This is a Visiting Nurse Service of New York (“VNSNY”) system. This system, including all related equipment, networks and network devices, services, processes, data, messages, information and any and all other functions or information (the “System”), are provided to you solely to conduct VNSNY business.
VNSNY provides this System only for the authorized use of the employees of VNSNY and its subsidiary and affiliate corporations and consultants or contractors to VNSNY who are specifically granted authorization by VNSNY.
Any access, use or disclosure of Protected Health Information (“PHI”) stored, created or maintained through the VNSNY system, or any third party system, shall at all times be in compliance with the Health Information Portability and Accountability Act of 1996 and its implementing regulations (“HIPAA”) and Health Information Technology for Economic and Clinical Health Act and its implementing regulations (“HITECH”) and VNSNY’s policies and procedures.
This System, including back-up copies and data and information stored or facilitated by a third-party vendor, is the sole property of VNSNY. VNSNY may review, audit, intercept, access, disclose and delete data and information created, entered, processed, sent, received or stored on its system, including systems and services provided at VNSNY expense by third-party vendors, without the user’s permission or knowledge.
Because privacy does not extend to employees’ or consultants’ work-related conduct or the use of equipment or supplies that VNSNY provides, including equipment and services provided at VNSNY expense by third-party vendors, all such conduct, use and information are subject to inspection and review by VNSNY.
VNSNY reserves the right, but not the duty, to monitor this system for all lawful purposes, including, but not limited to, ensuring that all use is authorized, managing the system, facilitating protection against unauthorized access and other security and maintenance needs.
Use of this system, authorized or unauthorized, constitutes knowledge of and consent to the monitoring of this system for any purpose. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal or adverse action.