technology TTT 1 Flashcards
(16 cards)
what are the different components of google workspace?
gmail, drive, chat, calendar, meet, docs, sheets, slides, forms
PHI
protected health information
how is safe PHI transmission ensured?
using google workspace which protects transmission of such information under a business associate agreement (BAA)
what information constitutes PHI?
any information that could identify an individual.
what are additional precautions in our policies that further aid the safety of PHI?
omit protected information whenever possible. ensure all recipients have a right to information before sending. set strong passwords. two factor authentication. log in and out everytime you use platform, avoid suspicious emails/attatchements
what do we not do to help the protection of PHI
don’t save passwords on shared devices, don’t save any documents contains PHI to personal devices, don’t use save to cloud or website services, don’t use software products
what do you do if you suspect a security breach or inappropriate disclosure of PHI?
report using REport a Data Breach form linked on LC Homebase
When are you able to share documents and other information from Drive outside of the organization?
only when you have obtained express written permission from management.
what are the expectations about logging into and out of google account?
log in/out everytime
what shield you do if you are unsure how to use any aspect of google workspace?
job aids found in the Headquarters Drive or links in the Using Technology Reference Guide
how do we protect PHI in CentralReach/percision x
strong/unique passwords, log in/out everytime
should you send PHI through gmail or central reach given the choice?
central reach
personal information in zenefits
keep personal information up to date and upload them in a timely manner.
how to sign out an electronic device for use outside of the clinic?
Fill out sing out sheet on front desk. clinical manager must mark the sign out sheet as approved.
when should electronic devices be used at the LC?
buisness use only, ensure protection of PHI.
what precautions should be used with personal devices?
use passcodes, avoid giving access to PHI through unstable networks/opening it in public locations/physical access. don’t take photos of clients.