HEALTH INFORMATION SYSTEM (HIS) HOW TO COMMUNICATE WITH THE HIS PROJECT TEAM. How To Communicate with the HIS Project Team
|
|
- Martin Francis
- 8 years ago
- Views:
Transcription
1 How To Communicate with the HIS Project Team This guide is intended to provide you with support for communicating with the HIS Project Team. There may be instances where the HIS Project Team will require additional information from your local agency. This additional information may include protected health information (PHI); therefore, this resource will provide the necessary steps for submitting PHI to the HIS Project Team. In this document, you will learn how to: Identify what is Protected Health Information Communicate with the HIS Project Team Protected Health Information Fax Protected Health Information Download TrueCrypt encryption software Encrypt files using TrueCrypt Protected Health Information (PHI) Before discussing the process of communicating with the HIS Project Team, it is important that you understand what constitutes Protected Health Information (PHI). According to ConsumerAllianceUSA.org, protected health information means individually identifiable health information collected electronically, orally, or via paper. Protected health information includes information such as the patient s name, social security number, telephone number, medical record number, address, including ZIP code as well as medical records. The Privacy Rule protects certain information that covered entities use and disclose. This information is called protected health information (PHI), which is generally individually identifiable health information that is transmitted by, or maintained in, electronic media or any other form or medium. This information must relate to 1) the past, present, or future physical or mental health, or condition of an individual; 2) provision of health care to an individual; or 3) payment for the provision of health care to an individual. If the information identifies or provides a reasonable basis to believe it can be used to identify an individual, it is considered individually identifiable health information. IMPORTANTE NOTE: If your electronic communication with the DHHS Customer Support Center contains PHI, you are required to protect the document. At a minimum, you must password protect your document prior to ing the document to the HIS Project Team. It is recommended to encrypt your data as this provides a greater level of security than using the password feature in Microsoft Word. -fax-phi-v doc Page 1 of 18
2 Communicating with the HIS Project Team All communication directed to the HIS Project Team must be initiated through the DHHS Customer Service Center so that a Remedy ticket can be created for this issue/question. The Remedy ticket ensures a streamline mechanism for capturing and addressing issues/questions, and helps to minimize the risk of your issues/questions not being addressed. The steps below outline the communication process. 1. Submit your HIS comment/question/issue to the DHHS Customer Service Center. DHHS.Customer.Support.Center@dhhs.nc.gov 2. Telephone Number: , option 5 3. DHHS Customer Service Center will input your request in the Remedy system, which will generate a ticket. This ticket will be assigned to the appropriate HIS Help Desk person. You will receive notification that a Remedy ticket has been created. 4. If additional information is needed, you will be contacted by the HIS Project Team. NOTE: If the HIS Project Team requires additional information, a Help Desk member will contact you via or phone. 5. or fax the additional information to the HIS Project Team, if requested. -fax-phi-v doc Page 2 of 18
3 ing PHI Due to privacy rules, protected health information (PHI) cannot be distributed through or online file sharing sites without being protected. At a minimum, you MUST password protect your files using the password protection feature in Microsoft Word. The HIS Project Team encourages that you encrypt PHI as this provides a greater level of security. To ensure that encrypted PHI is accessible to all necessary persons, the HIS Project Team has identified a free encryption software (TrueCrypt) to be used. NOTE: If the information requested does not contain PHI, you do not need to password protect or encrypt the file. 1. Protect/encrypt your file if the additional information requested contains PHI. NOTE: See the steps below for protecting your file using MS Word Password Protection option or using the recommended encryption option. 2. Respond to the submitted to you requesting the additional information. 3. Attach the encrypted PHI file to the Submit the . ing PHI Password Protected document 1. Open the MS Word document to be protected. 2. Select Tools > Options from the menu. The Options dialog box will display. 3. Select the Security tab in the Options dialog box. 4. In the Filing Sharing Options section, enter a password in the Password to open field. ing PHI Encryption procedure (Recommended) 1. Download and install TrueCrypt. 2. Follow the TrueCrypt step-by-step instructions. Note: Use the standard password. If you are not familiar with the standard password, contact DHHS Customer Service. 5. Click OK. 6. Re-enter the password in the Confirm Password dialog box and click OK. 7. Save and close the document. -fax-phi-v doc Page 3 of 18
4 Faxing PHI All agencies, including the HIS Project Team should have internal procedures for handling faxes in a timely manner and the physical location of the fax machine should be in a secured area. HIS Project Fax: Prepare a cover letter that identifies the following: Contact Person Contact Number and/or Number of pages included in the fax 2. Submit the fax to the HIS Project Team. 3. The requesting member of the HIS Project Team will contact you with receipt of the requested fax. If you have not received confirmation, please contact the DHHS Customer Service Center. TrueCrypt - Download TrueCrypt is a free open-source disk encryption software for Windows (7, Vista, and XP), MAC OS X and Linux. Visit the TrueCrypt website to download the executable file. CAUTION Please note that no employee shall install TrueCrypt without prior approval from your agency s Director and/or IT office. Please refer to your local computer use policy for additional procedures/requirements related to downloading software to agency computers. -fax-phi-v doc Page 4 of 18
5 TrueCrypt Step-by-Step Instructions TrueCrypt is a free encryption software application that is used by the HIS Project Team and the HIS vendor. The intent of TrueCrypt is to allow local agencies, the HIS Project Team and the HIS vendor to communicate and troubleshoot issues as needed. The steps outlined below will provide you instructions on how to use TrueCrypt. For more detail information, please visit the TrueCrypt Documentation page. 1. Double-click the TrueCrypt shortcut icon on your Desktop. The TrueCrypt main window displays. NOTE: If no shortcut exists, go to Start > Programs > TrueCrypt > TrueCrypt to initiate the application. Figure 1: TrueCrypt Main Window -fax-phi-v doc Page 5 of 18
6 2. Click. The TrueCrypt Volume Creation Wizard displays. Figure 2: TrueCrypt Volume Creation Wizard 3. Leave the default selection Create an encrypted file container selected. 4. Click. The Volume Type window displays. Figure 3: TrueCrypt Volume Type window 5. Leave the default selection Standard TrueCrypt volume selected. -fax-phi-v doc Page 6 of 18
7 6. Click. The Volume Location window displays. Figure 4: TrueCrypt Volume Location window -fax-phi-v doc Page 7 of 18
8 7. Click. The Specify Path and File Name dialog box displays. NOTE: Consider a volume to be equivalent to a folder. You must create a volume to store files that you want encrypted. In Figure 5, My Documents is where we will be creating our volume. You are not required to use the My Document folder. The key is to remember where you save your volume. Figure 5: Specify Path and File Name dialog box 8. Enter the name of your volume file in the File name field. NOTE: For these steps, a volume called Instruction is created. Figure 6: Specify Path and File Name dialog box File name field -fax-phi-v doc Page 8 of 18
9 9. Click. The Volume Location window displays with the volume location noted. Figure 7: TrueCrypt Volume Location window 10. Click. The Encryption Options window displays. Figure 8: TrueCrypt Encryption Options window 11. Leave the default settings in the Encryption Options window. -fax-phi-v doc Page 9 of 18
10 12. Click. The Volume Size window displays. NOTE: The Volume Size window is where you will specify your volume size. For our example 1 GB will be used. Your volume size is dependent upon the files you place within the volume. Remember, your volume is a container. You will eventually place the files that require encryption within this container. Figure 9: TrueCrypt Volume Size window 13. Enter your volume size and select the appropriate size category (i.e., KB, MB or GB). -fax-phi-v doc Page 10 of 18
11 14. Click. The Volume Password window displays. Figure 9: TrueCrypt Volume Password window 15. In the Password field, enter the standard password. 16. In the Confirm field, enter the standard password again. NOTE: If you are not familiar with the standard password, please contact the Customer Service Center at option Click. The TrueCrypt Volume Created Wizard dialog box displays due to the short password entered in steps 15 and 16. Click the Yes button to continue. The Volume Format window displays. Figure 10: TrueCrypt Volume Creation Wizard dialog box -fax-phi-v doc Page 11 of 18
12 18. Move your mouse randomly over the Volume Format window. NOTE: This mouse movement strengthens the encryption keys for your volume. You only need to move your mouse for approximately 5 10 seconds over the Volume Format window. Figure 11: TrueCrypt Volume Format window 19. Click. NOTE: In the Volume Format window, the system will begin formatting your newly created volume. Once complete, you will receive a TrueCrypt Volume Creation Wizard dialog box indicating the process is successfully complete. Click the OK button to continue. Figure 12: TrueCrypt Volume Creation Wizard dialog box -fax-phi-v doc Page 12 of 18
13 20. The Volume Created window displays, which indicates that you have successfully created a volume. Click to close the TrueCrypt Wizard. NOTE: The TrueCrypt Main Window is now visible. 21. Select a Drive from the TrueCrypt Main Window. NOTE: For this example, the M drive is selected. You can select any drive listed in the Main window when performing these steps. Figure 14: TrueCrypt Main Window Drive selection -fax-phi-v doc Page 13 of 18
14 22. Select. The Select a TrueCrypt Volume window displays. NOTE: Return to the location where you created your volume. In the earlier steps, we created a volume in My Documents. In Figure 15, the Instruction volume is now available to add any files that require encryption. Again, your volume is a container. All files that require encryption should be included within the volume. Figure 15: Select a TrueCrypt Volume window 23. Select your volume file. NOTE: For this instruction, a volume called Instruction was created and is selected. -fax-phi-v doc Page 14 of 18
15 24. Click. The TrueCrypt Main Window displays. NOTE: In the Volume field, the volume file location path is now visible. Figure 16: Select a TrueCrypt Main Window 25. Click. The Enter password dialog box displays. NOTE: Mounting allows you to add files to the volume. You will not be able to add files unless the volume file is mounted. This is an important step as this is how your files become encrypted. Figure 17: TrueCrypt Enter password dialog box -fax-phi-v doc Page 15 of 18
16 26. Enter the password you created for this volume in step 15 and click. NOTE: The TrueCrypt Main Window displays. The virtual disk is entirely encrypted (including file names, allocation tables, free space, etc.) and behaves like a real disk. You can save (or copy, move, etc.) files to this virtual disk and they will be encrypted on the fly. Figure 18: TrueCrypt Main Window -fax-phi-v doc Page 16 of 18
17 27. Save the file(s) that require encryption to the virtual drive.. NOTE: Once mounted, a new virtual drive is available on your computer. Saving a file to this virtual drive follows the same process as if you were saving a file to your C: drive or shared network drive. You can access this virtual drive only when you have mounted the virtual drive. The M: drive was selected for this instruction. You may have a different virtual drive letter depending upon the virtual drive you selected in step 21. Figure 19: Virtual M: Drive -fax-phi-v doc Page 17 of 18
18 28. After saving all files to the virtual drive that require encryption, click. NOTE: When you dismount, you close your virtual drive. When the virtual drive is closed, the files within your volume are now inaccessible. The TrueCrypt Main Window displays. Figure 19: TrueCrypt Main Window 29. You may now distribute your volume file, which contains PHI to the appropriate person or team. NOTE: In the earlier steps provided, the Instructions volume was saved in the My Documents folder. You can access the volume and attach it to either an , burn to a CD/DVD or upload the volume file to an online file sharing site as the PHI information is now encrypted. All files placed within the encrypted Volume will automatically be included. Access to the encrypted volume can be done outside of TrueCrypt; however, no one will be able to enter the encrypted volume without TrueCrypt and correct password. ***End of Document*** -fax-phi-v doc Page 18 of 18
MAC/OSX - How to Encrypt Data using TrueCrypt. v.05201011
MAC/OSX - How to Encrypt Data using TrueCrypt v.05201011 This chapter contains step-by-step instructions on how to create, mount, and use a TrueCrypt volume. We strongly recommend that you read the entire
More informationEncrypting a USB Drive Using TrueCrypt
Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and
More informationAcronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
More informationUsing TrueCrypt to protect data
Using TrueCrypt to protect data Password protecting and encrypting files one by one is a certainly an effective way to securely store and share data. However, what if you have a lot of files? Creating
More informationUser Installation Guide
The will provide a step-by-step walkthough of how to download and install the application, activate each feature of the product, install any of the feature's prerequisites, extend the license, and deactivate
More informationJunk E-mail Settings. Options
Outlook 2003 includes a new Junk E-mail Filter. It is active, by default, and the protection level is set to low. The most obvious junk e-mail messages are caught and moved to the Junk E-Mail folder. Use
More informationWARNING!!: Before installing Truecrypt encryption software on your
Truecrypt installation and usage guide for Windows XP, 7, Vista and 8 WARNING!!: Before installing Truecrypt encryption software on your computer, you should create an Acronis image back up of your computer
More informationCONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
More informationInstalling FileMaker Pro 11 in Windows
Installing FileMaker Pro 11 in Windows Before you begin the installation process, please exit other open programs and save your work. Installation notes Before you install FileMaker Pro, review the following
More informationGetting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class
Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing
More informationSet Up E-mail Setup with Microsoft Outlook 2007 using POP3
Page 1 of 14 Help Center Set Up E-mail Setup with Microsoft Outlook 2007 using POP3 Learn how to configure Outlook 2007 for use with your 1&1 e-mail account using POP3. Before you begin, you will need
More informationQUICK START GUIDE EDI Claims Link for Windows version 3.1
QUICK START GUIDE EDI Claims Link for Windows version 3.1 System Requirements - Operating system: Windows 98 or later - Computer/Processor: Pentium 2, 233 MHz or greater - Memory: 64MB Ram - Initial application
More informationODBC Driver Version 4 Manual
ODBC Driver Version 4 Manual Revision Date 12/05/2007 HanDBase is a Registered Trademark of DDH Software, Inc. All information contained in this manual and all software applications mentioned in this manual
More informationInstallation Instruction STATISTICA Enterprise Small Business
Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations
More informationParallels Desktop for Mac
Parallels Software International, Inc. Parallels Desktop for Mac Quick Start Guide 3.0 (c) 2005-2007 Copyright 2006-2007 by Parallels Software International, Inc. All rights reserved. Parallels and Parallels
More informationCreating client-server setup with multiple clients
Creating client-server setup with multiple clients Coffalyser.Net uses a SQL client server database model to store all project/experiment- related data. The client-server model has one main application
More informationGlobal VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
More informationowncloud Configuration and Usage Guide
owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,
More informationSTATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS
STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)
More informationLexia Network Installation Instructions
Lexia Network Installation Instructions For Lexia Early Reading 3.x, Primary Reading 1.x, Foundation Reading 1.x, Strategies for Older Students 4.x, Cross-Trainer 1.x and Quick Reading Test 2.x (NOT for
More informationUndergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC
Undergraduate Academic Affairs \ Student Affairs IT Services VPN and Remote Desktop Access from a Windows 7 PC Last edited: 4 December 2015 Contents Inform IT Staff... 1 Things to Note... 1 Setting Up
More informationSysAidTM Freeware Installation Guide
SysAidTM Freeware Installation Guide Document Updated: 10 November 2009 Introduction SysAid free edition is built for organizations with fewer than 100 computers and users. This document will help you
More informationOffice of Public and Indian Housing PIH Information Center (PIC)
US Department of Housing and Urban Development Office of Public and Indian Housing PIH Information Center (PIC) FRS 5.0 User Guide Install and Set Up FRS 5.0 February 2011 Table of Contents 1. INTRODUCTION...
More informationMagaya Software Installation Guide
Magaya Software Installation Guide MAGAYA SOFTWARE INSTALLATION GUIDE INTRODUCTION Introduction This installation guide explains the system requirements for installing any Magaya software, the steps to
More informationHow to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment?
Author Janice Hong Version 1.0.0 Date Mar. 2014 Page 1/56 How to use the VMware Workstation / Player to create an ISaGRAF (Ver. 3.55) development environment? Application Note The 32-bit operating system
More informationStellar Phoenix. Access Database Repair 5.0 Installation Guide
Stellar Phoenix Access Database Repair 5.0 Installation Guide Overview Stellar Phoenix Access Database Repair, a secure and easy to use application is designed for repairing corrupt Microsoft Access (.mdb,.accdb)
More informationMigrating from MyYSU Mail to Office 365 Microsoft Outlook 2010
Migrating from MyYSU Mail to Office 365 Microsoft Outlook 2010 Required Items: Microsoft Outlook 2010, MyYSU e-mail account This guide will assist you with configuring the Microsoft Outlook 2010 email
More informationHow to create a portable encrypted USB Key using TrueCrypt
How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong
More informationHWS Virtual Private Network Configuration and Setup Mac OS X 12/19/2006
The VPN connection supports mainly access to the HWS network drives, not streaming audio/video or downloading large amounts of data. Contents Before Connecting via VPN Before setting up a Virtual Private
More informationFor Mac User Directions, see page 5
Windows Vista, Windows 7, and Windows XP with Service Pack 3 Remote Desktop Access For Mac User Directions, see page 5 This instruction allows district staff and students to access the Commack UFSD network
More informationRichmond Systems. SupportDesk Quick Start Guide
Richmond Systems SupportDesk Quick Start Guide Table of Contents SupportDesk Quick Start Guide...1 Introduction...1 Pre-requisites...2 Installation at a Glance...2 Installation...3 Setup Console...13
More informationUSB Flash Security Free Edition Quick Start
Quick Start [For USB Flash Security Free Edition] 1 / 18 USB Flash Security Free Edition Quick Start Before use USB Flash Security 1. Free edition can only be installed on the USB Flash Drive up to 4GB
More informationSage Peachtree Installation Instructions
Sage Peachtree Installation Instructions Quick Tips for Network Install Use the following tips to help you install Sage Peachtree on a network: Always install Sage Peachtree FIRST on the computer that
More informationHADS 2.1.0e Installation and migration
Ageing, Disability and Home Care, Department of Family and Community Services MDS fact sheet - February 2012 HADS 2.1.0e Installation and migration Caution! If at any stage during this process you receive
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationInstalling your certificate on your Windows PC
Installing your certificate on your PC Choose your email software below to learn how to obtain and install a digital certificate. Microsoft Outlook Mail Using Outlook or Mail Step one Visit Comodo for
More informationHow to install Radiance on your computer via a virtual machine
How to install Radiance on your computer via a virtual machine This instruction will help to install the lighting simulation tool Radiance on a Windows operated computer. As Radiance runs under Unix/Linux,
More information1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
More informationWhat is WS_FTP? How WS_FTP Works
What is WS_FTP? WS_FTP is the leading file transfer client with millions of users worldwide. You can easily and securely transfer files between your home and office and to and from customers, clients,
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationInstructions for Uploading and Sending Transcripts to the CollegeforTN.org Transcript Exchange Chancery SMS IMPORTANT NOTES:
Instructions for Uploading and Sending Transcripts to the CollegeforTN.org Transcript Exchange Chancery SMS IMPORTANT NOTES: START WITH STEP 1 ONLY IF YOU HAVE DOWNLOADED AND INSTALLED THE CHANCERY SMS
More informationWelcome to EMP Monitor (Employee monitoring system):
Welcome to EMP Monitor (Employee monitoring system): Overview: Admin End. User End. 1.0 Admin End: Introduction to Admin panel. Admin panel log in. Introduction to UI. Adding an Employee. Getting and editing
More informationThese instructions were tested on OS X 10.9.4. Earlier or later versions may have slight or major differences in how things work and appear.
These instructions were tested on OS X 10.9.4. Earlier or later versions may have slight or major differences in how things work and appear. PART ONE VBOX INSTALL AND FILE STAGING You will be given a location
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationSecure Access Using VPN
Secure Access Using VPN WHAT IS CISCO SSL VPN? Cisco is the brand name of the VPN appliance (hardware). The SSL VPN stands for Secure Sockets Layer Virtual Private Network. SSL VPN is a service that allows
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More information8x8 Network Monitoring Tool
8x8 Version 1.0, May 2011 The Champion For Business Communications Table of Contents Introduction...3 Overview of 8x8 VoIP Readiness Tools...3 Test #1: VoIP Quality and Connectivity speed...3 Test #2:
More informationWINDOWS 7 & HOMEGROUP
WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows
More informationSSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.
Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work
More informationStarWind iscsi SAN Software: Using with Citrix XenServer
StarWind iscsi SAN Software: Using with Citrix XenServer www.starwindsoftware.com Copyright 2008-2010. All rights reserved. COPYRIGHT Copyright 2008-2010. All rights reserved. No part of this publication
More informationSoftware Installation and Creating a New Company
Chapter 1 Software Installation and Creating a New Company OBJECTIVES: 1 System Requirements 2 Software Installation 3 Starting QuickBooks and Creating a New Company 4 Backing up Company Data 5 QuickBooks
More informationBatch Eligibility Long Term Care claims
Hewlett Packard Enterprise Provider Electronic Solutions software lets Connecticut Medical Assistance Program providers verify patient s eligibility and submit and correct claims for services all electronically.
More informationConnecting to Remote Desktop Windows Users
Connecting to Remote Desktop Windows Users How to log into the College Network from Home 1. Start the Remote Desktop Connection For Windows XP, Vista and Windows 7 this is found at:- Star t > All Programs
More information4cast Client Specification and Installation
4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights
More informationCitrix Client Install Instructions
Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator
More informationViewing and Troubleshooting Perfmon Logs
CHAPTER 7 To view perfmon logs, you can download the logs or view them locally. This chapter contains information on the following topics: Viewing Perfmon Log Files, page 7-1 Working with Troubleshooting
More informationDropSend Getting Started Guide
DropSend Getting Started Guide DropSend Ltd. 2012 Step 1: How to send a file without registration If you want to quickly send a large file, you can do it from the homepage in just a couple of clicks. Here
More informationSAS 9.3 Foundation for Microsoft Windows
Software License Renewal Instructions SAS 9.3 Foundation for Microsoft Windows Note: In this document, references to Microsoft Windows or Windows include Microsoft Windows for x64. SAS software is licensed
More information1. Open Thunderbird. If the Import Wizard window opens, select Don t import anything and click Next and go to step 3.
Thunderbird The changes that need to be made in the email programs will be the following: Incoming mail server: newmail.one-eleven.net Outgoing mail server (SMTP): newmail.one-eleven.net You will also
More informationM a r k B o o k C Y, M a r k B o o k A M, v e r s i o n, e d i t i o n. MarkBook for Windows on a Mac 1
M a r k B o o k C Y, M a r k B o o k A M, v e r s i o n, e d i t i o n MarkBook for Windows on a Mac 1 Installation/Use on an Apple Macintosh Computer Ordinarily, a Mac computer cannot run Windows software.
More informationVIVIDESK Desktops can be accessed with a Macintosh Computer by one of two methods:
VIVIDESK Desktops can be accessed with a Macintosh Computer by one of two methods: 1. If you have Macintosh OS version IX, then VIVIDESK is best viewed using Windows emulation software. 2. If you have
More informationRelease 2.0. Cox Business Online Backup Quick Start Guide
Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.
More informationCopyright Pro Softnet Corporation. All rights reserved. 2 of 24
Copyright Pro Softnet Corporation. All rights reserved. 2 of 24 Remote Access Helpdesk User Manual TABLE OF CONTENTS Introduction...4 Features...4 Administrator: Manage Technicians...5 Technician: Initiate
More informationWhat is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting
Version 1.6 1 1 1 2 2 8 8 9 9 9 What is Aconex Local Copy? Controlling Access to a Datastore Hardware Requirements Software Requirements Installing Aconex Local Copy Troubleshooting your Installation Managing
More informationSetting up Email in Outlook Express
Setting up Email in Outlook Express If you have more than one email account but need to use a single computer to access them, then Outlook Express can help. To begin, open Outlook Express by double-clicking
More informationSetting up a VPN connection Windows XP
Setting up a VPN connection Windows XP 1. Open Control Panel. 2. Click on Network and Internet Connections. 3. Click on Create a connection to the network at your workplace. 4. Select Virtual Private Network
More informationCCH Axcess Portal Client User Guide
CCH Axcess Portal Client User Guide Keys Quick reference to the key aspects of a particular function Icon Legend Tip Notes Best practice tips and shortcuts Informational notes about functions Warning Important
More informationSecure Agent Quick Start for Windows
Secure Agent Quick Start for Windows 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
More informationExport the address book from the Blackberry handheld to MS Outlook 2003, using the synchronize utility in Blackberry Desktop Manager.
Export the address book from the Blackberry handheld to MS Outlook 2003, using the synchronize utility in Blackberry Desktop Manager. Revised 2/25/07 Creating a New Contacts Folder in Outlook Open Outlook
More informationWindows 7 Hula POS Server Installation Guide
Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3
More informationInstallation Guide Command WorkStation 5.5 with Fiery Extended Applications 4.1
Installation Guide Command WorkStation 5.5 with Fiery Extended Applications 4.1 About Fiery Extended Applications Fiery Extended Applications (FEA) 4.1 is a package of the following applications for use
More informationContents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
More informationVirtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
More informationLearn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms
Learn how to create web enabled (browser) forms in InfoPath 2013 and publish them in SharePoint 2013. InfoPath 2013 Web Enabled (Browser) forms InfoPath 2013 Web Enabled (Browser) forms Creating Web Enabled
More informationProtection Service for Business
Protection Service for Business Getting Started Guide for Mac Computers System requirements System requirements Supported platforms For all supported OS X versions. Workstation (Mac) Processor: Memory:
More informationStarWind iscsi SAN: Configuring Global Deduplication May 2012
StarWind iscsi SAN: Configuring Global Deduplication May 2012 TRADEMARKS StarWind, StarWind Software, and the StarWind and StarWind Software logos are trademarks of StarWind Software that may be registered
More informationInstalling Microsoft Outlook on a Macintosh. This document explains how to download, install and configure Microsoft Outlook on a Macintosh.
Reference : USER184 Issue date : December 2002 Revision date : September 2007 Classification : Software Originator : Hugh Burt REVISED DOCUMENT Installing Microsoft Outlook on a Macintosh This document
More informationCall Recorder Quick CD Access System
Call Recorder Quick CD Access System V4.0 VC2010 Contents 1 Call Recorder Quick CD Access System... 3 1.1 Install the software...4 1.2 Start...4 1.3 View recordings on CD...5 1.4 Create an archive on Hard
More informationMY WORLD GIS. Installation Instructions
MY WORLD GIS Version 4.1 Installation Instructions Copyright 2007 by Northwestern University. All rights reserved. Created August 15, 2002 Last Revised April 14, 2008 2. Launching the Installer On the
More informationExtracting an S/MIME certificate from a digital signature
Extracting an S/MIME certificate from a digital signature Instructions for Microsoft Outlook 2007 and 2010 Document User_Instruction_Outlook_Certificate_Handling Status Final Date: 03.06.2012 Version:
More informationStep-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet
Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from
More informationInstalling The SysAidTM Server Locally
Installing The SysAidTM Server Locally Document Updated: 17 October 2010 Introduction SysAid is available in two editions: a fully on-demand ASP solution and an installed, in-house solution for your server.
More informationHome and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows
Overview Home and Shared Folders on Windows Accessing Home and Shared Folders on Active Directory File Servers Using Windows Ithaca College provides network file sharing for all faculty members, all staff
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationHow to Install a Network-Licensed Version of IBM SPSS Statistics 19
How to Install a Network-Licensed Version of IBM SPSS Statistics 19 Important: IBM SPSS Statistics 19 requires either Windows XP Professional or later. IBM SPSS Statistics 19 installs from a DVD and your
More informationGuide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
More informationYale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for
More informationAdminToys Suite. Installation & Setup Guide
AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products
More informationGladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationSIMIAN systems. Sitellite Desktop User Manual. Sitellite Professional Edition
Sitellite Desktop User Manual Sitellite Professional Edition Introduction The Sitellite Desktop is a cross-platform desktop application that can manage one or more Sitellite 5-powered websites in a more
More informationInstallation Guide. Research Computing Team V1.9 RESTRICTED
Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots
More informationSTATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS
data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network
More informationMesa DMS. Once you access the Mesa Document Management link, you will see the following Mesa DMS - Microsoft Internet Explorer" window:
Mesa DMS Installing MesaDMS Once you access the Mesa Document Management link, you will see the following Mesa DMS - Microsoft Internet Explorer" window: IF you don't have the JAVA JRE installed, please
More informationManaging Files. On a PC, after you find your file, right click it and selet Rename from the pop-up menu.
Managing Files File Types, Renaming Files The software you are using will automatically save your file as the type that applies to your current application. For Microsoft Word documents, for example, will
More informationBRIC VPN Setup Instructions
BRIC VPN Setup Instructions Change Your VPN Password 1. Go to https://fw-ats.bric.msu.edu/. Note: You will receive a message about the certificate not being valid; go ahead and accept it. 2. Login with
More informationInstallation and Connection Guide to the simulation environment GLOBAL VISION
Installation and Connection Guide to the simulation environment GLOBAL VISION Hardware and Software Requirements The following hardware specification is recommended for client machines: 2 GHz Pentium class
More informationStarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008
StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008 www.starwindsoftware.com Copyright 2008-2012. All rights reserved. COPYRIGHT Copyright 2008-2012. All rights reserved.
More informationCreating a Virtual CDFS File Server
Table of Contents Table of Contents Introduction 1 Foreword... 1 Legal Notices... 2 Document Conventions... 2 What Virtual CD FS can do for you... 3 New Features in Version 9... 4 Virtual CD FS Licensing...
More informationXConsole GUI setup communication manual September 2010.
XConsole GUI setup communication manual September 2010. XConsole is compatible with Microsoft XP, Vista and Windows 7. The software will also work if using Boot camp on a Mac. IMPORTANT NOTES: - Do NOT
More information