Securing System and Workspace Information 448-01-25-15-15

(Revised 11/1/17 ML #3510)

View Archives

 

 

Federal and State regulations require information stored in the computer systems and at your workspace be kept secure. The following requirements must be followed to ensure the security of this information:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

-----------Confidentiality Statement-----------

This transmission is intended only for the use of the individual to whom it is addressed and may contain information that is made confidential by law. If you are not the intended recipient, you are hereby notified any dissemination, distribution, or copying of this communication is strictly prohibited. If you have received this communication in error, please respond immediately to the sender and then destroy the original transmission as well as any electronic or printed copies. Thank you.

 

 

-----------Confidentiality Statement-----------

This transmission is intended only for the use of the individual to whom it is addressed and may contain information that is made confidential by law. If you are not the intended recipient, you are hereby notified any dissemination, distribution, or copying of this communication is strictly prohibited. If you have received this communication in error, please respond immediately to the sender and then destroy the original transmission as well as any electronic or printed copies. Thank you.

 

This notice accompanies a disclosure of information concerning a client in alcohol or drug treatment, made to you with the consent of such a client. This information has been disclosed to you from records protected by Federal confidentiality rules (42 C.F.R Part 2). The Federal rules prohibit you from making any further disclosure of this information unless further disclosure is expressly permitted by the written consent of the person to whom it pertains or as otherwise permitted by 42 C.F.R. Part 2. A general authorization for the release of medical or other information is NOT sufficient for this purpose. The Federal rules restrict any use of the information to criminally investigate or prosecute any alcohol or drug abuse patient.

 

Controlling Access to Areas Containing Federal Tax Information (FTI)

The director or designee shall maintain an authorized list of all personnel who have access to information system areas where these systems contain FTI. This shall not apply to those areas within the facility officially designated as publicly accessible.

 

Each agency shall control physical access to the information systems (TECS) that display FTI information or where FTI is processed to prevent unauthorized individuals from observing the display output.

 

Each agency shall position information system components within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access.