12
Good Computing Practices Volunteer Training Module Open Door Clinic

Good Computing Practices

Embed Size (px)

DESCRIPTION

Basic privacy and HIPAA training module for the Open Door clinic.

Citation preview

Page 1: Good Computing Practices

Good Computing

Practices

Volunteer Training ModuleOpen Door Clinic

Page 2: Good Computing Practices

PasswordsUse cryptic passwords that can’t be easily guessed and protect your passwords – don’t write them down and don’t share them!

Page 3: Good Computing Practices

Lock Your ScreenFor a PC <ctrl> <alt> <delete> <enter>

For a Mac Configure screensaver with your password Create a shortcut to activate screensaver Use a password to start up or wake-up your computer

Page 4: Good Computing Practices

Workstation SecurityPhysically secure your area and data when unattended.

Page 5: Good Computing Practices

Portable DevicesDon’t keep confidential data on portable devices.Back up your data

• Make backups a regular task, ideally at least once per day.• Backup data to your department’s secure server or store on

removable media such as CD-RW or a USB memory stick.• Store backup media safely and separately from the

equipment. Remember, your data is valuable!

Page 6: Good Computing Practices

Manage Confidentia

l Data

Know where data is stored.• Destroy confidential data which is no longer needed• Erase/degauss information before disposing of or

reusing drives• Protect confidential data that you keep• Back-up your data to a departmental server

Page 7: Good Computing Practices

AntivirusMake sure your computer has anti-virus and all necessary security patches.

Page 8: Good Computing Practices

Computer Security

Do not install unknown or unsolicited programs on your computer.

Page 9: Good Computing Practices

EmailPractice safe

emailing

• Don’t open, forward, or reply to suspicious emails• Don’t open suspicious email attachments or click on

unknown website addresses • Delete spam • Before emailing patients, confirm a valid email consent

is in the medical record

Page 10: Good Computing Practices

Safe Internet Use

• Accessing patient information electronically can be tracked back to your User ID and computer and defines the documents and time spent accessing the records. • Accessing sites with questionable content often results in spam or release of viruses.• And it bears repeating…Don’t download unknown or unsolicited programs!

Page 11: Good Computing Practices

Report Security

Incidents

• Report lost or stolen laptops, Blackberries, PDAs, cell phones, flash drives, etc…

• Loss or theft of any computing device MUST be reported immediately to the Open Door staff

• This also applies for loss/theft of PHI in hardcopy format (paper, films etc).

Page 12: Good Computing Practices

Summary of Safeguards

1. Passwords2. Lock Your Screen3. Workstation Security4. Portable Device5. Data Management6. Anti Virus7. Computer Security8. Email9. Safe Internet Use10. Reporting Security Incidents/Breach