Laserfiche WebLink
IV. Client's Rights <br />The client has a right to receive a copy of this notice at the time of request, <br />Each client has the right to receive the following, no tater than five (S) business days of a written request: <br />• A correction of Inaccurate or incomplete PPI <br />• A copy of his or her consent form <br />• A copy of his or her HMIS records <br />• A current list of participating organizations that have access to HMIS data <br />V. Date. Use <br />This Organization must protect HMIs data by ensuring that; <br />• A link to the Privacy Notice Is accessed from the Organization's website, <br />• LA/OC HMIS Is not accessible to unauthorized users <br />s WOC HMIs Is only accessed by computers approved by the Organization <br />• HMIs Users are trained regarding user responsibilities and conduct <br />• HMIS Users sign and comply with the LA10C HMIS UserAgroement <br />• HMIS users forward a copy of a rJtenCs Revocation of Consent to the HM IS Adminlstrator within 24 hours of <br />receipt. <br />VI, Responsibilities <br />This Organization Is responsible to ensure that; <br />• The Notice Regarding Collection of Personal Information Is posted at each intake desk or comparable <br />location, <br />• HMIS Users do not misuse the system <br />• Clients are notified if a breach of their PPI is discovered <br />• Any HMIs User who finds a possible security lapse on the system is obligated to Immediately report it to the <br />HMIS Administrator, <br />• A signed copy of the Consent to Share Protected Personal Information Is retained for a period of seven <br />(7) years after the PPI was created or last changed, - - <br />VII. System Use <br />Computer equipment and services provided by a COC are Intended only for LA/OC HMIS-related activities. <br />Prohibited uses Include, but are not limited to: malicious or illegal activities; unauthorized access; the creation, <br />sending and/or storing of fraudulent, threatening, harassing, or obscene messages; Inappropriate mass mailing <br />(sparrming, flooding; bombing); denial of service attacks; and the creation or Intentional distribution of computer <br />viruses, worms, and/or Trojan horses, <br />Egn/pment, ifappllooble: All CoC-provided computer equipment Including, but not limited to, <br />printers, scanners, laptops and monitors, were provided through grant funds from HUD, The maintenance <br />and upgrades of these devices are subject to the requirements and funding limitations of the HUD grant, <br />Maintenance and/or upgrade costs to equipment, Incurred after the HUD grant funds have been <br />exhausted, become the sole responsibility of this Organization. <br />Software,Licenses, andlor Services, ff applicable: CoC-provided services to each organization <br />may include, but are not limited to, purchasing and Installing Anti-virus Software and licenses, Firewall <br />software and licenses, Windows software updates and High -Speed Internet connections, The software <br />and/or services are provided for HMIS purposes through HUD grant funds. The maintenance, upgrades <br />and license purchases are subject to the requirements and funding limitations of the HUD grant. <br />Additional maintenance, upgrades and license purchases, Incurred after the grant funds have been <br />exhausted, become the sole responsibility of this Organization. <br />Version 1.5 Page 2 of 3 ModlJred 10/21/2015 <br />