Privacy - Onward Transfer - Access Limitations, v1.0

Defines privacy requirements for organizations to document the types of user actions and permissions that are controlled by the organization's access limitations.

Assessment Step

1
Privacy - Onward Transfer - Access Limitations (Privacy-OnwardTransfer-AccessLimitations)
Has the organization documented the types of user actions and permissions that are controlled by the organization's access limitations? Note: User actions and permissions are often used to identify agencies and individuals with a need and right to know particular information or intelligence, access case management information, access non-sensitive information only, or to identify who is authorized to submit or modify particular records or record sets, to have read only access or to be authorized to add/modify/delete records, or to be authorized to grant privileges. Best Practice: It is suggested that organizations specify their system for identifying user actions and permissions in their privacy policies.
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
Parameters
Information Typesrequired
ENUM_MULTI : Select the type(s) of sensitive information that apply.
  • PII
  • PHI
  • III
  • IIHI
  • Other
Satisfied By Privacy Policyrequired
BOOLEAN : Is the organization's privacy policy the source for all supporting information for satisfying the issuance criteria of this Trustmark Definition? (TRUE=yes)

Conformance Criteria (1)

C-1
What types of user actions and permissions are controlled by the center's access limitations? Note: User actions and permissions are often used to identify agencies and individuals with a need and right to know particular information or intelligence, access case management information, access non-personally identifiable information (PII) only, or to identify who is authorized to submit or modify particular records or record sets, to have read only access or to be authorized to add/modify/delete records, or to be authorized to grant privileges. Best Practice: It is suggested that centers specify their system for identifying user actions and permissions in their privacy policies.
Citation
FCPP
Section J.1, Sharing and Disclosure