{"id":8105,"date":"2022-06-07T11:55:22","date_gmt":"2022-06-07T18:55:22","guid":{"rendered":"https:\/\/depts.washington.edu\/comply\/?page_id=8105"},"modified":"2025-11-06T15:51:39","modified_gmt":"2025-11-06T23:51:39","slug":"privacy-resources","status":"publish","type":"page","link":"https:\/\/depts.washington.edu\/comply\/privacy-resources\/","title":{"rendered":"Patient Information Privacy &#038; Security Resources"},"content":{"rendered":"<p>This listing of resources is gathered from throughout UW and UW Medicine to help you comply with privacy- and security-related policies and best practices.<\/p>\n<div class=\"su-accordion su-u-trim\">\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\">\n<div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>How to<\/div>\n<div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<div class=\"su-row\">\n<div class=\"su-column su-column-size-1-2\">\n<div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/guidance\/cloud-computing\/\" target=\"_blank\" rel=\"noopener noreferrer\">How can I use cloud storage securely?<\/a>\u00a0<a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a><\/li>\n<li><a href=\"https:\/\/it.uw.edu\/guides\/privacy\/reference-materials\/personal-data-data-classifications-and-structures\/data-classifications\/\" target=\"_blank\" rel=\"noopener noreferrer\">How do I classify information\/data?<\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/accounts-and-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">How do I create a password?<\/a>\u00a0<a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/guidance\/encryption\/\" target=\"_blank\" rel=\"noopener noreferrer\">How do I encrypt?<\/a>\u00a0<a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/guidance\/secure-telework\/secure-remote-access\/\" target=\"_blank\" rel=\"noopener noreferrer\">How do I remote access computing systems securely?<\/a><a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/guidance\/video-conferencing\/\" target=\"_blank\" rel=\"noopener noreferrer\">How do I video conference securely?<\/a><a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"su-column su-column-size-1-2\">\n<div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/guidance\/phishing-and-spam-email-guidance\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to forward phishing emails and report them?\u00a0<\/a> <a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a><\/li>\n<li>How to make your mobile device secure?\n<ul>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/guidance\/mobile-security\/android-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android Security<\/a>\u00a0<a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a> | <a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/guidance\/mobile-security\/ios-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">iPhone Security<\/a>\u00a0<a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/guidance\/encryption\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to send an email securely?<\/a>\u00a0<a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a>\n<ul>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/guidance\/encryption\/approved-email-domains\/\" target=\"_blank\" rel=\"noopener noreferrer\">Approved email domain list<\/a><a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\">\n<div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Education, Training and Policies<\/div>\n<div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<div class=\"su-row\">\n<div class=\"su-column su-column-size-1-2\">\n<div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<li><a href=\"http:\/\/www.washington.edu\/admin\/rules\/policies\/APS\/02.04.html#43sinfo\" target=\"_blank\" rel=\"noopener noreferrer\">APS 2.4: Information Security and Privacy: Roles, Responsibilities, and Definitions<\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/guidance\/\" target=\"_blank\" rel=\"noopener noreferrer\">Information Security Guidance<\/a><a href=\"#_ftn1\" name=\"_ftnref1\"><sup>[1]<\/sup><\/a><\/li>\n<li><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/security-authentication\/devices\/smartphone-configuration\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Devices<\/a><\/li>\n<li><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/security-authentication\/accounts-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">Passwords<\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/comply\/privacy-faqs\/\" target=\"_blank\" rel=\"noopener\">Patient Information Privacy FAQs<\/a><\/li>\n<li><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/security-authentication\/scams-malware-phishing\/phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Phishing<\/a><\/li>\n<li><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/email-calendaring\/protecting-your-email\/phishing-examples\/\" target=\"_blank\" rel=\"noopener noreferrer\">Phishing and Spam Email Guidance<\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/comply\/privacy-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Policies<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"su-column su-column-size-1-2\">\n<div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<li><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/security-authentication\/overview-of-security\/security-101\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security and Privacy 101<\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/comply\/docs\/comp_107.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Security Policies<\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/comply\/docs\/303_G1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Social Media Guidance<\/a><\/li>\n<li><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/email-calendaring\/protecting-your-email\/phishing-examples\/\" target=\"_blank\" rel=\"noopener noreferrer\">Spam vs. Phishing<\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/restricted\/security-governance\/information-security-standards\/\">System Security Standard<\/a><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/security-authentication\/overview-of-security\/social-media\/\" target=\"_blank\" rel=\"noopener noreferrer\"><sup>[1]<\/sup><\/a><\/li>\n<li><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/security-authentication\/overview-of-security\/social-media\/\" target=\"_blank\" rel=\"noopener noreferrer\">Social Media Guidelines<\/a><\/li>\n<li><a href=\"https:\/\/ciso.uw.edu\/education\/online-training\/#mobile\" target=\"_blank\" rel=\"noopener noreferrer\">SSN Use at the UW<\/a><\/li>\n<li><a href=\"https:\/\/www.uwmedicine.org\/about\/policies-and-notices\/wearable-technology-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">Wearable Technology Guidance<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\">\n<div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Graphs and Infographics<\/div>\n<div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<ul>\n<li><a href=\"https:\/\/ciso.uw.edu\/site\/files\/Things_to_know_about_malware.pdf\" target=\"_blank\" rel=\"noopener\">Malware Infographic<\/a><\/li>\n<li><a href=\"https:\/\/ciso.uw.edu\/site\/files\/phishing_uw.pdf\" target=\"_blank\" rel=\"noopener\">Phishing at UW Infographic<\/a><\/li>\n<li><a href=\"https:\/\/ciso.uw.edu\/site\/files\/ransomware.pdf\" target=\"_blank\" rel=\"noopener\">Ransomware Infographic<\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/comply\/docs\/DataClassificationChart_20161101.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Where to Find List of Personally Identifiable Information<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\">\n<div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Templates and Tools<\/div>\n<div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<ul>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/pcisa_discuss_tool\/\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Confidentiality and Information Security Agreement (PCISA) Discussion Tool for Chairs and Directors<\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/comply\/docs\/002_F1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Confidentiality and Information Security Agreement (PCISA) Form Template<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\">\n<div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Contact IT and IT Security<\/div>\n<div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<div class=\"su-row\">\n<div class=\"su-column su-column-size-1-2\">\n<div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<li>For ALNW, HMC, UWP, and UWMC:\n<ul>\n<li>206.543.7012 | <a href=\"mailto:uwmhelp@uw.edu\">uwmhelp@uw.edu<\/a><\/li>\n<\/ul>\n<\/li>\n<li>For CUMG:\n<ul>\n<li>206.987.1111<\/li>\n<\/ul>\n<\/li>\n<li>For\u00a0DoM IT\/SoM:\n<ul>\n<li>206.221.2459 | <a href=\"mailto:domhelp@uw.edu\">domhelp@uw.edu<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/\" target=\"_blank\" rel=\"noopener noreferrer\">UW Medicine IT Security<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"su-column su-column-size-1-2\">\n<div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<ul>\n<li>For UWMC-Northwest:\n<ul>\n<li>206.668.1605<\/li>\n<\/ul>\n<\/li>\n<li>For UW IT:\n<ul>\n<li>206.221.5000<\/li>\n<\/ul>\n<\/li>\n<li>For VMC:\n<ul>\n<li>425.228.3440<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"su-spoiler su-spoiler-style-fancy su-spoiler-icon-plus\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\">\n<div class=\"su-spoiler-title\" tabindex=\"0\" role=\"button\"><span class=\"su-spoiler-icon\"><\/span>Additional Resources<\/div>\n<div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<div class=\"su-row\">\n<div class=\"su-column su-column-size-1-2\">\n<div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<h4>Privacy Links<\/h4>\n<ul>\n<li><a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/index.html\" target=\"_blank\" rel=\"noopener\">HHS: HIPAA Final Rule<\/a><\/li>\n<li><a href=\"https:\/\/www.hhs.gov\/answers\/hipaa\/index.html\" target=\"_blank\" rel=\"noopener\">HHS: HIPAA Frequent Questions<\/a><\/li>\n<li><a href=\"http:\/\/www.washington.edu\/itconnect\/security\/security-and-privacy-policies\/\" target=\"_blank\" rel=\"noopener\">UW: Electronic Privacy Policy on Personally Identifiable Information<\/a><\/li>\n<li><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/privacy\/about-us\/governance\/#committee\" target=\"_blank\" rel=\"noopener\">UW: Privacy Steering Committee<\/a><\/li>\n<li><a href=\"https:\/\/disclosureaccounting.uwmedicine.org\/\" target=\"_blank\" rel=\"noopener\">UW Medicine Accounting of Disclosure Submission<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"su-column su-column-size-1-2\">\n<div class=\"su-column-inner su-u-clearfix su-u-trim\">\n<h4>Information Security Links<\/h4>\n<ul>\n<li><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/security-authentication\/\" target=\"_blank\" rel=\"noopener\">UW-IT Security &amp; Authentication<\/a><\/li>\n<li><a href=\"https:\/\/itconnect.uw.edu\/security\/\" target=\"_blank\" rel=\"noopener\">UW: Computing &amp; Communications [C&amp;C] Security Website<\/a><\/li>\n<li><a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/security-authentication\/devices\/secure-disposal-of-computers-and-devices\/\" target=\"_blank\" rel=\"noopener\">UW: Computing Devices Disposal<\/a><\/li>\n<li><a href=\"http:\/\/www.washington.edu\/admin\/rules\/policies\/APS\/02.02.html#3\" target=\"_blank\" rel=\"noopener\">UW: Information Security Policies<\/a><\/li>\n<li><a href=\"https:\/\/depts.washington.edu\/uwmedsec\/\" target=\"_blank\" rel=\"noopener\">UW: Medicine IT Services: Security Infrastructure Team [SIT]<\/a><\/li>\n<li><a href=\"https:\/\/itconnect.uw.edu\/it-at-the-uw\/it-governance-and-policies\/it-governance\/governance-groups\/information-security-privacy-domain\/\" target=\"_blank\" rel=\"noopener\">Security Advisory Board<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><sup>[1]<\/sup><\/a> For workforce members with UW NetID access only.\u00a0For VMC Workforce members, please visit <a href=\"https:\/\/valleymed.sharepoint.com\/content\/pages\/it-department.aspx\" target=\"_blank\" rel=\"noopener\">VMC&#8217;s IT Security Site<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This listing of resources is gathered from throughout UW and UW Medicine to help you comply with privacy- and security-related policies and best practices. [1] For workforce members with UW NetID access only.\u00a0For VMC Workforce members, please visit VMC&#8217;s IT Security Site.<\/p>\n<div><a class=\"more-link\" href=\"https:\/\/depts.washington.edu\/comply\/privacy-resources\/\">Continue reading <span class=\"screen-reader-text\">Patient Information Privacy &#038; Security Resources<\/span><\/a><\/div>\n","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-8105","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/depts.washington.edu\/comply\/wp-json\/wp\/v2\/pages\/8105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/depts.washington.edu\/comply\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/depts.washington.edu\/comply\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/depts.washington.edu\/comply\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/depts.washington.edu\/comply\/wp-json\/wp\/v2\/comments?post=8105"}],"version-history":[{"count":32,"href":"https:\/\/depts.washington.edu\/comply\/wp-json\/wp\/v2\/pages\/8105\/revisions"}],"predecessor-version":[{"id":8208,"href":"https:\/\/depts.washington.edu\/comply\/wp-json\/wp\/v2\/pages\/8105\/revisions\/8208"}],"wp:attachment":[{"href":"https:\/\/depts.washington.edu\/comply\/wp-json\/wp\/v2\/media?parent=8105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}