Privacy Update Recent Updates in Privacy Law
|
|
|
- Aron Chambers
- 9 years ago
- Views:
Transcription
1 Privacy Update Recent Updates in Privacy Law Kathryn Frelick DISCLAIMER This Coffee Talk presentation is provided as an information service and is not meant to be taken as legal opinion or advice. Please do not act on the information provided in this presentation without seeking specific legal advice. Miller Thomson LLP, 2011 All Rights Reserved. All Intellectual Property Rights including copyright in this presentation are owned by Miller Thomson LLP. This presentation may be reproduced and distributed in its current state. Any other form of reproduction or distribution requires the prior written consent of Miller Thomson LLP which may be requested at
2 Privacy Update Recent Developments in Privacy Law Overview 1. Can you be sued for a privacy breach? Privacy class action update and the implications of Ontario s new privacy tort 2. Recent developments under PHIPA and FIPPA 3. Recent cases Freedom of information
3 Can you be sued for breach of privacy? In Canada, traditionally no independent action for breach of privacy Typically tied to something else (i.e. constructive dismissal, breach of contract, trespass, negligence, breach of fiduciary duty)
4 Can you be sued for breach of privacy? May be statutory basis (i.e. PHIPA) Increasing concern regarding risk of identity theft (i.e. fraud/credit monitoring, need for protective measures) Significant increase in privacy class actions in Canada Loss/theft of PHI (i.e. Durham Health Region) Business practices / unauthorized access by employee(s) (i.e. recent certification of class action lawsuits against Regional Health Authorities in Newfoundland and Nova Scotia)
5 Privacy Breach Statutory Basis Limited recourse under PHIPA for breach of privacy Offences under the Provincial Offences Act Significant fines Action for damages for breach of PHIPA Statutory right to seek compensation from Superior Court for breach of privacy for actual harm suffered where order issued by IPC or conviction damages for mental anguish capped at $10,000 (payable where willful or reckless)
6 Durham Health Region Class Action December Nurse loses unencrypted USB key with PHI of 83,500 individuals immunized for H1N1 January IPC Order HO-007 strong encryption for mobile storage devices December Class action certification motion $40 million damages (negligence, breach of statutory duty, breach of fiduciary duty) Primary concern - identity theft
7 Durham Health Region Class Action July 2012 class action settlement approved $500,000 in costs to counsel, plus % of claims paid Must demonstrate economic loss, otherwise, no damages Opportunity to mitigate loss Mr. Justice Lauwers: Risks from lost data negligible No evidence of identify theft / minimal information
8 Class Actions Unauthorized Access Recent class action law suits related to privacy breaches / unauthorized access to EHRs Hospitals notifying patients and managing breach Termination / discipline Early stages Vicarious liability is hospital responsible for intentional behaviour of employee? Systems responsibilities - adequate training, policies and procedures and systems in place to monitor policies?
9 New Privacy Tort Intrusion upon Seclusion Ontario Court of Appeal - Jones v. Tsige Bank employee accessing personal bank account of spouse s ex-wife (another bank employee) 174 times over 4 year period Brought motion for summary judgment on the basis that Ontario law does not recognize tort of breach of privacy CA determined that there ought to be a right of action for intrusion upon seclusion in certain situations where there has been a deliberate and significant invasion of personal privacy
10 Three elements - Intrusion upon seclusion Conduct must be intentional (or reckless) Individual must have invaded, without lawful justification, another s private affairs or concerns A reasonable person would regard the invasion as highly offensive causing distress, humiliation or anguish Objectively, only certain types of intrusions highly offensive i.e. involving financial or health information, employment, diary, personal correspondence
11 Damages for Intrusion Upon Seclusion No need to demonstrate harm to economic interests or actual loss Damages for intrusion upon seclusion will be relatively modest (i.e. capped at $20,000)
12 Implications for Health Industry Clients Extends beyond PHI to other types of personal information Actions may be contrary to organizational policy (employee discipline), but may still be exposed to potential law suits / class action law suits Significant public relations and legal risk, therefore, when and how individuals are notified is very important ensure strong communication strategy
13 Implications for Health Industry Clients Risk management Adequate policies and procedures Privacy breach management Training, monitoring and auditing compliance coming under increasing focus Consider risk transfer (i.e. privacy notification and look back programs, identity theft monitoring)
14 Review Orders/Decisions A review of Orders issued under PHIPA, as well as corresponding fact sheets and guidance documents reveal that many of these repeat the SAME THEMES Failure to use appropriate encryption or other safeguards when storing PHI on mobile devices Limit ability to remove PHI unless adequate safeguards are in place Improper disposal/destruction of PHI Document management and retention policies Contractual protections when relying upon third party
15 Recent Developments PHIPA and FIPPA PHIPA Order HO 011 October 2011 Cancer Care Ontario in its role as a prescribed person (Ontario Cancer Screening Registry) Delivery of screening reports to over 7000 physicians in paper format (sent by courier)
16 Recent Developments PHIPA and FIPPA Key findings: Need to evaluate privacy and security standards as they evolve over time Consider whether the use of fax, mail and courier services are adequate given technological advances Put practices in writing IPC Fact Sheet # 18 August 2012 Secure Transfer of Personal Health Information
17 Recent Developments PHIPA and FIPPA July Elections Ontario losing unencrypted USB key involving personal information of up to 2.4 million individuals Failure to effectively implement and monitor privacy practices IPC White Paper - A Policy is Not Enough: It Must be Reflected in Concrete Practices September 2012
18 Recent Decisions Freedom of Information Carleton University (IPC, Feb. 2012) Presumption that an access request for s does not require routine search of backup tapes for deleted s Exception - unless there is a reason to assume that such a search is required If individual requests search from backup tapes, must search and retrieve
19 Recent Decisions - Advice and Recommendation Ontario Court of Appeal finding that IPC applying advice and recommendation exemption too narrowly Entire deliberative process is protected (not necessary to go to final decision maker) Presentation of range of options may be properly withheld leave to appeal to SCC filed (May 15, 2012) Ontario (Finance) v. Ontario (Information and Privacy Commissioner)
20 Recent Decisions Third Party Information Supreme Court of Canada decision - Merck Frosst v. Canada (Health) Outlines procedural and substantive protections for third parties Although deals with federal Access to Information Act, likely will apply more broadly No single interest is paramount (i.e. duty to provide access equally important as duty to protect third party information)
21 Recent Decisions Third Party Information Threshold to trigger notice obligation is low no need to provide notice where information clearly exempt or clearly subject to disclosure, but otherwise, must provide notice While third party assistance may be required, the decision to disclose ultimately lies with institution - head must apply the exemption / conduct thorough analysis Only where third party believes decision is wrong does the onus shift to third party Decision also considers substance of tests and threshold for harms-based exemptions
22 Questions? Thank you!
PHIPA Potpourri. Judith Goldstein, Legal Counsel Information and Privacy Commissioner/Ontario. IPC Mediators April 21, 2015
PHIPA Potpourri Judith Goldstein, Legal Counsel Information and Privacy Commissioner/Ontario IPC Mediators April 21, 2015 Powers of the Commissioner The Powers the Commissioner has to conduct a review
Document Management in the FIPPA Era
Document Management in the FIPPA Era Kathryn Frelick DISCLAIMER This Coffee Talk presentation is provided as an information service and is not meant to be taken as legal opinion or advice. Please do not
Brian Beamish. Commissioner (Acting) Ontario Information and Privacy Commission. Cyber Risk National Conference February 9, 2015
Preventing Privacy Breaches and Building Confidence in Electronic Health Records Brian Beamish Commissioner (Acting) Ontario Information and Privacy Commission Cyber Risk National Conference February 9,
Detecting and Deterring Unauthorized Access to Personal Health Information
Detecting and Deterring Unauthorized Access to Personal Health Information TABLE OF CONTENTS Introduction... 1 The Benefits and Risks of Electronic Records... 3 The Impact of Unauthorized Access... 5
The New Face of Privacy in the Courts: Damages, Tort Claims and Class Actions
Volume 12, No. 1 August 2012 Privacy Law Section The New Face of Privacy in the Courts: Damages, Tort Claims and Class Actions By Alex Cameron 1 & Jesse Harper 2 and Fasken Martineau DuMoulin LLP In addition
Recent and Upcoming Privacy Law and Litigation Developments. Alex Cameron Partner, Fasken Martineau IAPP Canada Symposium May 8, 2014
Recent and Upcoming Privacy Law and Litigation Developments Alex Cameron Partner, Fasken Martineau IAPP Canada Symposium May 8, 2014 Nobody is perfect The fact that the Respondent has never denied having
What s New in Access, Privacy and Health Care. Brian Beamish Commissioner. Ontario Connections May 21, 2015
What s New in Access, Privacy and Health Care Brian Beamish Commissioner Ontario Connections May 21, 2015 The Three Acts The IPC ensures compliance with: o Freedom of Information and Protection of Privacy
How To Ensure Health Information Is Protected
pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance
About Canada Dispute Resolution Forms of Business Organization Aboriginal Law Competition Law Real Estate Securities and Corporate Finance Foreign Investment Public- Private Partnerships Restructuring
Cloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM
PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is
Ann Cavoukian, Ph.D.
Protecting Privacy in an Era of Electronic Health Records Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Barrie and Community Family Health Team Royal Victoria Hospital Georgian College
Health Information Privacy Refresher Training. March 2013
Health Information Privacy Refresher Training March 2013 1 Disclosure There are no significant or relevant financial relationships to disclose. 2 Topics for Today State health information privacy law Federal
Insurance Journal. Defending Until the End When Does the Duty to. Volume 1, Issue 3 Editor Keoni Norgren. May 1, 2013
Insurance Journal May 1, 2013 In this Issue Volume 1, Issue 3 Editor Keoni Norgren Defending Until the End When Does the Duty to Defend End? Cyber Liability Laws in Canada Dolden Wallace Folick Welcomes
ORDER PO-3499. Appeal PA14-230. Ontario Securities Commission. June 16, 2015
ORDER PO-3499 Appeal PA14-230 Ontario Securities Commission June 16, 2015 Summary: A requester seeks access to the pricing information attached to a contract between a transcription company and the OSC.
Mohawk DI-r: Privacy Breach Management Procedure Version 2.0. April 2011
Mohawk DI-r: Privacy Breach Management Procedure Version 2.0 April 2011 Table of Contents 1 Purpose... 3 2 Terminology... 5 3 Identifying a Privacy Breach... 5 4 Monitoring for Privacy Breaches... 6 5
EHR Contributor Agreement
This EHR Contributor Agreement (this Agreement ) is made effective (the Effective Date ) and sets out certain terms and conditions that apply to the sharing of Personal
Cloud Computing: Privacy and Other Risks
December 2013 Cloud Computing: Privacy and Other Risks by George Waggott, Michael Reid and Mitch Koczerginski, McMillan LLP Introduction While the benefits of outsourcing organizational data storage to
PERSONAL HEALTH INFORMATION PROTECTION ACT, 2004: AN OVERVIEW FOR HEALTH INFORMATION CUSTODIANS
PERSONAL HEALTH INFORMATION PROTECTION ACT, 2004: AN OVERVIEW FOR HEALTH INFORMATION CUSTODIANS Note: This document provides a general overview of the Personal Health Information Protection Act, 2004,
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
Privacy Management Program Toolkit Health Custodians Personal Health Information Act
Office of the Information and Privacy Commissioner for Nova Scotia Privacy Management Program Toolkit Health Custodians Personal Health Information Act Introduction: This toolkit was prepared by the Information
Cloudy With a Chance Of Risk Management
Proudly presents Cloudy With a Chance Of Risk Management Toby Merrill, ACE USA John Mullen, Nelson Levine de Luca & Hamilton Shawn Melito, Immersion Ltd. Michael Trendler, ACE INA Canada What is Cloud
UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14
UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
Helpful Tips. Privacy Breach Guidelines. September 2010
Helpful Tips Privacy Breach Guidelines September 2010 Office of the Saskatchewan Information and Privacy Commissioner 503 1801 Hamilton Street Regina, Saskatchewan S4P 4B4 Office of the Saskatchewan Information
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
Corporate ICT & Data Management. Data Protection Policy
90 Corporate ICT & Data Management Data Protection Policy Classification: Unclassified Date Created: January 2012 Date Reviewed January Version: 2.0 Author: Owner: Data Protection Policy V2 1 Version Control
Privacy Breach Protocol
& Privacy Breach Protocol Guidelines for Government Organizations www.ipc.on.ca Table of Contents What is a privacy breach? 1 Guidelines on what government organizations should do 2 What happens when the
Personal Injury Laws
CHAPTER 6 Chapter 6 Slide 1 Personal Injury Laws Lessons 6-1 Offenses Against Individuals 6-2 Intentional Torts, Negligence, and Strict Liability 6-3 Civil Procedure LESSON 6-1 Chapter 6 Slide 2 Offenses
Mandatory Reporting A process
Mandatory Reporting A process guide for employers, facility operators and nurses Table of Contents Introduction.... 3 What is the purpose of mandatory reporting?... 3 What does the College do when it receives
DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS
Overview. DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS A comprehensive and consistently applied document retention policy is necessary to reduce the risk of being charged with spoliation
Personal Health Information Privacy Policy
Personal Health Information Privacy Policy Privacy Office Document ID: 2478 Version: 6.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights
Ann Cavoukian, Ph.D.
School Psychologists: What You Should Know about the Personal Health Information Protection Act Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Psychological Services Northeast Toronto
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
FIPPA and MFIPPA: Bill 8 The Recordkeeping Amendments
FIPPA and MFIPPA: Bill 8 The Recordkeeping Amendments December 2015 CONTENTS Introduction...1 The Amendments What s New?...1 Is My Institution Required to Comply With These Provisions?...2 What are Records?...2
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper
CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section
Personal Information Protection and Electronic Documents Act
PIPEDA Self-Assessment Tool Personal Information Protection and Electronic Documents Act table of contents Why this tool is needed... 3 How to use this tool... 4 PART 1: Compliance Assessment Guide Principle
Health Care Consent Act
Briefing Note 2005, 2007 College of Physiotherapists of Ontario 2009 Contents Overview...3 Putting the in Context...3 The HCCA in Brief...4 Key Principles Governing Consent to Treatment...4 Key Aspects
South Australia LAW REFORM (CONTRIBUTORY NEGLIGENCE AND APPORTIONMENT OF LIABILITY) ACT 2001
South Australia LAW REFORM (CONTRIBUTORY NEGLIGENCE AND APPORTIONMENT OF LIABILITY) ACT 2001 An Act to reform the law relating to contributory negligence and the apportionment of liability; to amend the
VICTIMS OF CRIME ACT
Province of Alberta VICTIMS OF CRIME ACT Revised Statutes of Alberta 2000 Current as of November 1, 2013 Office Consolidation Published by Alberta Queen s Printer Alberta Queen s Printer 7 th Floor, Park
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
Health Care Provider Guide
Health Care Provider Guide Diagnostic Imaging Common Service Project, Release 1 Version: 1.4 Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document may be reproduced
RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES
PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK
THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK REVISED August 2004 PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK Introduction
Merthyr Tydfil County Borough Council. Data Protection Policy
Merthyr Tydfil County Borough Council Data Protection Policy 2014 Cyfarthfa High School is a Rights Respecting School, we recognise the importance of ensuring that the United Nations Convention of the
POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING
POLICE RECORD CHECKS IN EMPLOYMENT AND VOLUNTEERING Know your rights A wide range of organizations are requiring employees and volunteers to provide police record checks. Privacy, human rights and employment
Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:
Information and Privacy Commissioner of Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Canadian Institute for Health Information: A Prescribed Entity under the Personal
Electronic Health Record Privacy Policies
Electronic Health Record Privacy Policies Table of Contents 1. Access and Correction Policy v1.1 2. Assurance Policy v1.1 3. Consent Management Policy v1.2 4. Inquiries and Complaints Policy v1.1 5. Logging
HIPAA/HITECH Compliance Using VMware vcloud Air
Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the
Privacy Incident and Breach Management Policy
Privacy Incident and Breach Management Policy Privacy Office Document ID: 2480 Version: 2.1 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2014, ehealth Ontario All rights
Bill 34 The New Limitation Act: Significant Changes and Transition Issues Explained
Bill 34 The New Limitation Act: Significant Changes and Transition Issues Explained A Presentation for CLE Employment Law Conference 2013 Pan Pacific Hotel Vancouver, BC May 9, 2013 Carman J. Overholt,
Information and Privacy Commissioner of Ontario. Guidelines for Using Video Surveillance Cameras in Schools
Information and Privacy Commissioner of Ontario Guidelines for Using Video Surveillance Cameras in Schools Ann Cavoukian, Ph.D. Commissioner Revised July 2009 This publication is an updated version of
SUBJECT: VOYAGEUR TRANSPORTATION CORPORATE POLICIES/PROCEDURES TITLE: PRIVACY OF PERSONAL HEALTH INFORMATION
SUBJECT: VOYAGEUR PAGE 1 1.0 PURPOSE: 1.1 To establish and document a policy which defines Voyageur s commitment to the protection of an individual s personal health information in the course of providing
Personal Information Protection Act Information Sheet 11
Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores
Philip L. Gordon, Esq. Littler Mendelson, P.C.
Beyond The Legal Requirements: Key Practical Issues in Negotiating Business Associate Agreements, Responding to a Breach of Unsecured PHI, and Understanding HHS Enforcement Philip L. Gordon, Esq. Littler
EMBEDDING PRIVACY INTO ELECTRONIC HEALTH RECORDS. Manuela Di Re Associate Director of Legal Services Information and Privacy Commissioner of Ontario
EMBEDDING PRIVACY INTO ELECTRONIC HEALTH RECORDS Manuela Di Re Associate Director of Legal Services Information and Privacy Commissioner of Ontario Presentation Outline 1. Definitions 2. Need to Protect
This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.
Privacy Breach No.: 6700 PR2 Policy Reference: 6700 Category: Information Management Department Responsible: Privacy and Records Management Current Approved Date: 2012 May 01 Objectives This procedure
Practice Tool for Exercising Discretion: Emergency Disclosure of Personal Information by Universities, Colleges and other Educational Institutions
Practice Tool for Exercising Discretion: Emergency Disclosure of Personal Information by Universities, Colleges and other Educational Institutions October 2008 Information and Privacy Commissioner of Ontario
technical factsheet 176
technical factsheet 176 Data Protection CONTENTS 1. Introduction 1 2. Register with the Information Commissioner s Office 1 3. Period protection rights and duties remain effective 2 4. The data protection
EXAMINATION OF BRITISH COLUMBIA HEALTH AUTHORITY PRIVACY BREACH MANAGEMENT. Elizabeth Denham Information and Privacy Commissioner
EXAMINATION OF BRITISH COLUMBIA HEALTH AUTHORITY PRIVACY BREACH MANAGEMENT Elizabeth Denham Information and Privacy Commissioner September 30, 2015 Examination of British Columbia Health Authority Privacy
The Health Information Protection Act
1 The Health Information Protection Act being Chapter H-0.021* of the Statutes of Saskatchewan, 1999 (effective September 1, 2003, except for subsections 17(1), 18(2) and (4) and section 69) as amended
DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT
Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security
Civil Law (Wrongs) (Proportionate Liability and Professional Standards) Amendment Act 2004
Australian Capital Territory Civil Law (Wrongs) (Proportionate Liability and Professional Standards) Amendment Act 2004 Contents Page 1 Name of Act 2 2 Commencement 2 3 Legislation amended 2 4 New chapter
INDEPENDENT CONTRACTOR AGREEMENT THE UNIVERSITY OF MANITOBA. (the University ) - and - (the Contractor )
CAR Form No. I ICA Contract No. INDEPENDENT CONTRACTOR AGREEMENT AGREEMENT made as of the most recent date set out on page 6 hereof. BETWEEN: THE UNIVERSITY OF MANITOBA (the University ) - and - (the Contractor
Understanding Legal Documents for Guardianship, Powers of Attorney and Estates
Understanding Legal Documents for Guardianship, Powers of Attorney and Estates Rachel Blumenfeld Jesstina McFadden DISCLAIMER This Coffee Talk presentation is provided as an information service and is
Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010
pic pic Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010 Updated March 2013 Our Vision Better data. Better decisions. Healthier
NOTICE OF PRIVACY PRACTICES
THE PHYSICIAN PRACTICE, P.A. NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW
OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute
OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil
OCR Reports on the Enforcement. Learning Objectives
OCR Reports on the Enforcement of the HIPAA Rules HCCA Compliance Institute April 22, 2013 David Holtzman Sr. Health IT & Privacy Specialist U.S. Department of Health and Human Services Office for Civil
New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010
New HIPAA Breach Notification Rule: Know Your Responsibilities Loudoun Medical Group Spring 2010 Health Information Technology for Economic and Clinical Health Act (HITECH) As part of the Recovery Act,
