{"id":120,"date":"2007-12-13T15:20:00","date_gmt":"2007-12-13T15:20:00","guid":{"rendered":"https:\/\/med.sites.unc.edu\/security\/policies-guidelines\/"},"modified":"2022-04-19T12:16:19","modified_gmt":"2022-04-19T12:16:19","slug":"policies-guidelines","status":"publish","type":"page","link":"https:\/\/www.med.unc.edu\/security\/policies-guidelines\/","title":{"rendered":"Policies &#038; Guidelines"},"content":{"rendered":"<div>\n<ul>\n<li><a href=\"\/security\/hipaa\/policies\">UNC School of Medicine Policies<\/a><\/li>\n<li><a class=\"internal-link\" title=\"\" href=\"\/security\/hipaa\/policies\" target=\"_self\" rel=\"noopener\">UNC Health Care System Policies<\/a><\/li>\n<li><a class=\"internal-link\" title=\"\" href=\"https:\/\/www.med.unc.edu\/security\/wp-content\/uploads\/sites\/631\/2018\/04\/privacyguidelines1218071.pdf\" target=\"_self\" rel=\"noopener\">UNC Health Care System Privacy Guidelines [.pdf]<\/a><\/li>\n<li><a class=\"external-link\" href=\"http:\/\/its.unc.edu\/about-its\/university-it-policies\/\" target=\"_blank\" rel=\"noopener\">UNC IT Security Policies<\/a><\/li>\n<li><a href=\"https:\/\/policies.unc.edu\/TDClient\/2833\/Portal\/Home\/\" target=\"_blank\" rel=\"noopener\">UNC Chapel Hill Policies, Procedures and Standards<\/a><\/li>\n<\/ul>\n<h2>National Standards to Protect the Privacy of Personal Health Information<\/h2>\n<ul>\n<li><a class=\"external-link\" href=\"http:\/\/www.gpo.gov\/fdsys\/pkg\/FR-2013-01-25\/pdf\/2013-01073.pdf\" target=\"_blank\" rel=\"noopener\">HIPAA Omnibus Rule<\/a> [.pdf]<\/li>\n<li><a class=\"internal-link\" title=\"\" href=\"https:\/\/www.med.unc.edu\/security\/wp-content\/uploads\/sites\/631\/2018\/04\/hipaasecurityrule2003.pdf\" target=\"_self\" rel=\"noopener\">HIPAA Security Final Rule<\/a> [.pdf]<\/li>\n<li><a class=\"internal-link\" title=\"\" href=\"https:\/\/www.med.unc.edu\/security\/wp-content\/uploads\/sites\/631\/2018\/04\/hipaaprivacyrule2002.pdf\" target=\"_self\" rel=\"noopener\">HIPAA Privacy Final Rule<\/a> [.pdf]<\/li>\n<\/ul>\n<h2>Guideline and Best Practice Resources for Information Security<\/h2>\n<ul>\n<li><b><\/b><a href=\"http:\/\/csrc.nist.gov\" target=\"_blank\" rel=\"noopener\">NIST<\/a> National Institute of Standards and Technology<\/li>\n<li><a href=\"http:\/\/www.cert.org\" target=\"_blank\" rel=\"noopener\">CERT<\/a> Carnegie Mellon University&#8217;s Computer Emergency Response Team<\/li>\n<li><a href=\"http:\/\/www.sans.org\" target=\"_blank\" rel=\"noopener\">SANS<\/a> SysAdmin, Audit, Network, Security Institute<\/li>\n<li><a href=\"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-44-ver2\/SP800-44v2.pdf\">NIST Guidelines on Securing Public Web Servers<\/a> [.pdf]<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>UNC School of Medicine Policies UNC Health Care System Policies UNC Health Care System Privacy Guidelines [.pdf] UNC IT Security Policies UNC Chapel Hill Policies, Procedures and Standards National Standards to Protect the Privacy of Personal Health Information HIPAA Omnibus Rule [.pdf] HIPAA Security Final Rule [.pdf] HIPAA Privacy Final Rule [.pdf] Guideline and Best &hellip; <a href=\"https:\/\/www.med.unc.edu\/security\/policies-guidelines\/\" aria-label=\"Read more about Policies &#038; Guidelines\">Read more<\/a><\/p>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-120","page","type-page","status-publish","hentry","odd"],"acf":[],"_links_to":[],"_links_to_target":[],"_links":{"self":[{"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/pages\/120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":0,"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}