Security Flashcards
What is the Ser Master file?
````````````The provider (SER) master file can be thought of as a directory of clinicians and resources affiliated with your organization. The provider master file includes one record for every clinician who provides care to your patients, as well as other schedulable resources.
What is clinical authority?
A person’s provider record also records their clinical authority, including whether they can:
Authorize medications or other orders
write orders in the hospital
admit or attend on patients
A provider record is also used to track referrals to or from a particular provider.
True or False: There is one provider (Ser) record for each person or resource meeting?
True, there is one provider (ser) record or each person or resource meeting ANY of the following criteria:
* C has credentials
*A Authorizes orders
*R Can be referred to or send referrals
*S- Can be scheduled
What is the EMP Master file?
The User master file contains one record for every person who logs into your instance of EPIC. your user records contain your login ID and password and links to security settings that determine what functionality you can access.
If someone needs to log into the system to complete their job, what user do they use?
They need a user record.
What type of templates are EMP records?
User templates are EMP records that are used to configure groups of users. they allow for build and maintenance of user settings in one location that is linked to by other user records. For instance, all inpatient nurses can be assigned the same template which controls their security, user role, and more. If a change is needed, it can be made once in the template instead of needing to update each nurses user record individually.
What is the ECL master File?
It is security and it is used to give access or permission to activities and information within EPIC.
What does Security (ECL) do?
Security is used to give access or permission to activities and information within EPIC.
- Video-They collect information about what a user is able to do. It is a key ring/card lets people do things. access to functionality. Depending on the security class, it lets you run reports, edit criteria, create public report columns, edit query template.
What are the two key security concepts:
Security points and Security class
What does security point do?
Security point grants access to one feature within epic. Think of these like a key that grants you access to one room.
If a user has a security point, they have access to an activity. if they do not have the required security point, then the activity will not be available to them; they wont even see it.
What does security class do?
security class does grouping of security points that grant access to related activities and functionality in an epic application. Think of this as a ring of keys.
True or False: security classes are application specific?
True, security classes are application specific and attach to a user or template record. Any given user could have upwards of 15- different key rings (Security classes) depending on their job responsibilities. The more applications they need to access, the more security classes they will have.
What is a user role (E2R)?
The user role record defines the visual appearance (or layout) of hyperspace. It works very closely with security in determining how a user can get to a given activity. It is attached to a user or template record and is required to log in to Hyperspace.
The Cogito form in the user security can be used across all of our tools to limit which data a user sees in their results. What are some examples of when these values ?
*Some slicerdicer data models require a user to have an authorized service area. Without one, the data model is completely inaccessible.
*SlicerDicer data models can filter results automatically using the service areas listed.
*Many workbench templates use required “Dynamic” Parameters that filter by these values whenever the report is run. This means two users running the same HRX would see different results cased on the values stored here.
*Dashboard summary level parameter selection is limited to the values stored here for all users viewing a dashboard.
For user roles in the security section, what do user roles define?
The user role record defines the visual appearance (or layout) of hyperspace.