All users must comply with HIPAA PRIVACY RULE REQUIREMENTS while using this computer system, including -
All of the information on managed or transmitted by this system is believed to be accurate and reliable; however, the system custodian assumes no responsibility for any errors appearing in the information. Further, the system custodian assumes no responsibility for the use of the information provided. If you are using this information for research, it is highly recommended that you verify your results by consulting the official sources of the information. In some cases the information may need to be updated. DO NOT RELY ON THE TEXT DISPLAYED BY THIS COMPUTERIZED SYSTEM IF THE PRECISE LANGUAGE IS IMPORTANT FOR YOUR PURPOSES.
This computerized system may provide links to sites which are not maintained by, or under the control of, the system custodian. Technical problems with outside links, other than a link that has been moved or changed, should be reported to the entity that maintains the site, not the site custodian. If you feel that the content of an outside link is inappropriate please e-mail us.
Information that is transmitted by e-mail over the Internet is not secure and can be intercepted and read by other Internet users. DO NOT use e-mail to send the system custodian private or confidential data about yourself or others. Additionally, the system custodian will not use e-mail to transmit responses that contain private or confidential data on an individual.
This computerized Health Information System is intended as a resource and guide for the authorized users. It is not a source of definitive legal advice about specific legal issues.
Unauthorized access, use, misuse, or modification of this computer system or of the data contained herein or in transit to/from this system constitutes a violation of Title 18, United States Code, Section 1030, and may subject the individual to Criminal and Civil penalties pursuant to Title 26, United States Code, Sections 7213(a), 7213A (the Taxpayer Browsing Protection Act), and 7431. This system and equipment are subject to monitoring to ensure proper performance of applicable security features or procedures. Such monitoring may result in the acquisition, recording and analysis of all data being communicated, transmitted, processed or stored in this system by a user. If monitoring reveals possible evidence of criminal activity, such evidence may be provided to Law Enforcement Personnel.