For purposes of this Agreement, “Service” refers to the Company’s service which can be accessed via our website at https://peacecaringservices.com or through our mobile application. The terms “we,” “us,” and “our” refer to the Company. “You” refers to you, as a user of Service.
II. INFORMATION WE COLLECT
We may collect both “Non-Personal Information” and “Personal Information” about you. “Non-Personal Information” includes information that cannot be used to personally identify you, such as anonymous usage data, general demographic information we may collect, referring/exit pages and URLs, platform types, preferences you submit and preferences that are generated based on the data you submit and number of clicks. “Personal Information” includes information that can be used to personally identify you, such as your name, address and email address.
In addition, we may also track information provided to us by your browser or by our mobile application when you view or use the Service, such as the website you came from (known as the “referring URL”), the type of browser you use, the device from which you connected to the Service, the time and date of access, and other information that does not personally identify you. We use this information for, among other things, the operation of the Service, to maintain the quality of the Service, to provide general statistics regarding use of the Service and for other
business purposes. We track this information using cookies, or small text files which include an anonymous unique identifier. Cookies are sent to a user’s browser from our servers and are stored on the user’s computer hard drive. Sending a cookie to a user’s browser enables us to collect Non-Personal Information about that user and keep a record of the user’s preferences when utilizing our services, both on an individual and aggregate basis. The Company may use both persistent and session cookies; persistent cookies remain on your computer after you close your session and until you delete them, while session cookies expire when you close your browser. Persistent cookies can be removed by following your Internet browser help file directions. If you choose to disable cookies, some areas of the Service may not work properly.
III. HOW WE USE AND SHARE INFORMATION
In general, we do not sell, trade, rent or otherwise share your Personal Information with third parties without your consent. We may share your Personal Information with vendors and other third-party providers who are performing services for the Company. In general, the vendors and third-party providers used by us will only collect, use and disclose your information to the extent necessary to allow them to perform the services they provide for the Company. For example, when you provide us with personal information to complete a transaction, verify your credit card, place an order, arrange for a delivery, or return a purchase, you consent to our collecting and using such personal information for that specific purpose, including by transmitting such information to our vendors (and their service providers) performing these services for the Company.
However, certain third-party service providers, such as payment processors, have their own privacy policies in respect of the information that we are required to provide to them in order to use their services. For these third-party service providers, we recommend that you read their privacy policies so that you can understand the manner in which your Personal Information will be handled by such providers.
IV. HOW WE PROTECT INFORMATION
We implement reasonable precautions and follow industry best practices in order to protect your Personal Information and ensure that such Personal Information is not accessed, disclosed, altered or destroyed. However, these measures do not guarantee that your information will not be accessed, disclosed, altered or destroyed by breach of such precautions. By using our Service, you acknowledge that you understand and agree to assume these risks.
V. YOUR RIGHTS REGARDING THE USE OF YOUR PERSONAL INFORMATION
VII. LINKS TO OTHER WEBSITES
VIII. AGE OF CONSENT
By using the Service, you represent that you are at least 18 years of age.
X. MERGER OR ACQUISITION
XI. EMAIL COMMUNICATIONS & OPTING OUT
We will send you Service-related announcements on occasions when it is necessary to do so. For instance, if our Service is temporarily suspended for maintenance, or a new enhancement is released, which will affect the way you use our Service, we might send you an email. Generally, you may not opt-out of these communications, which are not promotional in nature. Based upon the Personal Information that you provide us, we may communicate with you in response to your inquiries to provide the services you request and to manage your account. We will communicate with you by email or telephone, in accordance with your wishes. We may also use your Personal Information to send you updates and other promotional communications. If you no longer wish to receive those email updates, you may opt-out of receiving them by following the instructions included in each update or communication.
XII. CONTACT US & WITHDRAWING CONSENT
Health Insurance Portability and Accountability Act (HIPAA)
HIPAA is the acronym for the Health Insurance Portability and Accountability Act that was passed by Congress in 1996. The HIPAA Privacy regulations require health care providers and organizations, as well as their business associates, to develop and follow procedures that ensure the confidentiality and security of protected health information (PHI) when it is transferred, received, handled, or shared. This applies to all forms of PHI, including paper, oral, and electronic, etc. HIPAA requires the protection and confidential handling of protected health information including patient health information, demographic information, physical or mental health, health care payment provisions, and client identity. At the same time, the Privacy Rule is balanced so that it permits the disclosure of health information needed for patient care and other important purposes. Failure to comply with HIPAA can result in civil and criminal penalties (42 USC § 1320d-5).
Examples of HIPAA violations:
- Improper disposal of patient records; shredding is necessary before disposing of patient’s record.
- Insider snooping, which refers to family members or coworkers looking into a person’s medical records without authorization. This can be avoided with password protection, tracking systems, and clearance levels.
- Releasing information to an undesignated party; only the exact person listed on the authorization form may receive patient information.
- Releasing the wrong patient’s information; through a careless mistake, someone releases information to the wrong patient. This sometimes happens when two patients have the same or similar name.
- Unprotected storage of private health information, such as a laptop that is stolen. Private information stored electronically needs to be stored on a secure device. This applies to a laptop, thumbnail drive, or any other mobile device.
Scenarios of HIPAA violations:
- Telling friends or relatives about clients that are under your care
- Discussing private health information in public areas
- Discussing private health information over the phone in a public area
- Not logging off your computer or a computer system that contains private health information Including private health information in an unsecured text or email
Confidentiality of client medical information
Individuals in our care expect us to maintain the confidentiality and security of all their Protected Health Information (PHI). Peace Caring Services, LLC does not use, disclose, or discuss client-specific information with others unless the client authorizes the release of his or her information, or we are required or authorized by law to release the information. Peace Caring Services, LLC maintains the confidentiality of client medical information and uses appropriate security measures to protect this information, including information contained in client charts. Peace Caring Services, LLC also uses appropriate security measures of PHI in all communications.