OCR Guidance on Ensuring Equal Access to Emergency Services During Hurricane Florence

OCR Guidance on Ensuring Equal Access to Emergency Services During Hurricane Florence

Official guidance from the Office for Civil Rights

Notification as sent from the OCR-Privacy-List listserv, operated by the Office for Civil Rights (OCR) in the US Department of Health and Human Services:

As Hurricane Florence makes landfall, the HHS Office for Civil Rights (OCR) and its federal partners remain in close coordination to help ensure that emergency officials effectively address the needs of at-risk populations as part of disaster response.  To this end, emergency responders and officials should consider adopting, as circumstances and resources allow, the following practices to help make sure all segments of the community are served:

 

  • Employing qualified interpreter services to assist individuals with limited English proficiency and individuals who are deaf or hard of hearing during evacuation, response, and recovery activities;

 

  • Making emergency messaging available in languages prevalent in the affected area(s) and in multiple formats, such as audio, large print, and captioning and ensuring that websites providing disaster-related information are accessible;

 

  • Making use of multiple outlets and resources for messaging to reach individuals with disabilities, individuals with limited English proficiency, and members of diverse faith communities;

 

  • Considering the needs of individuals with mobility impairments and individuals with assistive devices or durable medical equipment in providing transportation for evacuation;

 

  • Identifying and publicizing accessible sheltering facilities that include accessible features, such as bathing, toileting, eating facilities, and bedding;

 

  • Avoiding separating people from their sources of support, such as service animals, durable medical equipment, caregivers, medication, and supplies; and

 

  • Stocking shelters with items that will help people to maintain independence, such as hearing aid batteries, canes, and walkers.

 

Being mindful of all segments of the community and taking reasonable steps to provide an equal opportunity to benefit from emergency response efforts will help ensure that the disaster management in all areas affected by Hurricane Florence is successful.

 

For more information regarding how Federal civil rights laws apply in an emergency, visit OCR’s Civil Rights Emergency Preparedness page.

 

For information about emergency requirements for long-term care facilities, visit the CMS Emergency Preparedness Rule page. 

 

For information regarding Title VI of the Civil Rights Act of 1964, Section 504 of the Rehabilitation Act of 1973, and other civil rights authorities that HHS OCR enforces, visit the Laws and Regulations Enforced by OCR civil rights page.

 

DISCLAIMER: These guidance documents are not final agency actions, do not legally bind persons or entities outside the Federal government, and may be rescinded or modified in the Department’s discretion. Noncompliance with any voluntary standards (e.g., recommended practices) contained in these documents will not, in itself, result in any enforcement action.

If you believe that a person or organization covered by the Privacy and Security Rules (a "covered entity") violated your health information privacy rights or otherwise violated the Privacy or Security Rules, you may file a complaint with OCR. For additional information about how to file a complaint, visit OCR's web page on filing complaints at http://www.hhs.gov/ocr/privacy/hipaa/complaints/index.html.

Previous Article How to Navigate Health App Permissions
Next Article Why it's Important to Check Your Health Records
Print
22318 Rate this article:
5.0
0Upvote 0Downvote
Please login or register to post comments.

How to Protect Your Privacy as More Apps Harvest Your Data

A New York Times Personal Tech series article by Brian X. Chen

Retrieved By Health eConsultation 0 14820 Article rating: 5.0

In this article written by Brian X. Chen from the New York Times he discusses some of the potential ways in which mobile apps that you download to your phone may be collecting and using your personal data in ways you did not know.

One of the key takeaways is that there are ways in which to protect yourself and tools that can help you figure out which apps are collecting your data and how to remove their ability to do so.

Stay Private: How to Hide Your Webcam, Mute Your Mic, and Turn Off Notifications

An article from Zapier

Nathan E Botts 0 14831 Article rating: 5.0

One consideration as you gather and store more personal health information on your computer and devices is making sure that you are not inadvertently sharing this information (or some other aspect of your personal health) through your webcam or mic.

This article from Zapier outlines several different ways and some handy applications that can help you control this on your PC or MAC.

Determining the Value of Compromising Your Privacy

An article from Engadget

Nathan E Botts 0 9929 Article rating: No rating

This article from the Engadget web magazine discusses how your online searching behaviors might be monitored by different companies that you are unaware about. This data is likely used to build profiles that may impact the advertisements you see, credit ratings received, and other potential social network aspects as of yet identified. 

Cybersecurity: Crash Course Computer Science #31

Retrieved By Health eConsultation 0 14443 Article rating: No rating

Cybersecurity: Crash Course Computer Science #31Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In today’s episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible as possible. From massive Denial of Service, or DDos attacks, to malware and brute force password cracking there are a lot of ways for hackers to gain access to your data, so we’ll also discuss some strategies like creating strong passwords, and using 2-factor authentication, to keep your information safe. Check out Computerphile’s wonderful video on how to choose a password! https://www.youtube.com/watch?v=3NjQ9b3pgIg Pre-order our limited edition Crash Course: Computer Science Floppy Disk Coasters here! https://store.dftba.com/products/computer-science-coasters Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios Want to know more about Carrie Anne? https://about.me/carrieannephilbin The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV Want to find Crash Course elsewhere on the internet? Facebook - https://www.facebook.com/YouTubeCrash... Twitter - http://www.twitter.com/TheCrashCourse Tumblr - http://thecrashcourse.tumblr.com Support Crash Course on Patreon: http://patreon.com/crashcourse CC Kids: http://www.youtube.com/crashcoursekids

RSS

What is Health eDefense?

Health eDefense is the act of protecting your personal health information. This not only protects your privacy, security, and safety, but also protects the data of your family, friends, and others in your community.

The Health eDefense platform is dedicated to providing consumers with actionable information on how to protect their personal health information effectively from cyber threats. Health eDefense provides informational content and education related to cyber security, privacy and consent, security, and related topics and policies such as HIPAA and GDPR.

Cyber security is impacting our daily lives, and our personal and protected health information is a target for hackers and criminals looking to make money off of our personal data. Your personal health data will always be about your health, demographics, social, lifestyle, financial history, and other related details. Once taken, they cannot be taken back.

We think the best cybersecurity tool is education and awareness, and we hope to provide users with tools and insight to protect themselves and their data better.