Policies and Procedures and Documentation Requirements Sample Clauses

POPULAR SAMPLE Copied 3 times
Policies and Procedures and Documentation Requirements. “Policies and Procedures and Documentation Requirements” shall mean the Standards for the Protection of Electronic Protected Health Information at 45 CFR §164.316.
Policies and Procedures and Documentation Requirements. On or before the Compliance Date, Business Associate shall have implemented reasonable and appropriate policies and procedures to comply with the standards, implementation specifications, or other requirements of the EPHI Security Standards, taking into account the factors specified at 45 C.F.R. § 164.306(b)(2)(i), (ii), (iii) and (iv). Commencing on and after the Compliance Date, Business Associate shall (i) maintain the policies and procedures implemented to comply with the EPHI Security Standards in written or electronic form, and (ii) if an action, activity or assessment is required by 45 C.F.R. Part 164, Subpart C “Security Standards for the Protection of Electronic Protected Health Information” to be documented, maintain a written or electronic record of the action, activity, or assessment in accordance with the implementation specifications set forth at 45 C.F.R. § 164.316(b)(2).
Policies and Procedures and Documentation Requirements. Business Associate shall maintain reasonable and appropriate policies and procedures to comply with the standards, implementation specifications, or other requirements of the EPHI Security Standards, taking into account the factors specified at 45 C.F.R. § 164.306(b)(2)(i), (ii), (iii) and (iv). Business Associate shall (i) maintain the policies and procedures implemented to comply with the EPHI Security Standards in written or electronic form, and (ii) if an action, activity or assessment is required by 45 C.F.R. Part 164, Subpart C “Security Standards for the Protection of Electronic Protected Health Information” to be documented, maintain a written or electronic record of the action, activity, or assessment in accordance with the implementation specifications set forth at 45 C.F.R. § 164.316(b)(2).
Policies and Procedures and Documentation Requirements. Effective on or before February 17, 2010, Business Associate shall comply with the policies and procedures and documentation standards and implementation specifications under 45 CFR § 164.316, in accordance with 45 CFR § 164.306.

Related to Policies and Procedures and Documentation Requirements

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the Company’s Policies and Procedures as they may exist from time to time.

  • Compliance Policies and Procedures To assist the Fund in complying with Rule 38a-1 of the 1940 Act, BBH&Co. represents that it has adopted written policies and procedures reasonably designed to prevent violation of the federal securities laws in fulfilling its obligations under the Agreement and that it has in place a compliance program to monitor its compliance with those policies and procedures. BBH&Co will upon request provide the Fund with information about our compliance program as mutually agreed.

  • Documentation Requirements ODM shall pay the MCP after it receives sufficient documentation, as determined by ODM, detailing the MCP’s Ohio Medicaid-specific liability for the Annual Fee. The MCP shall provide documentation that includes the following: 1. Total premiums reported on IRS Form 8963;

  • Personnel Requirements and Documentation Grantee will; 1. maintain current personnel documentation on each employee. All documents must be factual and accurate. Health-related information must be stored separately with restricted access as appropriate under Tex. Gov. Code §552.102. Training records may be stored separately from the main personnel file but must be easily accessible upon request. Required documentation includes the following, as applicable: i. A copy of the current job description signed by the employee; ii. Application or resume with documentation of required qualifications and verification of required credentials; iii. Verification of work experience; iv. Annual performance evaluations; v. Personnel data that includes date hired, rate of pay, and documentation of all pay increases and bonuses; vi. Documentation of appropriate screening and/or background checks, to include probation or parole documentation; vii. Signed documentation of initial and other required training; and viii. Records of any disciplinary actions. 2. document authentication must include signature, credentials when applicable, and date. If the document relates to past activity, the date of the activity must also be recorded. Documentation must be permanent and legible. When it is necessary to correct a required document, the error must be marked through with a single line, dated, and initialed by the writer.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls: (i) Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems). (ii) Limit information system access to the types of transactions and functions that authorized users are permitted to execute. (iii) Verify and control/limit connections to and use of external information systems. (iv) Control information posted or processed on publicly accessible information systems. (v) Identify information system users, processes acting on behalf of users, or devices. (vi) Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems. (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse. (viii) Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals. (ix) Escort visitors and monitor visitor activity; maintain audit logs of physical access; and control and manage physical access devices. (x) Monitor, control, and protect organizational communications (i.e., information transmitted or received by organizational information systems) at the external boundaries and key internal boundaries of the information systems. (xi) Implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks. (xii) Identify, report, and correct information and information system flaws in a timely manner. (xiii) Provide protection from malicious code at appropriate locations within organizational information systems. (xiv) Update malicious code protection mechanisms when new releases are available. (xv) Perform periodic scans of the information system and real-time scans of files from external sources as files are downloaded, opened, or executed.