Security Classes: Give An End User Access To Activites Flashcards

0
Q

Security classes

A

Group of security points ( keys on a key ring) assigned to the appropriate groups of users. Accessed from clin admin or hyperspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are security points

A
Individual keys to pieces of functionality. Each activity is associated with one or more security points. Some security points grant access to specific functionality within various activities.
Refers to by the type of security class they are found in and a number. Most security points are permissive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of security classes

A

Different group of keys ex. Caesar keys, Jeanette keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where do you go to change the EpiCare Security class

A

User template are change in user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What function does security perform in EPIC

A

Security controls access to functionality what a user is or is not allowed to do in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the difference between a security class and a security point

A

A security point grants access to a single piece of functionality, it’s like a key. A security class is a collection of security points, like a key ring. Users are linked to a security classes either directly or via a template; users are not linked directly to security points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which three security classes does every user need

A

In basket
Report workbench
Shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of security controls access to hospital functionality like the MAR and DOC Flowsheets

A

EpiCare inpatient security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your organization wants the charge RN to have administrative access to the Pt list activity ( Inpt security - pt list administrator). Otherwise their list should be the same as inpt RN ( who use the MODEL IP RN inpt security class). How would you efficiently take care of this need?

A

duplicate the MODEL and call it IP CHARGE RN. Add to the duplicate the desired security point. Link all charge RN user records to this duplicate security class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are trying to build a sub template, but the items you want are all grayed out. What did you forget?

A

You forgot to put those items in the defined column of the items defined form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the foundation security classes

A

EPIC preconfigured security classes that can be used right outs of the box. Use as a staring point and validate to determine if it meet your needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security levels

A

You can not assign someone a security level higher than your own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a sub template

A

A template within a template to meet the needs of a few. Sub templates can add or override the template. Can be ranked 1-7, 1 is given the top priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly