Laserfiche WebLink
IV. Client's Rights <br />The client has a right to receive a copy of this notice at the time of request. <br />Each client has the right to receive the following, no later than five (5) business days of a written request: <br />• A correction of Inaccurate or Incomplete PPI <br />• A copy of his or her consent form <br />• A copy of his or her HM IS records <br />• A current list of participating organizations that have access to HMIS data <br />V. Data Use <br />This Organization must protect HMIS data by ensuring that: <br />• A link to the Privacy Notice is accessed from the Organizatlon's webaite. <br />• LA/OC HMIS b not accessible to unauthorized users <br />• LA/OC HMIS Is only accessed by computers approved by the Organization <br />• HMIS Users are trained regarding user responsibilities and conduct <br />• fIMIS Users sign and comply with the LA10C HMIS User Agreement <br />• HMIS Users forward a copy of a client's Revocation of Consent to the HMIS Administrator within 24 hours of <br />receipt. <br />Vl. Responsibilities <br />This Organization Is responsible to ensure that: <br />• The Noflce Regarding Collection of Personal information Is posted at each Intake desk or comparable <br />location, <br />• HMIS Users do not misuse the system <br />• Clients are notified if a breach of their PPI Is discovered <br />• Any HMIS User who finds a possible security lapse on the system is obligated to Immediately report it to the <br />HMIS Administrator. <br />• A signed copy of the Consent to Share Protected Personal Information is retained for a period of seven <br />(7) years after the PPI was created or last changed. <br />VII. System Use <br />Computer equipment and services provided by a Car are intended only for LA/OC HMIS-related activities. <br />Prohibited uses include, but are not limited to: malicious or Illegal activities; unauthorized access; the creation, <br />sending and/or storing of fraudulent, threatening, harassing, or obscene messages; Inappropriate mess mailing <br />(spamming, flooding, bombing); dental of service attacks; and the creation or Intentional distribution of computer <br />viruses, worms, and/or Trojan horses, <br />Equipment, If applicable: All CoC-provided computer equipment including, but not limited to, <br />printers, scanners, laptops and monitors, were provided through grant funds from HUD. The maintenance <br />and upgrades of these devices are subject to the requirements and funding limitations of the HUD grant. <br />Maintenance and/or upgrade costs to equipment, Incurred after the HUD grant funds have been <br />exhausted, become the sole responsibility of this Organization. <br />Software, Ucenses, andlor Services, If applicable: CoC•provlded services to each organization <br />may Include, but are not limited to, purchasing and Installing Antl-Virus Software and licenses, Firewall <br />software and licenses, Windows software updates and High -Speed Internet Connections. The software <br />and/or services are provided for HMIS purposes through HUD grant funds. The maintenance, upgrades <br />and license purchases are subject to the requirements and funding limitations of the HUD grant, <br />Additional maintenance, upgrades and license purchases, Incurred after the grant funds have been <br />exhausted, become the sole responsibility of this Organization. <br />Verslan 1.5 Page 2 of 3 Modli led 1a12112a15 <br />