Contains policies at the organizational and administrative levels.
Lessons
- 2.7. Company Leadership and Organizational Chart
- 2.8. Programs and Services
- 2.10. Technology and Systems Plan
- 2.10.1. Electronic Medical Record/ Electronic Signatures
- 2.10.2. Internet/Phone Connection Troubleshooting
- 2.10.4. Wireless Internet Access
- 2.10.5. Technology Troubleshooting Protocol
- 2.10.6. Technology Troubleshooting FAQ
- 2.13. Rights of Persons Served
- 2.14. Accessibility
- 2.14.1. Client Requests for Special Accommodations
- 2.15. Information Measurement and Management
- 2.16.1. Access to Emergency Services
- 2.16.2.a. Fire Emergency
- 2.16.2.b. Severe Weather and Natural Disasters
- 2.16.2.c. Power Outage Protocol
- 2.16.2.d. Bomb Threats
- 2.16.2.e. Violence or Threatening Behavior
- 2.16.2.f. Shelter-in-Place
- 2.16.2.g. Medical and Psychiatric Emergencies
- 2.16.2.h. Seizures
- 2.16.2.i. Automated External Defibrillator (AED)
- 2.16.2.j. Non-Emergency Medical Issues
- 2.16.2.k. Emergency Drills
- 2.16.2.m. Emergency Contact Numbers
- 2.17.1. Maintenance, Housekeeping, and Inspection
- 2.17.3. Hazardous Materials
- 2.17.4. Privacy of Sessions
- 2.17.5. Detection and Extermination of Pests
- 2.17.6. Door Lock Key Code Changes
- 2.20. Accounts Payable
- 2.21.1. Information Security—Introduction
- 2.21.2. Employee Responsibilities
- 2.21.3. Identification and Authentication
- 2.21.4. Network Connectivity
- 2.21.5. Malicious Code
- 2.21.6. Encryption
- 2.21.7. Telecommuting
- 2.21.8. Telehealth
- 2.21.9. Assistive Technology
- 2.21.10. Specific Protocols and Devices
- 2.21.11. Retention/Destruction of Medical Information
- 2.21.12. Disposal of External Media/Hardware
- 2.21.13. Audit Controls
- 2.21.14. Data Integrity
- 2.21.15. Contingency Plan
- 2.21.16. Emergency Operations Procedures
- 2.21.17. Emergency Access “Break the Glass”
- 2.21.18. Sanction Policy