{"id":120,"date":"2016-01-22T09:11:24","date_gmt":"2016-01-22T14:11:24","guid":{"rendered":"http:\/\/eagleassociates.net\/news\/?p=120"},"modified":"2016-02-01T01:20:04","modified_gmt":"2016-02-01T06:20:04","slug":"acceptable-responsible-use","status":"publish","type":"post","link":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/","title":{"rendered":"Acceptable\/Responsible Use"},"content":{"rendered":"<p>Once a workforce member is granted access to a practice\u2019s information systems (including computer hardware, software, email, voice mail, internet, telephone, cell phone, laptops, or other electronic equipment or service made available to employees or paid for by the practice), it is everyone\u2019s responsibility to ensure that the systems are utilized in an acceptable manner following basic rules of conduct.<\/p>\n<p>Acceptable Use applies to the use and disclosure of proprietary and patient information, computer or other devices (includes mobile and other computing or storage devices), and network resources. Some basic responsibilities include:<\/p>\n<ul>\n<li><i>Protecting proprietary information, such as business practices, financial information and intellectual property of the practice.<\/i><\/li>\n<li><i>Using or disclosing business and patient information only as necessary to perform assigned duties.<\/i><\/li>\n<li><i>Promptly reporting any theft, loss or unauthorized disclosure of proprietary or patient information.<\/i><\/li>\n<li><i>Exercising good judgment in the use of the information system (this includes internet access and the sites visited).<\/i><\/li>\n<li><i>Ensuring that local, state, federal, or international law is not violated while utilizing the practice\u2019s information system.<\/i><\/li>\n<\/ul>\n<p>It is helpful if acceptable or responsible use expectations are outlined in an employee handbook, or otherwise clearly communicated to workforce members.\u00a0 Some organizations may also require users to sign an acknowledgement (often called an \u201cacceptable use policy\u201d) to ensure understanding of the policies.<\/p>\n<p>Sanctions or penalties must be uniformly imposed if anyone should cause harm to the information system, use or disclose information in an unauthorized manner, or violate regulatory requirements. Sanctions may include disciplinary actions up to, and including termination of employment.\u00a0 Workforce members should also be warned that certain actions that violate privacy requirements might subject them to prosecution and\/or monetary penalties by regulatory agencies, such as the Office for Civil Rights.<\/p>\n<p>Communicating compliance responsibilities to workforce members, and informing them of sanctions that will be imposed for failure to meet them, helps ensure the security of your practice\u2019s information system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Once a workforce member is granted access to a practice\u2019s information systems (including computer hardware, software, email, voice mail, internet, telephone, cell phone, laptops, or other electronic equipment or service made available to employees or paid for by the practice), it is everyone\u2019s responsibility to ensure that the systems are utilized in an acceptable manner&#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/\">Continue reading <span class=\"meta-nav\">&#8594;<\/span><\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":121,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[23,48,47],"class_list":["post-120","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eagle-staff","tag-hipaa","tag-information-systems","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Acceptable\/Responsible Use | Eagle Associates News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Acceptable\/Responsible Use | Eagle Associates News\" \/>\n<meta property=\"og:description\" content=\"Once a workforce member is granted access to a practice\u2019s information systems (including computer hardware, software, email, voice mail, internet, telephone, cell phone, laptops, or other electronic equipment or service made available to employees or paid for by the practice), it is everyone\u2019s responsibility to ensure that the systems are utilized in an acceptable manner... Continue reading &#8594;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/\" \/>\n<meta property=\"og:site_name\" content=\"Eagle Associates News\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-22T14:11:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-01T06:20:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2016\/02\/acceptable-use.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eagle Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eagle Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/\"},\"author\":{\"name\":\"Eagle Staff\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/ed0338105c6f7bd7e7014934db2b97f9\"},\"headline\":\"Acceptable\\\/Responsible Use\",\"datePublished\":\"2016-01-22T14:11:24+00:00\",\"dateModified\":\"2016-02-01T06:20:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/\"},\"wordCount\":321,\"image\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/acceptable-use.jpg\",\"keywords\":[\"hipaa\",\"information systems\",\"security\"],\"articleSection\":[\"eagle associates staff\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/\",\"name\":\"Acceptable\\\/Responsible Use | Eagle Associates News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/acceptable-use.jpg\",\"datePublished\":\"2016-01-22T14:11:24+00:00\",\"dateModified\":\"2016-02-01T06:20:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/ed0338105c6f7bd7e7014934db2b97f9\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/acceptable-use.jpg\",\"contentUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2016\\\/02\\\/acceptable-use.jpg\",\"width\":1000,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2016\\\/01\\\/acceptable-responsible-use\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Acceptable\\\/Responsible Use\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/\",\"name\":\"Eagle Associates News\",\"description\":\"News and More from Eagle Associates, Inc.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/ed0338105c6f7bd7e7014934db2b97f9\",\"name\":\"Eagle Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g\",\"caption\":\"Eagle Staff\"},\"sameAs\":[\"http:\\\/\\\/www.eagleassociates.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Acceptable\/Responsible Use | Eagle Associates News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/","og_locale":"en_US","og_type":"article","og_title":"Acceptable\/Responsible Use | Eagle Associates News","og_description":"Once a workforce member is granted access to a practice\u2019s information systems (including computer hardware, software, email, voice mail, internet, telephone, cell phone, laptops, or other electronic equipment or service made available to employees or paid for by the practice), it is everyone\u2019s responsibility to ensure that the systems are utilized in an acceptable manner... Continue reading &#8594;","og_url":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/","og_site_name":"Eagle Associates News","article_published_time":"2016-01-22T14:11:24+00:00","article_modified_time":"2016-02-01T06:20:04+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2016\/02\/acceptable-use.jpg","type":"image\/jpeg"}],"author":"Eagle Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eagle Staff","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/#article","isPartOf":{"@id":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/"},"author":{"name":"Eagle Staff","@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/ed0338105c6f7bd7e7014934db2b97f9"},"headline":"Acceptable\/Responsible Use","datePublished":"2016-01-22T14:11:24+00:00","dateModified":"2016-02-01T06:20:04+00:00","mainEntityOfPage":{"@id":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/"},"wordCount":321,"image":{"@id":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/#primaryimage"},"thumbnailUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2016\/02\/acceptable-use.jpg","keywords":["hipaa","information systems","security"],"articleSection":["eagle associates staff"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/","url":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/","name":"Acceptable\/Responsible Use | Eagle Associates News","isPartOf":{"@id":"https:\/\/eagleassociates.net\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/#primaryimage"},"image":{"@id":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/#primaryimage"},"thumbnailUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2016\/02\/acceptable-use.jpg","datePublished":"2016-01-22T14:11:24+00:00","dateModified":"2016-02-01T06:20:04+00:00","author":{"@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/ed0338105c6f7bd7e7014934db2b97f9"},"breadcrumb":{"@id":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/#primaryimage","url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2016\/02\/acceptable-use.jpg","contentUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2016\/02\/acceptable-use.jpg","width":1000,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/eagleassociates.net\/news\/2016\/01\/acceptable-responsible-use\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eagleassociates.net\/news\/"},{"@type":"ListItem","position":2,"name":"Acceptable\/Responsible Use"}]},{"@type":"WebSite","@id":"https:\/\/eagleassociates.net\/news\/#website","url":"https:\/\/eagleassociates.net\/news\/","name":"Eagle Associates News","description":"News and More from Eagle Associates, Inc.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eagleassociates.net\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/ed0338105c6f7bd7e7014934db2b97f9","name":"Eagle Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g","caption":"Eagle Staff"},"sameAs":["http:\/\/www.eagleassociates.net"]}]}},"_links":{"self":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":1,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/120\/revisions"}],"predecessor-version":[{"id":122,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/120\/revisions\/122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/media\/121"}],"wp:attachment":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/media?parent=120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/categories?post=120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/tags?post=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}