Laserfiche WebLink
IV. Client's Rights <br />The client has a right to receive a copy of this notice at the time of request. <br />Each client has the right to receive the following, no later than five (5) business days of a written request: <br />• A correction of Inaccurate or Incomplete PPI <br />• A copy of his or her consent form <br />• A copy of his or her HMIS records <br />• A current list of participating organizations that have access to HMIS data <br />V. Data Use <br />This Organization must protect HMIS data by ensuring that: <br />• A link to the Privacy Notice is accessed from the Organization's website. <br />• WOC HMIS is not accessible to unauthorized users <br />• WOC HMIS Is only accessed by computers approved by the Organization <br />• HMIS Users are trained regarding user responsibilities and conduct <br />• HMIS Users sign and comply with the LA/OC HIM User Agreement <br />• HMIS Users forward a copy of a client's Revocation of Consent to the HMIS Administrator within 24 hours of <br />receipt. <br />VI. Responsibilities <br />This Organization is responsible to ensure that: <br />. The Notice Regarding Collection of Personal Information is posted at each intake desk or comparable <br />location. <br />• HMIS Users do not misuse the system <br />• Clients are notified if a breach of their PPI is discovered <br />• Any HMIS User who finds a possible security lapse on the system is obligated to Immediately report it to the <br />HMIS Administrator. <br />• A signed copy of the Consent to Share Protected Personal Information is retained for a period of seven <br />(7) years after the PPI was created or last changed. <br />VII. System Use <br />Computer equipment and services provided by a CoC are Intended only for LA/OC HMIS-related activities. <br />Prohibited uses include, but are not limited to: malicious or Illegal activities, unauthorized access; the creation, <br />sending and/or storing of fraudulent, threatening, harassing, or obscene messages; inappropriate mass mailing <br />(spamming, flooding, bombing); denial of service attacks; and the creation or intentional distribution of computer <br />viruses, worms, and/or Trojan horses. <br />Equipment, if applicable: All CoC-provided computer equipment including, but not limited to, <br />printers, scanners, laptops and monitors, were provided through grant funds from HUD. The maintenance <br />and upgrades of these devices are subject to the requirements and funding limitations of the HUD grant. <br />Maintenance and/or upgrade costs to equipment, incurred after the HUD grant funds have been <br />exhausted, become the sole responsibility of this Organization. <br />Software, Licenses, and/or Services, if applicable. CoC-provided services to each organization <br />may include, but are not limited to, purchasing and installing Anti -Virus Software and licenses, Firewall <br />software and licenses, Windows software updates and High -Speed Internet Connections. The software <br />and/or services are provided for HMIS purposes through HUD grant funds. The maintenance, upgrades <br />and license purchases are subject to the requirements and funding limitations of the HUD grant. <br />Additional maintenance, upgrades and license purchases, Incurred after the grant funds have been <br />exhausted, become the sole responsibility of this Organization. <br />Version 1.5 Page 2 of 3 Modified 1012112015 <br />