VNSHealth Logo

This is a VNSHealth system.

This system, including all related equipment, networks and network devices, services, processes, data, messages, information and any and all other functions or information (the "System"), are provided to you solely to conduct VNSHealth business.

VNSHealth provides this System only for the authorized use of the employees of VNSHealth and its subsidiary and affiliate corporations and consultants or contractors to VNSHealth who are specifically granted authorization by VNSHealth.

Any access, use or disclosure of Protected Health Information ("PHI") stored, created or maintained through the VNSHealth system, or any third party system, shall at all times be in compliance with the Health Information Portability and Accountability Act of 1996 and its implementing regulations ("HIPAA") and Health Information Technology for Economic and Clinical Health Act and its implementing regulations ("HITECH") and VNSHealth.s policies and procedures.

This System, including back-up copies and data and information stored or facilitated by a third-party vendor, is the sole property of VNSHealth. VNSHealth may review, audit, intercept, access, disclose and delete data and information created, entered, processed, sent, received or stored on its system, including systems and services provided at VNSHealth expense by third-party vendors, without the user.s permission or knowledge.

Because privacy does not extend to employees' or consultants'. work-related conduct or the use of equipment or supplies that VNSHealth provides, including equipment and services provided at VNSHealth expense by third-party vendors, all such conduct, use and information are subject to inspection and review by VNSHealth.

VNSHealth reserves the right, but not the duty, to monitor this system for all lawful purposes, including, but not limited to, ensuring that all use is authorized, managing the system, facilitating protection against unauthorized access and other security and maintenance needs.

Use of this system, authorized or unauthorized, constitutes knowledge of and consent to the monitoring of this system for any purpose. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal or adverse action.