REQUESTING ORGANIZATION INFORMATION:

Size: px
Start display at page:

Download "REQUESTING ORGANIZATION INFORMATION:"

Transcription

1 Instructions: Please fill in this form, print it, and sign it (5 pages in total). You may then either: fax the completed and signed forms to the ehealth Service Desk at or scan the completed and signed forms then them to If you require additional assistance please call the ehs Service Desk at: (local ). REQUESTING ORGANIZATION INFORMATION: Organization Service Type: Physician Office / Clinic Community Pharmacy Regional Health Authority Other (describe): RHA ONLY Hospital Emergency Hospital In-Patient Hospital Ambulatory Care/Out-patients Organization Home Care Long-Term Care/Affiliates Hospital Laboratory Service Type Physician Office/Clinic Primary Health Centre Hospital Radiology/Diagnostics (office use only) Public Health Mental Health/Addictions Hospital Pharmacy Organization Legal Name: Organization Name (if different from Legal Name): Primary Administrative Contact Name: Street Address: Postal Code: Telephone: City: Fax: Estimated number of initial users for Organization: Facilities (if different than above or more than 1) Facility Name 1 2 3

2 Designation of Authorized Approvers Please fill out the following section with a minimum of 1 Authorized Approver. Approvers will receive requests to verify that members of your Organization who request access to the ehr Viewer ( Users ) are allowed to have access. Authorized Approvers Last Name First Name Address Have a SCI or EMC account ehs Viewer Access Required 1 2 Yes No Yes No Yes No Yes No 3 Yes No Yes No 4 Yes No Yes No 5 Yes No Yes No Privacy, Security and Technical Assessment Although your initial access to the ehr Viewer will not be affected by this assessment, it must be completed and submitted as part of your Organization Approval Package. You may be contacted at a later date by our Privacy and Access Office to discuss any privacy or security concerns that may affect your continued use of the ehr Viewer. Technical Requirements Yes No Comments My organization meets the technical specifications outlined in the attached Technical Requirements document. Does your Organization use any of the following: Yes No Comments Electronic Medical Record (EMR) Pharmaceutical Information Program (PIP) Shared Client Index (SCI) or Enterprise Management Consul (EMC) Section A: Privacy and Security Assessment Yes No Comments 1) Is your Organization aware of privacy, The Health Information Protection Act (HIPA), and your responsibility to manage and secure personal health information?

3 2) Does your Organization have the following: a. someone designated as Privacy Officer or responsible for information privacy b. privacy and security policies and procedures c. confidentiality agreements signed by all staff d. privacy and security training for staff e. procedures in place to routinely or periodically audit user use/access to systems containing health information f. signed agreements in place with third parties (such as paper shredding services, computer support, etc. and other trustees) 3) Does your Organization provide information to patients about information management practices, including the purpose for collection, use and disclosure of their personal health information? Section B: Technical Security You may need to contact your IT Support to help answer some of these questions Yes No Comments 1) Are computer monitors placed so that unauthorized viewing is prevented? 2) Is equipment such as printers, fax machines, etc. located in secure areas, not accessible to the public? 3) Are the following technical and physical security safeguards in place where ehr Viewer access will occur: a. Controls to prevent screens from view if computer is unattended ie: password enabled screen save b. Anti-virus protection is installed with regular updates c. Anti-virus controls are enabled d. Firewalls are installed and enabled 4) Are Local Area Network and appropriate controls in place? 5) Are Wireless security settings configured and enabled?

4 Agreement This section must be signed by the head of the Organization requesting Approval. The head of the organization could be classified as the Owner, Chief Physician, Chief Executive Officer, or Chief Information Officer. I acknowledge that I, the trustee or a designated representative of the trustee, have read and agree to the responsibilities as outlined below as well as my obligations under HIPA. ehr Viewer Approved Organization Roles & Responsibilities Approved Organizations are responsible for ensuring that: The Organization s designated Authorized Approvers have completed the required training as well as have read and understand their roles and responsibilities. Appropriate physical, organizational and technological safeguards are in place within their organization to protect the security and confidentiality of the ehr Viewer data. ehr Viewer data is used only on a need-to-know basis for the authorized purposes in accordance with The Health Information Protection Act (HIPA) and the Joint Service and Access Policy (JSAP). The Organization is responsible for the management of Authorized Approvers including additions, deletions and changes in privileges. The Approved Organization and the Approver are accountable for the actions of the user. ehr Viewer Authorized Approver Roles & Responsibilities Authorized Approvers are responsible for ensuring that: Users complete the training available on the ehr Viewer Program Page. Approvers are responsible for going in and approving Viewer access requests for their Organizations as required. Note: ehr Viewer User Roles & Responsibilities Users are responsible for completing the training available in the ehr Viewer Program Page. Users are responsible for ensuring that the use of ehr Viewer data is on a need-to-know basis for the purpose of their health care work and is in accordance with their health organization s policies, procedures and HIPA and Joint Service Access and Policy (JSAP) agreement. Users who are viewing data within the ehr Viewer are responsible for selecting the correct person from the candidate list and for protecting the information from use for purposes other than health care delivery. User access is audited. Inappropriate use of the ehr Viewer shall be reported to the ehealth Saskatchewan s Chief Privacy Officer. Any violation of privacy legislation will be investigated and addressed. This may include immediate revocation of ehr Viewer access privileges. For additional details on any of these bullets, please see the Joint Services Access Policy (JSAP). A copy of which is available for download on the ehr Viewer Program Home Page. Head of the Organization Information & Signature: Name: Signature: Title: Date:

5 Technical Requirements These requirements must be met in order to access to the ehr Viewer. Each individual MUST have their own address and account Supported Browsers: Internet Explorer 8, 9, 10 and 11 Firefox (latest version) Chrome (latest version) Safari (latest version for Mac OS X) Safari (latest ios version for ipad only) Latest Version of Adobe Reader (required for viewing PDF documents in the browser) Latest Version of Adobe Flash Reader Minimum screen resolution: 1024 x 768 Verify that you can access the ehr Viewer web page: Verify you can access the ehr Viewer log in page: Add a shortcut on desktop or add to favorites

REQUEST FOR INTEGRATED SERVICES

REQUEST FOR INTEGRATED SERVICES REQUEST FOR INTEGRATED SERVICES Call the Service Desk 1-888-316-7446 (local 306-337-0600) if you are unclear about any fields below. Return to: Fax Number: 306-781-8480 : servicedesk@ehealthsask.ca CLINIC

More information

ehealth EHR Viewer & Integration Joint Service/Access Policy Executive Summary for Authorized Provider Organizations ("APOs")

ehealth EHR Viewer & Integration Joint Service/Access Policy Executive Summary for Authorized Provider Organizations (APOs) ehealth EHR Viewer & Integration Joint Service/Access Policy July 31, 2013 Version 1.0 1. BACKGROUND: Executive Summary for Authorized Provider Organizations ("APOs") ehealth Saskatchewan ("ehealth") is

More information

Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates. Reference Manual

Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates. Reference Manual Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates Guidelines on Requirements and Good Practices For Protecting Personal Health Information Disclaimer

More information

How to File the FBAR Electronically. The following steps describe the process of filing an FBAR electronically with our system.

How to File the FBAR Electronically. The following steps describe the process of filing an FBAR electronically with our system. Prerequisite How to File the FBAR Electronically The following steps describe the process of filing an FBAR electronically with our system. Our site requires use of the free Adobe Reader product to properly

More information

California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines

California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines California State Polytechnic University, Pomona Desktop Security Standard and Guidelines Version 1.7 February 1, 2008 Table of Contents OVERVIEW...3 AUDIENCE...3 MINIMUM DESKTOP SECURITY STANDARD...3 ROLES

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

Adobe Reader Settings

Adobe Reader Settings Adobe Reader Settings Table of Contents Adobe 9 and X (10) Reader Settings...2 For Adobe Reader X (10)... 5 Adobe Reader XI (11)...7 Internet Explorer 8 and 9... 8 Google Chrome... 9 Mozilla Firefox...

More information

Remote Access End User Reference Guide for SHC Portal Access

Remote Access End User Reference Guide for SHC Portal Access Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the

More information

estatement Consent and Disclosure Agreement (Agreement to Receive or Access

estatement Consent and Disclosure Agreement (Agreement to Receive or Access estatement Consent and Disclosure Agreement (Agreement to Receive or Access Electronic Disclosures (edisclosures), Notices (enotices) and Statements (estatements)) Introduction This estatement Consent

More information

How To Install the Virtual Learning App

How To Install the Virtual Learning App Table of Contents Installation Instructions... 2 MAC: Using Firefox... 2 MAC: Using Chrome... 6 Disabling PepperFlash... 9 MAC: Using Safari Unsafe Mode We Can t Control So Use Firefox or Chrome... 11

More information

Using Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet

Using Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet System Requirements These are the minimum requirements necessary to ensure the proper operation of Centegra Health System s Access.Centegra.Com. Administrative level access to the PC or other device used

More information

Install and End User Reference Guide for Direct Access to Citrix Applications

Install and End User Reference Guide for Direct Access to Citrix Applications Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a

More information

XenApp & XenDesktop Documentation. Help Desk (202) 994-8096 www.columbian.gwu.edu/ots

XenApp & XenDesktop Documentation. Help Desk (202) 994-8096 www.columbian.gwu.edu/ots XenApp & XenDesktop Documentation Help Desk (202) 994-8096 www.columbian.gwu.edu/ots 1 Version Date Comments Author v1.0 June 2011 Initial Version R. Shore v2.0 December 2011 Full Revision R. Shore v2.1

More information

About this Tool Information Security for Residents...

About this Tool Information Security for Residents... About this Tool Information Security for Residents... Purpose: Provide materials to inform and educate Residents in order to reach compliance regarding information security. Audience: New Residents Information

More information

Portal Instructions for Mac

Portal Instructions for Mac Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...

More information

8.03 Health Insurance Portability and Accountability Act (HIPAA)

8.03 Health Insurance Portability and Accountability Act (HIPAA) Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of

More information

Quick Start Guide to Logging in to Online Banking

Quick Start Guide to Logging in to Online Banking Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s

More information

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required

More information

Credit Card Security

Credit Card Security Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary

More information

GrandView. Web Client Software Requirements and Recommendations. Revision 2012.9.26

GrandView. Web Client Software Requirements and Recommendations. Revision 2012.9.26 GrandView Web Client Software Requirements and Recommendations Revision 2012.9.26 RoviSys 1455 Danner Drive Aurora, OH 44202 330-562-8600 grandviewbusinesssolutions.com TABLE OF CONTENTS Introduction...

More information

Safe Practices for Online Banking

Safe Practices for Online Banking November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.

More information

Citrix : Remediation - MAC

Citrix : Remediation - MAC Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing

More information

Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE

Learning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System

More information

Windows XP / Internet Explorer

Windows XP / Internet Explorer Windows XP / Internet Explorer 1. Log on to your computer 2. You will need to connect to the following SSID: RGNS Net 3. Once connected to the correct SSID, Open IE and you will be directed to the registration

More information

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006

HWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006 The VPN connection supports mainly access to the HWS network drives, not streaming audio/video or downloading large amounts of data. Contents Before Connecting via VPN Before setting up a Virtual Private

More information

HIPAA Risk Assessments for Physician Practices

HIPAA Risk Assessments for Physician Practices HIPAA Risk Assessments for Physician Practices Eric Sandhusen Corporate Compliance Director and Privacy Officer Lloyd Torres Director of Ambulatory HIM DISCLAIMER The statements and opinions presented

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Finance & Information Management Network Operations

Finance & Information Management Network Operations Finance & Information Management Network Operations Accessing Advance via External Affairs remote access system, Citrix. 1. Using a web browser, it s possibly to access Advance without the application

More information

Using TS-ACCESS for Remote Desktop Access

Using TS-ACCESS for Remote Desktop Access Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources

More information

PD 360 Training. Getting Started Series. PD 360 Essentials (Distance Learning) PD 360 Essentials. School Leadership and PD 360

PD 360 Training. Getting Started Series. PD 360 Essentials (Distance Learning) PD 360 Essentials. School Leadership and PD 360 Getting Started Series is an essential part of the successful implementation of any new initiative. To ensure a successful start for your organization, School Improvement Network has created the Getting

More information

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning

More information

Accessing TP SSL VPN

Accessing TP SSL VPN Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos

More information

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.

Mac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network. Mac OS X The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with benefits in security and improved

More information

Dartmouth College Technical Support Document for Kronos PC version

Dartmouth College Technical Support Document for Kronos PC version Dartmouth College Technical Support Document for Kronos PC version Contents How to Save the Kronos URL as a Favorite or Bookmark... 2 Internet Explorer... 2 Firefox... 4 Possible Problems When Logging

More information

Citrix Introduction and FAQs

Citrix Introduction and FAQs Citrix Introduction and FAQs Introduction to Citrix... 2 Why should I use this?... 2 What about Support?... 2 What browser should I use?... 2 Known Issues... 2 System Requirements for Windows-based computers...

More information

Information Security Manager Training

Information Security Manager Training Information Security Manager Training Kent Swagler CCEP Director, Corporate Compliance Direct line (314) 923-3097 Cell (314) 575-8334 kswagler@metrostlouis.org Information Security Manager Training Overview

More information

Fusion Release Notes Versions 5.14.00 5.14.04. 2 January 2015

Fusion Release Notes Versions 5.14.00 5.14.04. 2 January 2015 Fusion Release Notes Versions 5.14.00 5.14.04 2 January 2015 Fusion System Requirements Windows 8 and Internet Explorer 10 and 11 Compatibility IE10 and 11 on Windows 8 will only be supported using Desktop

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Zinio FAQ. » I created a Library Collection account but I did not receive my confirmation email. Why not?

Zinio FAQ. » I created a Library Collection account but I did not receive my confirmation email. Why not? Zinio FAQ» I created a Library Collection account but I did not receive my confirmation email. Why not? The notification emails are sent automatically after you subscribe and should show up in your email

More information

Section 2: Organization Information

Section 2: Organization Information NM MVD in partnership with New Mexico Interactive (NMI) New Mexico Interactive, LLC 1221 Flagman Way, Suite B4 Santa Fe, NM 87505 Telephone: (505) 982-8307 Fax: (505) 212-0758 http://www.mvd.newmexico.gov/vrs

More information

Computer and Network Security Policy

Computer and Network Security Policy Coffeyville Community College Computer and Network Security Policy Created By: Jeremy Robertson Network Administrator Created on: 6/15/2012 Computer and Network Security Page 1 Introduction: The Coffeyville

More information

Business Objects InfoView Quick-start Guide

Business Objects InfoView Quick-start Guide Business Objects InfoView Quick-start Guide Last Modified: 10/28/2015 The latest PDF version of this document can be found at: http://www.calpolycorporation.com/docs/finance/boeinfoviewquickstart.pdf What

More information

IT@DUSON. IT Service Desk

IT@DUSON. IT Service Desk IT@DUSON Technology plays a key role in the learning process for nursing students at Duke. This is your guide to the technology used at the Duke School of Nursing and how to request assistance for all

More information

Computing Services Information Security Office. Security 101

Computing Services Information Security Office. Security 101 Computing Services Information Security Office Security 101 Definition of Information Security Information security is the protection of information and systems from unauthorized access, disclosure, modification,

More information

Protection of Clients' Personal Health Information G & G LIVING CENTERS, INC.'s Privacy Practices

Protection of Clients' Personal Health Information G & G LIVING CENTERS, INC.'s Privacy Practices Protection of Clients' Personal Health Information G & G LIVING CENTERS, INC.'s Privacy Practices G & G Living Centers, Inc. has had a longstanding commitment to protecting the privacy of its clients'

More information

SYSTEM AND TECHNOLOGY GUIDE. for the Web-based MAP and Skills Navigator systems

SYSTEM AND TECHNOLOGY GUIDE. for the Web-based MAP and Skills Navigator systems for the Web-based MAP and Skills Navigator systems NOVEMBER 1, 2015 2010 2015 NWEA Measures of Academic Progress, MAP, and Skills Navigator are registered trademarks of NWEA in the United States and other

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

Installation Guide for Kurzweil 3000 Web License (Visual Walkthrough) Macintosh Version 14

Installation Guide for Kurzweil 3000 Web License (Visual Walkthrough) Macintosh Version 14 Installation Guide for Kurzweil 3000 Web License (Visual Walkthrough) Macintosh Version 14 Follow the instructions in this guide to download, install, and get started with Kurzweil 3000 Web License (K3000).

More information

mystanwell.com Installing Citrix Client Software Information and Business Systems

mystanwell.com Installing Citrix Client Software Information and Business Systems mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.

More information

Electronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security

Electronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security Electronic Communication In Your Practice How To Use Email & Mobile Devices While Maintaining Compliance & Security Agenda 1 HIPAA and Electronic Communication 2 3 4 Using Email In Your Practice Mobile

More information

BT Lancashire Services

BT Lancashire Services In confidence BT Lancashire Services Remote Access to Corporate Desktop (RACD) Getting Started Guide Working in partnership Confidentiality Statement BT Lancashire Services Certain information given to

More information

Secure Mail Registration and Viewing Procedures

Secure Mail Registration and Viewing Procedures Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email

More information

MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS. e-filing Guide

MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS. e-filing Guide MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS e-filing Guide 2012-2014 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in

More information

Dynamic Learning Maps Consortium Technical Liaison Webinar

Dynamic Learning Maps Consortium Technical Liaison Webinar Dynamic Learning Maps Consortium Technical Liaison Webinar Fall 2015 James Herynk Audio will be streamed through Skype for Business/Lync. Please hold questions until the end. All questions must be asked

More information

REMOTE ACCESS SERVICE SUPPORT. ICR User Support Guide

REMOTE ACCESS SERVICE SUPPORT. ICR User Support Guide REMOTE ACCESS SERVICE SUPPORT ICR User Guide Question Answer/ What is supported Non-ICR computer access 1. What are the support hours for the remote access service? The IT Helpdesk service is available

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

User Guide Remote PIV to VDI Using a PIV Card

User Guide Remote PIV to VDI Using a PIV Card User Guide Remote PIV to VDI Using a PIV Card Energy IT Services (IM-64) March 2015 Authors Prepared By Matthew Cummings Senior Systems Engineer IM-64 Version Control Date Version Document Revision Description

More information

Basic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann

Basic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring

More information

Frequently Asked Questions Ag Banking Online

Frequently Asked Questions Ag Banking Online Table of Contents Note: To quickly navigate to the answer, click on the question. What is Multi-Factor Authentication (MFA) and its purpose?... 2 This is my first time accessing the online application.

More information

Paxera Uploader Basic Troubleshooting

Paxera Uploader Basic Troubleshooting Before going further, please check the logs and auto-route queue in the Uploader Control, these logs will say a lot about your problem. You should take care of the following before contacting our Support

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Support Guide for CCS Service Desk. Banner Document Management (BDM)

Support Guide for CCS Service Desk. Banner Document Management (BDM) (BDM) Support Guide for CCS Service Desk 1 Table of Contents Overview 3 1. Process Details 1.1 BDM Security 4 1.2 BDM Functional Specialists 4 1.3 The Format of the Request 5 1.4 BDM Related Banner Classes

More information

Frequently Asked Questions 2. Prerequisites for Safari 3-5. Logging in to @Home Access With Safari 5-9

Frequently Asked Questions 2. Prerequisites for Safari 3-5. Logging in to @Home Access With Safari 5-9 Table of Contents It is important that you read this notice, the frequently asked questions and the detailed instructions for your browser thoroughly. Please be patient as you work through the list of

More information

SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE

SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE Welcome To Surpass Hosting Service. This document contains instructions to help you get up and running with your new service. The instructions

More information

Introduction... 2. Requesting a VPN Account... 2. Accessing the Citrix Access Gateway (CAG)... 3. Tips and Tricks... 9

Introduction... 2. Requesting a VPN Account... 2. Accessing the Citrix Access Gateway (CAG)... 3. Tips and Tricks... 9 NWI Research VPN Basics Table of Contents Introduction... 2 Requesting a VPN Account... 2 Accessing the Citrix Access Gateway (CAG)... 3 Tips and Tricks... 9 Back up Your Favorites and Desktop Folders

More information

SAGE Secure Browser Frequently Asked Questions

SAGE Secure Browser Frequently Asked Questions SAGE Secure Browser Frequently Asked Questions How often will there be auto-updates to the secure browser? Our goal is that the secure browser will continue to be updated once a year. However, updates

More information

Online (Internet) Banking Agreement and Disclosure

Online (Internet) Banking Agreement and Disclosure Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

For Mac User Directions, see page 5

For Mac User Directions, see page 5 Windows Vista, Windows 7, and Windows XP with Service Pack 3 Remote Desktop Access For Mac User Directions, see page 5 This instruction allows district staff and students to access the Commack UFSD network

More information

ONLINE ACCESS ONLINE ACCESS FAQS FAQS

ONLINE ACCESS ONLINE ACCESS FAQS FAQS ONLINE ACCESS ONLINE ACCESS FAQS FAQS How do I create an Online Access Account? There are three options for setting up an Online Access Account 1. Use your member number and temporary password given to

More information

Labour Market Programs Support System. LaMPSS Computer Compatibility Guide

Labour Market Programs Support System. LaMPSS Computer Compatibility Guide Labour Market Programs Support System LaMPSS Computer Compatibility Guide Prepared by: LaMPSS Operations Support June 2012 Version: 1.1 2011 Nova Scotia Department of Labour and Advanced Education This

More information

The Journey to Create Document Standards and Guidelines for Occupational Therapists. Christine Fleming Legislation and Bylaws Committee

The Journey to Create Document Standards and Guidelines for Occupational Therapists. Christine Fleming Legislation and Bylaws Committee The Journey to Create Document Standards and Guidelines for Occupational Therapists Christine Fleming Legislation and Bylaws Committee Objectives To describe the process and tools used to create the document

More information

Installing the Pharos Client onto your Macintosh laptop

Installing the Pharos Client onto your Macintosh laptop Downloading Pharos Wi-Fi installers for Windows and Macintosh Computers The remote print system can be installed on either a PC or a Macintosh computer. Installing the Pharos Client onto your Macintosh

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

BI-RADS Atlas 5th Edition e-book Download Instructions (Updated: 12/11/14)

BI-RADS Atlas 5th Edition e-book Download Instructions (Updated: 12/11/14) BI-RADS Atlas 5th Edition e-book Download Instructions (Updated: 12/11/14) Note: These instructions and screenshots are a general guide and may vary with what appears on your device due to differences

More information

Scholastic Reading Inventory Installation Guide

Scholastic Reading Inventory Installation Guide Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published

More information

RE: Erlanger IT Technology Letter from the Erlanger Chief Medical Informatics Officer Stephen Adams, MD

RE: Erlanger IT Technology Letter from the Erlanger Chief Medical Informatics Officer Stephen Adams, MD June 26, 2015 RE: Erlanger IT Technology Letter from the Erlanger Chief Medical Informatics Officer Stephen Adams, MD Dear Incoming Resident, On behalf of the Erlanger IT staff, I d like to welcome you

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View:

Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View: Instructions to Sign On and Off of Self Service Applications NOTE: Internet Explorer 7 and 8 are the only supported Browsers for the PeopleSoft Student Self Service applications. If you experience technical

More information

Access to Electronic Health Records Policy Franciscan Health System

Access to Electronic Health Records Policy Franciscan Health System Access to Electronic Health Records Policy Franciscan Health System PURPOSE: The purpose of the Access to Electronic Health Records Policy ( EHR Policy ) is to establish processes and procedures for permitting

More information

boundary free tv As part of our Boundary Free TV promise, Mediacom is proud to introduce HBO GO & MAX GO, the new streaming services from HBO.

boundary free tv As part of our Boundary Free TV promise, Mediacom is proud to introduce HBO GO & MAX GO, the new streaming services from HBO. boundary free tv As part of our Boundary Free TV promise, Mediacom is proud to introduce HBO GO & MAX GO, the new streaming services from HBO. Our customers will have access to over 1400 of their favorite

More information

isupplygw Site Login Troubleshooting

isupplygw Site Login Troubleshooting Site Login Troubleshooting Tips User name is administrator s email address Password requirements: o Passwords must be at least 8 characters long and can be as long as 30 characters. o Passwords must contain

More information

Complete Patch Management

Complete Patch Management Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia

More information

AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS

AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS OBJECTIVE Increase your IT vocab so that you can assess the risks related to your audits of EHRs and/or EHR related data AGENDA What

More information

Corporate Account Takeover (CATO) Risk Assessment

Corporate Account Takeover (CATO) Risk Assessment Corporate Account Takeover (CATO) Risk Assessment As a business, you want to be sure you have a strong process in place for monitoring and managing who has access to your ECorp services and how the information

More information

Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only

Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only Imhotep Academy is committed to staying on the forefront of educational practices of the 21st century. We are piloting a new policy

More information

Certified Secure Computer User

Certified Secure Computer User Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the

More information

CREDIT CARD POLICY DRAFT

CREDIT CARD POLICY DRAFT APPROVED BY Ronald J. Paprocki I. Policy Statement Any office of the University that processes credit card transactions may do so only in the manner approved by the University Treasury Office and in compliance

More information

How to use Mints@Home

How to use Mints@Home How to use Mints@Home Citrix Remote Access gives Mints users the ability to access University Of Cambridge and MINTS resources from any computer, anywhere in the world,. The service requires a high-speed

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

Citrix Receiver 11.8 for Macintosh OS X

Citrix Receiver 11.8 for Macintosh OS X 1. Document Control Record Document title Document Owner Citrix Receiver 11.8 for Macintosh OS X Rayna McKinley 2. Issue and Amendment Record Issue Date Revised by Comments 1 8/15/2013 Rayna McKinley Original

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

PavelComm s Pro-Tech Lite Fact Sheet

PavelComm s Pro-Tech Lite Fact Sheet PavelComm s Fact Sheet PavelComm s Fact Sheet - IT for Small Companies with Big Business Needs Owners, Executives and Managers should be investing in and integrating technology to increase the productivity

More information