintain system integrity and ensure that users
are using the system appropriately, responsibly and in accordance with Catholic
Charities’ policy and procedures.
1.3
E-Mail Etiquette.
Employees should bear in mind that their e-mail messages may be read by someone
other than the person to whom they are addressed and may even someday have to be
disclosed to outside parties or a court in connection with litigation. Accordingly,
employees are directed to ensure that their messages are courteous, professional and
businesslike. E-mail messages, once sent, are usually irretrievable. Employees should
be sensitive to the fact that, in the absence of an explanation, e-mail messages may be
ambiguous and convey the wrong impression. This is of specific concern when a
message is being forwarded to multiple recipients. Rather than quickly sending
messages without adequate review, employees should consider printing the messages
and reading them prior to distribution to ensure that their content is completely
appropriate. The“everyone@cctrenton.org” is to be used for business purpose only.
1.4
E-mail and Confidentiality of Protected Health Information.
At no time should any protected health information of any clients be transmitted via
electronic mail outside of Catholic Charities network, unless it is encrypted. Due
care shall be used when transmitting private health information of any client by
electronic mail within Catholic Charities internal network, to prevent the transmittal
and/or receipt of such information to any staff member not authorized to have access
to the information. Staff member shall not forward to any third party outside of
Catholic Charities any email messages that contain any form of individually
identifiable health information, unless expressly authorized by the client on a signed
authorization for use/disclosure of health information form. Catholic Charities will
incorporate e-mail messages sent or received that concern the diagnosis or treatment
of a client, or payment for treatment, into the client’s chart and/or billing file and
shall maintain such information with the same degree of confidentiality as the
remainder of the client’s chart and billing file.
1.5
Storing and Deleting E-Mail Messages.
Catholic Charities strongly discourages the storage of large numbers of e-mail
messages for a number of reasons. First, because e-mail messages may contain
confidential information, it is desirable to limit the number, distribution, and
availability of such messages. Second, retention of messages consumes storage space
on the network and personal computer hard disks, and can slow down the
performance of both the network and individual personal computers. Finally, in the
event that Catholic Charities needs to search the network server, back-up tapes or
individual hard disks for important documents, the fewer documents it has to search
through, the easier the search will be.
Accordingly, employees should regularly delete any e-mail messages they send or
receive that no longer require action or are not necessary to an ongoing project.
Employees should audit their stored e-mail messages periodically to identify
messages that are no longer needed and should be deleted.
112
2. Permitted and Prohibited Uses
2.1
Use Limited to Catholic Charities’ Business Purposes.
The computer system, e-mail system, and Internet access may be used only to support
and promote Catholic Charities business objectives. The use of computers and
Internet access through the Catholic Charities’ system is a privilege, not a right, and
may be revoked. Use of the computer system, e-mail system, or the Internet in
violation of these policies can result in disciplinary action.
Therefore, for example, employees may not:
2.2
2.3
2.1.1
intentionally waste limited computer resources;
2.1.2
engage in activities that have the potential to disrupt the business environment
of the workplace;
2.1.3
engage in actions that damage computers, computer systems or computer
networks;
2.1.4
use the computer system for commercial purposes, for personal gain or profit,
or to engage in illegal activity;
2.1.5
use the e-mail system to copy and/or transmit any documents, software, or
other information protected by the copyright laws;
2.1.6
use their Catholic Charities’ provided Internet address when communicating
personal viewpoints on the Internet, unless approved by Catholic Charities’
Senior Management; or
2.1.7
use the computer system to access, view, store or distribute obscene,
offensive, harassing, discriminatory, or otherwise objectionable files.
E-Mail Use.
E-mail messages, whether created inside Catholic Charities or created outside
Catholic Charities and transmitted within Catholic Charities or from Catholic
Charities to other sites, can generate claims of defamation, harassment, and
discrimination. Therefore, employees may not:
2.2.1
use the e-mail system to engage in any communications that are in violation of
any policy; or
2.2.2
use the e-mail system to transmit or display defamatory, obscene,
intimidating, offensive or harassing messages or pictures, or messages that
disclose personal information without authorization.
Internet Use.
An approved employee accessing the Internet from a Catholic Charities’ site is
responsible for all on-line activities that take place through the use of his or her login
and password. When using another organization’s networks or computing resources,
employees must comply with the rules appropriate for that network.
113
Those employees with Internet access privileges may not:
2.3.1
access inappropriate websites, including those involving gambling,
pornography, or obscene materials;
2.3.2
obligate Catholic Charities financially to any commercial web-sites without
the express permission of the IT Manager; or
2.3.3
use the Internet from a Catholic Charities’ site to engage in the practice of
moonlighting or for any commercial purposes, advertising or other similar
activities.
3. Computer System Security
3.1
Importance of System Security.
Catholic Charities is obligated to maintain the confidentiality of its own information,
of client information and of communications with clients. As a consequence, all
users of the computer system must take steps to ensure the security of the system and
to maintain the confidentiality of all information on the system or communicated
through the use of the system. Each employee is responsible for what happens under
his or her log in name. Violations of security policies are considered serious
violations and can result in disciplinary action.
3.2
Password and User Logon ID’s are unique to each authorized user and will be
assigned by the IT Department. Passwords must be kept private. They should not be
shared, coded into programs, or written down.
In order to protect against dissemination of confidential information, employees
should not access their e-mail messages for the first time in the presence of others. Email windows should not be left open on the screen when the computer is unattended.
E-mail passwords (as well as other computer passwords) should be routinely changed.
3.3
Computer Viruses.
Computer viruses can be injected into the system through the receipt of e-mails, email attachments or files from other systems. Exercise particular care when opening
files attached to e-mails from unknown senders. Employees must pay attention to and
strictly comply with all warnings and instructions of the IT Department relating to
viruses. Employees must immediately inform the IT Department of the presence of
any virus on any Catholic Charities computer. Any computer that is infected or
suspected of being infected must immediately be disconnected from the network to
reduce the risk of spreading a virus. Employees are prohibited from disabling or
interfering with any virus scanning software installed on their system.
3.4
Installing or Downloading Software.
The IT Department must approve and install all software on any Catholic Charities
computer. No employee may download software without the approval of the IT
Department. When and if authorized to download software, employees must comply
with all restrictions and procedures for downloading software, including mandatory
virus scanning and detection procedures. Employees must inform the IT Department
114
of any virus, configuration change, or different behavior of a computer or application,
especially after the addition of new software to the environment.
All employees must obey and follow all licensing agreements and procedures with
regard to the use and installation of all software. The IT Department will inspect
computers periodically to verify that all software has been approved and licensed
properly.
3.5
Remote Access.
All remote access to the computer system, whether via dial-up or Internet access,
must use encryption services to protect the confidentiality of the session. Information
regarding access to the computer system, such as dial-up phone numbers, is
confidential. This information must not be posted on electronic bulletin boards, listed
in telephone directories, placed on business cards or made available to third parties
without express authorization.
3.6
Confidentiality.
Users must keep confidential all references and resource labels of Catholic Charities’
computer system including but not limited to internal domain names, server names,
printer names, IP addresses, and directory services.
4. Confidentiality of Communications
4.1
Importance of Confidentiality.
Employees must exercise a greater degree of caution in transmitting information
through e-mail than they take with other means of communicating information
(e.g., written memoranda, letters or phone calls) because of the reduced human
effort required to redistribute such information and the security considerations on
the Internet. Confidential information of Catholic Charities or its clients should
never be transmitted or forwarded to outside individuals or companies not
authorized to receive that information.
Employees should always use care in addressing e-mail messages to make sure
that messages are not inadvertently sent to outsiders or the wrong person within
Catholic Charities. In particular, employees should exercise care when using
distribution lists to make sure that all addressees are appropriate recipients of the
information. Lists may not always be kept current and individuals using lists
should take measures to ensure that the lists are current. Employees should
refrain from routinely forwarding messages containing confidential information to
multiple parties unless there is a clear business need to do so.
Employees may contact the IT Department with any questions concerning this policy or
procedure.
Approved 5-97
Revised and approved 12-03
Reviewed 6-05
115
Attachment A to HP-2.10
HIPAA Policies and Procedures
(aka Attachment A to AP-4.05)
ACKNOWLEDGMENT OF UNDERSTANDING
COMPUTER, E-MAIL, AND INTERNET USAGE POLICIES
I acknowledge that I have read and will abide by Catholic Charities’ policies regarding
computer, e-mail, and Internet usage. In particular:
1. I understand that Catholic Charities has the complete authority to monitor my computer
usage, e-mail communications, and Internet usage, and that Catholic Charities may monitor
on a routine and/or special case basis.
2. I will accept personal responsibility for all activities occurring under my password/login.
3. I will keep confidential my password/login and will not utilize another’s password/login to
access any system.
4. I will keep confidential all client information, regardless of the medium – computer, email,
etc.
5. I understand that the computer system, the e-mail system, and the Internet system are to be
used for business purposes only.
6. I understand that I cannot install or download software and/or programs, screen savers,
firewalls, etc. without written approval of the IT Manager.
7. I understand that any violation by me of Catholic Charities’ computer, e-mail, or Internet
policies may result in a loss of access, disciplinary action (including termination), or other
legal action.
______________________________________________
Signature
______________________________________________
Name (please print)
Original: Personnel file
116
______________________
Date
Attachment B to HP-2.10
HIPAA Policies and Procedures
(aka Attachment B to AP-4.05)
REQUEST FOR INTERNET ACCESS
Name _____________________________________
Title ____________________________
Program ___________________________________
Division _________________________
Location
_______________________________________________________________________
Date of Request _______________________
Justification for access to the Internet:
Program Director’s Signature ___________________________
Date __________________
------------------------------------------------------------------Division Director/Department Head Review and Approval
( ) approved ( ) not approved
Signature ___________________________________________
Date ________________
------------------------------------------------------------------IT Manager’s Signature _______________________________
Original: IT Office
Copy: Program Director
117
Date ___________________
HP-3.01
HIPAA Policies and Procedures
RISK ANALYSIS
Purpose
Catholic Charities depends heavily on technology and automated systems, and their disruption
for even a few days could negatively impact both client services and business functions. The
continued operations of an organization depend on management’s awareness of potential
disasters, their ability to develop a plan to minimize disruptions of mission critical functions, and
the capability to recover operations expediently and successfully. The risk analysis process helps
to protect the organization in the event that all or parts of its operations and/or computer services
are rendered unusable. Catholic Charities will review each functional area of the organization
and determine the potential risks and impact related to various disaster threats. (Risk Analysis)
Definition
Risk Analysis:
 A risk analysis involves identifying the most probable threats to an organization and
analyzing the related vulnerabilities of the organization to these threats.
 A risk assessment involves evaluating existing physical and environmental security and
controls, and assessing their adequacy relative to the potential threats of the organization.
 A business impact analysis involves identifying the critical business functions within the
organization and determining the impact of not performing the business function beyond the
maximum acceptable outage. Types of criteria that can be used to evaluate the impact
include: customer service, internal operations, legal/statutory and financial.
Risk Analysis Process
1. Regardless of the prevention techniques employed, possible threats that could arise inside or
outside the organization need to be assessed. Although the exact nature of potential disasters
or their resulting consequences are difficult to determine, it is beneficial to perform a
comprehensive risk assessment of all threats that can realistically occur to the organization.
Regardless of the type of threat, the goals of Catholic Charities recovery planning are to
ensure the safety of our clients, employees, volunteers and other personnel during and
following a disaster.
In determining the probability of a specific disaster, Catholic Charities will include, but not
be limited to the following:
 geographic location.
 topography of the area.
 proximity to major sources of power, bodies of water and airports.
 degree of accessibility to facilities within the organization.
 history of local utility companies in providing uninterrupted services.
 history of the area’s susceptibility to natural threats.
 proximity to major highways, which transport hazardous waste and combustible
products.
118
2. Potential exposures may be classified as natural, technical, or human threats. Examples
include:
Natural Threats: Internal flooding, external flooding, internal fire, external fire, seismic
activity, high winds, snow and ice storms, tornado, hurricane, epidemic, tidal wave.
Technical Threats: Power failure/fluctuation, heating, ventilation or air conditioning failure,
malfunction or failure of CPU, failure of system software, failure of application software,
telecommunications failure, gas leaks, communications failure, nuclear fallout.
Human Threats: Robbery, bomb threats, embezzlement, extortion, burglary, vandalism,
terrorism, civil disorder, chemical spill, sabotage, explosion, war, biological contamination,
radiation contamination, hazardous waste, vehicle crash, airport proximity, work stoppage
(Internal/External), computer crime.
3. Catholic Charities will include all locations and facilities in the risk analysis. Rather than
attempting to determine exact probabilities of each disaster, a general relational rating system
of high, medium and low can be used to identify the probability of the threat occurring.
4. The risk analysis will determine the impact of each type of potential threat on various
functions or departments within the organization.
The impact can be rated as:
0 = No impact or interruption in operations.
1 = Noticeable impact, interruption in operations for up to 8 hours.
2 = Damage to equipment and/or facilities, interruption in operations for 8 - 48 hours.
3 = Major damage to the equipment and/or facilities, interruption in operations for more
than 48 hours. All main office and/or computer center functions must be relocated.
5. Certain assumptions may be necessary to uniformly apply ratings to each potential threat.
Following are typical assumptions that can be used during the risk assessment process:
5.1
Although impact ratings could range between 1 and 3 for any facility given a specific
set of circumstances, ratings applied should reflect anticipated, likely or expected
impact on each area.
5.2
Each potential threat should be assumed to be “localized” to the facility being rated.
5.3
Although one potential threat could lead to another potential threat (e.g., a hurricane
could spawn tornados), no domino effect should be assumed,
5.4
If the result of the threat would not warrant movement to an alternate site(s), the
impact should be rated no higher than a “2”.
5.5
The risk assessment should be performed by facility.
119
6. To measure the potential risks, a weighted point rating system can be used. Each level of
probability can be assigned points as follows:
Probability Points
 High 10
 Medium 5
 Low 1
7. Considerations in analyzing risk include:
7.1
Investigating the frequency of particular types of disasters (often versus seldom).
7.2
Determining the degree of predictability of the disaster.
7.3
Analyzing the speed of onset of the disaster (sudden versus gradual).
7.4
Determining the amount of forewarning associated with the disaster.
7.5
Estimating the duration of the disaster.
7.6
Considering the impact of a disaster based on two scenarios:
 Vital records are destroyed.
 Vital records are not destroyed.
7.7
Identifying the consequences of a disaster, such as:
 Personnel availability.
 Personal injuries.
 Loss of operating capability.
 Loss of assets.
 Facility damage.
7.8
Determining the existing and required redundancy levels throughout the organization
to accommodate critical systems and functions, including:
 Hardware.
 Software.
 Information.
 Communication.
 Personnel.
 Services.
7.9
Estimating potential dollar loss:
 Increased operating costs.
 Loss of business opportunities.
 Loss of financial management capability.
 Loss of assets.
 Negative media coverage.
 Loss of goodwill.
 Loss of income.
 Loss of competitive edge.
 Legal actions.
120
8. Estimating potential losses for each business function based on the financial and service
impact and the length of time the organization can operate without this business function.
The impact of a disaster related to a business function depends on the type of outage that
occurs and the time that elapses before normal operations can be resumed.
9. Determining the cost of contingency planning.
DISASTER PREVENTION and RECOVERY
Reference:
Disaster Prevention and Recovery Plan – Information Technology
Emergency Preparedness Policies and Procedures
Approved 12-03
Reviewed 6-05
121
Attachment to HP-3.01
HIPAA Policies and Procedures
RISK ANALYSIS FORM
High – Medium – Low
1. Probability
H = High (10)
L = Low (1)
M = Medium (5)
Sudden – Gradual
2. Speed of Onset
S = Sudden (5)
G = Gradual (1)
3. Forewarning
Yes – No
Y= Yes (1)
N= No (5)
4. Duration
Long – Intermediate – Short
L = Long (10)
I = Intermediate (5)
S = Short 1)
5. Impact
0 = No impact or interruption in operations.
1 = Noticeable impact, interruption in operations for up to 8 hours.
2 = Damage to equipment and/or facilities, interruption for 8 – 48 hours.
3 = Major damage to equipment and/or facilities, interruption for more than 48 hours. All
main office and/or computer center functions must be relocated.
122
Catholic Charities, Diocese of Trenton
Notificación de Practicas Confidenciales
ESTA NOTIFICACIÓN DESCRIBE LA MANERA EN QUE SE PUEDE USAR Y
COMPARTIR SU INFORMACION MEDICA Y COMO USTED PUEDE TENER ACCESO A
DICHA INFORMACION. FAVOR DE LEERLA CON MUCHO CUIDADO.
Para cumplir con los requisitos del Acto de Portabilidad y Responsabilidad de Seguros de Salud
(Health Insurance Portability and Accountability Act – HIPPA.)
Tenemos el deber de Guardar y Proteger su información Medica. Nosotros mantendremos
información medica personal que lo identifica a usted, sea el servicio medico proveído o pago de
su cuidado medico. Se nos requiere por ley proveerle esta noticia de información sobre las
practicas de privacidad, que están vigentes. Esto explica como, cuando y por que razón podemos
usar o revelar su información medica con algunas excepciones, evitaremos usar o divulgar mas
información medica de la que es requerida para el propósito presente.
Las condiciones de esta notificación se refiere a todos los documentos con su información
medica y demográfica creada por nosotros o en nuestro poder. Nosotros tenemos el derecho de
hacer cambios a la notificación de practicas confidenciales. Cualquier cambio a esta notificación
será añadida a toda la información que tenemos referente a usted, cualquier información medica
que recibamos en el futuro y los documentos que creamos y mantengamos en el futuro. Nuestra
organización pondrá una copia con los cambios actuales en nuestras oficinas, en un lugar
prominente y usted puede pedir una copia de la notificación mas reciente durante cualquier visita
a nuestra organización.
Pregunta: COMO PODEMOS NOSOTROS USAR Y COMPARTIR SU INFORMACIÓN:
Contesta: Usaremos o divulgaremos su información medica por diferentes razones. Para algunos
de estos usos o divulgaciones, pediremos su autorización. A continuación se describen las
distintas categorías de divulgación, sus usos y se proveen varios ejemplos.
A. Usos y Divulgación Relacionados a Tratamiento, Recompensa por Tratamiento y/o
Servicios, o para Funcionamiento del Cuidado de Salud. De acuerdo a la ley federal.
1. Para el Tratamiento: Podemos divulgar información de salud a otros
proveedores de servicios de salud que sean parte de su cuidado. Por ejemplo,
podemos divulgar su información medica a un hospital si durante su tiempo en
nuestra facilidad se requiere, o a un programa residencial al cual sea referido. Las
razones para tal divulgación podrían ser: para que usted reciba el tratamiento
apropiado para su condición medica, para coordinar su cuido, o para planear
exámenes necesarios.
2. Para Lograr Recompensa por Tratamiento y/o Servicios: Podemos usar y
compartir su información medica y demográfica para obtener reembolso por los
servicios que usted ha recibido de nosotros. Por ejemplo, podemos proveer
algunas partes de su información medica a su seguro medico, Medicare o
Medicaid para recibir pagos por haberle prestado servicios.
3. Para el Funcionamiento del Cuidado de Salud: En algunas situaciones será
necesario usar y/o divulgar su información medica para hacer funcionar nuestra
organización. Por ejemplo, podemos usar su información de salud para evaluar la
123
calidad del servicio que le han brindado nuestros empleados. También le
proveeremos información a nuestros contables, abogados y asesores para
asegurarnos que estamos cumpliendo con la ley.
B. Otros Usos de su Información son Permitidos por Ley Federal. Podemos divulgar su
información medica sin su autorización por las siguientes razones:
1. Cuando Divulgación de su información se requiere por Ley Federal, Estatal o
Local, en Procedimientos Judiciales o Administrativos o a Agentes de Orden
Publico: Por ejemplo podemos divulgar su información de salud si se nos
ordena por corte, o si la ley requiere que reportemos este tipo de información
a un Funcionario de Gobierno, o a Agentes de Orden Publico, tales como en
caso de mordida de perro, sospecha de maltrato a menores o una herida con
alma de fuego.
2. Actividades de salud publica: Según la ley, es nuestro deber reportar
información sobre ciertas enfermedades y/o muerte a agencias de gobierno
que colectan esta información. Con la posible excepción de información de
capacidad mental y/o tratamiento de abuso de alcohol y drogas, el estatus de
VIH (por cual obtendríamos su autorización), también se nos permite
proveer alguna información al examinador medico o director de funerales, si
fuese necesario después de fallecer el cliente.
3. Actividades de vigilancia del cuidado de salud. Por ejemplo proveeremos su
información medica si así lo exige el Condado o el Estado cuando vigilan el
programa en cual recibe usted cuidado. También le proveeremos
información a oficinas de gobierno, tales como New Jersey División of Mental
Health Services, New Jersey Department of Health and Senior Services
División of Youth and Family Services, etc. Cuales tienen el derecho de
inspeccionar nuestras oficinas y/o investigar practicas de cuidado de salud.
4. Donación de órganos. Si un cliente desea donar ojos, órganos o tejidos
después de fallecer, estamos permitidos divulgar información medica
necesaria para asistir a la apropiada organización a procurar los órganos.
5. Información sistémica y científica. Bajo ciertas circunstancias, (por ejemplo,
donde es aprobado por la Junta de Privacidad o Junta de Revisas bajo ley
federal), se nos permite usar o proveer información de salud medica
protegida con el propósito de investigación científica.
6. Para evitar amenaza a la salud o seguridad. Si uno de nuestros consejeros,
médicos o enfermeras identifican la necesidad de protegerle a usted, otra
persona o al publico, podemos proveerle la información de salud protegida a
la policía o otros que tengan la posibilidad de reducir la amenaza.
7. Función especial del gobierno. Con la posible excepción de información de
desorden mental o tratamiento de alcohol y drogas, y tratamiento de estatus
de VIH (por el cual obtendríamos su autorización), podemos divulgar
información de personal militar o veteranos cuando sea requerido por
autoridades Militares de Estados Unidos. También podemos divulgar
información de salud con propósitos de seguridad Nacional, tal como
investigación de sospecha de terrorismo que pueda amenazar nuestra nación.
8. Compensación de trabajadores: Nuestra organización puede compartir su
información medica como se describe bajo la ley de compensación, si su
condición fue resultado de una herida en el trabajo por el cual reclama usted
compensación de trabajador.
124
9. Para recordarle una cita: A menos que usted nos haga saber que no desea ser
recordado de una cita, podemos usar o divulgar su información para
recordarle a usted sus citas. También para proveerle información y avisos
sobre programas alternos y tratamientos que le puedan ayudar a usted.
10. Para aumentar fondos: Por ejemplo, si nuestra organización desea levantar
fondos para apoyar uno o mas de nuestros programas o facilidades, o otra
causa benéfica o para programa de educación de salud a la comunidad,
podemos usar la información para hacerle aviso a usted. Si no desea ser
parte de actividades de levantar fondos, por favor avisarle a su terapeuta.
C. SUS DERECHOS RESPECTO A SU INFORMACIÓN MEDICA Y DEMOGRÁFICA:
1. Divulgar información a miembros de su familia, amistades, o otros envueltos en
su cuidado. Podemos proveerle limitada información medica a un miembro
de su familia, amistad o otra persona conocida como encargado de su
cuidado o en pagar sus gastos, a menos que usted nos avise de forma
contraria. Por ejemplo, si un miembro de su familia lo acompaña a una cita
medica y usted le permite entrar al cuarto de examen con usted, podemos
divulgar información de salud protegida durante la cita, a menos que usted
no nos avise de lo contrario.
2. Divulgar información para notificar a miembro de familia, amistades o otra
persona selecta. Cuando primero comenzó usted en este programa se le pidió
información sobre una persona de contacto de emergencia en caso de que
algo le ocurriera a usted mientras este en nuestras facilidades. A menos que
usted nos dirija de forma distinta le divulgaremos cierta información de
salud medica sobre (su condición general, lugar, etc.) a su contacto de
emergencia o a otro miembro de su familia, sea que usted requiera ser
admitido a un hospital.
D. Otras Divulgaciones Requieren Ser Autorizadas antes por Escrito Por Usted. En
situaciones otras de las categorías mencionadas arriba, o otras divulgaciones
permitidas bajo ley federal, si desea obtener una divulgación usted debe someter
una petición por escrito. También le pediremos su autorización por escrito para
divulgar información acerca de su salud mental, uso de alcohol o drogas y/o el
tratamiento, y para divulgar su estatus de VIH.
Si escoge usted autorizar divulgación de información medica, puede después
revocarla para discontinuar uso siempre que ya no se haga tomado a cabo la
petición, puede ser revocada por escrito.
PREGUNTA: CUALES SON MIS DERECHOS SOBRE MI INFORMACIÓN
MEDICA?
Contesta: Usted tiene los siguientes derechos respecto a su información medica
privada:
A. El Derecho de Pedir Limites sobre Uso y Divulgación de Información de Salud.
Usted tiene el derecho de pedir limites o restricciones a su información medica.
No se nos requiere estar de acuerdo con su petición. Si acordamos con su pedido,
le pondremos los limites por escrito y los seguiremos, excepto en caso de
125
emergencia. Favor tomar en cuenta que no se le permite limitar las
divulgaciones que se nos requiere o se nos permiten por ley.
B. El Derecho de Escoger Como le Comunicamos Información
de Salud y Como Nos Ponemos en Contacto con Usted. Usted tiene el derecho de
cómo nos ponemos en contacto con usted en una dirección alterna o numero de
teléfono (por ejemplo enviando información por correo a su trabajo en vez de a
su domicilio) u otra manera alterna (por ejemplo, por email en vez de teléfono.)
Nuestro acuerdo es necesario siempre que sea fácil cumplir su pedido.
C. El Derecho de Mirar o Obtener una Copia de su Información
Medica. En la mayoría de los casos usted tiene el derecho de mirar o obtener
una copia de la información medica que esta en nuestro poder, primero debe
hacer una petición por escrito. Una petición puede ser obtenida por su terapeuta.
Le responderemos acerca de unos 30 días después de haber recibido la petición
por escrito. Si no tenemos la información que usted pide, pero si sabemos quien
la tiene, le diremos como obtenerla, y por escrito le avisaremos nuestro motivo
por el cual le negamos la información. En ciertas situaciones puede usted pedir
una apelación.
Si pide usted copia de alguna parte de su información medica, le cobraremos por
pagina, solo como se permite por la ley de New Jersey. Le pediremos que se
pague por completo antes de proveerle la copia. Si esta de acuerdo, con aviso
previo le podemos proveer con una explicación de sus archivos, se le cobrara por
la preparación de estos.
D. El Derecho de recibir una lista de Divulgaciones de Salud que
Nosotros Hemos Hecho. Usted tiene el derecho de recibir una lista de ciertas
divulgaciones de información medica que se hagan.
Esta lista no incluirá usos o divulgación de tratamiento, pago o operaciones de
cuido de salud, divulgaciones a usted o con su autorización por escrito, o
divulgaciones a su familia con el propósito de notificarle sobre su envolvimiento
en su cuidado. Esta lista también no incluirá divulgaciones hechas por motivos
de seguridad nacional, divulgaciones a autoridades leyes o a agentes de orden
publico si estaba usted en su custodia durante ese tiempo, también divulgaciones
hechas antes de Abril 14, 2003, el lapso de tiempo para pedir información es 6
años.
Para hacer tal petición, le pedimos se haga por escrito: una petición se puede
obtener de su consejero/a. Le responderemos entre 60 días después de haber
recibido su pedido. La lista puede incluir la fecha de la divulgación, la persona o
organización que recibió la información (con su dirección si esta disponible), una
breve descripción de la información divulgada, y una breve razón por la
divulgación. Le proveeremos a usted esta lista sin costo a usted: Si hace usted
mas de una pedido al año se le cobrara $10.00 por cada petición al año.
E. El Derecho de Pedir Cambios, Corregir o Traer al Día
Información Medica. Si piensa usted que hay un error en su información medica o
que una parte de información importante esta ausente, usted tiene el derecho de
pedir que hagamos los cambios apropiados a su información. Usted debe hacer
la petición por escrito, identificando su petición, puede obtener una petición de
su terapeuta o consejero. Responderemos a su pedido en unos 60 días de haber
126
recibido su petición. Si estamos de acuerdo con su petición, haremos los cambios
a su información medica, le avisaremos cuando han sido hechos, y le avisaremos
a otros que deben ser avisados sobre estos cambios.
Podemos rechazar su petición si la información medica: (1) esta correcta y
completa; (2) no fue creada por nosotros; (3) no se permite ser divulgada a
usted; (4) no es parte de nuestros archivos.
Nuestro rechazo por escrito le explicara la razón o motivo sobre el rechazo, y
explicara su derecho de cómo hacer una disputa por escrito de su desacuerdo. Si
no desea hacerlo, puede pedir que se le incluya una copia de su petición y
nuestro rechazo, con todas divulgaciones futuras de su información de salud.
F. El derecho de Obtener una Copia de esta Notificación.
Usted tiene derecho una copia de esta notificación.
PREGUNTA: COMO HACER UNA QUEJA O HACER PREGUNTAS SOBRE LAS
PRACTICAS PRIVADAS DE ESTA ORGANIZACIÓN?
Contesta: Si tiene usted preguntas a algo discutido en este aviso o de las practicas
privadas, o si tiene inquietud o quejas, favor de avisar a, Compliance Director at
Catholic Charities of Trenton, 383 West State Street, Trenton, New Jersey 08607 o
llamar al (609) 394-5181 extensión 150. Tambien tiene el derecho de formar una queja
con el Secretario de el Departamento de Salud y Servicios Humanos de Estados Unidos.
No podemos tomar represalia contra usted si hace alguna queja.
PREGUNTA: CUANDO TOMA EFECTO ESTE AVISO?
Contesta: Este aviso toma efecto el 3 de Junio, 2003.
AL RECIBO DE NOTIFICACIÓN DE PRACTICAS CONFIDENCIALES
Yo,_________________________________________, he leído y revisado y me han
explicado mis derechos acerca de divulgación de mi información personal de salud
tomada durante el proceso terapéutico por Catholic Charities. Yo he preguntado y he
contestado preguntas acerca del uso y divulgación de dicha información. Estoy
conforme que entiendo su significado y reconozco haber sido proveído una copia de
estos derechos como ha sido establecido por HIPPA en 1996.
_________________________________________________________
Firma de Cliente
Fecha
__________________________________________________________
Padre/Guardian
Fecha
Testigo
Fecha
Copia: Cliente
Original: Archivo
127
Download