DHCH IT Orientation Introduction to DHCH Computer and Information Systems.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

About e-Services How to access? How to create user? How to file e-Returns? How to apply for e- Forms? Contact Details Commercial Taxes Department, Govt.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
System Security & Patient Confidentiality General Lesson 1.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Westbrook Technologies from Document Management’s Role in HIPAA.
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Free HIPAA Training BCI Computers Free HIPAA Training (c) 2014 BCI Computers all rights reserved.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
07/15/2007 eCAF SAA User Guide Slide 1 SAA User Guide for eCAF.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Awareness:
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
10 Essential Security Measures PA Turnpike Commission.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
SECURITY: Personal Health Information Protection Act, 2004 this 5 min. course covers: changing landscape of electronic health records security threats.
Clinic Security and Policy Enforcement in Windows Server 2008.
Data Access and Data Sharing KDE Employee Training Data Security Video Series 2 of 3 October 2014.
IT FORUM March 23, 2010 RoyalDrive Tony Gazoo Applications Administrator IT Development & Applications.
1 12 Easy Steps to Complete an Employment Contract Amendment Campus Human Resources Employment & Compensation Services October, 2009.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
CPS Acceptable Use Policy Day 2 – Technology Session.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
IT Infrastructure Transformation – VPN Services 0 Enterprise VPN Don Kendrick, VITA Senior Manager, Security Operations August 25, 2009.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
WORKING EFFECTIVELY IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Corporate Information Systems Delivery of Infrastructure IT Services.
1.1 System Performance Security Module 1 Version 5.
AHS COMPUTING Introduction to Computing. AHS Computing Personnel.
Confidential Data Security Strategies Based upon the ESG “Outside-In” Confidential Data Security Model © 2009 Enterprise Strategy Group Vendor Channel.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
©Holm Publications Security Awareness Presentation.
Chapter 1 Introduction to the Help Desk Introduction to Help Desk Concepts & Skills Mike Meyers’ Computer Skills.
Information Services Overview An introduction to DePaul’s technology especially for new employees.
University Health Care Computer Systems Fellows, Residents, & Interns.
Children’s Hospital Requirements for Remote Access.
Copyright © First Option 2008 First Option WebCheck The 1st Option in IT.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
1 Craig D. Azoff, Director Administrative Information Systems Bill Luecken, Senior Director Information Systems Eric Steinhardt, Security Manager 13 th.
AHS COMPUTING INTRODUCTION TO COMPUTING. AHS COMPUTING PERSONNEL.
Implementing Microsoft Exchange Online with Microsoft Office 365
Introduction TO Network Administration
CAIU Technology Essentials All Staff Day, 2016 Instructor: Stefan Moyer.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
How to CORRECTLY Complete a TEASE Access Request Form.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
Information Technology Nuts and Bolts Presented by Susana Ponte August 19, 2015.
Information Technology Overview Welcome to NC State!
Enterprise | education | public printing locations PrinterOn for Healthcare.
Don Kendrick, VITA Senior Manager, Security Operations
Health Information Professionals
Virtual Private Networks (VPN)
Enterprise Single Sign-On
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Creating a University IT Service Portfolio
Introduction to the PACS Security
Information Technology Montana State University
Presentation transcript:

DHCH IT Orientation Introduction to DHCH Computer and Information Systems

Meet Your IT Personnel José Mickens, Director of IT AV Greene, Project Manager Daniel Gitomer, Analyst Patrick Zabst, Analyst Aligned with DUHS services and strategic initiatives and with Duke Health Technology Solutions (DHTS).

What is Information Systems? Information Systems consist of both technology and people resources. Information Systems impacts on all aspects of DHCH functions from patient care and support services to Administrative information flow and personnel payroll.

Our Goals To provide a broad range of information support services to all DHCH personnel. Manage information to promote safe, quality patient care and efficient decision- making. Provide accurate and timely information in a secure environment.

Confidentiality and Security It is the responsibility of each individual within the Health System to protect the patient’s right of confidentiality. DUHS Confidentiality Agreement Secure System Usage Memo Active Directory (Network Access) Password Policy

Passwords, Security and Access Access to the DHCH network and applications requires a unique user id and password. Passwords expire every 180 days and must be changed to a unique code that is a minimum of eight characters, with a combination of alpha, numeric and symbols. Remote users of DHCH computer systems are required to use an encrypted and secure identification (VPN) to connect to the DHCH network via the Internet Access to computerized patient information is granted based on approval of the employee’s manager. The type and level of access granted is role based and is tailored to the requirements to perform their job. Virus protection is enabled on the DHCH network to include scanning of all computers at start up and when any file is opened, as well as incoming data via .

Systems Network support for the DHCH Entity (4321 office, Wake Office, ICF, UBC, Granville office) Applications Clinical applications – HCM, BZM, MBI Office productivity – MSOffice Enterprise applications – Notes, SAP, Report Xpress Support applications – Remedy Printing, Copying & Scanning Services – Multiple devices throughout the facilities.

Directories Home Directory – H drive Location to maintain user work files Shared Directories – T drive Location of shared work files by department, by function, etc. (Example – Policies Directory) All Network files are backed up nightly and stored in an off-site location for business continuity.

Network Devices Desktop Users Connect to the network via secure wired access Clinical/mobile users Connect via secure wired or wireless access Clinical users are responsible for the appropriate use and protection of the laptop. All users are responsible for the information security – including printed information.

IT Help/Assistance The DHTS Service Desk provides 24x7 coverage for all IT-related requests and issues. Can be reached by Phone Call Via the web:

DHTS Service Desk Tips When contacting the Service Desk, state your Duke Unique ID, your name, department - (DHCH: Duke HomeCare & Hospice), and purpose for calling. Please be specific with any details you can provide. This ensures that the Service Desk routes the request correctly. Phone Calls are automatically marked High priority. Obtain Remedy ticket# to track your call and ensure completion of request. Voic & ed requests are automatically marked Low priority.

This concludes the presentation.