SmartCode Availability and Overview
|
|
|
- Bartholomew Hamilton
- 9 years ago
- Views:
Transcription
1 1 of :20 PM Welcome to the SmartCode Report Generator This is a simple online application that helps you 'decode' the DeVilbiss SmartCode and generate sleep therapy data reports for patients. SmartCode Availability and Overview Availability SmartCode is currently available for Standard (DV51), Standard (DV53), AutoAdjust (DV54), Bilevel (DV55/56), and AutoBilevel (DV57). The most recent firmware update released on 01/21/2009 includes enhanced SmartCode features for both the Standard and AutoAdjust models. Units that were shipped prior to this release date can be upgraded in the field with a firmware update. For more information on the firmware update, please visit the following page: SmartCodes and Timeframes - Standard Plus, AutoAdjust, Bilevel, and AutoBilevel There are five SmartCodes available for Standard Plus, AutoAdjust, AutoBilevel, and Bilevel, each representing a 'rolling window' of usage based on different time frames: 1-day: provides data for the last day of usage 7-day: provides a summary of the past 7 days of usage 30-day: provides a summary of the last 30 days of usage 90-day: provides a summary of the last 90 days of usage SmartCode Usage: provides cumulative data since the start of therapy SmartCodes and Timeframes - Standard There are two codes available for Standard, one code that includes data for the 1, 7, 30 and 90-day timeframes, as well as one cumulative code. SmartCode: provides a summary of the past 1, 7, 30, and 90-day timeframes SmartCode Usage: provides cumulative data since the start of therapy Generating Reports with the Report Generator To use this report generator, you must first contact the patient and ask them to retrieve the SmartCode from their DV51, DV53, DV54, DV55/56 or DV57 CPAP. Simply call the patient and ask them to to turn on their device and press the left arrow once. Once you have collected the desired code(s) they can be de-coded using this report generator. Most of the information in the report generator is optional -- use it only if you want the information to display on the final report. A note about serial numbers: you can optionally include the device serial number in the patient's report. If you include a serial number, the SmartCode report generator will validate the collected codes to make sure that they match the device that the patient has. Once you have completed all of the desired fields and included at least one SmartCode, you click on 'generate report' to display the report. From there, you will be able to save the report as a PDF on your hard drive and distribute it. A note about privacy: The SmartCode report
2 2 of :20 PM generator does not store any information about the patient. Once the report is generated, the only way to save information is to save it locally as a PDF. Sample Codes If you would like to take the SmartCode Report Generator for a test drive, please feel free to use the following sample codes: AutoAdjust Codes Serial Number: HD Day: F6CD-39F Day: 3CCC-379D-7D75 30-Day DXY4-3D97-DJ7Y 90-Day: 7MTJT-47D9-7DT7L SmartCode Usage: ZD7-79FK-K7X Bilevel Codes Serial Number: LD Day: 46MQ-39F-3AAF 7-Day: ACCP-979D-73AP 30-Day 5XYW-AD97-D6A6 90-Day: H82JT-L1D9-7DRAB SmartCode Usage: ZD7-79FK-KA6 Standard Codes Serial Number: ID SmartCode: 16J-TCX8-2FL SmartCode Usage: ZD7-79FK-KFJ Standard Plus Codes Serial Number: JA Day: FJ4F-3B3-3P2Q 7-Day: 3CCC-379D-7C20 30-Day D0Y4-3D97-DP2L 90-Day: 7MTJT DV2P SmartCode Usage: ZD3-79FK-K2V AutoBilevel Codes Serial Number: MD Day: B6CD-39F-35M1 7-Day: 9CCC-379D-7DM3 30-Day EXY4-3D97-DJMN 90-Day: CMTJT-47D9-7DTM4 SmartCode Usage: ZD7-79FK-KMJ SmartCode Report Definitions Minimum Use Threshold Determines the minimum amount of time that the patient must use the device to be logged as a compliant day. Device settings allow for 4 or 5 hours, with 4 hours being the default setting. This
3 3 of :20 PM setting can be changed in the device clinical set-up menu. Adherence Score Shows the maximum adherence achieved for any period of thirty consecutive days of use within a ninety-day time frame. The score represents the percentage of days, within thirty consecutive days, where usage met or exceeded the Usage Threshold. This reports the best consecutive thirty days of usage. For example, if the best 30 out of the last 90 days show 22 days used above the usage threshold and 8 days below the threshold, then the Adherence Score would show 73% (22/30). For this calculation, the usage must be continuous hours and longer than the Usage Threshold. Days at Least X Hours Shows the number of days in the timeframe where the total usage within each day is at least X hours. X represents the Usage Threshold setting in the patient s device. For this calculation, all usage within a 24-hour period is recorded. % Days at Least X Hours Shows the percentage of days in the timeframe where the total usage within each day is at least X hours. X represents the Usage Threshold setting in the patient s device. For this calculation, all usage within a 24-hour period is recorded. Day Count Shows a count of days for each timeframe. If, for example, the 90-day code is collected at day 45 of therapy. The Day Count for this code will be 45 days. In most cases, however, the day count is equal to the days in the code s timeframe(s). While Breathing Hours While breathing hours are only available within the last-day timeframe and with the cumulative code. This measurement shows the total hours of use. 95th Percentile Pressure AutoAdjust or AutoBilevel pressure was at or below this pressure 95-percent of the time it is in use. 90th Percentile Pressure AutoAdjust or AutoBilevel pressure was at or below this pressure 90-percent of the time it is in use. AHI Apnea/Hypopnea Index (AHI) represents the average number of apneas and hypopneas per hour for the timeframe. Pressure Plateau Time Represents the percentage of time the AutoAdjust or AutoBilevel spent at the upper pressure setting. A value of 10% or more indicates a possible need to raise the upper pressure setting to allow higher pressures. High Leak Flow Time Shows the percentage of time where leak was above 95 liters per minute. A value of 10% or more indicates that the mask fit should be checked. NRI Non-Responding Event Index (NRI) represents the average number of non-responding events per hour.
4 4 of :20 PM A non-responding event is a respiratory event that is detected but by design does not result in a pressure change during AutoAdjust or AutoBilevel therapy. EPI The Exhale Puff Index (EPI) is the number of exhale puff events detected per hour. Exhale puffing is caused by inhaling through the patient circuit and exhaling through the mouth. % Machine Inspiration % Machine Inspiration indicates the percentage of breaths in which the timed backup feature of the Bilevel ST has initiated an inspiration trigger. % Machine Expiration % Machine Expiration indicates the percentage of breaths in which the timed backup feature of the Bilevel ST has initiated an expiration cycle. How SmartCode Supports HIPAA Compliance Confidentiality HIPAA Security Rule (Electronic Protected Health Information) Authentication Authentication: Verify person / entity has access to electronic protected health information is the one claimed Access Control Automatic logoff: Terminate an electronic session after a predetermined time of inactivity Encryption and decryption: Encrypt/decrypt electronic protected health information How SmartCode Supports Compliance Unique administrator IDs All administrator passwords are encrypted Administrator password protocol in place Administrative SoD (Separation of Duties) with multiple levels of access control and administrator privileges Administrators cannot access accounts of other administrators All temporary files are purged after a short time period an encrypted Secure Socket Layer (SSL) connection Privacy Standard: Transmission Security Encryption: Encrypt electronic protected health information (that is being transmitted) an encrypted SSL connection
5 5 of :20 PM Integrity Availability Audit Integrity: Protect electronic health information from improper alteration or destruction Implementation specifications: Mechanism to authenticate electronic protected information Integrity controls: Ensure that electronically transmitted data is protected Administrative Safeguards Data backup plan: Establish and implement procedures to create and maintain retrievable exact copies of electronic protected health information Disaster recovery plan: Establish (and implement as needed) procedures to restore any loss of data Audit controls: Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information Administrative Safeguards Log-in monitoring: Procedures for monitoring log-in attempts and reporting discrepancies All SmartCodes are protected by built in integrity checks All access to the system is captured in detailed logs and is monitored Physical access to hardware is restricted an encrypted SSL connection Data exists for a session. Data is not retained to protect privacy Hardware is monitored to ensure service availability Web browser access logging Logs are protected Detailed reporting is available of all system activity
Effective Treatment for Obstructive Sleep Apnoea
Effective Treatment for Obstructive Sleep Apnoea The Series of Positive Airway Pressure devices from DeVilbiss Healthcare is designed to meet the varied needs of people suffering from Obstructive Sleep
HIPAA Information Security Overview
HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)
Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH) Table of Contents Introduction... 1 1. Administrative Safeguards...
HIPAA Compliance Guide
HIPAA Compliance Guide Important Terms Covered Entities (CAs) The HIPAA Privacy Rule refers to three specific groups as covered entities, including health plans, healthcare clearinghouses, and health care
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery
WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
VMware vcloud Air HIPAA Matrix
goes to great lengths to ensure the security and availability of vcloud Air services. In this effort VMware has completed an independent third party examination of vcloud Air against applicable regulatory
itrust Medical Records System: Requirements for Technical Safeguards
itrust Medical Records System: Requirements for Technical Safeguards Physicians and healthcare practitioners use Electronic Health Records (EHR) systems to obtain, manage, and share patient information.
HIPAA. considerations with LogMeIn
HIPAA considerations with LogMeIn Introduction The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in 1996, requires all organizations that maintain or transmit electronic
icode TM Software USER MANUAL
icode TM Software USER MANUAL Table of Contents 1. Overview...1 2. icode Availability...1 3. icode and String of Code Frames...1 4. Generating Reports with the icode Software...1 4.1. How to get the string
HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich
HIPAA Audit Processes Erik Hafkey Rainer Waedlich 1 Policies for all HIPAA relevant Requirements and Regulations Checklist for an internal Audit Process Documentation of the compliance as Preparation for
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery
WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights
REGULATIONS COMPLIANCE ASSESSMENT
ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS
1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
HIPAA Security Checklist
HIPAA Security Checklist The following checklist summarizes HIPAA Security Rule requirements that should be implemented by covered entities and business associates. The citations are to 45 CFR 164.300
Datto Compliance 101 1
Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)
How Managed File Transfer Addresses HIPAA Requirements for ephi
How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
LogMeIn HIPAA Considerations
LogMeIn HIPAA Considerations Contents Introduction LogMeIn HIPAA Considerations...3 General HIPAA Information...4 Section A Background information on HIPAA Rules...4 Technical Safeguards Overview...5 Section
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
White Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
Zmanda Cloud Backup Frequently Asked Questions
Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
TRUST Online u s e r g u i d e v e r s i o n 8. 4 O c t o b e r 2 0 1 3
TRUSTOnline u s e r g u i d e version 8.4 October 2013 TABLE of CONTENTS Access Trust Online... 1 Login to Trust Online... 1 Enhanced Authentication Login... 3 Select an Account... 5 Locate an Account...
Logging In You must log in to the system before you can begin exchanging files with UMB. To log in to the system, follow the steps below.
Using UMB Secure File Transfer UMB Secure File Transfer is a Java-based interface that you can use to upload and download your files through a secure SSL connection using a Javasupported web browser such
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS
HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS Thank you for taking the time to fill out the privacy & security checklist. Once completed, this checklist will help us get a better
Welcome to Business Internet Banking
Welcome to Business Internet Banking Member FDIC Table of Contents Logging On to Business Internet Banking. 3 Viewing Balances. 6 Viewing Transaction Information. 7 Issuing Stop Payments. 9 Viewing estatements.
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Background Information
User Guide 1 Background Information ********************************Disclaimer******************************************** This is a government system intended for official use only. Using this system
A QUICK AND EASY GUIDE TO CITY NATIONAL BUSINESS ONLINE
A QUICK AND EASY GUIDE TO CITY NATIONAL BUSINESS ONLINE WELCOME Welcome to City National Business Online, available to you 24 hours a day, seven days a week. This guide will help you navigate the Business
UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook
Introduction Per UCSC's HIPAA Security Rule Compliance Policy 1, all UCSC entities subject to the HIPAA Security Rule ( HIPAA entities ) must implement the UCSC Practices for HIPAA Security Rule Compliance
This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
Health Services provider user guide
Health Services provider user guide online claims submission... convenient service, delivered through an easy-to-use secure web site http://provider.ab.bluecross.ca/health... convenient service, delivered
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com
Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc. [email protected] www.uslegalsupport.com HIPAA Privacy Rule Sets standards for confidentiality and privacy of individually
White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.
White Paper ezcac: HIPAA Compliant Cloud Solution Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1 Copyright 2014, ezdi, LLC. TECHNICAL SAFEGUARDS Access Control 164.312 (a) (1)
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Healthcare Security and HIPAA Compliance with A10
WHITE PAPER Healthcare Security and HIPAA Compliance with A10 Contents Moving Medicine to the Cloud: the HIPAA Challenge...3 HIPAA History and Standards...3 HIPAA Compliance and the A10 Solution...4 164.308
HIPAA COMPLIANCE AND DATA PROTECTION. [email protected] +39 030 201.08.25 Page 1
HIPAA COMPLIANCE AND DATA PROTECTION [email protected] +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification
Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification Type of Policy and Procedure Comments Completed Privacy Policy to Maintain and Update Notice of Privacy Practices
An Effective MSP Approach Towards HIPAA Compliance
MAX Insight Whitepaper An Effective MSP Approach Towards HIPAA Compliance An independent review of HIPAA requirements, detailed recommendations and vital resources to aid in achieving compliance. Table
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
The Health Insurance Portability and Accountability Act - HIPAA - Using BeAnywhere on a HIPAA context
The Health Insurance Portability and Accountability Act - HIPAA - Using BeAnywhere on a HIPAA context About HIPAA The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in
Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance
RADSpa HIPAA Compliance 1. Introduction 3 1.1. Scope and Field of Application 3 1.2. HIPAA 3 2. Security Architecture 4 2.1 Authentication 4 2.2 Authorization 4 2.3 Confidentiality 4 2.3.1 Secure Communication
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant
1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
Personal and Small Business Login Guide
Personal and Small Business Login Guide Let s Get Started: 1. From our home page at www.americanbusinessbank.com, in the upper left hand corner under the heading PERSONAL & SMALL BUSINESS, enter your current
Online account access
User guide Online account access The best way to manage your accounts, pay bills and stay connected to your finances. osufederal.com 800-732-0173 A quick and easy guide to online account access Table of
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
Develop HIPAA-Compliant Mobile Apps with Verivo Akula
Develop HIPAA-Compliant Mobile Apps with Verivo Akula Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200 [email protected] Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
HealthInfoNet HELP DESK REFERENCE GUIDE. Revised on 10.16.2014 Page 1 of 26
HealthInfoNet HELP DESK REFERENCE GUIDE Revised on 10.16.2014 Page 1 of 26 INSIDE: HealthInfoNet Help Desk Reference Guide Contacting HealthInfoNet (HIN) Determining Priority How to Reach HIN Account Management
Online Giving User Guide for Church Members
User Guide for Church Members Pub 111, February 2011 2009-2011 ParishSOFT LLC, all rights reserved. ParishSOFT grants licensed users the right to unlimited duplication of this publication for internal
Cathay Business Online Banking
Cathay Business Online Banking A QUICK GUIDE TO CATHAY BUSINESS ONLINE BANKING R6119 CATHAY 8_5x11 Cover V2.indd 1 6/11/13 5:50 PM Welcome Welcome to Cathay Business Online Banking (formerly known as Cathay
HIPAA Security Matrix
HIPAA Matrix Hardware : 164.308(a)(1) Management Process =Required, =Addressable Risk Analysis The Covered Entity (CE) can store its Risk Analysis document encrypted and offsite using EVault managed software
tell you about products and services and provide information to our third party marketing partners, subject to this policy;
WEBSITE PRIVACY POLICY FOR RUBE GOLDBERG As of 09-25-2012 Rube Goldberg has created this Privacy Policy in order to demonstrate our firm commitment to protecting personal information. The following discloses
B. KTT Web-based File Transfer
B. KTT Web-based File Transfer The Key Total Treasury Internet File Transfer module allows clients to upload or download data files to/from KeyBank s transmission platform using a PC and Internet browser.
Online Banking & Bill Pay. Quick Start Guide. Step-by-step instructions PLUS easy-to-read screen shots and helpful tips.
Online Banking & Bill Pay Quick Start Guide Step-by-step instructions PLUS easy-to-read screen shots and helpful tips. Welcome -- Online System Security Welcome to Online Banking and Bill Pay! Whether
Training Guide for Delaware Practitioners and Pharmacists Delaware Division of Professional Regulation Prescription Monitoring Program
Training Guide for Delaware Practitioners and Pharmacists Delaware Division of Professional Regulation Prescription Monitoring Program August 2014 v1.7 Contents Contents 1 Document Overview... 1 Purpose
Security, Audit, and e-signature Administrator Console v1.2.x
Security, Audit, and e-signature Administrator Console v1.2.x USER GUIDE SAE Admin Console for use with: QuantStudio Design and Analysis desktop Software Publication Number MAN0010410 Revision A.0 For
HIPAA Security and HITECH Compliance Checklist
HIPAA Security and HITECH Compliance Checklist A Compliance Self-Assessment Tool HIPAA SECURITY AND HITECH CHECKLIST The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires physicians
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation
Paladin Computers Privacy Policy Last Updated on April 26, 2006
Paladin Computers Privacy Policy Last Updated on April 26, 2006 At Paladin Computers ( Service Provider ), we respect our Users and Clients right to privacy with regards to the use of their email and our
1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
Personal Internet Online Banking Frequently Asked Questions
Personal Internet Online Banking Frequently Asked Questions What is First National Bank s Internet Online Banking? With First National Bank s Online Banking, you can conduct through your personal computer
Perceptive Content Security
Perceptive Content Security Best Practices Perceptive Content, Version: 7.1.x Written by: Product Knowledge, R&D Date: June 2015 2015 Perceptive Software. All rights reserved. Perceptive Software is a
eztechdirect Backup Service Features
eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets
Krengel Technology HIPAA Policies and Documentation
Krengel Technology HIPAA Policies and Documentation Purpose and Scope What is Protected Health Information (PHI) and What is Not What is PHI? What is not PHI? The List of 18 Protected Health Information
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
UC Irvine Health Secure Mail Message Center
UC Irvine Health Secure Mail Message Center UC Irvine Health is committed to protecting the privacy of its member s information, especially their protected health information (PHI). UC Irvine Health is
Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures
Security First Bank Consumer Online Banking Information Sheet, Access Agreement and Disclosures Welcome to Online Banking with Security First. This Online Banking Agreement and Disclosure (Agreement) discusses
ShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service
http://docs.oracle.com Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service Configuration Guide 2015 Oracle Corporation. All rights reserved 05/11/2015 Contents 1 HIPAA 3 1.0.1 What is HIPAA?
