Best IT Documents.com Blog


Sample Word – POC Imprivata Hardware – Software Resources

Comments Off on Sample Word – POC Imprivata Hardware – Software Resources

Sample Word – Single Sign-on Application Wrapper Standard Specifications

Posted in Information Rights Management (100),Policies - Standards (600) by Guest on the August 16th, 2015
Comments Off on Sample Word – Single Sign-on Application Wrapper Standard Specifications

Sample Word – Clinical Radiology Provisioning Architecture (PACs)

Free Word document download

HIPAA, HITech / HITrust

Clinical PACS System Detailed Information for provisioning

 

Comments Off on Sample Word – Clinical Radiology Provisioning Architecture (PACs)

IT Security Guideline – Emergency Access Controls and Password Use

This procedure is to ensure that access controls do not interfere with critical and timely access to patient information.

This is to be accomplished by the following:

Prepare 2 packets of sealed envelopes with full access information and store it in a secure area. The accesses included in each packet are Network, Meditech, ChartMaxx and Dictaphone.

Passwords are to require user to change them the first time they access the system(s).

Provide doctors and nurses with full access including username and password.

After this emergency access process is activated, IT management must be notified as soon as reasonably possible.

After these emergency access capabilities are used, a full audit must be conducted.

After emergency access is no longer needed, accounts will be deactivated and new emergency accounts are to be created for use in the next emergency situation.

Comments Off on IT Security Guideline – Emergency Access Controls and Password Use

Sample Word – Identity Management-Vendor Discovery RFP

Posted in Compliances (1300),Information Rights Management (100) by Guest on the July 16th, 2015

Sample Word document download

Identity Management-Vendor Discovery RFP

 

Comments Off on Sample Word – Identity Management-Vendor Discovery RFP

HR Operating Policies and Procedures to Ensure Proper Access Removal

Reference:

Security Guideline Physical and Environmental Security of Information Technology Resources.

  • HR will ensure proper pre-employment screening of employee prior to employment. Reference HR Policy #.
  • Upon completion of the HR pre-employment screening, Department Directors or designee will complete access request via User Access Request Site for appropriate access to applications. Link is available on Intranet under Information Technology. Reference procedure Validate Entity Prior to Granting Access.

Procedure:

  1. TS Managers will ensure all combination locks are changed upon an employees’ termination.
  2. TS Managers will coordinate with Security to ensure employees are removed from all access lists upon employees’ termination.
  3. Upon receipt of a termination via email, notifiers from both applications and systems teams will deactivate Application and Network access.
  4. TS Managers will ensure all keys, tokens, cards, etc. that permit access are returned to them upon employees’ termination. Reference HR Policy.

Deactivation of Application accounts inactive for 90-days:

  1. Run application report USER>users.with.exp.password, Report shows users who have not been active in the last 4 months by default.
  2. Inactivate users listed. DO NOT inactivate non-users as indicated by an X in the user type column!
  3. Use discretion when inactivating Users. This link is used by PCI in lookups.
  4. Any time an account needs to be reactivated, even on the accounts deactivated per 90 day policy, please refer to procedure “Access Establishment and Modification”.
Comments Off on HR Operating Policies and Procedures to Ensure Proper Access Removal
Next Page »