Epic Introduction Basics

Slides:



Advertisements
Similar presentations
Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Perimeter Church Perimeter Network Introduction 2005.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Downloading and Installing AutoCAD Architecture 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the software.
Fire Officer Strategy and Tactics (FOST) State Certification Practical Examination PART “A” May 2009.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Manager Self Service October 15, InSITE Self Service Manager Self Service Presentation This presentation is approximately 10 minutes in length.
Information guide.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
©Holm Publications Security Awareness Presentation.
Using A presentation of the Elmhurst Public Library.
University Health Care Computer Systems Fellows, Residents, & Interns.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
bitdefender virus protection
2.4 Cyber-Safety.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Online Training Course
Welcome! To the ETS – Create Client Account & Maintenance
IT Security  .
Internet Identity, Safety, & Security
Unit 4 IT Security.
Protecting What’s Yours: Your Identity
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Welcome to Week 3 in the computer lab
How to build a good reputation online
Information Security 101 Richard Davis, Rob Laltrello.
Patient Lists For Ambulatory Staff
eKiDs PowerChart Basics
Lesson 1: Epic Advanced Appointment Scheduling
Staying Austin College
Faculty Access Class Rosters & Entering Grades.
Information Security Session November 11, 2004
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Epic Access.
eKiDs Task Management For Ambulatory Staff
PowerChart New User Tutorial
2.4 Cyber-Safety.
Patient Lists Presented by Ambulatory and Physician Informatics,
Lesson 2: Epic Security Considerations
Task Lists For Ambulatory Staff
Part 3.
Epic Introduction Basics
Epic Access This material contains confidential and copyrighted information of Epic Systems Corporation - Confidential.
Lesson 1: Epic Advanced Appointment Scheduling
Epic Introduction Basics
Keep It Safe! Secure Your Secrets
Epic Access.
Lesson 1: Epic Advanced Appointment Scheduling
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
What is Phishing? Pronounced “Fishing”
Presentation transcript:

Epic Introduction Basics Revised December 2012

Epic Introduction Upon successful completion of this course you will be given a UserID/password for Epic View Only access to patient, account and coverage information only. You can only view account information for your department. Additional classroom training will be required for staff that will be responsible for creating patient records and updating patient registration records.

Epic Introduction At the completion of this course there is a hyperlink to the exam. 80% is a passing grade. Please address suggestions and/or feedback via email to IS Training. The address is istrain@chkd.org. The Epic Intro View Only manual is available online on KDNet at “Education>IS Education>Epic Training Manuals and User Guides>Epic Training Manuals>Epic Introduction”. Completion of this tutorial along with using the Epic Intro Basics manual as a reference will provide you with the tools you need to access information with View Only access.

Epic Introduction Objectives: In this session you will learn: General features and capabilities of Epic Security Considerations General Security Awareness

Epic Introduction Epic presents a powerful, graphical user interface for accessing Epic’s applications. All Epic applications have a standard set of conventions for access, navigation, and utilization. Certain functions behave the same throughout each application. By learning these conventions you can use any Epic application to its maximum efficiency.

Epic Introduction Epic provides access to the following Epic features: Scheduling Registration Provider Schedules Internal E-mail Patient Accounting (not covered in this course)

Security Considerations Your username is assigned to you by the IS Department. Usernames can be similar, but they are never the same. William R. Smith’s username could be SMITHWR. Passwords must be at least eight characters in length, no more than 30 characters, must contain at least 1 lowercase letter, must contain at least 1 number, must not contain your username, cannot be words from the password dictionary, must not contain 3 or more consecutive identical characters and cannot repeat any of the previous 24 passwords. The password used for Epic is the same as your active directory password.

Security Considerations Remember to create strong passwords that use a mix of letters, numbers and punctuation; be sure to make it something you can recall. No one should ever ask you for your password for any reason; never share your password with anyone. Report any suspicious activity to Information Services.

Security Considerations If you feel your password has been compromised, change it immediately. Your username coupled with your password makeup your electronic signature.

General Security Awareness Don’t trust unexpected emails/files Most computer viruses enter the network when an employee opens an e-mail attachment. If an attachment arrives unexpectedly, verify who sent it before you open it. Never open attachments from strangers. Never give out your password Never, under any circumstances, should a user give out their password. Watch out for persons attempting to get your password or information through social engineering. Social engineering is a method by which a person impersonates or intimates others to get sensitive information. Report any such cases to Information Services 8-7075

General Security Awareness Use strong p@ssw0rdZ Hackers use tools that automatically try every word in the dictionary as your password. Choose longer, hard-to-guess passwords that contain a mix of letters, numbers, and punctuation. For easy-to-remember passwords, use a line from a poem, song, or movie. Supporting Material: http//kdnet/education/informationservices/iseducation.asp/PswdMgt04.ppt

General Security Awareness Destroy notes containing passwords. More and more, thieves are stealing computer files or passwords from their victims. Notes and post-it notes around your work area containing passwords, account numbers, or other confidential information make it too easy. Clean up. Lock it up to lock them out . Never leave your computer/applications open when you step away from your computer. Locking your PC will help to stop snooping passers by when you leave your desk.

General Security Awareness Stay in safe Web neighborhoods You recognize the dangers of wandering to the tough part of town. Web surfing works the same way. Malicious software is installed on victims’ computers from a number of unsafe sites. If a web site does not look right….it probably is not! Look before you click. Look carefully at links before you click them. Unless you intend to download software, no website/web address should have .exe in it. That indicates an executable program, which could be malicious.

General Security Awareness Just click "no" When you visit a Web site and a box asks, "Should I remember your password?" do not enable it. The password is actually stored on your own computer. Anyone else using your computer can visit your Favorites and log in as you.

General Security Awareness Report suspicious activity Computer not performing as expected, there are more web pages popping up on your screen than clicked on or you notice a program installing and you did not start the installation. These are examples of what is considered suspicious activity on a computer and could indicate that spyware, adaware or remote control programs have been installed without your permission or knowledge. If you experience any of these or other suspicious activity, please call the help desk at 8-7075.

General Security Awareness When in doubt call Information Services Information Services is here for you. If you ever have a question or need to notify us of a problem, give us a call at 8-7075. Only with your help can we maintain the privacy and security of our systems.

End of Chapter 1 Continue to Next Chapter