HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Applicable Standards for each CoC, Implementing Jurisdiction or ASP Notice Strategies for Implementation Description Ref # Policy Issues Data Collection Requirements: 1.4, 1.5, SOPs (Establish a participation Does the CoC want to limit minimum data collection to the Sections requirements specified in the HMIS Standards or are there policy for providers and clear 2 and 3 additional data elements that should be required based on expectations for data collection.) local needs? Do all providers know what they need to collect? DV Provider Participation: Has the CoC developed a policy and method for DV provider 1.5.6 SOPs (Establish a participation participation that will allow the CoC to generate analysis policy for DV providers and clear based on a systemwide unduplicated count? expectations for data collection.) Notification and/or Consent Policies: SOPs (Document all baseline 4.2.1 Does the CoC have privacy policies and procedures to expectations for agency and user 4.2.2 ensure that all agencies and users share a common behavior in the SOPs, including 4.2.3 understanding of client notification and/or consent notification and consent procedures? procedures, reasonable Decisions: accommodation for persons with - standard uses and disclosures disabilities and persons that don’t - policy on when client can be notified vs when a client speak English, client rights with must provide consent regarding use and disclosure respect to their information, etc.) of data Sample Privacy Notice and - procedure for how users should provide notification related documents (Develop a and/or consent template of the privacy notice, protocol for amending the privacy notice, explanation for clients, and related consent agreements for all agencies to adopt and use.) Page 1 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD Community Status Yes No Notes HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Applicable Standards for each CoC, Implementing Jurisdiction or ASP Notice Strategies for Implementation Description Ref # Security standards: Does the CoC have minimum security standards to ensure that all agencies understand how to protect the HMIS application and database? - Define the frequency of virus protection updates - Define appropriate physical locations for HMIS access (characteristics of physical environment, appropriateness of use of laptops, appropriateness of use of users’ home workstations, etc.) - Frequency and method of HMIS data backup (document sys admin responsibility to implement or contractually secure this service with ASP, if appropriate) Data Access and Release policies: Does the CoC have minimum data access standards to ensure that all agencies understand how to protect HMIS data in both hardcopy and digital formats? Central CoC Data Repository: Does the CoC have a designated central database repository that collects all of the providers’ HMIS data at least annually for the purposes of generating an unduplicated count and basic analysis of the unduplicated HMIS data? 4.3 SOPs (Document all baseline expectations for agency and user behavior in the SOPs, including core elements of an appropriate agency security protocol.) Sample Information Security Protocol (Document how to operationalize the minimum security policies by providing a sample information security protocol.) 4.3.2, 4.3.3 SOPs (Document procedures for storing HMIS data in digital and hardcopy formats.) 5.2.1 Central database (Data must be collected at least annually and stored for a minimum of seven years after the data of collection by the central repository.) SOPs. Page 2 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD Community Status Yes No Notes HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Applicable Standards for each CoC, Implementing Jurisdiction or ASP Notice Strategies for Implementation Description Ref # Agency and User Issues Data Collection: Do all providers know what they need to collect? Do they know how to correctly code individual client records to capture household groupings? DV Provider Participation: Do DV agencies know what they need to collect and how they can participate? Bed Coverage: Is there an emphasis on obtaining emergency shelter, transitional housing, and outreach provider participation? Note subsequent participation priorities too. Notification and Consent Policies: Do all agency executives understand their responsibilities? Notification and Consent Policies: Do all users understand their responsibilities? NOTE: If this is delegated to participating agencies, CoC may want to implement more extensive monitoring procedures. 1.4, 1.5, Sections 2, 3 and 5 User training (Consistently communicate requirements). Develop user tools (Quick Cheat Sheet). 1.5.6 User training (Consistently communicate requirements). Develop user tools (Quick Cheat Sheet). 1.6 Agency outreach and user training. 4.2.6 Agency Agreement (Require all agency executives to sign prior to bringing the agency online.) Agency executive training. 4.2.6 User Agreement (Require all users to sign prior to gaining system access.) User training. Page 3 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD Community Status Yes No Notes HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Applicable Standards for each CoC, Implementing Jurisdiction or ASP Notice Strategies for Implementation Description Ref # Security Standards: Do agencies understand the security standards that apply to their users? Hard Copy Security: Do agencies understand how to protect hard copy data, including reports, data entry forms, signed consent forms, etc.? 4.3.1 Agency Agreement. (Require all agency executives to sign prior to bringing the agency online.) Information Security Protocol (CoC could require each agency to adopt a security protocol that addresses all aspects of the security standards. CoC could provide a sample information security protocol to ensure that agencies understand minimum requirements.) 4.3.3 Agency Agreement. (Require all agency executives to sign prior to bringing the agency online.) Information Security Protocol (CoC could require each agency to adopt a security protocol that addresses all aspects of the security standards. CoC could provide a sample information security protocol to ensure that agencies understand minimum requirements.) Page 4 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD Community Status Yes No Notes HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Applicable Standards for each CoC, Implementing Jurisdiction or ASP Notice Strategies for Implementation Description Ref # Software Issues Data Elements: Does your software collect all of the universal and programspecific data elements, including the required response categories and technical elements? Data Completeness: Does the software automatically generate default exit dates by program type? Does the software maintain transactional data for data elements that need to be analyzed over time, such as income and service utilization? Data Collection: Do all providers know what they need to collect? DV Provider Participation: Based on the adopted policy, does the software need to provide an alternative method for client-level data submission? 1.4, 1.5, Sections 2, 3 and 5 Inventory your software. Work with your vendor to program software to collect missing elements and response categories. 5.1.5 Software programming. (Based on local assumptions, the software should be programmed to generate default exit dates by program type to ensure complete universal data collection.) 1.4, 1.5, Sections 2 and 3 Software tools (e.g. CoC may want to require or prompt for missing data). Software queries to check for missing or inaccurate data. 1.5.6 Software design and integration tools. Page 5 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD Community Status Yes No Notes HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Applicable Standards for each CoC, Implementing Jurisdiction or ASP Notice Strategies for Implementation Description Ref # Privacy policy: Does the software support the CoC’s notice or consent procedure (opt-in or opt-out), if applicable? Timeliness of PPI Storage: Does the CHO dispose of or remove identifiers from a client record after a specified period of time? (Minimum standard: 7 years after PPI was last changed if record is not in current use.) Note this is a CHO requirement, but will need to be operationalized at the CoC level (central database) and at the CHO-level if the CHO maintains a decentralized database. User Authentication: Does the password protocol meet the minimum standard? (e.g. Require a minimum of 8 characters including at least one number and one letter; prohibit use of username, HMIS name, or vendor’s name; prohibit use of a password which consists entirely of any word found in the dictionary; and prohibit use of any of the above spelled backwards?) User Logon: Does the software prohibit users from logging onto the HMIS application more than once at any given time? 4.2.1 Software tools (e.g. checkbox to remind user about notification procedure, way to flag a record if client opts out of default setting, way to flag a record if client wants data shared beyond the default setting, etc.) 4.2.2 Automated data management (Does software automatically dispose of or remove identifiers from a client record after a specified period of time?) 4.3.1 and 4.3.2 User Authenti cation Password Limitations (Password parameters should be built into the application.) 4.3.1 and 4.3.2 User Authenti cation Software user authentication (Application should verify that user is not already logged on before granting access to the database application.) Page 6 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD Community Status Yes No Notes HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Applicable Standards for each CoC, Implementing Jurisdiction or ASP Notice Strategies for Implementation Description Ref # Workstation authentication: 4.3.1 Sys admin or ASP should use PKI If users access the HMIS through a public forum (e.g. Public internet), does the software authenticate the workstation prior Access or extranets that limit access to granting access? based on the Internet Provider (IP) address prior to granting access to the HMIS application. Virus Protection: 4.3.1 Install virus protection software; Does the lead org and ASP have regularly updated virus Virus protection software that automatically scans files as they are Protectio Assign someone to regularly accessed by users on the system where the HMIS update definitions. n application is housed? Disaster Protection and Recovery: 4.3.1 Backup Plan. (Documented in Does lead org or ASP back up all HMIS data on a regular Disaster basis to another medium and store it in a secure off-site SOP, Agency Agreement, or Recover location? NOTE: This standard applies to each CHO, but is y and Service Contract with ASP) most likely operationalized through the CoC. Backup Disposal: Does lead org and/or ASP appropriately reformat the storage 4.3.1 Disposal Plan. (Documented in Disposal medium when disposing of HMIS data? NOTE: This SOP, Agency Agreement, or standard applies to each CHO, but is most likely Service Contract with ASP) operationalized through the CoC. Page 7 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD Community Status Yes No Notes HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Applicable Standards for each CoC, Implementing Jurisdiction or ASP Notice Strategies for Implementation Description Ref # System Monitoring: 4.3.1 User access log and other System Does lead org and/or ASP routinely monitor to verify that System users are appropriately accessing the HMIS and that security Monitori monitoring. (Sys admin and/or systems are intact? NOTE: This standard applies to each ng agency administrators should CHO, but is most likely operationalized through the CoC. routinely review user access log to verify that user access is consistent with expected patterns. Document in SOP, Service Contract with ASP, and/or Agency Agreement.) Electronic Data Transmission: Does the HMIS application encrypt all HMIS data that are electronically transmitted over the Internet, publicly accessible networks or phone lines? Electronic Data Storage: Does the HMIS application store HMIS data in a binary format? Data export: Can the software export HMIS data in a comma-separated values text file, according to the prescribed format? 4.3.2 Electroni c Data Transmit tal Software application. (Verify with software provider/ASP that application uses 128-bit encryption to transmit HMIS data using tertiary systems.) 4.3.2 Electroni c Data Storage Software application. (Verify with software provider that application stores HMIS data in a binary format.) 5.1.7 Software programming. Page 8 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD Community Status Yes No Notes HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Applicable Standards for each CoC, Implementing Jurisdiction or ASP Notice Strategies for Implementation Description Ref # Monitoring: Does the CoC monitor its participating agencies on compliance with the following areas? Data Quality: 1.4, 1.5, QA procedure (Sys admin or data Are providers collecting what they need to collect? Sections analyst could run query to check 2 and 3 for complete and accurate data and follow up with providers to improve data quality.) Privacy Policies: Section Site monitoring (site monitoring Are all agencies complying with the minimum standards 4 established in Section 4 and any additional adopted CoC could randomly check sites for privacy policies? compliance or could systematically monitor all agencies. Could be integrated with other regular grant monitoring, application review, ...) User Agreements: 4.2.6 Central copies of User Agreement Have all users signed a user agreement that specifies their responsibilities? (CoC could maintain copies of the user agreement centrally, or require submittal prior to granting a user ID/password, or monitor sites to ensure they’re completed) Page 9 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD Community Status Yes No Notes HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Applicable Standards for each CoC, Implementing Jurisdiction or ASP Notice Strategies for Implementation Description Ref # Virus and Firewall Protection: Does the agency regularly update virus definitions? 4.3.1 Virus Protectio n, Firewalls Site monitoring (site monitoring could randomly check sites for compliance or could systematically monitor all agencies. Could be integrated with other regular grant monitoring, application review, ...) Workstation Access: Does agency appropriately locate and staff equipment that is 4.3.1 Site monitoring (site monitoring Physical authorized to access the HMIS application? Does the could randomly check sites for Access agency follow the laptop and/or home access policy compliance or could appropriately? systematically monitor all agencies. Could be integrated with other regular grant monitoring, application review, ...) Page 10 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD Community Status Yes No Notes HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 Baseline elements of the sign at the intake Desk: - General explanation of the reasons for collecting client information. (4.2.1) - Offer to provide a copy of the notice upon request (4.2.4) Baseline elements of the Privacy Notice: - Specify the purposes for which it collects PPI (4.2.3) - Define all uses and disclosures (4.2.3) - Amendment policy and procedure (4.2.4) - Right of client to inspect and have a copy of any PPI about the individual, offer to explain the information, consider any request for correction of inaccurate or incomplete PPI. (4.2.5) - Right of client to complain about the agency’s privacy and security policies and practices (4.2.6) HMIS Agency Participation Agreement should specify and ask agency executives to affirm that they will: - Comply with data collection requirements - Comply with state and federal law - Post a sign at intake meeting minimum standards - Adopt and comply with a privacy notice (meeting minimum standards, documenting all amendments, post on website, provide in foreign languages as appropriate) (4.2, see description of privacy notice above) - Provide reasonable accommodation to persons with disabilities to ensure that they understand the privacy notice (4.2.4, see exceptions) - Comply with additional CoC privacy policies on notification and/or consent (4.2.4) - Establish a procedure for accepting and considering questions or complaints about its privacy and security policies and practices (4.2.6) - Ensure that all users at its agency understand and comply with its privacy notice (4.2.6) - Comply with the security standards in the HMIS standards. [Agreement could require each agency to establish an information security protocol that outlines practices to comply with the security standards.] (4.3) - Establish mechanisms to protect hard copy data, including reports, data entry forms, signed consent forms, etc. (4.3.3) - Submit data at least annually to the central CoC respository, if the agency is maintaining its own independent database. (5.2.1) NOTE: These responsibilities may be detailed in the agreement or may be documented by reference to the adopted SOPs. HMIS User Agreement should ask users to affirm that they: - will comply with state and federal law - acknowledge receipt of a copy of the agency’s privacy notice and will comply with the privacy notice (4.2.6) - will comply with the CoC procedure for providing notice and/or consent to clients (4.2.4) - will provide reasonable accommodation to persons with disabilities and persons that don’t speak English to ensure that they understand the privacy notice (4.2.4, if applicable) - will agree to maintain written information about their password in a private, secure location (4.3.1) Page 11 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD HMIS System Administrator Toolbox CoC/Implement Jurisdiction Data Standards Compliance Assessment Checklist 1.0 NOTE: These responsibilities may be detailed in the agreement or may be documented by reference to the adopted SOPs. Potential information security protocol provisions: - User Authentication policies: (4.3.1 User Authentication) o Password parameters that meet the HMIS standard for user authentication o Policies that prohibit storing or displaying written information on user access (e.g. username and password) in a publicly accessible location o Policies that prohibit users from logging into more than one workstation at a time - Procedure to maintain virus protection software with [define minimum timeframe] updated virus definitions on all workstations on the same network as an HMIS workstation. (4.3.1 Virus Protection) - Procedure to maintain a firewall at the point of access to the Internet (network and/or individual workstations). (4.3.1 Firewal) - Procedure to authenticate all workstations accessing the HMIS application through a public forum (e.g. internet) prior to connecting to the HMIS application. (4.3.1 Public Access) - Protocol to define appropriate physical locations for workstations, and parameters for accessing the HMIS through laptops and/or home workstations. Only workstations that meet this standard will be authorized to access the HMIS (e.g. workstation authentication). - Procedure to install password protected screensavers on all workstations that are authorized to access the HMIS; set screensaver to automatically turn on when the workstation is temporarily not in use. - Policy/procedure to instruct staff to log off of the HMIS application and shut down the computer when workstation will not be in use for an extended period of time. - Procedure to protect hard copy data containing personal protected information that is generated from or for the HMIS, including reports, data entry forms, signed consent forms, etc. Page 12 of 12 Developed by the National HMIS TA Initiative by the QED Group, LLC for HUD