This is a VNS Health system.
This system, including all related equipment, networks and network devices, services, processes, data, messages, information and any and all other functions or information (the "System"), are provided to you solely to conduct VNS Health business.
VNS Health provides this System only for the authorized use of the employees of VNS Health and its subsidiary and affiliate corporations and consultants or contractors to VNS Health who are specifically granted authorization by VNS Health.
Any access, use or disclosure of Protected Health Information ("PHI") stored, created or maintained through the VNS Health system, or any third party system, shall at all times be in compliance with the Health Information Portability and Accountability Act of 1996 and its implementing regulations ("HIPAA") and Health Information Technology for Economic and Clinical Health Act and its implementing regulations ("HITECH") and VNS Health.s policies and procedures.
This System, including back-up copies and data and information stored or facilitated by a third-party vendor, is the sole property of VNS Health. VNS Health may review, audit, intercept, access, disclose and delete data and information created, entered, processed, sent, received or stored on its system, including systems and services provided at VNS Health expense by third-party vendors, without the user.s permission or knowledge.
Because privacy does not extend to employees' or consultants'. work-related conduct or the use of equipment or supplies that VNS Health provides, including equipment and services provided at VNS Health expense by third-party vendors, all such conduct, use and information are subject to inspection and review by VNS Health.
VNS Health reserves the right, but not the duty, to monitor this system for all lawful purposes, including, but not limited to, ensuring that all use is authorized, managing the system, facilitating protection against unauthorized access and other security and maintenance needs.
Use of this system, authorized or unauthorized, constitutes knowledge of and consent to the monitoring of this system for any purpose. Unauthorized use may subject you to criminal prosecution. Evidence of unauthorized use collected during monitoring may be used for administrative, criminal or adverse action.