Information Security Management 2008 Programs. Data Security The data security team processes 120,000 requests per year and is staffed with five FTE.

Slides:



Advertisements
Similar presentations
Northern Kentucky University Procurement Card Training For MasterCard
Advertisements

Change Enablement Q3 Update Objectives & Value The Change Enablement team adds value and increases transparency and engagement by applying a structured.
Project Update : Claims/Clinical Linkage Project MHDO Board of Directors June 6, 2013.
6/2/20151 MARS MARS Management Administrative Reporting System Commonwealth of Kentucky.
YALE MASTER SLIDE HERE Clinical Research Management – Is not just a handshake deal? Jamie Caldwell, MBA Director Office of Research Services for the Health.
Solutions Center Jack Kufahl November 1, Purpose The Solutions Center provides consultation, user, and technical services in support of the faculty,
Manager Desktop & Supervisor ID UL Meeting December 15, 2006.
CUMC IRB Investigator Meeting November 9, 2004 Research Use of Stored Data and Tissues.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
EmpowHR EmpowHR Security Overview. 2 Application Security Administration Permission List Roles User Profiles Row level security Distributed Security Administration.
Planview for Resource Managers: Create Your Project
Copyright Statement © Jason Rhode and Carol Scheidenhelm This work is the intellectual property of the authors. Permission is granted for this material.
Network security policy: best practices
Application Security Management Functional Project Manager (s) ERP Project Director ERP Campus Executive University & Campus Administration Security Policy.
LMS Gap Analysis 6/15/2011 Department of Personnel.
System for Award Management (SAM) ►Agency Roles Administrator Training ►Dial in information: / passcode: # July 10 th, 2012.
Entering a Purchase Request Draft Departmental User Instructions June 2014.
HIE Implementation in Michigan for Improved Health As approved by the Michigan Health Information Technology Commission on March 4, 2009.
Workers Comp Help Desk. The Workers Comp Help Desk is designed to provide the highest level of convenience and support for Industrial Carrier Professionals.
HOLMES 2 System Administration Through HOLMES 2 System Administration, an incident can be configured such that access is restricted to: – specified users.
East Carolina University Revised 12/14 1. Documents to be submitted to Graduate School Completed and signed graduate contract Terms and Conditions SACS.
Landlord Utility Services Work Instructions. To enter the portal, simply enter your assigned User ID and Password, provided by Consumers Energy. Log In.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Lifecycle Workstation Operator Training: PIN Reset and Certificate Update Updated April 17, 2012.
RDWG – MP Online Data Entry – Project Priority List / Update July 30, 2013 Troy Anderson.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Internal and Governmental Financial Auditing and Operational Auditing.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley Internal and Governmental Financial Auditing and Operational Auditing.
IRB Training May 2014 Michele Myrvik Program Specialist Research & Development VA Ext 7645.
GSA’s Vendor and Customer Self Service (VCSS)
Employee FAQs SubFinder Overview. FAQs Do I have to have touch-tone service to access the SubFinder system? No, but you do need a telephone that can be.
MP Online Data Entry Project Update WMS / ROS August 2013 Troy Anderson.
Incident Management PCCYFS June 27, 2007 Incident Management for the Office of Children, Youth and Families.
New Principal Training Property Control July 7, 2015.
Identity and Access Management Roadmap Presentations for Committee on Technology and Architecture March 21, 2012 Amy Day, MBA Director of GME IAM Committee.
Case Studies for VCCCD Automatic PIN Reset Drop Notification Terry Loftus Senior Consultant Strata Information Group 3CBG Conference April
HR SERVICE REQUEST SYSTEM (SRS) Academic Senate COR April 21, 2014.
Introduces ePIRATE electronic Portal for Institutional Research at ECU East Carolina University Office for Human Research Integrity.
Flexible Registration for Community Education Dottie Marron Delivery Center Manager Student Administrative Services Consulting Center.
Systems Analysis & Design AUTHOR: PROFESSOR SUSAN FUSCHETTO 10/24/
Message Validation, Processing, and Provisioning System (MVPS) Access for Jurisdictions User has SAMS User ID Center for Surveillance, Epidemiology, and.
On-Line BankCard Center Presentation Cardholder Role During the Presentation click the mouse on this button to move back a slide During the Presentation.
We are proud to take you to the next step in databank with Vision Soft Group (School Manager Software) - a Next Generation technology. Complete with Billing.
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
The following training presentation is for all 1Prospect employees and is taken upon joining the company team. Quality Management System (QMS) Training.
MAPP HHTS Implementation Preparation March 1, 2016.
SAP GRC(Governance Risk and Compliance)/SECURITY ONLINE TRAINING  Magnific Name : SAP GRC/SECURITY 24*7 Technical support  faculty : Real time Experience.
Access Provisioning: Navigating the Request Process Stella Le and Jim Lewis Senior Information Security Analysts Enterprise Application Security Team (EAST)
Identification of WEBnet users Aleš Padrta
Oral Exam Rating Process May 23, 2016 NATIONAL CENTER FOR STATE COURTS.
University of Southern California Identity and Access Management (IAM)
Migration to Central Data Exchange (CDX)
Review of IT General Controls
Business Model and Administration Governance
UDI Key Features: Medical Device Integration
SAP GRC(Governance Risk and Compliance)/SECURITY ONLINE TRAINING UK
Patient Identifier Cross-Referencing for MPI (PIX)
The following training presentation is for all employees and is taken upon joining the company team. Quality Management System (QMS) Training Proprietary.
MyGaDOE Portal Provisioning for Security Officers
eMedical User Roles Guide
University of Southern California Identity and Access Management (IAM)
FIRST FRIDAY’S 11/02/2018 CONCUR PCARD FAQ’S
TER New User Setup Instructions for Medical Certifiers
What are IAM Key Processes.
Creating a University IT Service Portfolio
NerfChain.
Quick Reference Guide Issue Types
New Research Access Processes IU Health Research Access Team Effective August 15, /18/2019.
Presentation transcript:

Information Security Management 2008 Programs

Data Security The data security team processes 120,000 requests per year and is staffed with five FTE. Each task could be anything from a simple question to an S/OLAR with access requests to 15 separate applications. Provide some type of user administration for 97 applications The following is a list of services Provide users with access to systems Remove users access to systems Create, Maintain, Remove ID’s for non-users such as auto-logins (kiosks), vendors, etc. Maintain physician master records in Cerner, SMS, and other downstream systems Maintain BAA HIPAA contracts for vendors IHIE & VPN download from pulse Maintain applications and routing in SOLAR Pulse registration troubleshooting while maintaining CDS Assist in the investigation of HIPAA audits and incidents Badges to South Campus and Data Centers Set up framework for granting groups of users similar access (NT Groups) Audit response and research

Research Access Methodology Data Custodians IRB Data Security Cerner Application Security Expert on Security Design and Development Develop Profiles, Security Classes, Groups Consult with others to design working security Maintain updates from custodians Own the data and who has access to it Design what tokens (transactions) get assigned to which roles Define the roles and how they are allocated to individuals Test, approve design, & approve access Manage User Identity’s & match to predefined access Receive approved requests to create new users ID’s Give access or remove access to/from users Provisioning and De-provisioning Users MGR OLAR Ticket

Research Access - OLAR Where to get the OLAR – WebForms/IS/online_access_request_internal.dochttp://pulse.clarian.org/portal/intranet/home/content?url=/Clarian WebForms/IS/online_access_request_internal.doc –General instructions are on this site What access do I ask for if I’m doing research? –Cerner for physician notes and drugs –Careweb has other medical record information What do I do when the project ends or I’m not longer doing research? –Notify the IRB by completing an OLAR that says to remove your access

OLAR and Responsibility Statement