REQUESTING ORGANIZATION INFORMATION:
|
|
- Louise Reynolds
- 8 years ago
- Views:
Transcription
1 Instructions: Please fill in this form, print it, and sign it (5 pages in total). You may then either: fax the completed and signed forms to the ehealth Service Desk at or scan the completed and signed forms then them to If you require additional assistance please call the ehs Service Desk at: (local ). REQUESTING ORGANIZATION INFORMATION: Organization Service Type: Physician Office / Clinic Community Pharmacy Regional Health Authority Other (describe): RHA ONLY Hospital Emergency Hospital In-Patient Hospital Ambulatory Care/Out-patients Organization Home Care Long-Term Care/Affiliates Hospital Laboratory Service Type Physician Office/Clinic Primary Health Centre Hospital Radiology/Diagnostics (office use only) Public Health Mental Health/Addictions Hospital Pharmacy Organization Legal Name: Organization Name (if different from Legal Name): Primary Administrative Contact Name: Street Address: Postal Code: Telephone: City: Fax: Estimated number of initial users for Organization: Facilities (if different than above or more than 1) Facility Name 1 2 3
2 Designation of Authorized Approvers Please fill out the following section with a minimum of 1 Authorized Approver. Approvers will receive requests to verify that members of your Organization who request access to the ehr Viewer ( Users ) are allowed to have access. Authorized Approvers Last Name First Name Address Have a SCI or EMC account ehs Viewer Access Required 1 2 Yes No Yes No Yes No Yes No 3 Yes No Yes No 4 Yes No Yes No 5 Yes No Yes No Privacy, Security and Technical Assessment Although your initial access to the ehr Viewer will not be affected by this assessment, it must be completed and submitted as part of your Organization Approval Package. You may be contacted at a later date by our Privacy and Access Office to discuss any privacy or security concerns that may affect your continued use of the ehr Viewer. Technical Requirements Yes No Comments My organization meets the technical specifications outlined in the attached Technical Requirements document. Does your Organization use any of the following: Yes No Comments Electronic Medical Record (EMR) Pharmaceutical Information Program (PIP) Shared Client Index (SCI) or Enterprise Management Consul (EMC) Section A: Privacy and Security Assessment Yes No Comments 1) Is your Organization aware of privacy, The Health Information Protection Act (HIPA), and your responsibility to manage and secure personal health information?
3 2) Does your Organization have the following: a. someone designated as Privacy Officer or responsible for information privacy b. privacy and security policies and procedures c. confidentiality agreements signed by all staff d. privacy and security training for staff e. procedures in place to routinely or periodically audit user use/access to systems containing health information f. signed agreements in place with third parties (such as paper shredding services, computer support, etc. and other trustees) 3) Does your Organization provide information to patients about information management practices, including the purpose for collection, use and disclosure of their personal health information? Section B: Technical Security You may need to contact your IT Support to help answer some of these questions Yes No Comments 1) Are computer monitors placed so that unauthorized viewing is prevented? 2) Is equipment such as printers, fax machines, etc. located in secure areas, not accessible to the public? 3) Are the following technical and physical security safeguards in place where ehr Viewer access will occur: a. Controls to prevent screens from view if computer is unattended ie: password enabled screen save b. Anti-virus protection is installed with regular updates c. Anti-virus controls are enabled d. Firewalls are installed and enabled 4) Are Local Area Network and appropriate controls in place? 5) Are Wireless security settings configured and enabled?
4 Agreement This section must be signed by the head of the Organization requesting Approval. The head of the organization could be classified as the Owner, Chief Physician, Chief Executive Officer, or Chief Information Officer. I acknowledge that I, the trustee or a designated representative of the trustee, have read and agree to the responsibilities as outlined below as well as my obligations under HIPA. ehr Viewer Approved Organization Roles & Responsibilities Approved Organizations are responsible for ensuring that: The Organization s designated Authorized Approvers have completed the required training as well as have read and understand their roles and responsibilities. Appropriate physical, organizational and technological safeguards are in place within their organization to protect the security and confidentiality of the ehr Viewer data. ehr Viewer data is used only on a need-to-know basis for the authorized purposes in accordance with The Health Information Protection Act (HIPA) and the Joint Service and Access Policy (JSAP). The Organization is responsible for the management of Authorized Approvers including additions, deletions and changes in privileges. The Approved Organization and the Approver are accountable for the actions of the user. ehr Viewer Authorized Approver Roles & Responsibilities Authorized Approvers are responsible for ensuring that: Users complete the training available on the ehr Viewer Program Page. Approvers are responsible for going in and approving Viewer access requests for their Organizations as required. Note: ehr Viewer User Roles & Responsibilities Users are responsible for completing the training available in the ehr Viewer Program Page. Users are responsible for ensuring that the use of ehr Viewer data is on a need-to-know basis for the purpose of their health care work and is in accordance with their health organization s policies, procedures and HIPA and Joint Service Access and Policy (JSAP) agreement. Users who are viewing data within the ehr Viewer are responsible for selecting the correct person from the candidate list and for protecting the information from use for purposes other than health care delivery. User access is audited. Inappropriate use of the ehr Viewer shall be reported to the ehealth Saskatchewan s Chief Privacy Officer. Any violation of privacy legislation will be investigated and addressed. This may include immediate revocation of ehr Viewer access privileges. For additional details on any of these bullets, please see the Joint Services Access Policy (JSAP). A copy of which is available for download on the ehr Viewer Program Home Page. Head of the Organization Information & Signature: Name: Signature: Title: Date:
5 Technical Requirements These requirements must be met in order to access to the ehr Viewer. Each individual MUST have their own address and account Supported Browsers: Internet Explorer 8, 9, 10 and 11 Firefox (latest version) Chrome (latest version) Safari (latest version for Mac OS X) Safari (latest ios version for ipad only) Latest Version of Adobe Reader (required for viewing PDF documents in the browser) Latest Version of Adobe Flash Reader Minimum screen resolution: 1024 x 768 Verify that you can access the ehr Viewer web page: Verify you can access the ehr Viewer log in page: Add a shortcut on desktop or add to favorites
REQUEST FOR INTEGRATED SERVICES
REQUEST FOR INTEGRATED SERVICES Call the Service Desk 1-888-316-7446 (local 306-337-0600) if you are unclear about any fields below. Return to: Fax Number: 306-781-8480 : servicedesk@ehealthsask.ca CLINIC
More informationehealth EHR Viewer & Integration Joint Service/Access Policy Executive Summary for Authorized Provider Organizations ("APOs")
ehealth EHR Viewer & Integration Joint Service/Access Policy July 31, 2013 Version 1.0 1. BACKGROUND: Executive Summary for Authorized Provider Organizations ("APOs") ehealth Saskatchewan ("ehealth") is
More informationPrivacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates. Reference Manual
Privacy and Security Resource Materials for Saskatchewan EMR Physicians: Guidelines, Samples and Templates Guidelines on Requirements and Good Practices For Protecting Personal Health Information Disclaimer
More informationHow to File the FBAR Electronically. The following steps describe the process of filing an FBAR electronically with our system.
Prerequisite How to File the FBAR Electronically The following steps describe the process of filing an FBAR electronically with our system. Our site requires use of the free Adobe Reader product to properly
More informationCalifornia State Polytechnic University, Pomona. Desktop Security Standard and Guidelines
California State Polytechnic University, Pomona Desktop Security Standard and Guidelines Version 1.7 February 1, 2008 Table of Contents OVERVIEW...3 AUDIENCE...3 MINIMUM DESKTOP SECURITY STANDARD...3 ROLES
More informationInstructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
More informationAdobe Reader Settings
Adobe Reader Settings Table of Contents Adobe 9 and X (10) Reader Settings...2 For Adobe Reader X (10)... 5 Adobe Reader XI (11)...7 Internet Explorer 8 and 9... 8 Google Chrome... 9 Mozilla Firefox...
More informationRemote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
More informationestatement Consent and Disclosure Agreement (Agreement to Receive or Access
estatement Consent and Disclosure Agreement (Agreement to Receive or Access Electronic Disclosures (edisclosures), Notices (enotices) and Statements (estatements)) Introduction This estatement Consent
More informationHow To Install the Virtual Learning App
Table of Contents Installation Instructions... 2 MAC: Using Firefox... 2 MAC: Using Chrome... 6 Disabling PepperFlash... 9 MAC: Using Safari Unsafe Mode We Can t Control So Use Firefox or Chrome... 11
More informationUsing Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet
System Requirements These are the minimum requirements necessary to ensure the proper operation of Centegra Health System s Access.Centegra.Com. Administrative level access to the PC or other device used
More informationInstall and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
More informationXenApp & XenDesktop Documentation. Help Desk (202) 994-8096 www.columbian.gwu.edu/ots
XenApp & XenDesktop Documentation Help Desk (202) 994-8096 www.columbian.gwu.edu/ots 1 Version Date Comments Author v1.0 June 2011 Initial Version R. Shore v2.0 December 2011 Full Revision R. Shore v2.1
More informationAbout this Tool Information Security for Residents...
About this Tool Information Security for Residents... Purpose: Provide materials to inform and educate Residents in order to reach compliance regarding information security. Audience: New Residents Information
More informationPortal Instructions for Mac
Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...
More information8.03 Health Insurance Portability and Accountability Act (HIPAA)
Human Resource/Miscellaneous Page 1 of 5 8.03 Health Insurance Portability and Accountability Act (HIPAA) Policy: It is the policy of Licking/Knox Goodwill Industries, Inc., to maintain the privacy of
More informationQuick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
More informationSHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
More informationCredit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
More informationGrandView. Web Client Software Requirements and Recommendations. Revision 2012.9.26
GrandView Web Client Software Requirements and Recommendations Revision 2012.9.26 RoviSys 1455 Danner Drive Aurora, OH 44202 330-562-8600 grandviewbusinesssolutions.com TABLE OF CONTENTS Introduction...
More informationSafe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
More informationCitrix : Remediation - MAC
Citrix : Remediation - MAC Key Points: 1. 2. 3. 4. 5. 6. 7. Understanding End Point Scan Analysis Supported anti-virus and firewall products Configuring AVAST/SOPHOS and the Mac OS X Firewall Installing
More informationLearning Management System (LMS) Quick Tips. Contents LMS REFERENCE GUIDE
Learning Management System (LMS) Quick Tips Contents Process Overview... 2 Sign into the LMS... 3 Troubleshooting... 5 Required Software... 5 Mobile devices are not supported... 5 Using the Check System
More informationWindows XP / Internet Explorer
Windows XP / Internet Explorer 1. Log on to your computer 2. You will need to connect to the following SSID: RGNS Net 3. Once connected to the correct SSID, Open IE and you will be directed to the registration
More informationHWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006
The VPN connection supports mainly access to the HWS network drives, not streaming audio/video or downloading large amounts of data. Contents Before Connecting via VPN Before setting up a Virtual Private
More informationHIPAA Risk Assessments for Physician Practices
HIPAA Risk Assessments for Physician Practices Eric Sandhusen Corporate Compliance Director and Privacy Officer Lloyd Torres Director of Ambulatory HIM DISCLAIMER The statements and opinions presented
More informationNewcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
More informationFinance & Information Management Network Operations
Finance & Information Management Network Operations Accessing Advance via External Affairs remote access system, Citrix. 1. Using a web browser, it s possibly to access Advance without the application
More informationUsing TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
More informationPD 360 Training. Getting Started Series. PD 360 Essentials (Distance Learning) PD 360 Essentials. School Leadership and PD 360
Getting Started Series is an essential part of the successful implementation of any new initiative. To ensure a successful start for your organization, School Improvement Network has created the Getting
More informationCyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security
Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security The IT Security Office (ITSO) What We Do? Risk Assessment Network and System Security Monitoring Vulnerability Scanning
More informationAccessing TP SSL VPN
Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos
More informationMac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.
Mac OS X The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with benefits in security and improved
More informationDartmouth College Technical Support Document for Kronos PC version
Dartmouth College Technical Support Document for Kronos PC version Contents How to Save the Kronos URL as a Favorite or Bookmark... 2 Internet Explorer... 2 Firefox... 4 Possible Problems When Logging
More informationCitrix Introduction and FAQs
Citrix Introduction and FAQs Introduction to Citrix... 2 Why should I use this?... 2 What about Support?... 2 What browser should I use?... 2 Known Issues... 2 System Requirements for Windows-based computers...
More informationInformation Security Manager Training
Information Security Manager Training Kent Swagler CCEP Director, Corporate Compliance Direct line (314) 923-3097 Cell (314) 575-8334 kswagler@metrostlouis.org Information Security Manager Training Overview
More informationFusion Release Notes Versions 5.14.00 5.14.04. 2 January 2015
Fusion Release Notes Versions 5.14.00 5.14.04 2 January 2015 Fusion System Requirements Windows 8 and Internet Explorer 10 and 11 Compatibility IE10 and 11 on Windows 8 will only be supported using Desktop
More informationIT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
More informationZinio FAQ. » I created a Library Collection account but I did not receive my confirmation email. Why not?
Zinio FAQ» I created a Library Collection account but I did not receive my confirmation email. Why not? The notification emails are sent automatically after you subscribe and should show up in your email
More informationSection 2: Organization Information
NM MVD in partnership with New Mexico Interactive (NMI) New Mexico Interactive, LLC 1221 Flagman Way, Suite B4 Santa Fe, NM 87505 Telephone: (505) 982-8307 Fax: (505) 212-0758 http://www.mvd.newmexico.gov/vrs
More informationComputer and Network Security Policy
Coffeyville Community College Computer and Network Security Policy Created By: Jeremy Robertson Network Administrator Created on: 6/15/2012 Computer and Network Security Page 1 Introduction: The Coffeyville
More informationBusiness Objects InfoView Quick-start Guide
Business Objects InfoView Quick-start Guide Last Modified: 10/28/2015 The latest PDF version of this document can be found at: http://www.calpolycorporation.com/docs/finance/boeinfoviewquickstart.pdf What
More informationIT@DUSON. IT Service Desk
IT@DUSON Technology plays a key role in the learning process for nursing students at Duke. This is your guide to the technology used at the Duke School of Nursing and how to request assistance for all
More informationComputing Services Information Security Office. Security 101
Computing Services Information Security Office Security 101 Definition of Information Security Information security is the protection of information and systems from unauthorized access, disclosure, modification,
More informationProtection of Clients' Personal Health Information G & G LIVING CENTERS, INC.'s Privacy Practices
Protection of Clients' Personal Health Information G & G LIVING CENTERS, INC.'s Privacy Practices G & G Living Centers, Inc. has had a longstanding commitment to protecting the privacy of its clients'
More informationSYSTEM AND TECHNOLOGY GUIDE. for the Web-based MAP and Skills Navigator systems
for the Web-based MAP and Skills Navigator systems NOVEMBER 1, 2015 2010 2015 NWEA Measures of Academic Progress, MAP, and Skills Navigator are registered trademarks of NWEA in the United States and other
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationInstallation Guide for Kurzweil 3000 Web License (Visual Walkthrough) Macintosh Version 14
Installation Guide for Kurzweil 3000 Web License (Visual Walkthrough) Macintosh Version 14 Follow the instructions in this guide to download, install, and get started with Kurzweil 3000 Web License (K3000).
More informationmystanwell.com Installing Citrix Client Software Information and Business Systems
mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.
More informationElectronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security
Electronic Communication In Your Practice How To Use Email & Mobile Devices While Maintaining Compliance & Security Agenda 1 HIPAA and Electronic Communication 2 3 4 Using Email In Your Practice Mobile
More informationBT Lancashire Services
In confidence BT Lancashire Services Remote Access to Corporate Desktop (RACD) Getting Started Guide Working in partnership Confidentiality Statement BT Lancashire Services Certain information given to
More informationSecure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
More informationMULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS. e-filing Guide
MULTIFUNCTIONAL DIGITAL COLOR SYSTEMS / MULTIFUNCTIONAL DIGITAL SYSTEMS e-filing Guide 2012-2014 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in
More informationDynamic Learning Maps Consortium Technical Liaison Webinar
Dynamic Learning Maps Consortium Technical Liaison Webinar Fall 2015 James Herynk Audio will be streamed through Skype for Business/Lync. Please hold questions until the end. All questions must be asked
More informationREMOTE ACCESS SERVICE SUPPORT. ICR User Support Guide
REMOTE ACCESS SERVICE SUPPORT ICR User Guide Question Answer/ What is supported Non-ICR computer access 1. What are the support hours for the remote access service? The IT Helpdesk service is available
More informationPHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
More informationUser Guide Remote PIV to VDI Using a PIV Card
User Guide Remote PIV to VDI Using a PIV Card Energy IT Services (IM-64) March 2015 Authors Prepared By Matthew Cummings Senior Systems Engineer IM-64 Version Control Date Version Document Revision Description
More informationBasic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann
Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring
More informationFrequently Asked Questions Ag Banking Online
Table of Contents Note: To quickly navigate to the answer, click on the question. What is Multi-Factor Authentication (MFA) and its purpose?... 2 This is my first time accessing the online application.
More informationPaxera Uploader Basic Troubleshooting
Before going further, please check the logs and auto-route queue in the Uploader Control, these logs will say a lot about your problem. You should take care of the following before contacting our Support
More informationEstate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
More informationSupport Guide for CCS Service Desk. Banner Document Management (BDM)
(BDM) Support Guide for CCS Service Desk 1 Table of Contents Overview 3 1. Process Details 1.1 BDM Security 4 1.2 BDM Functional Specialists 4 1.3 The Format of the Request 5 1.4 BDM Related Banner Classes
More informationFrequently Asked Questions 2. Prerequisites for Safari 3-5. Logging in to @Home Access With Safari 5-9
Table of Contents It is important that you read this notice, the frequently asked questions and the detailed instructions for your browser thoroughly. Please be patient as you work through the list of
More informationSURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE
SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE Welcome To Surpass Hosting Service. This document contains instructions to help you get up and running with your new service. The instructions
More informationIntroduction... 2. Requesting a VPN Account... 2. Accessing the Citrix Access Gateway (CAG)... 3. Tips and Tricks... 9
NWI Research VPN Basics Table of Contents Introduction... 2 Requesting a VPN Account... 2 Accessing the Citrix Access Gateway (CAG)... 3 Tips and Tricks... 9 Back up Your Favorites and Desktop Folders
More informationSAGE Secure Browser Frequently Asked Questions
SAGE Secure Browser Frequently Asked Questions How often will there be auto-updates to the secure browser? Our goal is that the secure browser will continue to be updated once a year. However, updates
More informationOnline (Internet) Banking Agreement and Disclosure
Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationFor Mac User Directions, see page 5
Windows Vista, Windows 7, and Windows XP with Service Pack 3 Remote Desktop Access For Mac User Directions, see page 5 This instruction allows district staff and students to access the Commack UFSD network
More informationONLINE ACCESS ONLINE ACCESS FAQS FAQS
ONLINE ACCESS ONLINE ACCESS FAQS FAQS How do I create an Online Access Account? There are three options for setting up an Online Access Account 1. Use your member number and temporary password given to
More informationLabour Market Programs Support System. LaMPSS Computer Compatibility Guide
Labour Market Programs Support System LaMPSS Computer Compatibility Guide Prepared by: LaMPSS Operations Support June 2012 Version: 1.1 2011 Nova Scotia Department of Labour and Advanced Education This
More informationThe Journey to Create Document Standards and Guidelines for Occupational Therapists. Christine Fleming Legislation and Bylaws Committee
The Journey to Create Document Standards and Guidelines for Occupational Therapists Christine Fleming Legislation and Bylaws Committee Objectives To describe the process and tools used to create the document
More informationInstalling the Pharos Client onto your Macintosh laptop
Downloading Pharos Wi-Fi installers for Windows and Macintosh Computers The remote print system can be installed on either a PC or a Macintosh computer. Installing the Pharos Client onto your Macintosh
More informationHELPFUL TIPS: MOBILE DEVICE SECURITY
HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information
More informationBI-RADS Atlas 5th Edition e-book Download Instructions (Updated: 12/11/14)
BI-RADS Atlas 5th Edition e-book Download Instructions (Updated: 12/11/14) Note: These instructions and screenshots are a general guide and may vary with what appears on your device due to differences
More informationScholastic Reading Inventory Installation Guide
Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published
More informationRE: Erlanger IT Technology Letter from the Erlanger Chief Medical Informatics Officer Stephen Adams, MD
June 26, 2015 RE: Erlanger IT Technology Letter from the Erlanger Chief Medical Informatics Officer Stephen Adams, MD Dear Incoming Resident, On behalf of the Erlanger IT staff, I d like to welcome you
More informationCentral Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
More informationInstructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View:
Instructions to Sign On and Off of Self Service Applications NOTE: Internet Explorer 7 and 8 are the only supported Browsers for the PeopleSoft Student Self Service applications. If you experience technical
More informationAccess to Electronic Health Records Policy Franciscan Health System
Access to Electronic Health Records Policy Franciscan Health System PURPOSE: The purpose of the Access to Electronic Health Records Policy ( EHR Policy ) is to establish processes and procedures for permitting
More informationboundary free tv As part of our Boundary Free TV promise, Mediacom is proud to introduce HBO GO & MAX GO, the new streaming services from HBO.
boundary free tv As part of our Boundary Free TV promise, Mediacom is proud to introduce HBO GO & MAX GO, the new streaming services from HBO. Our customers will have access to over 1400 of their favorite
More informationisupplygw Site Login Troubleshooting
Site Login Troubleshooting Tips User name is administrator s email address Password requirements: o Passwords must be at least 8 characters long and can be as long as 30 characters. o Passwords must contain
More informationComplete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
More informationAUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS
AUDITING TECHNIQUES TO ASSESS FRAUD RISKS IN ELECTRONIC HEALTH RECORDS OBJECTIVE Increase your IT vocab so that you can assess the risks related to your audits of EHRs and/or EHR related data AGENDA What
More informationCorporate Account Takeover (CATO) Risk Assessment
Corporate Account Takeover (CATO) Risk Assessment As a business, you want to be sure you have a strong process in place for monitoring and managing who has access to your ECorp services and how the information
More informationImhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only
Imhotep Academy BYOD Policy (Bring Your Own Device) 4th-8th Grades Only Imhotep Academy is committed to staying on the forefront of educational practices of the 21st century. We are piloting a new policy
More informationCertified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
More informationCREDIT CARD POLICY DRAFT
APPROVED BY Ronald J. Paprocki I. Policy Statement Any office of the University that processes credit card transactions may do so only in the manner approved by the University Treasury Office and in compliance
More informationHow to use Mints@Home
How to use Mints@Home Citrix Remote Access gives Mints users the ability to access University Of Cambridge and MINTS resources from any computer, anywhere in the world,. The service requires a high-speed
More informationData Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
More informationSecurity Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
More informationICT OPERATING SYSTEM SECURITY CONTROLS POLICY
ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...
More informationCitrix Receiver 11.8 for Macintosh OS X
1. Document Control Record Document title Document Owner Citrix Receiver 11.8 for Macintosh OS X Rayna McKinley 2. Issue and Amendment Record Issue Date Revised by Comments 1 8/15/2013 Rayna McKinley Original
More informationU.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
More informationPavelComm s Pro-Tech Lite Fact Sheet
PavelComm s Fact Sheet PavelComm s Fact Sheet - IT for Small Companies with Big Business Needs Owners, Executives and Managers should be investing in and integrating technology to increase the productivity
More information