Top Banner
Good Computing Practices Volunteer Training Module Open Door Clinic
12

Good Computing Practices

Jun 19, 2015

Download

Technology

Megan Rivard

Basic privacy and HIPAA training module for the Open Door clinic.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Good Computing Practices

Good Computing

Practices

Volunteer Training ModuleOpen Door Clinic

Page 2: Good Computing Practices

PasswordsUse cryptic passwords that can’t be easily guessed and protect your passwords – don’t write them down and don’t share them!

Page 3: Good Computing Practices

Lock Your ScreenFor a PC <ctrl> <alt> <delete> <enter>

For a Mac Configure screensaver with your password Create a shortcut to activate screensaver Use a password to start up or wake-up your computer

Page 4: Good Computing Practices

Workstation SecurityPhysically secure your area and data when unattended.

Page 5: Good Computing Practices

Portable DevicesDon’t keep confidential data on portable devices.Back up your data

• Make backups a regular task, ideally at least once per day.• Backup data to your department’s secure server or store on

removable media such as CD-RW or a USB memory stick.• Store backup media safely and separately from the

equipment. Remember, your data is valuable!

Page 6: Good Computing Practices

Manage Confidentia

l Data

Know where data is stored.• Destroy confidential data which is no longer needed• Erase/degauss information before disposing of or

reusing drives• Protect confidential data that you keep• Back-up your data to a departmental server

Page 7: Good Computing Practices

AntivirusMake sure your computer has anti-virus and all necessary security patches.

Page 8: Good Computing Practices

Computer Security

Do not install unknown or unsolicited programs on your computer.

Page 9: Good Computing Practices

EmailPractice safe

emailing

• Don’t open, forward, or reply to suspicious emails• Don’t open suspicious email attachments or click on

unknown website addresses • Delete spam • Before emailing patients, confirm a valid email consent

is in the medical record

Page 10: Good Computing Practices

Safe Internet Use

• Accessing patient information electronically can be tracked back to your User ID and computer and defines the documents and time spent accessing the records. • Accessing sites with questionable content often results in spam or release of viruses.• And it bears repeating…Don’t download unknown or unsolicited programs!

Page 11: Good Computing Practices

Report Security

Incidents

• Report lost or stolen laptops, Blackberries, PDAs, cell phones, flash drives, etc…

• Loss or theft of any computing device MUST be reported immediately to the Open Door staff

• This also applies for loss/theft of PHI in hardcopy format (paper, films etc).

Page 12: Good Computing Practices

Summary of Safeguards

1. Passwords2. Lock Your Screen3. Workstation Security4. Portable Device5. Data Management6. Anti Virus7. Computer Security8. Email9. Safe Internet Use10. Reporting Security Incidents/Breach