Lesson 1: Epic Advanced Appointment Scheduling

Slides:



Advertisements
Similar presentations
EWU On-line Application Tutorial. Online Employment System Training for Eastern Washington University Applicants This presentation will take approximately.
Advertisements

How to Use Stowe School District
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Getting Started. Edline Web Site Requirements Provide Students and Parents With: 1.A Brief Course Description 2.Your Address 3.Course Syllabus 4.Major.
Introduction to Online Data Collection (OLDC) Community Based Abstinence Education September, 2009.
Perimeter Church Perimeter Network Introduction 2005.
Welcome to Florida International University Online J.O.B.S. Link Applicant Tutorial.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
1 Welcome to the Colgate University Online Employment System Applicant Tutorial.
Welcome to the Arizona State University Online Employment System Applicant Tutorial.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
LGC Website and Customer On-line Tools LGC RESOURCE 2014.
Start the slide show by clicking on the "Slide Show" option in the above menu and choose "View Show”. or – hit the F5 Key.
Information guide.
IT security By Tilly Gerlack.
EWU On-line Application Tutorial. Online Employment System Training for Eastern Washington University Applicants This presentation will take approximately.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
©Holm Publications Security Awareness Presentation.
Downloading and Installing Autodesk Revit 2016
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Core ELN Training: Office Web Apps (OWA)
Epic for Nursing Students
Welcome! To the ETS – Create Client Account & Maintenance
Internet Identity, Safety, & Security
Unit 4 IT Security.
Creating an Account on Wikieducator
Lesson 3 Safe Computing.
Lawson System Foundation 9.0
– Officiating Management Software
Patient Lists For Ambulatory Staff
eKiDs PowerChart Basics
Lesson 1: Epic Advanced Appointment Scheduling
Staying Austin College
Information Security Session November 11, 2004
Intro to SurgiNet Applications Computer-Based Training
Cybersecurity Awareness
Epic Access.
Clinical Documentation (PowerForms) For Ambulatory Staff
eKiDs Task Management For Ambulatory Staff
PowerChart New User Tutorial
Introduction to FirstNet Applications
Welcome to FOCUS FOCUS website:
Intro to Clinical Documentation Basics Computer-Based Training
Lesson 1: Epic Basic Appointment Scheduling Tutorial
Patient Lists Presented by Ambulatory and Physician Informatics,
SurgiNet Case Tracking Computer-Based Training
Clinical Documentation (PowerForms) For Ambulatory Staff
Lesson 2: Epic Security Considerations
Task Lists For Ambulatory Staff
Epic Introduction Basics
Lesson 1: Epic Basic Appointment Scheduling Tutorial
Epic Access This material contains confidential and copyrighted information of Epic Systems Corporation - Confidential.
Two methods to observe tutorial
Epic Introduction Basics
Epic Access.
Lesson 1: Epic Advanced Appointment Scheduling
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Epic Introduction Basics
self-paced eLearning series
Lesson 1: Epic Basic Appointment Scheduling Tutorial
Welcome to the Second Tutorial
Navigating NEIU Blackboard 417 – 418a
Presentation transcript:

Lesson 1: Epic Advanced Appointment Scheduling

Epic Advanced Appointment Scheduling In this lesson you will learn to: ─ Use this tutorial ─ Navigate within the tutorial ─ Lessons to be covered - Log in to Epic Let’s get started!

How to Use This Tutorial To start a lesson, click once on the Lesson Name and click the Open button. Click once anywhere on the slide to move forward to the next slide. This is a passive Computer Based Training program. When reading the presentation, it will tell you that a specific button needs to be clicked. This is for the live program. The action buttons in this presentation will not respond to clicking. You can also navigate by clicking the Right mouse button anywhere on the slide. Select the Advance (Next) option from this menu to move forward to the next slide. Select the Reverse (Previous) option to move back to the previous slide. Select Full Screen for maximized view of the tutorial slides. Select End Show to exit the lesson. Click the Back button on your Internet Explorer toolbar at any time to Exit the lesson. On the lesson Summary slide, click the ‘Lesson Name’ hyperlink to launch the next lesson in the tutorial.

Purpose of This Tutorial This tutorial provides instruction on how to create advanced appointments in Epic Hyperspace and use the many options available in Epic Scheduling. Your on-site trainer should provide you with a copy of the Epic Scheduling manuals. This manual is also available for printing from KDnet: Education/IS Education/Epic Training Manuals and User Guides/Epic Training Manuals/Scheduling. Complete all the lessons in the Epic Basic Scheduling and Epic Advanced Scheduling PowerPoint presentations. You must pass the Epic Basic Scheduling and Epic Advanced Scheduling tests with a minimum score of 80%. Questions that you have regarding the information presented in this tutorial should be directed to your on-site trainer. The on-site trainer will support your hands-on activities for the concepts presented in this tutorial.

Course Contents Lesson 1: Epic Advanced Appointment Scheduling Lesson 2: Epic Check In Lesson 3: Epic Check Out Lesson 4: User Batch Report Lesson 5: Epic Past Appointment Scheduling

Course Contents Lesson 6: Epic Advanced Joint Appts Lesson 7: Epic Advanced Sequential Appointments Lesson 8: Epic Advanced Recurring Appointment Lesson 9: Epic Walk In Appts

Course Contents Lesson 10: Epic Viewing Providers Schedule Lesson 11: Expand and Edit Providers Schedule Lesson 12: Epic End of Day Procedure Lesson 13: Epic Scheduling Reports

Epic Security Considerations In this lesson you will learn: ─ Password creation ─ Security Considerations ─ Where to find support material ─ Safety measures ─ Who to contact for security concerns

Epic Security Considerations Your username is assigned to you by the IS Department. Usernames can be similar, but they are never the same. William R. Smith’s username could be SMITHWR. Passwords must be at least eight characters in length and contain one number. No more than 32 characters, cannot be dictionary words, cannot be reused, and must contain at least one number. The FIRST TIME you login, enter your username; enter the same password as you used for logging into Citrix. This is your active directory password and it is used for Epic as well.

Epic Security Considerations Remember to create strong passwords that use a mix of letters, numbers and punctuation. Be sure to make it something you can recall. No one should ever ask you for your password for any reason; never share your password with anyone. Report any suspicious activity to Information Services.

Epic Security Considerations If you feel your password has been compromised, change it immediately. When changing a password, you may not reuse a password for 180 days. You must change it at the Citrix/Network level. That password is used in Epic. Your username coupled with your password makeup your electronic signature.

Epic Security General Security Awareness Don’t trust unexpected emails/files. Most computer viruses enter the network when an employee opens an e- mail attachment. If an attachment arrives unexpectedly, verify who sent it before you open it. Never open attachments from strangers. Never give out your password Never, under any circumstances, should a user give out their password. Watch out for persons attempting to get your password or information through social engineering. Social engineering is a method by which a person impersonates or intimates others to get sensitive information. Report any such cases to Information Services 8-7075.

Epic Security General Security Awareness Use strong p@ssw0rdZ. Hackers use tools that automatically try every word in the dictionary as your password. Choose longer, hard-to- guess passwords that contain a mix of letters, numbers, and punctuation. For easy-to-remember passwords, use a line from a poem, song, or movie. Supporting Material: http//kdnet/chkd.nt/education/informationservices/Ps wdMgt04.ppt

Epic Security General Security Awareness Destroy notes containing passwords. More and more, thieves are stealing computer files or passwords from their victims. Notes and post-it notes around your work area containing passwords, account numbers, or other confidential information make it too easy. Clean up! Lock it up to lock them out . Never your leave your computer/applications open when you step away from your computer. Locking your PC will help to stop snooping passers by when you leave your desk.

Epic Security General Security Awareness Stay in safe Web neighborhoods. You recognize the dangers of wandering to the tough part of town. Web surfing works the same way. Malicious software is installed on victims’ computers from a number of unsafe sites. If a web site does not look right….it probably is not! Look before you click. Look carefully at links before you click them. Unless you intend to download software, no website/web address should have .exe in it. That indicates an executable program, which could be malicious.

Epic Security General Security Awareness Just click "no." When you visit a Web site and a box asks, "Should I remember your password?" do not enable it. The password is actually stored on your own computer. Anyone else using your computer can visit your Favorites and log in as you.

Epic Security General Security Awareness Report suspicious activity Your computer is not performing as expected, there are more web pages popping up on your screen than clicked on or you notice a program installing and you did not start the installation. These are examples of what is considered suspicious activity on a computer and could indicate that spyware, adaware or remote control programs have been installed without your permission or knowledge. If you experience any of these or other suspicious activity, please call the help desk at 8-7075.

Epic Security General Security Awareness When in doubt call Information Services Information Services is here for you. If you ever have a question or need to notify us of a problem, give us a call at 8-7075. Only with your help can we maintain the privacy and security of our systems.