Practice Management Application Suite
|
|
|
- Cornelius Leonard
- 10 years ago
- Views:
Transcription
1 RESOURCE AND PATIENT MANAGEMENT SYSTEM Practice Management Application Suite (BPRM) Version 3.0 Office of Information Technology Division of Information Technology
2 Table of Contents 1.0 Introduction Opening the BPRM Application System Navigation Application Toolbar Register Patient Search Box Advanced Search Division Selection List Application Signal Strength Indicator Tools Button Lock Button Log Out Button Workspace Patient Record Pane Taskbar Tasks Button List Boxes Search-Based List Boxes Entering Dates The Settings Module Clinics Page Wards Page Table Maintenance Page Room-Beds Page CQM Site Parameters Admin Page Appendix A: Rules of Behavior A.1 All RPMS Users A.2 RPMS Developers A.3 Privileged Users Glossary Acronym List Contact Information ii Table of Contents
3 Preface The Practice Management Application Suite (namespace BPRM) is a browserenabled graphical user interface (GUI) for the Indian Health Service (IHS) Resource and Patient Management System (RPMS) applications. BPRM provides for the entry of new patients and editing the records of those already registered at a medical facility. The patient data managed with BPRM is crucial to the third-party billing and follow up patient care. Appropriate caution and checking should be employed to ensure that accurate data is entered into the patient registration system and, subsequently, transmitted to the National Patient Information Resource System and used by providers and staff. iii Preface
4 1.0 Introduction BPRM represents a forward step in the streamlining of IHS record and patient management. Through the use of a consistent GUI and module-based architecture, it not only simplifies record and patient management, but also allows for future expansion of the scope and capabilities of the system. This User Manual provides an overview of the BPRM suite. Individual User Manuals are available for each major module of the suite. 1.1 Opening the BPRM Application Follow these steps to open BPRM: 1. Open Internet Explorer. 2. In the Address bar, enter the IP address of your Windows application server using this form: Note: The IP address of your Windows application server is available from your System Manager. 3. If Microsoft Silverlight is not already installed on the computer, a message will be displayed offering to download and install it. Follow the prompts to install Silverlight on the computer. 4. Once Silverlight is installed, the BPRM Log In screen (Figure 1-1) is displayed. Figure 1-1: BPRM Log In screen 5. Type your RPMS Access Code (user name) in the Access Code field. 6. Type your RPMS Verify Code (password) in the Verify Code field. 1 Introduction
5 7. Select your RPMS database from the Database list box. Note: Users must have an RPMS division assigned to them before they can log into the RPMS database selected in this step. 8. Click Login. A screen similar to that shown in Figure 1-2 will be displayed. Figure 1-2: BPRM Opening Screen Refer to the separate BPRM User Manuals for additional information about using the modules that make up the application suite. 2 Introduction
6 2.0 System Navigation BPRM provides access to a vast array of RPMS information. Entering and accessing that information is done through a consistent interface, primarily the Application Toolbar, the Taskbar, and the Workspace. Each of these components are described briefly in this section, and discussed in further detail later in this manual. 2.1 Application Toolbar The Application Toolbar (Figure 2-1) at the top of the BPRM page provides a simplified method and location for registering new patients, finding the records for existing patients, and selecting the applicable health facility. The Application Toolbar is displayed at all times, regardless of the RPMS module being used. Sections through briefly describe the options available from the Application Toolbar. Figure 2-1: Application Toolbar Register Patient Click Register Patient (Figure 2-2) in the Application Toolbar to register a new patient and enter the patient s information into the RPMS system. See the BPRM Patient Registration User Manual for a detailed explanation of the options available when registering a new patient. Figure 2-2: Register Patient Button Search Box Use the Search box (Figure 2-3) in the Application Toolbar to find the records for an existing patient. You can search for a patient based on their name (LAST NAME,FIRST NAME,MIDDLE NAME), their exact Health Record Number (HRN), date of birth (in the form BMMDDYYYY or DD-MM-YYYY), or Social Security Number (SSN). Figure 2-3: Search box Typing any one (or combination) of these search criteria into the Search box causes a list of search results to be displayed. Select a patient from the list displayed to open that patient s record in the Patient workspace. 3 System Navigation
7 2.1.3 Advanced Search The Advanced Search option provides additional fields to search for a patient record. Click Advanced Search (Figure 2-4) in the Application Toolbar to open the Advanced Patient Search form. Figure 2-4: Advanced Search button When you click Advanced Search, a form similar to that shown in Figure 2-5 is displayed. Type your search criteria in any of the fields provided and click Search Patients. (Click Clear in the upper right corner of the form to clear any previouslyentered search criteria.) Figure 2-5: Advanced Patient Search form The search results will be displayed in the lower portion of the Advanced Patient Search form. If necessary, use the scroll bar on the right of the form to scroll through the page of search results. Use the left and right arrows in the lower left corner of the search listing to navigate through multiple search result pages. Open a patient record by selecting the appropriate row and clicking OK, or by double-clicking the patient record Division Selection List Use the Division Selection list button (Figure 2-6) on the Application Toolbar to select the medical facility for which you want to manage patient records. Figure 2-6: Division Selection list button 4 System Navigation
8 2.1.5 Application Signal Strength Indicator The Application Signal Strength Indicator shows the connectivity between the user s session and the application server. During normal conditions, the indicator will display with white bars (Figure 2-7). If there is a disruption in the network connectivity, then the indicator will change to red bars. During this time, some actions in the application may not be able to complete properly (i.e. new appointment creation or check-in). Figure 2-7: Application Signal Strength Indicator Tools Button Use the Tools button (Figure 2-8) on the Application Toolbar to access the options shown in Figure 2-9. Figure 2-8: Tools button After clicking the Tools button, the menu of options shown in Figure 2-9 is displayed. Figure 2-9: Tools Button options Table 2-1 describes each of the options available: Table 2-1: Tools Button Options Option Name Theme Modify Verify Code Description Select this option to change the color theme of the BPRM interface. Select this option to modify a user's verify code. 5 System Navigation
9 Option Name About Release Notes User Settings Description Select this option to display a report showing information about the current user (including the roles assigned to them), as well as information about the BPRM version being used. More information about user roles is available in the Practice Management Application Suite (BPRM) Technical Manual. The information shown in this report is primarily for use by the IHS Help Desk. Select this option to display the Release Notes for the currently-installed version of BPRM. Select this option to enable or disable the option to force BPRM to retrieve and update the scheduling data shown when users are also using legacy (roll and scroll) RPMS scheduling applications Lock Button Use the Lock button (Figure 2-11) on the Application Toolbar to lock the current BPRM session. After locking the session, you must enter your Access Code and Verify Code to return to BPRM. Figure 2-10: Lock button Log Out Button Use the Log Out button (Figure 2-11) on the Application Toolbar to log out from the BPRM application and the RPMS database. Figure 2-11: Log Out button 6 System Navigation
10 2.2 Workspace The Workspace (Figure 2-12) makes up the majority of the BPRM display. The information displayed within the Workspace varies, depending on the task being done. In most cases, the Workspace is used for both entering and displaying patient information. Figure 2-12: Workspace 7 System Navigation
11 2.3 Patient Record Pane The Patient Record Pane (Figure 2-13) shows the currently open patient records. Up to six open patient records can be displayed in the Patient Record Pane. Click any of the records shown to navigate to that patient s record. Figure 2-13: Patient Record pane 2.4 Taskbar The BPRM Taskbar (Figure 2-14) provides quick access to various Patient Registration and Scheduling modules. These modules are grouped into separate, but related tasks. Figure 2-14: Sample Taskbar Click any of the modules in the Taskbar to display and work on that task in the Workspace. Note: The modules you will see displayed may vary depending on which ones have been installed and which modules you have permissions to access. 8 System Navigation
12 2.4.1 Tasks Button The Patient Management Application Suite gives you the ability to open and work on multiple patient records at the same time. For example, while updating the insurance information for Patient A, you can open the record for Patient B to add a new Emergency Contact phone number. When you do this, a message (Figure 2-15) is displayed giving you the following options: Exit from Patient A s record without saving any changes Continue working on Patient A s record Keep the changes to Patient A s record pending while opening Patient B s record Figure 2-15: Unsaved Changes warning message When you click Pend, the page you are working on is temporarily saved as a pending task, and the Tasks button in the lower left corner of the screen is incremented to show the number of pending tasks. In the example shown in Figure 2-16, there are three pending tasks. Figure 2-16: Tasks button Click the Tasks button to see a list of the pending tasks (Figure 2-17). Click any of the pending tasks to jump immediately to the page where that task is pending. Figure 2-17: Tasks button with pending tasks 9 System Navigation
13 Using the Tasks button: You can have up to 10 pending tasks at one time. Due to the need to validate data entries, information you enter into a field on a form will not be saved with the pending task unless you click another field or press the <Tab> key to move to another field before opening another patient s record. 2.5 List Boxes Throughout BPRM are numerous instances of list boxes, also commonly referred to as a drop-down list. List boxes provide a convenient way to display and select from a list of options. As displayed within BPRM, a list box is closed (Figure 2-18) and initially appears as an empty field within the form being viewed. Figure 2-18: Closed List Box example Click anywhere within the empty list box to expand it and display a list of choices applicable for that field within the form. Figure 2-19 shows an example of an expanded list. Figure 2-19: Expanded List Box example After expanding the list box, click any of the choices shown to populate that field of the form. 10 System Navigation
14 2.6 Search-Based List Boxes Some fields in forms throughout the Patient Management Application Suite use list boxes that initiate a search of the RPMS database to retrieve existing records. These list boxes are identified by the magnifying glass icon on the right side of the box, as shown in Figure Figure 2-20: Closed Search-Based List Box example Enter information into a search-based list box using one of these methods: Type one or more letters in the name (or other part of the name) you want to enter into the list box. A list of entries containing the sequence of letters you typed is displayed. Figure 2-21 shows an example of an expanded search-based list box. Use the scroll bar on the right side of the listing to scroll through all of the entries. Click any of the choices shown to populate that field of the form. Figure 2-21: Expanded Search-Based List Box example 11 System Navigation
15 Type two question marks (??) into the list box. A list of the first ten database entries pertaining to that field is displayed, in alphanumeric order. Use the right and left arrows at the bottom of the listing to navigate through additional pages of database entries. Click any of the choices shown to populate that field of the form. Type the full name you want to enter into the list box. Note that you must type the name exactly as it is stored in RPMS. 2.7 Entering Dates A number of the fields within BPRM require calendar dates. To simplify the entering of dates, BPRM provides date entry boxes. Similar to a list box, a date entry box is closed (Figure 2-22) and initially appears as an empty field within the form being viewed. Figure 2-22: Closed Date Entry Box example Date entry boxes accept different types of input. You can type the date directly into the date entry box using any of these accepted formats: 5/25/ The date will automatically be formatted and stored as MM/DD/YYYY, regardless of how you type it. Alternatively, you can click the calendar icon on the right side of the date entry box to display a calendar. The current date is selected by default, but you can click any of the other dates displayed to select it. You can also use the left and right arrows at the top of the calendar box to navigate to other months, and then select the specific date. As in RPMS, you can type the letter T in any date entry box to enter today's date. Also, you can type T-n, where n is the number of days before today's date that you want to enter. Conversely, typing T+n will enter a date n days from today's date. For example, typing T+90 will enter a date 90 days into the future from the current date. 12 System Navigation
16 3.0 The Settings Module Unlike the other modules in BPRM, the Settings module does not directly control or modify patient records. Instead, it controls a variety of application settings for other modules, allowing you to change or add such things as available appointment types, employer names, insurers, and clinics. Although they are grouped in the Settings module, these settings affect other modules in the BPRM suite. In most cases, once these settings have been established, they will rarely need to be changed. Notes: The options available in the Settings module may vary for different users, depending on the RPMS functionality enabled at your site and the access permissions granted to each user. You must log off and back in to the BPRM application for any patient registration configuration changes to take effect. Open the Settings module by clicking Settings in the Taskbar, as shown in Figure 3-1. Figure 3-1: Taskbar with Settings module highlighted The selection pane on the left side of the Settings module displays a list of available options. The information displayed on the right side of the screen varies, depending on the option chosen. 3.1 Clinics Page Click Clinics in the selection pane of the Settings Module to see the Clinics page of the Settings module (Figure 3-2). Refer to the BPRM Scheduling Module User Manual for more information about using the Clinics page of the Settings Module. 13 The Settings Module
17 Figure 3-2: Settings Module - Clinics page 3.2 Wards Page Click Wards in the selection pane of the Settings Module to see the Wards page of the Settings module (Figure 3-3). Refer to the BPRM ADT Module User Manual for more information about using the Wards page of the Settings Module. Figure 3-3: Settings Module - Wards page 14 The Settings Module
18 3.3 Table Maintenance Page Click Table Maintenance in the selection pane to see the main Table Maintenance page (Figure 3-4). Figure 3-4: Settings Module - Table Maintenance page The individual options from the Table Maintenance page are described in the User Manual for that particular module as shown in Table 3-1. Table 3-1: Settings module Table Maintenance options Option Chart Deficiency Category II (Local Flag) Eligibility Modifiers Employer Group Insurance Employers Insurers Patient Application Types Access Types Holiday Configuration Resource Groups Described In BPRM ADT User Manual BPRM Patient Registration User Manual BPRM Patient Registration User Manual BPRM Patient Registration User Manual BPRM Patient Registration User Manual BPRM Patient Registration User Manual BPRM Patient Registration User Manual BPRM Scheduling Module User Manual BPRM Scheduling Module User Manual BPRM Scheduling Module User Manual 3.4 Room-Beds Page Click Room-Beds in the selection pane to see the main Room-Beds page (Figure 3-5). Refer to the BPRM ADT Module User Manual for more information about using the Room-Beds page of the Settings Module. 15 The Settings Module
19 3.5 CQM Figure 3-5: Settings Module Room-Beds page Click CQM in the selection pane of the Settings Module to see the CQM Export page of the Settings module (Figure 3-6). Refer to the BPRM CQM Module User Manual for more information about using the CQM Export page of the Settings Module. Figure 3-6: Settings Module - CQM page 16 The Settings Module
20 3.6 Site Parameters Click Site Parameters in the selection pane to see the main Site Parameters page (Figure 3-7). Figure 3-7: Settings Module Site Parameters page The individual options from the Site Parameters page are described in the User Manual for that particular module as shown in Table 3-2. Table 3-2: Settings module Site Parameters options Option ADT Site Parameters Described In BPRM ADT User Manual 3.7 Admin Page Click Admin in the selection pane to see the main Admin page (Figure 3-4). Figure 3-8: Settings Module - Admin page 17 The Settings Module
21 The individual options from the Admin page are available to Site Administrators with the Admin role assigned. Refer to the BPRM Installation Guide for more information on User Role and Security Key assignment. Table 3-3: Settings module Site Parameters options Option Server Side Cache Setup Checks Described In Select this option to clear the BPRM website CachedData folder on the application server. Using this option may slow down the application as the cached data is regenerated. This can be used to resolve problems when changes to standard tables are not reflected in BPRM (i.e. Name changes to User, Institution or Division). Select this option to run the Moonwalk Setup Status Page. This can be used for troubleshooting setup related issues. 18 The Settings Module
22 Appendix A: Rules of Behavior The Resource and Patient Management (RPMS) system is a United States Department of Health and Human Services (HHS), Indian Health Service (IHS) information system that is FOR OFFICIAL USE ONLY. The RPMS system is subject to monitoring; therefore, no expectation of privacy shall be assumed. Individuals found performing unauthorized activities are subject to disciplinary action including criminal prosecution. All users (Contractors and IHS Employees) of RPMS will be provided a copy of the Rules of Behavior (RoB) and must acknowledge that they have received and read them prior to being granted access to a RPMS system, in accordance IHS policy. For a listing of general ROB for all users, see the most recent edition of IHS General User Security Handbook (SOP 06-11a). For a listing of system administrators/managers rules, see the most recent edition of the IHS Technical and Managerial Handbook (SOP 06-11b). Both documents are available at this IHS Web site: The ROB listed in the following sections are specific to RPMS. A.1 All RPMS Users In addition to these rules, each application may include additional RoBs that may be defined within the documentation of that application (e.g., Dental, Pharmacy). A.1.1 Access RPMS users shall Only use data for which you have been granted authorization. Only give information to personnel who have access authority and have a need to know. Always verify a caller s identification and job purpose with your supervisor or the entity provided as employer before providing any type of information system access, sensitive information, or nonpublic agency information. Be aware that personal use of information resources is authorized on a limited basis within the provisions Indian Health Manual Part 8, Information Resources Management, Chapter 6, Limited Personal Use of Information Technology Resources. 19 Rules of Behavior
23 RPMS users shall not Retrieve information for someone who does not have authority to access the information. Access, research, or change any user account, file, directory, table, or record not required to perform their official duties. Store sensitive files on a PC hard drive, or portable devices or media, if access to the PC or files cannot be physically or technically limited. Exceed their authorized access limits in RPMS by changing information or searching databases beyond the responsibilities of their jobs or by divulging information to anyone not authorized to know that information. A.1.2 Information Accessibility RPMS shall restrict access to information based on the type and identity of the user. However, regardless of the type of user, access shall be restricted to the minimum level necessary to perform the job. RPMS users shall Access only those documents they created and those other documents to which they have a valid need-to-know and to which they have specifically granted access through an RPMS application based on their menus (job roles), keys, and FileMan access codes. Some users may be afforded additional privileges based on the functions they perform, such as system administrator or application administrator. Acquire a written preauthorization in accordance with IHS policies and procedures prior to interconnection to or transferring data from RPMS. A.1.3 Accountability RPMS users shall Behave in an ethical, technically proficient, informed, and trustworthy manner. Log out of the system whenever they leave the vicinity of their personal computers (PCs). Be alert to threats and vulnerabilities in the security of the system. Report all security incidents to their local Information System Security Officer (ISSO) Differentiate tasks and functions to ensure that no one person has sole access to or control over important resources. Protect all sensitive data entrusted to them as part of their government employment. 20 Rules of Behavior
24 Abide by all Department and Agency policies and procedures and guidelines related to ethics, conduct, behavior, and information technology (IT) information processes. A.1.4 A.1.5 Confidentiality RPMS users shall Be aware of the sensitivity of electronic and hard copy information, and protect it accordingly. Store hard copy reports/storage media containing confidential information in a locked room or cabinet. Erase sensitive data on storage media prior to reusing or disposing of the media. Protect all RPMS terminals from public viewing at all times. Abide by all Health Insurance Portability and Accountability Act (HIPAA) regulations to ensure patient confidentiality. RPMS users shall not Allow confidential information to remain on the PC screen when someone who is not authorized to that data is in the vicinity. Store sensitive files on a portable device or media without encrypting. Integrity RPMS users shall Protect their systems against viruses and similar malicious programs. Observe all software license agreements. Follow industry standard procedures for maintaining and managing RPMS hardware, operating system software, application software, and/or database software and database tables. Comply with all copyright regulations and license agreements associated with RPMS software. RPMS users shall not Violate federal copyright laws. Install or use unauthorized software within the system libraries or folders. Use freeware, shareware, or public domain software on/with the system without their manager s written permission and without scanning it for viruses first. 21 Rules of Behavior
25 A.1.6 A.1.7 System Logon RPMS users shall Have a unique User Identification/Account name and password. Be granted access based on authenticating the account name and password entered. Be locked out of an account after five successive failed login attempts within a specified time period (e.g., one hour). Passwords RPMS users shall Change passwords a minimum of every 90 days. Create passwords with a minimum of eight characters. If the system allows, use a combination of alpha-numeric characters for passwords, with at least one uppercase letter, one lower case letter, and one number. It is recommended, if possible, that a special character also be used in the password. Change vendor-supplied passwords immediately. Protect passwords by committing them to memory or store them in a safe place (do not store passwords in login scripts or batch files). Change passwords immediately if password has been seen, guessed, or otherwise compromised, and report the compromise or suspected compromise to their ISSO. Keep user identifications (IDs) and passwords confidential. RPMS users shall not Use common words found in any dictionary as a password. Use obvious readable passwords or passwords that incorporate personal data elements (e.g., user s name, date of birth, address, telephone number, or social security number; names of children or spouses; favorite band, sports team, or automobile; or other personal attributes). Share passwords/ids with anyone or accept the use of another s password/id, even if offered. Reuse passwords. A new password must contain no more than five characters per eight characters from the previous password. Post passwords. Keep a password list in an obvious place, such as under keyboards, in desk drawers, or in any other location where it might be disclosed. 22 Rules of Behavior
26 Give a password out over the phone. A.1.8 A.1.9 Backups RPMS users shall Plan for contingencies such as physical disasters, loss of processing, and disclosure of information by preparing alternate work strategies and system recovery mechanisms. Make backups of systems and files on a regular, defined basis. If possible, store backups away from the system in a secure environment. Reporting RPMS users shall Contact and inform their ISSO that they have identified an IT security incident and begin the reporting process by providing an IT Incident Reporting Form regarding this incident. Report security incidents as detailed in the IHS Incident Handling Guide (SOP 05-03). RPMS users shall not Assume that someone else has already reported an incident. The risk of an incident going unreported far outweighs the possibility that an incident gets reported more than once. A.1.10 Session Timeouts RPMS system implements system-based timeouts that back users out of a prompt after no more than 5 minutes of inactivity. RPMS users shall Utilize a screen saver with password protection set to suspend operations at no greater than 10 minutes of inactivity. This will prevent inappropriate access and viewing of any material displayed on the screen after some period of inactivity. A.1.11 Hardware RPMS users shall Avoid placing system equipment near obvious environmental hazards (e.g., water pipes). Keep an inventory of all system equipment. 23 Rules of Behavior
27 Keep records of maintenance/repairs performed on system equipment. RPMS users shall not Eat or drink near system equipment. A.1.12 Awareness RPMS users shall Participate in organization-wide security training as required. Read and adhere to security information pertaining to system hardware and software. Take the annual information security awareness. Read all applicable RPMS manuals for the applications used in their jobs. A.1.13 Remote Access Each subscriber organization establishes its own policies for determining which employees may work at home or in other remote workplace locations. Any remote work arrangement should include policies that Are in writing. Provide authentication of the remote user through the use of ID and password or other acceptable technical means. Outline the work requirements and the security safeguards and procedures the employee is expected to follow. Ensure adequate storage of files, removal, and nonrecovery of temporary files created in processing sensitive data, virus protection, and intrusion detection, and provide physical security for government equipment and sensitive data. Establish mechanisms to back up data created and/or stored at alternate work locations. Remote RPMS users shall Remotely access RPMS through a virtual private network (VPN) whenever possible. Use of direct dial in access must be justified and approved in writing and its use secured in accordance with industry best practices or government procedures. Remote RPMS users shall not Disable any encryption established for network, internet, and Web browser communications. 24 Rules of Behavior
28 A.2 RPMS Developers RPMS developers shall Always be mindful of protecting the confidentiality, availability, and integrity of RPMS when writing or revising code. Always follow the IHS RPMS Programming Standards and Conventions (SAC) when developing for RPMS. Only access information or code within the namespaces for which they have been assigned as part of their duties. Remember that all RPMS code is the property of the U.S. Government, not the developer. Not access live production systems without obtaining appropriate written access, and shall only retain that access for the shortest period possible to accomplish the task that requires the access. Observe separation of duties policies and procedures to the fullest extent possible. Document or comment all changes to any RPMS software at the time the change or update is made. Documentation shall include the programmer s initials, date of change, and reason for the change. Use checksums or other integrity mechanism when releasing their certified applications to assure the integrity of the routines within their RPMS applications. Follow industry best standards for systems they are assigned to develop or maintain, and abide by all Department and Agency policies and procedures. Document and implement security processes whenever available. RPMS developers shall not Write any code that adversely impacts RPMS, such as backdoor access, Easter eggs, time bombs, or any other malicious code or make inappropriate comments within the code, manuals, or help frames. Grant any user or system administrator access to RPMS unless proper documentation is provided. Release any sensitive agency or patient information. A.3 Privileged Users Personnel who have significant access to processes and data in RPMS, such as, system security administrators, systems administrators, and database administrators, have added responsibilities to ensure the secure operation of RPMS. 25 Rules of Behavior
29 Privileged RPMS users shall Verify that any user requesting access to any RPMS system has completed the appropriate access request forms. Ensure that government personnel and contractor personnel understand and comply with license requirements. End users, supervisors, and functional managers are ultimately responsible for this compliance. Advise the system owner on matters concerning information technology security. Assist the system owner in developing security plans, risk assessments, and supporting documentation for the certification and accreditation process. Ensure that any changes to RPMS that affect contingency and disaster recovery plans are conveyed to the person responsible for maintaining continuity of operations plans. Ensure that adequate physical and administrative safeguards are operational within their areas of responsibility and that access to information and data is restricted to authorized personnel on a need-to-know basis. Verify that users have received appropriate security training before allowing access to RPMS. Implement applicable security access procedures and mechanisms, incorporate appropriate levels of system auditing, and review audit logs. Document and investigate known or suspected security incidents or violations and report them to the ISSO, Chief Information Security Officer (CISO), and systems owner. Protect the supervisor, superuser, or system administrator passwords. Avoid instances where the same individual has responsibility for several functions (i.e., transaction entry and transaction approval). Watch for unscheduled, unusual, and unauthorized programs. Help train system users on the appropriate use and security of the system. Establish protective controls to ensure the accountability, integrity, confidentiality, and availability of the system. Replace passwords when a compromise is suspected. Delete user accounts as quickly as possible from the time that the user is no longer authorized system. Passwords forgotten by their owner should be replaced, not reissued. Terminate user accounts when a user transfers or has been terminated. If the user has authority to grant authorizations to others, review these other authorizations. Retrieve any devices used to gain access to the system or equipment. Cancel logon IDs and passwords, and delete or reassign related active and backup files. 26 Rules of Behavior
30 Use a suspend program to prevent an unauthorized user from logging on with the current user's ID if the system is left on and unattended. Verify the identity of the user when resetting passwords. This can be done either in person or having the user answer a question that can be compared to one in the administrator s database. Shall follow industry best standards for systems they are assigned to, and abide by all Department and Agency policies and procedures. Privileged RPMS users shall not Access any files, records, systems, etc., that are not explicitly needed to perform their duties Grant any user or system administrator access to RPMS unless proper documentation is provided. Release any sensitive agency or patient information. 27 Rules of Behavior
31 Glossary Employer Company or person that has hired the patient, often offering private health insurance as part of the benefit package. Health Record Number A number assigned to each patient by the Medical Records Department (if possible). Resource and Patient Management System A suite of software programs maintained for IHS use. Social Security Number A nine-digit number assigned by the Social Security Administration for tracking and Social Security benefit purposes. 28 Glossary
32 Acronym List Acronym BPRM GUI HRN IHS IP RPMS URL Definition RPMS Namespace allocated to the Practice Management Application Suite Graphical User Interface Health Record Number Indian Health Service Internet Protocol, the method by which information is sent between any two computers on the Internet or a browser-enabled network. Resource and Patient Management System Web address 29 Acronym List
33 Contact Information If you have any questions or comments regarding this distribution, please contact the OIT Help Desk (IHS). Phone: (888) (toll free) Web: Contact Information
RESOURCE AND PATIENT MANAGEMENT SYSTEM. Drug Accountability (PSA) GUI Invoice Upload Program Installation and Configuration Guide
RESOURCE AND PATIENT MANAGEMENT SYSTEM Drug Accountability (PSA) GUI Invoice Upload Program Installation and Configuration Guide Version 1.0 Office of Information Technology (OIT) Division of Information
IHS Emergency Department Dashboard
RESOURCE AND PATIENT MANAGEMENT SYSTEM IHS Emergency Department Dashboard (BEDD) Version 1.0 Office of Information Technology Division of Information Resource Management Albuquerque, New Mexico Document
Practice Management Application Suite
RESOURCE AND PATIENT MANAGEMENT SYSTEM Practice Management Application Suite (BPRM) Version 3.0 Office of Information Technology Division of Information Technology Table of Contents 1.0 Introduction...
Practice Management Application Suite
RESOURCE AND PATIENT MANAGEMENT SYSTEM Practice Management Application Suite (BMW) Version 2.0 Office of Information Technology Division of Information Technology Albuquerque, New Mexico Table of Contents
IHS Emergency Department Dashboard
RESOURCE AND PATIENT MANAGEMENT SYSTEM IHS Emergency Department Dashboard (BEDD) Version 1.0 Office of Information Technology Division of Information Resource Management Albuquerque, New Mexico Table of
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Clinical Scheduling for Windows
RESOURCE AND PATIENT MANAGEMENT SYSTEM Clinical Scheduling for Windows (BSDX) Version 3.0 Office of Information Technology (OIT) Albuquerque, New Mexico Preface Security This manual contains the installation
IHS USER SECURITY AUDIT
RESOURCE AND PATIENT MANAGEMENT SYSTEM IHS USER SECURITY AUDIT (BUSA) Version 1.0 Office of Information Technology Division of Information Technology Albuquerque, New Mexico Table of Contents 1.0 Release
Practice Management Application Suite
RESOURCE AND PATIENT MANAGEMENT SYSTEM Practice Management Application Suite (BPRM) Version 3.0 Office of Information Technology (OIT) Division of Information Technology Table of Contents 1.0 Introduction...
Personal Health Record
RESOURCE AND PATIENT MANAGEMENT SYSTEM Personal Health Record (BPHR) Personal Health Record Web Portal Administrator Manual Version 2.0 Office of Information Technology (OIT) Division of Information Resource
NASDAQ Web Security Entitlement Installation Guide November 13, 2007
November 13, 2007 Table of Contents: Copyright 2006, The Nasdaq Stock Market, Inc. All rights reserved.... 2 Chapter 1 - Entitlement Overview... 3 Hardware/Software Requirements...3 NASDAQ Workstation...3
User Manual for Web. Help Desk Authority 9.0
User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Resource Online User Guide JUNE 2013
Resource Online User Guide JUNE 2013 CHASE PAYMENTECH SOLUTIONS MAKES NO WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users
Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...
DarwiNet Client Level
DarwiNet Client Level Table Of Contents Welcome to the Help area for your online payroll system.... 1 Getting Started... 3 Welcome to the Help area for your online payroll system.... 3 Logging In... 4
SonicWALL SSL VPN 3.5: Virtual Assist
SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
PowerSchool Parent Portal User Guide. PowerSchool 7.x Student Information System
PowerSchool 7.x Student Information System Released December 2011 Document Owner: Documentation Services This edition applies to Release 7.1 of the [product name] software and to all subsequent releases
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
Getting Started. Business Link. User Name Rules. Hardware/Software Requirements. Password Rules
Getting Started User Name Rules All user names must: Be unique. Be between six and 40 characters in length. Notes: It is recommended that user names consist only of alphanumeric characters (A-Z, 0-9).
Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
Personal Call Manager User Guide. BCM Business Communications Manager
Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008
Cypress Connexion HELP Guide www.cypressconnexion.com
Welcome to Cypress Connexion your one-stop-shop for accessing and managing your Cypress Communications account online, at your convenience. The following guide will provide you with helpful information
Strategic Asset Tracking System User Guide
Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data
ETS. Major Field Tests. Proctor Administrator Manual
ETS Major Field Tests Proctor Administrator Manual Updated: December 2010 Table of Contents Contents 1.0 WELCOME... 1 1.1 INTRODUCTION... 1 1.2 SYSTEM REQUIREMENTS AND SETTING-UP STUDENT WORKSTATIONS...
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
eopf Release E Administrator Training Manual
eopf Release E Administrator Training Manual i The United States Office Of Personnel Management eopf Administrator Training Manual for eopf v5 eopf Version 4.1, July 2007, March 2008, March 2009; eopf
Basic ebusiness Banking User Guide
Basic ebusiness Banking User Guide 1 Welcome: Welcome to Chemical Bank s ebusiness Banking system. With ebusiness Banking, you can access your accounts 24-hours a day, seven days a week; anywhere an Internet
OUTLOOK WEB ACCESS. User Guide
OUTLOOK WEB ACCESS User Guide V3 2 August 2013 Not protectively marked GETTING STARTED Outlook Web Access (OWA) provides a useful means to remotely access Council email from outside of the council access.
HP ProtectTools User Guide
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
DCH File Transfer Application User Manual
DCH File Transfer Application User Manual Table of Contents HIPAA Compliancy Statement 3 Overview 4 General.4 Getting Started 4 Screen Basics...4 Accessing the File Transfer application...5 Single Sign
Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access
Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting
CONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
ScriptLogic File System Auditor User Guide
ScriptLogic File System Auditor User Guide FILE SYSTEM AUDITOR I 2005 by ScriptLogic Corporation All rights reserved. This publication is protected by copyright and all rights are reserved by ScriptLogic
Introduction... 2. Download and Install Mobile Application... 2. About Logging In... 4. Springboard... 4. Navigation... 6. List Pages...
Contents Introduction... 2 Download and Install Mobile Application... 2 About Logging In... 4 Springboard... 4 Navigation... 6 List Pages... 6 Example: Edit Contact... 7 View Pages... 12 Example: Companies...
Getting Started with IntelleView POS Administrator Software
Getting Started with IntelleView POS Administrator Software Administrator s Guide for Software Version 1.2 About this Guide This administrator s guide explains how to start using your IntelleView POS (IntelleView)
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
Windows 7 Hula POS Server Installation Guide
Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3
GP REPORTS VIEWER USER GUIDE
GP Reports Viewer Dynamics GP Reporting Made Easy GP REPORTS VIEWER USER GUIDE For Dynamics GP Version 2015 (Build 5) Dynamics GP Version 2013 (Build 14) Dynamics GP Version 2010 (Build 65) Last updated
CSOS Certificate Support Guide. Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority
Version: 1.1 Published: October 1, 2006 Publisher: CSOS Certification Authority Document Revision History Version # Revision Sections Summary of Changes Initials Date Affected 1.0 4/27/2006 All Version
GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS
Your Login ID: GETTING STARTED ON THE WINDOWS SERVICE A GUIDE FOR NEW STAFF MEMBERS CONTENTS 1.0 Introduction... 3 1.1 Welcome to Edinburgh Napier University from Information Services!... 3 1.2 About Information
Behavioral Health System
RESOURCE AND PATIENT MANAGEMENT SYSTEM Behavioral Health System (AMH) Version 4.0 Patch 6 Office of Information Technology Division of Information Technology Table of Contents 1.0 Objective #1: Introduction
EMC Documentum Webtop
EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights
Employee Quick Reference Guide
Employee Quick Reference Guide Thank you for using ADP's ipaystatements to view your payroll information. Use this Quick Reference Guide to learn how to view your pay statements, W-2s, 1099s, and adjustments.
USING DOCUWARE TO MANAGE WORKFORCE SOLUTIONS FILES CAREER OFFICE
USING DOCUWARE TO MANAGE WORKFORCE SOLUTIONS FILES CAREER OFFICE Using DocuWare to Manage Workforce Solutions Files Workforce Solutions 2015 Version 1.1, 3/17/15 Workforce Solutions is an equal opportunity
Infinity Web Viewer Reference Guide
Infinity Web Viewer Reference Guide Table of Contents Overview... 1 Security Considerations... 1 System Setup... 1 Infinity Configuration... 1 Workstation Prerequisites... 2 Configuring Internet Security...
The United States Office Of Personnel Management eopf System Administrator Training Manual for eopf Version 4.0.
The United States Office Of Personnel Management eopf System Administrator Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the Northrop
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
efiletexas.gov Review Queue User Guide
efiletexas.gov Review Queue User Guide EFS-TF-200-3194 v.4 February 2014 Copyright and Confidentiality Copyright 2014 Tyler Technologies, Inc. All rights reserved. All documentation, source programs, object
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0.
The United States Office Of Personnel Management eopf Human Resources Specialist Training Manual for eopf Version 4.0. Copyright 1994-2007 by Northrop Grumman. All rights reserved. Northrop Grumman, the
Outlook Web Access (OWA) User Guide
Outlook Web Access (OWA) User Guide September 2010 TABLE OF CONTENTS TABLE OF CONTENTS... 2 1.0 INTRODUCTION... 4 1.1 OUTLOOK WEB ACCESS SECURITY CONSIDERATIONS... 4 2.0 GETTING STARTED... 5 2.1 LOGGING
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
End User Configuration
CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Baylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
Evoko Room Manager. System Administrator s Guide and Manual
Evoko Room Manager System Administrator s Guide and Manual 1 1. Contents 1. Contents... 2 2. Read this first! Introduction to this Guide... 6 3. User Guide... 6 4. System Architecture Overview... 8 ----
Client Administrator Quick Reference Guide
Client Administrator Quick Reference Guide Thank you for using ADP's ipaystatements to view your payroll information. Use this Quick Reference Guide to learn how to view your pay statement, understand
TOPS v3.2.1 Calendar/Scheduler User Guide. By TOPS Software, LLC Clearwater, Florida
TOPS v3.2.1 Calendar/Scheduler User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition Second Edition 02 2007 09-2007
Hosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
ADP Workforce Now Security Guide. Version 2.0-1
ADP Workforce Now Security Guide Version 2.0-1 ADP Trademarks The ADP logo, ADP, and ADP Workforce Now are registered trademarks of ADP, Inc. Third-Party Trademarks Microsoft, Windows, and Windows NT are
Optum Patient Portal. 70 Royal Little Drive. Providence, RI 02904. Copyright 2002-2013 Optum. All rights reserved. Updated: 3/7/13
Optum Patient Portal 70 Royal Little Drive Providence, RI 02904 Copyright 2002-2013 Optum. All rights reserved. Updated: 3/7/13 Table of Contents 1 Patient Portal Activation...1 1.1 Pre-register a Patient...1
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
Institution/Department Administrator Manual
ETS Major Field Tests Institution/Department Administrator Manual Updated: December 2010 Table of Contents 1.0 WELCOME... 1 1.1 INTRODUCTION... 1 1.2 COMPUTER HARDWARE AND SOFTWARE REQUIREMENTS... 1 2.0
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
Outlook Web Access 2003 New Features Guide
Global Information Services Outlook Web Access 2003 New Features Guide Table of Contents After following a link, click on the toolbar to return to the Table of Contents. OWA 2003 2 Log in Screen 2 OWA
AT&T Voice DNA User Guide
AT&T Voice DNA User Guide Page 1 Table of Contents GET STARTED... 4 Log In... 5 About the User Dashboard... 9 Manage Personal Profile... 15 Manage Messages... 17 View and Use Call Logs... 22 Search the
How To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
Vital Records Electronic Registration System (ERS-II) Technical Resource Guide and Support Procedures
Vital Records Electronic Registration System (ERS-II) Technical Resource Guide and Support Procedures Vital Records Support Line: (402) 471-8275 Frequently Asked Questions Problem: User cannot access the
UniCom with Office Communicator and Live Meeting. Quick Start Guide
UniCom with Office Communicator and Live Meeting Quick Start Guide Table of Contents Understanding UniCom and Office Communicator... 1 What is UniCom?... 1 What Is Office Communicator?... 1 Who Can Use
HP ProtectTools for Small Business Security Software, Version 5.10. User Guide
HP ProtectTools for Small Business Security Software, Version 5.10 User Guide Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
2. _General Help and Technical Support
1. _Welcome Welcome to Business Internet Banking. Our online service is available 06:00 AM ET 12:00 AM (Midnight) ET, seven days a week, so you and your employees can manage your business banking accounts
Our website Internet Banking
Our website Internet Banking A safe and efficient way of accessing your People s Choice Credit Union accounts, paying bills and transferring money. 1 Contents 1. Security, system requirements and cookies...3
... This page intentionally left blank... Print in duplex mode (front and back) to avoid printing this page on separate sheet.
August - 2003 This guide is available at http://blue.usps.gov/hrisp/hris/guidebks/welcome.htm and is designed for printing in duplex mode (front and back). ... This page intentionally left blank... Print
NovaBACKUP Network User s Guide
NovaBACKUP Network User s Guide NovaStor / January 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
MHC CareMail User Guide
MHC CareMail User Guide Get Started with MHC CareMail Secure Communications Version 1.7 Table of Contents About MHC CareMail Communications... 4 Getting Started with... 5 Your MHC CareMail Account... 5
TAMUS Terminal Server Setup BPP SQL/Alva
We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE
CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE INTRODUCTION You can access your email account from any workstation at your school using Outlook Web Access (OWA),
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
Microsoft Dynamics GP. Electronic Signatures
Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without
Comodo LoginPro Software Version 1.5
Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System
Sophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
