Security Flashcards
What is the Ser Master file?
````````````The provider (SER) master file can be thought of as a directory of clinicians and resources affiliated with your organization. The provider master file includes one record for every clinician who provides care to your patients, as well as other schedulable resources.
What is clinical authority?
A person’s provider record also records their clinical authority, including whether they can:
Authorize medications or other orders
write orders in the hospital
admit or attend on patients
A provider record is also used to track referrals to or from a particular provider.
True or False: There is one provider (Ser) record for each person or resource meeting?
True, there is one provider (ser) record or each person or resource meeting ANY of the following criteria:
* C has credentials
*A Authorizes orders
*R Can be referred to or send referrals
*S- Can be scheduled
What is the EMP Master file?
The User master file contains one record for every person who logs into your instance of EPIC. your user records contain your login ID and password and links to security settings that determine what functionality you can access.
If someone needs to log into the system to complete their job, what user do they use?
They need a user record.
What type of templates are EMP records?
User templates are EMP records that are used to configure groups of users. they allow for build and maintenance of user settings in one location that is linked to by other user records. For instance, all inpatient nurses can be assigned the same template which controls their security, user role, and more. If a change is needed, it can be made once in the template instead of needing to update each nurses user record individually.
What is the ECL master File?
It is security and it is used to give access or permission to activities and information within EPIC.
What does Security (ECL) do?
Security is used to give access or permission to activities and information within EPIC.
- Video-They collect information about what a user is able to do. It is a key ring/card lets people do things. access to functionality. Depending on the security class, it lets you run reports, edit criteria, create public report columns, edit query template.
What are the two key security concepts:
Security points and Security class
What does security point do?
Security point grants access to one feature within epic. Think of these like a key that grants you access to one room.
If a user has a security point, they have access to an activity. if they do not have the required security point, then the activity will not be available to them; they wont even see it.
What does security class do?
security class does grouping of security points that grant access to related activities and functionality in an epic application. Think of this as a ring of keys.
True or False: security classes are application specific?
True, security classes are application specific and attach to a user or template record. Any given user could have upwards of 15- different key rings (Security classes) depending on their job responsibilities. The more applications they need to access, the more security classes they will have.
What is a user role (E2R)?
The user role record defines the visual appearance (or layout) of hyperspace. It works very closely with security in determining how a user can get to a given activity. It is attached to a user or template record and is required to log in to Hyperspace.
The Cogito form in the user security can be used across all of our tools to limit which data a user sees in their results. What are some examples of when these values ?
*Some slicerdicer data models require a user to have an authorized service area. Without one, the data model is completely inaccessible.
*SlicerDicer data models can filter results automatically using the service areas listed.
*Many workbench templates use required “Dynamic” Parameters that filter by these values whenever the report is run. This means two users running the same HRX would see different results cased on the values stored here.
*Dashboard summary level parameter selection is limited to the values stored here for all users viewing a dashboard.
For user roles in the security section, what do user roles define?
The user role record defines the visual appearance (or layout) of hyperspace.
In the section of User Role (E2R), it talks about user role records, What are some things a role record controls?
Some of the controls are:
What startup open automatically upon logging into hyperspace
What buttons you have access your hyperspace toolbar and under the epic menu
How long the system will stay idle before logging you out.
In a workbench report action security, what are the two main types of actions that can appear at the top of a report?
Activity based actions and extension based actions.
In workbench report action security what is an activity based action?
An activity based action jumps the user to a place in hyperspace. This could be opening the patients chart, creating an encounter, or opening any other activity. These types of actions are assigned to the template in the template editor.
In workbench report action security what is an extension-based action?
Extension based actions execute M code when click. This could include setting a flag in a record or populating data in a record.
How would you assign extension based actions to templates and reports?
Assign extension-based actions to templates and reports on the actions tab of the analytics system settings activity.
True or False: Extension based actions are records in the HGA master file?
True, extension based actions are records in the HGA master file. to view the action groups on an extension based action, find the record in the record viewer.
What are report groups?
Report groups are the primary means of distributing cogito content.
When is a user granted access to content?
A user is granted access to content if both of the following are true.
- The user has a security class that grants them the appropriate functionality to view/run that content.
- the user and content share at least one report group.
How would you determine who may see a template and its reports?
Assigning a report group to a template is just one part of making a template available to users. For a template to be available. it must be configured. For a template to be configured, it must have:
*One report type assign to it
*at least one report group.