DoD Health Information Privacy Regulation (DoD 6025. 18-R)

DoD Health Information Privacy Regulation (DoD 6025. 18-R)
Author: Department of Defense
Publisher: Createspace Independent Pub
Total Pages: 118
Release: 2013-01-12
Genre: History
ISBN: 9781481966504

This Regulation, “DoD Health Information Privacy Regulation,” is issued under the authority of DoD Directive 6025.18, “Privacy of Individually Identifiable Health Information in DoD Health Care Programs,” December 19, 2002 (reference (a)). It prescribes the uses and disclosures of protected health information. This Regulation is based on the requirements of the Health Insurance Portability and Accountability Act, Public Law 104-191 (reference (b)). Although it covers much of the same ground as the Privacy Act of 1974 (reference (c)), this Regulation in no way impacts the need for the Department of Defense to comply with reference (c) which has been implemented within DoD by DoD 5400.11-R (reference (d)). This Regulation applies to the Office of the Secretary of Defense, the Military Departments, the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the Department of Defense.

DoD Health Information Security Regulation

DoD Health Information Security Regulation
Author: Assistant Secretary of Defense for Health Affairs
Publisher:
Total Pages: 38
Release: 2013-01-13
Genre: Reference
ISBN: 9781481974387

This Regulation is issued under the authority of DoD Directive 5136.1 (Reference (a)). It assigns the Assistant Secretary of Defense for Health Affairs (ASD(HA)) the authority, direction, and control to establish policies, procedures, and standards that shall govern DoD medical programs. Although this Regulation is based on the requirements of the Health Insurance Portability and Accountability Act (HIPAA) of 1996, Public Law 104-191 (1996) (Reference (b)), and title 45 Code of Federal Regulations parts 160, 162, and 164 (Reference (c)), it covers much of the same ground as the Federal Information Security Management Act (FISMA) (Reference (d)). This Regulation in no way impacts the need for the Department of Defense to comply with the FISMA. This law has not been superseded and has been taken into consideration in developing this Regulation. This Regulation applies to the Office of the Secretary of Defense, the Military Departments, the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the Department of Defense (hereafter referred to collectively as the "DoD Components").

DoD Health Information Security Regulation (DoD 8580. 02-R)

DoD Health Information Security Regulation (DoD 8580. 02-R)
Author: Department Defense
Publisher: CreateSpace
Total Pages: 38
Release: 2013-01-27
Genre:
ISBN: 9781482095364

This Regulation is issued under the authority of DoD Directive 5136.1 (Reference (a)). It assigns the Assistant Secretary of Defense for Health Affairs (ASD(HA)) the authority, direction, and control to establish policies, procedures, and standards that shall govern DoD medical programs. Although this Regulation is based on the requirements of the Health Insurance Portability and Accountability Act (HIPAA) of 1996, Public Law 104-191 (1996) (Reference (b)), and title 45 Code of Federal Regulations parts 160, 162, and 164 (Reference (c)), it covers much of the same ground as the Federal Information Security Management Act (FISMA) (Reference (d)). This Regulation in no way impacts the need for the Department of Defense to comply with the FISMA. This law has not been superseded and has been taken into consideration in developing this Regulation. This Regulation applies to the Office of the Secretary of Defense, the Military Departments, the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the Department of Defense.

The Army Lawyer

The Army Lawyer
Author:
Publisher:
Total Pages: 64
Release: 2014-07
Genre: Courts-martial and courts of inquiry
ISBN:

Manuals Combined: USN/USMC Commander’s Quick Reference Legal Handbook 2015, 2012 and 2009 Editions And The USMC Senior Enlisted Leader Smart Packet (2016)

Manuals Combined: USN/USMC Commander’s Quick Reference Legal Handbook 2015, 2012 and 2009 Editions And The USMC Senior Enlisted Leader Smart Packet (2016)
Author:
Publisher: Jeffrey Frank Jones
Total Pages: 844
Release:
Genre:
ISBN:

Sample text: NCIS REPORTING AND MILITARY JUSTICE INVESTIGATIONS REFERENCES: (a) MCM (RCM 303) (b) JAGMAN (Chapter II) (c) SECNAVINST 5430.107 (series) (d) SECNAVINST 1752.4A (series) (e) DODI 6495.02 COMMAND INQUIRY: Suspected offenses may come to command attention in a variety of ways (e.g., shore patrol, civil law enforcement, or phone call, etc.) The commanding officer (CO) must conduct some form of inquiry into reported offenses that may be tried by court-martial per reference (a). The degree of inquiry will depend on the nature, validity, and seriousness of the complaint. See reference (b). MANDATORY REFERAL TO NCIS: Reference (c) mandates that certain incidents be referred to NCIS whether occurring on or off base and regardless of civilian investigation involvement. These incidents include: Actual, suspected, or alleged major criminal offenses (punishable under the Uniform Code of Military Justice (UCMJ) by more than 1 year of confinement); Non-combat deaths when the cause of death is not medically attributable to disease or natural causes; Fires or explosions of unknown origin affecting Department of the Navy (DON) property or property under DON control; Theft or loss of ordnance or controlled substances; Disappearance of a command member; All instances of suspected fraud against the government within DON (e.g., theft of government property, bribery, false claims for pay, etc.); actual or suspected acts of espionage, terrorism, sabotage, assassination, and actual, suspected, or attempted defection of DON personnel; Internal security incidents, such as loss, compromise, or suspected compromise of classified information and national security cases; and Suspected sex-related offenses as defined under Articles 120 and 125 of the UCMJ. WHEN NCIS DECLINES TO INVESTIGATE: NCIS may, at its discretion, decline to conduct or continue any investigation, but shall expeditiously inform the effected command. A command may then request assistance from the local base security department or appropriate authority or pursue a command investigation pursuant to reference (a).

Protecting the Force

Protecting the Force
Author: Vernon E. Clark
Publisher: DIANE Publishing
Total Pages: 86
Release: 2010-10
Genre: Technology & Engineering
ISBN: 143792798X

On Nov. 5, 2010, a gunman opened fire at the Soldier Readiness Center at Fort Hood, Texas. Thirteen people were killed and 43 others were wounded or injured. Following the shooting, Defense Sec. Robert M. Gates established the Dept. of Defense Independent Review Related to Fort Hood to address questions about the degree to which the entire Dept. is prepared for similar incidents in the future -- especially multiple, simultaneous incidents. This report includes, but is not limited to: identifying and monitoring potential threats; providing time-critical information to the right people; employing force protection measures; and planning for and responding to incidents.