/
Policies and Procedures Policies and Procedures

Policies and Procedures - PDF document

amelia
amelia . @amelia
Follow
344 views
Uploaded On 2021-09-14

Policies and Procedures - PPT Presentation

Please only fax page 1 to 8556980671Page 2of 2Rev 112017This Computer Use and Confidentiality Agreement will be completed by each user prior to receiving access to the eVitals system This system al ID: 880078

computer user users information user computer information users department passwords access security crimes florida system doh statutes confidential unauthorized

Share:

Link:

Embed:

Download Presentation from below link

Download Pdf The PPT/PDF document "Policies and Procedures" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

1 Please only f ax page 1 to: ( 855 )
Please only f ax page 1 to: ( 855 ) 698 - 0671 Page 2 of 2 Rev 11.2017 Policies and Procedures This Computer Use and Confidentialit y Agreement will be completed by each user prior to receiving access to the e - Vitals system. This system allows the user to access confidential information and information technology resources. ▪ All users with access to confidential information must sign the Computer Use and Confidential ity Agreement (CUCA) . ▪ The signed CUCA form will b e maintained by the Bureau of Vital Statistics. ▪ The respective Florida Statutes may be found on the website: http://www.leg.state.fl.us/Statutes ▪ The Florida Computer Crimes Act, Ch . 815, F.S., prohibits the introduction of fraudulent records into a compu ter system, the unauthorized use of computer systems and facilities, the alteration or destruction of computerized information, and the stealing of data from computer files. Computer crimes violate the department’s policies and may result in criminal char ges. Any users found to have violated these policies, laws, regulations, etc., may be subject to disciplinary action by their facility and criminal procedure by the department. ▪ Supervisors may monitor computer use by direct observation, review of computer history files through the systems administrator, or review work productivity and quality. ▪ Users will be given a user account to access DOH information technology resources. Users who are responsible for a user account within the department’s network are responsible for taking the appropriate steps to select and secure their passwords. ▪ Passwords are an important aspect of information security. Authorized users are responsible for the security of their passwords and user accounts. o Personal passwords may no t be shared or disclosed. o No supervisor may order a user to share his or her password. o All user - level passwords must be changed at least every 9 0 days. ▪ When computers are left unattended, users must lock their computers. ▪ Creating security breaches or other wise disrupting network communication is unacceptable. Security breaches include, but are not limited to, unauthorized acc e ss of data not intended for the user, or logging into a server or account that the user is not expressly authorized to access. Clear Form Print Form Please only f ax page 1 to: ( 855 ) 698 - 0671 Page 1 of 2 Rev 11.2017 Department of Hea lth, Office of Vital Statistics C omp

2 uter Use and Confidentiality Agreement
uter Use and Confidentiality Agreement The Florida Department of Health (DOH) has provided you with the Computer Use and Confidentiality Agreement and Policy & Procedures . This document govern all users of DOH computer systems. Understanding of Computer Related Crimes act : The Department of Health has authorized you to have access to confidential data per Chapter 38 Statutes, through the use of the DOH e - Vitals System for record registration . Computer crimes are a violation of the department’s policy and Florida Statutes. T he commission of computer crimes may result in disciplinary action by their facility and criminal procedure by the department. The Florida Computer Crimes Act, Ch apter 815, F lorida S tatutes , addresses the unauthorized creation, modification, In addition, Ch . 382 .026 , F.S. , specifically states that any person who, without lawful authority and with the intent to deceive, makes, counterfeits, alters, amends, or mutilates any certificate, record, or report commits a felony of the third degree. I have read the above statements , a nd by my sign ature , acknowledge I understand that a security violation may result in criminal prosecution according to the aforementioned provisions of Ch apters 815 and/or 382 , Florida Statutes. The minimum information security requirements are: ▪ Information entered on the e - Vitals system is confidential by law and shall not be disclosed to unauthorized persons. ▪ Personal passwords are not to be shared nor disclosed. There may be supplemental operating procedures that permit shared access to electronic mail for the purpo se of ensuring day - to - day operations of the department. ▪ No supervisor may order a user to share his or her password. ▪ All user - level passwords must be changed at least every 90 days . ▪ Information, both paper - based and electronic - based, is not to be obtained for my own or another person’s personal use. ▪ Department of Health data systems must . ▪ No user of a DOH system may create fraudulent records. ▪ Copyright law prohibits the unauthorized use or duplication of software. ▪ When computers are left unattended, users must lock their computers. _____________________________ ______ ____ __ ________ ________ _____________________ Signature of User Date ___________________ ______ ________________ ________ _____________________________ Print Name of User User’s Facility Nam