HIGHLIGHTS OF THE NAPHSIS SECURITY GUIDELINES MANUAL

Slides:



Advertisements
Similar presentations
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Advertisements

Red Flag Rules: What they are? & What you need to do
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
MODULE B - PROCESS B1. ASME Organizational Structure B2. Standards Development: Staff and Volunteer Roles and Responsibilities B3. Conformity Assessment:
Procedures For The Handling of Security Paper 2009 Local Issuance Training Presented by: Field Services Program Office of the State Registrar.
Pennsylvania’s Voter ID Law
1 PA / PTA Election Guide Chancellor’s Regulation A-660.
Janice Kephart Director of National Security Policy, Center for Immigration Studies Heritage Foundation July 14, 2009.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
FERPA 102 Helpful Guide for Administrators, Security Contacts and Support Staff Prepared by the Office of the Registrar Student Records: Institutional.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
NAPHSIS ANNUAL MEETING 2013 PHOENIX, ARIZONA NAPHSIS Security Committee Security Reminders Sue Bordeaux-Oklahoma Gary Thompson-West Virginia.
E-Verify Spring 2012 Director Workshop March 29, 2012.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
SIU School of Medicine Identity Protection Act and Associated SIU Policy.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Birth & Death Processes Copy Requests, Fees & Security Paper.
Form I-9 Process An Online Training for Supervisors and Designees Presented by Human Resources Revised November 2009.
South Carolina College of Pharmacy Board Application Process USC Campus May 2015 Degree Candidates.
2/16/2010 The Family Educational Records and Privacy Act.
North Dakota Open Records & Meetings Law Government in the Sunshine.
PIV-I Issuing Procedures for Applicants (New Employees) v1.1.
By Garland Land NAPHSIS Consultant. Importance of Birth Certificates Needed for: Social Security Card School Enrollment Driver’s License Passport.
New Citizenship and Identity Rules Required by the federal Deficit Reduction Act.
By Garland Land NAPHSIS Executive Director. Performance Measures Committee Dorothy Harshbarger, Alabama Dorothy Harshbarger, Alabama Barry Nangle, Utah.
Bulletin Guidance and Resources. BUL Format Provides a table of contents Organizes School Site Council (SSC), Compensatory Education Advisory.
Financial Resource Management Recommended Best Practices Training for Volunteers and Support Groups.
2015 ANNUAL TRAINING By: Denise Goff
Paperless Workflow Kelly Baker, MPH State Registrar and Center for Health Statistics Director OKLAHOMA NAPHSIS, June 2009, Baltimore.
New Grants Model Document Retention 1 District 5240 Grants Document Retention District Assembly /6/2013.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Frequently Asked Questions B. Recruiting and Selecting Members Highlights
Federal Work Study Instructions in Completing the Forms Student Financial Services.
Immigration and Hiring
What do these changes mean for Agreement State Programs?
RECORDS MANAGEMENT Office of Compliance. OBJECTIVES Four main objectives of a Records Management Program: –Increase efficiency of record keeping. –Protection.
Patricia W. Potrzebowski, Ph.D. Executive Director National Association for Public Health Statistics and Information Systems January 25, 2012 Vital Statistics.
PIV-I Issuing Procedures for Applicants (Current Employee) v1.1.
D5240 Document Retention System 8/20/ District 5240 The Rotary Foundation Grants Document Retention System Rotary Year
HOOVER CITY SCHOOLS In-Service Training: Annual Review of.
Employment Eligibility Verification The I-9 Form Bluefield State College New River Community & Technical College.
The NAPHSIS/NCHS Collaboration Past Successes and Future Challenges Salt Lake City, UT June 3 rd – 7 th, 2007 REGISTRAR/COORDINATOR SECURITY GUIDE NAPHSIS.
Company Confidential Registration Management Committee (RMC) AS9104/2A Presentation San Diego, CA January 17, 2013 Tim Lee The Boeing Company 1 Other Party.
Intelligence Reform & Terrorism Act – The Act – Intelligence Reform & Terrorism Act – The Act – -The Process- Centers for Disease Control and Prevention.
Discussion of Ethics & Campaign Finance Reform Packet Presented by Thomas B. Drage, Jr., County Attorney, and Dana Crosby, Assistant County Attorney June.
Best Practice Scenario Web-based EBRS at birthing facilities Validates NCHS edits at time of data entry If record passes all validations, jurisdiction.
Intelligence Reform: The Process Begins National Association for Public Health Statistics and Information Systems June 7, 2005.
Standard Unique Health Identifier for Health Care Providers April 9, th Annual HIPAA Summit Gail Kocher Highmark.
An introduction to records management at Clemson University Records Center is located at the Library Depot 103 Clemson Research Blvd Anderson, S.C
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
KASB ESI Policy GAAF GAAF Emergency Safety Interventions (See JRB, JQ, JQA, and KN) GAAF.
1 City of Shelby Wastewater Treatment Division Becomes State’s Second Public Agency to Implement a Certified Environmental Management System CERTIFICATION.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Ken Bramlett, Georgia State Registrar PHYSICAL SECURITY Presentation to NAPHSIS Distance Learning Webinar February 17, 2011.
A Secure Vital Registration System for the 21 st Century A Secure Vital Registration System for the 21 st Century Centers for Disease Control and Prevention.
Presented by: Sharon Pender Louisiana State PTA Treasurer.
Form I-9 Process Training for Supervisors and Designees Developed by Talent Development & Human Resources Revised April 2013.
Presbyterian College School of Pharmacy
Red Flags Rule An Introduction County College of Morris
Election Code Public Information
Events After the Election
Disability Services Agencies Briefing On HIPAA
Events After the Election
Election Code Public Information
Local Registration Statutes Quiz
Identity Theft Prevention Program Training
Confidentiality Frequently Asked Questions
OSU Controlled Substances Training Module for Researchers
Presentation transcript:

HIGHLIGHTS OF THE NAPHSIS SECURITY GUIDELINES MANUAL PRESENTED JUNE 5, 2013 BY CHUCK HARDESTER NAPHSIS SECURITY CONSULTANT

Why a NAPHSIS Security Guide? INTELLIGENCE REFORM & TERRIORISM PREVENTION ACT-2004 SEC. 7211. MINIMUM STANDARDS FOR BIRTH CERTIFICATES. SUPPLEMENT THE MODEL ACT ESTABLISH UNIFORMITY AMONG JURISDICTIONS NAPHSIS ADOPTED MOTION 2006 – 01

Motion 2006 – 01 To promote an awareness and commitment to national security through the intelligence reform & terrorism act regulations and create deterrent to identity theft and fraud, it is recommended that: Each jurisdiction designates a security coordinator performing or assigning the recommended best practices. Each jurisdiction adopt the attached best practices as part of the responsibilities under the designated security coordinator within each jurisdiction. NAPHSIS adopt these best practices as a standard and designate a security coordinator. The NAPHSIS security coordinator serves as a focal point among jurisdictional security coordinators so as to establish uniformity of security procedures and share information between and among the various jurisdictions.

57 Jurisdictions 6400 Issuing locations 14,000 different Birth certificates 57 – 6400 - 14000

Foundation of the Security Guide Model State Vital Statistics Act & Regulations State Best Practices Intel Reform Workgroups Recommendations Input from Contributors

What is the Process Initial Draft reviewed by Security Committee Draft sent to the Board of Directors Draft sent to Membership Comments and Additions Reviewed Section Made Available on NAPHSIS Website

Contributors to the Security Manual NCHS DOS-Passport Services DHS-forensic labs NAPHSIS Corporate Sponsors-technical Document Security Alliance-(DSA) North American Security Products Association-(NASPO) AAMVA-DMVs

The NAPHSIS Security Guide will be Internal Document-not available to public Living Document-continually changed and updated May Require a State to Change Laws and Regulations

SECTIONS OF THE MANUAL Section 1 Delayed Certificate of Birth Registration Section 2 Out of Institution Births Section 3 Birth Certification Document Section 4 Access to Vital Records Section 5 Issuance of a Certified Copy of Birth Section 6 Physical Security Measures Section 7 Destruction of Original Vital Records & other Documentation Containing Confidential & Sensitive Information Section 8 Corrections & Amendments to Birth Records Being Drafted

Section 1 “Delayed Birth Registration” All delayed certificates of birth should be processed, and filed at the central office of vital records. All birth certifications of a delayed certificate should be issued from the central office of vital records. Upon receipt of the documentation to establish the facts of birth, each document should be verified as authentic. If the document cannot be verified, it should not be accepted. All documentary evidence should agree. All documents submitted in support of the delayed birth registration should be copied and maintained for evidence. Affidavits of personal knowledge are not acceptable as evidence to establish a delayed certificate of birth. Walk-in or same day processing of a delayed certificate of birth should be prohibited. Any suspicious application should be retained in the fraud file for future reference.

Section 2 “Out of Institution Birth” All out of institution births should be filed with the office of the State Registrar. All documentation required to register an out of institution birth should be sent to the state vital records office for processing. There should be evidence of pregnancy, the infant was born alive, and the mother’s presence in the state on the date of the birth. Each piece of documentary evidence submitted should be verified by the vital records office or other designee of the State Registrar. All documentary evidence submitted should agree. An active fraud file of out of institution birth requests and related activities should be maintained.

Section 3 “Birth Certification Document” The birth certification document should have four layers of security, at a minimum. The security features should be overt, covert, and forensic and be included in the substrate (paper) and added to the surface (printing). All birth certification documents used in the state and local offices should be provided or approved by the state office. The printing of the birth certification documents should occur within the United States for security purposes. Shipping boxes containing birth certification documents should be anonymous. The name of the document should not be on the box, only the document number or a designated identifier. Annually, the State Registrar or designee should conduct and document a security inspection of the state operation.

Section 4 “Access to Vital Records” Access to vital records should be restricted and limited to eligible requestors. Only authorized employees and contractors of the vital records unit should have access to records and indexes. All employees (fulltime, part-time, temporary, contractual), who have access to records or data should be required to sign a privacy and confidentiality statement. The general public should be required to provide identification to obtain copies of restricted vital records. A government-issued photo ID such as a driver’s license, non-driver’s photo ID, or federal travel document issued by an appropriate issuing authority should be required. The authenticity of the government-issued photo ID document(s) presented to establish the identity of the applicant should be verified. Non-certified or informational copies of records should not be issued to the public.

Section 5 “Issuance of a Certified Copy of Birth” Each state office should prescribe a standardized application form for obtaining a certification of a vital record. An applicant for a birth certification should be required to provide identification documents establishing their identity and relationship to the person of the record before obtaining a birth certification. A valid government-issued identification document issued by an appropriate issuing authority should be required. A copy of the valid government-issued identification document should be copied and maintained with the application. Notarized statements should not be accepted in lieu of a valid government-issued identification document. State and local offices should issue all birth certifications from a centralized state-administered data base.

Section 6 “Physical Security Measures” There should be appropriate sensor, warning systems or controls in place to monitor fire, smoke, water and other emergencies. All areas of the vital records operation should have a fire suppression system. The State Registrar or designee should be notified of any emergency or security breech. A full report should be made and maintained in the files. There should be controlled access procedures to the vital records work area consisting on access devices (badges) for employees. There should be a central sign-in log for visitors, non-employees, vendors, delivery personnel, and cleaning staff. The public office staff should be protected from the public through barriers. At the conclusion of the work day, supervisory staff should conduct an operation-wide walk through to insure all established security measures are in place.

Section 7 “Destruction of Original Vital Records & Other Documentation Containing Confidential & Sensitive Information” To the fullest extent possible, the State Registrar should discourage the destruction of original paper records. At the end of the work day, all sensitive and confidential documentation should be taken by designated staff to a secure locked area for storage until destroyed. All sensitive and confidential documentation should be disposed of by shredding. The local registrar should notify the State Registrar for approval of any plan to destroy paper records in the local office. If an outside vendor is used to destroy hard drives, written certification of the destruction from the vendor should be maintained by the State Registrar.

SECURITY GUIDELINES MANUAL WWW.NAPHSIS.ORG SECURITYT SECTION