Lesson 8 & 9 Flashcards

1
Q

Based on what you have learned about types of security classes, which type of security class do you think you’ll need to edit for your pediatricians who can’t edit allergies in an office visit?

A

EpicCare security class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where do you need to go to change the EpicCare security class for Andy and the rest of your pediatricians?

A

User (EMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What function does security perform in Epic?

A

Security controls access to functionality—what a user is or is not allowed to do in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the difference between a security class and a security point.

A

A security point grants access to a single piece of functionality; it’s like a key. A security class is a collection of security points, like a key ring. Users are linked to security classes either directly or via a template; users are not linked directly to security points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which three security classes does every user need?

A

In Basket, Shared, and Reporting Workbench

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of security controls access to hospital functionality, like the MAR and Doc Flowsheets?

A

Inpatient security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your organization wants its hospital charge nurses to have administrative access to the Patient List activity (Inpatient security point 1 – Patient List Administrator). Otherwise, their access should be the same as that of other inpatient nurses (who use the IP NURSE Inpatient security class). How would you efficiently take care of this need?

A

Duplicate the IP NURSE Inpatient security class, and call the duplicate something like IP CHARGE NURSE. Add to the duplicate the desired security point. Link all of the charge nurses’ user records (or a charge nurse user template) to this duplicate security class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define security class

A

The Foundation System contains security class records. These are designed to meet the needs of particular groups of users, like physicians who use EpicCare Ambulatory or unit clerks who use EpicCare Inpatient. As much as possible, these security classes are meant to be useable out of the box. You can assign these security classes to your end users with little or no modification.

Grouping of security points that grant access to related activities and functionality in an Epic application. Think of this as a ring of keys (security points).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define security point

A

Security points are individual keys to pieces of Epic functionality. Each activity (like Chart Review) is associated with one or more security points. If a user has the security point, he has access to the activity. If he does NOT have the required security point, then he will not be able to launch the activity. In most cases, the user won’t even see the activity.

Grants access to one feature within Epic. Think of these like a key that grants you access to one room.

If a user has a security point, they have access to an activity. If they do NOT have the required security point, then the activity will not be available to them; they won’t even see it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What Does a Role Control?

A

Roles are records in the E2R master file that define how Hyperspace looks and behaves for a group of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

At any time, your pediatrician should see their startup activities (Dashboard, Schedule, and Patient Lists) and up to 3 patient charts. What is the number of maximum workspaces that should be specified in their role? Explain.

A

Four. The Dashboard, Schedule, and Patient Lists activities collectively make up the Startup Activity for your pediatricians. The Startup Activity constitutes one workspace. With the addition of 3 patient charts, the maximum number of workspaces should be 4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who will be affected by the change you made to the role?

A

The role is attached to a user template. Every user linked to the user template will be affected by the change you made to the role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ______________ field allows you to list more than one role record.

A

Default User Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What function does the role record perform in Epic?

A

A role record determines the layout and ground rules of Hyperspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name two things that are defined by your role record.

A

Roles define your default Startup Activity, the Hyperspace toolbar, options under the Epic button, the maximum number of workspaces a user can have open, automatic timeout settings, and whether your user’s last login department will default the next time she logs in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the difference between role and security.

A

Security determines a user’s access to functionality. Role determines where that functionality will appear for a user in Hyperspace.

17
Q

Define role

A

Determines the look and feel of Hyperspace for a user. For example, the user role controls the home workspace that appears when the user logs in and the application toolbar options that are available.

18
Q

Define descriptor

A

A string identifier for a Chronicles record, which usually must be unique. This is not the same as a record’s ID (.1) or name (.2).

19
Q

Define startup activity

A

Comes up when the user logs in to department. The main place where users or administrators enter and view data in Hyperspace. For example, the Order History activity is used to view information for an order and the Medications activity is used to manage a patient’s prescriptions. An activity can consist of a form, a report, or a series of forms.

20
Q

The effect a user’s role has on Hyperspace

A

The User Role defines the visual appearance or layout of Hyperspace. It works very closely with security in determining how a user can get to a given activity. It is attached to the user or template. Some of the things a role controls include:
What activities open upon logging in
What buttons you have across your top toolbar and under the Epic button
How long the system will stay idle before logging you out

Tip
Dr. Whitecoat has access to Chart Review, Medications, and Notes because of his security. He uses the Chart Review activity frequently, so it is a button on his Hyperspace toolbar. Medications and Notes he uses less frequently, so he has other ways of getting to those activities.

Tip
Security and Role can both be attached to the user or template. Because they often determine scope, they are typically shared by users with the same job role.

21
Q

The difference between what security impacts and what a role impacts

A

Security is used to give “access” or “permission” to activities and information within Epic. There are two key security concepts: security points and security classes.

The User Role defines the visual appearance or layout of Hyperspace. It works very closely with security in determining how a user can get to a given activity. It is attached to the user or template. Some of the things a role controls include:
•What activities open upon logging in
•What buttons you have across your top toolbar and under the Epic button
•How long the system will stay idle before logging you out