New Hire Orientation Ppt


Published on

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Updated 1-12-2007 IT New Hire Orientation is now on the 2 nd day of New Hire from 11AM to 1130AM.
  • New Hire Orientation Ppt

    1. 1. Information Technology Services
    2. 2. Agenda <ul><li>What is the IT Support Center? </li></ul><ul><li>HIPAA Security Rule </li></ul><ul><ul><li>Password management </li></ul></ul><ul><ul><li>Privacy expectations </li></ul></ul><ul><ul><li>Viruses and malicious code </li></ul></ul><ul><ul><li>Workstation security </li></ul></ul><ul><li>Internet & e-mail </li></ul><ul><li>Phishing </li></ul><ul><li>Software guidelines </li></ul><ul><li>Ask questions any time! </li></ul>
    3. 3. Information Technology Support Center <ul><li>The Bronson Information Technology Support Center is here to assist you with your information technology needs. Contact us any time to report an issue. </li></ul><ul><ul><li>Phone: ext. 6330 (Available 24/7/365) </li></ul></ul><ul><ul><li>Email: [email_address] </li></ul></ul><ul><ul><li>In Person: Lovell Building, Suite 54 </li></ul></ul><ul><ul><li>On the Web: </li></ul></ul>
    4. 4. What to Call For? <ul><li>Computer issues </li></ul><ul><li>Printer issues </li></ul><ul><li>Telecom issues: </li></ul><ul><ul><li>telephone, patient phones, pagers, Nextel/Sprint cell phone, voicemail, clinical wireless phone issues, and more </li></ul></ul><ul><li>User account requests </li></ul><ul><li>Software requests </li></ul><ul><li>PACS Issues </li></ul><ul><li>Time clock issues </li></ul><ul><li>Or just to ask a question! ext. 6330 </li></ul>
    5. 5. How Can You Help? <ul><li>Restart your PC daily </li></ul><ul><li>Power off / on printers </li></ul><ul><li>Check cables and power </li></ul><ul><li>Logoff your PC when done </li></ul><ul><li>Save your files often </li></ul>
    6. 6. HIPAA <ul><li>What does HIPAA stand for? </li></ul><ul><ul><li>Health Insurance Portability & Accountability Act </li></ul></ul><ul><li>Why does HIPAA exist? </li></ul><ul><ul><li>Confidentiality – Information is secure </li></ul></ul><ul><ul><li>Integrity – Information is correct </li></ul></ul><ul><ul><li>Availability – Information is there when needed </li></ul></ul><ul><li>Two major components of HIPAA: </li></ul><ul><ul><li>Privacy: </li></ul></ul><ul><ul><ul><li>BHG Privacy Officer is Chris Sangalli, ext. 8590 </li></ul></ul></ul><ul><ul><li>Security: </li></ul></ul><ul><ul><ul><li>BHG IT Security Officer is Halle’ Hudson, ext. 6537 </li></ul></ul></ul>
    7. 7. HIPAA – Privacy & Security Rule <ul><li>HIPAA Guidelines for electronic Protected Health Information (PHI) help keep patient information confidential, available, and accurate. </li></ul><ul><li>Healthcare institutions rely on computer systems to handle their patient health information. </li></ul><ul><li>Without good security procedures in place patient health information could be compromised. </li></ul>
    8. 8. HIPAA – Security Rule, What Every Bronson Computer User Should Know! <ul><li>Password management </li></ul><ul><li>Workstation security </li></ul><ul><li>Computer viruses </li></ul><ul><li>Privacy and auditing </li></ul>
    9. 9. Password Management <ul><li>Choose a strong secure password </li></ul><ul><ul><li>At least six characters </li></ul></ul><ul><ul><li>Use punctuation, letters and numbers </li></ul></ul><ul><ul><li>Change passwords every 90 days </li></ul></ul><ul><li>Know the difference between a strong and weak password </li></ul><ul><ul><li>No employee numbers </li></ul></ul><ul><ul><li>No first name, last name </li></ul></ul><ul><ul><li>No short passwords or easily guessed </li></ul></ul>
    10. 10. Password Management (continued) <ul><li>Keep your password private </li></ul><ul><ul><li>Do not write </li></ul></ul><ul><ul><li>Do not post </li></ul></ul><ul><ul><li>Do not share </li></ul></ul><ul><li>If you suspect your password is compromised, call ext. 6330 ! </li></ul>
    11. 11. System Access Form <ul><li>Purpose of Form </li></ul><ul><li>An agreement to abide by the rules of BHG System Access Policy </li></ul><ul><li>Protection for your System Access, in case you forget your password </li></ul><ul><li>By providing the IT Support Center with information that only you know, they can verify your identity and then assist you in resetting your password </li></ul>
    12. 12. Workstation Security & Management <ul><li>Workstations are your point of contact with Bronson’s network and patient information. </li></ul><ul><li>In public areas do not give others the opportunity to “shoulder surf” sensitive information. </li></ul><ul><li>Log off clinical applications before you walk away from the workstation. </li></ul><ul><li>If workstations need to be secured so no one can access “lock” the PC before walking away. </li></ul><ul><li>Please do not feed the computers! </li></ul><ul><ul><li>Keep food and drinks away from computers </li></ul></ul><ul><li>Contact the IT Support Center at ext. 6330 for assistance with your workstation. </li></ul>
    13. 13. Computer Viruses & Malicious Code <ul><li>What is a computer virus? </li></ul><ul><ul><li>Any program that performs an action on your computer that you are not aware of or have authorized to do. </li></ul></ul><ul><li>What does a computer virus do? </li></ul><ul><ul><li>Anything from shutting down your computer to revealing information about your computer you may not want to share </li></ul></ul><ul><li>Commonly known versions of malicious code: </li></ul><ul><ul><li>Computer viruses </li></ul></ul><ul><ul><li>Worms </li></ul></ul><ul><ul><li>Trojan horses </li></ul></ul><ul><li>How does malicious code spread? </li></ul><ul><ul><li>Peer-2-Peer (P2P) file sharing programs </li></ul></ul><ul><ul><li>Instant messengers </li></ul></ul><ul><ul><li>Spyware / Junkware downloaded from the Internet </li></ul></ul><ul><ul><li>E-mail attachments </li></ul></ul><ul><li>Suspect a virus on your computer? </li></ul><ul><ul><li>Contact the Support Center at ext.6330 </li></ul></ul>
    14. 14. Privacy & Auditing Expectations <ul><li>All computer activity is tracked, monitored and reviewed </li></ul><ul><ul><li>BHG Management, HR & Risk Management may request an audit of computer accounts or patient health information (PHI) at any time. </li></ul></ul><ul><li>Patient Information </li></ul><ul><ul><li>Share confidential information only when necessary. </li></ul></ul><ul><ul><li>DO NOT e-mail confidential information. </li></ul></ul><ul><ul><li>All patient information sent outside of Bronson must follow established procedures. </li></ul></ul><ul><ul><li>DO NOT access your own medical record. </li></ul></ul><ul><li>See your manager for specifics for handling department’s confidential information. </li></ul>
    15. 15. HIPAA – Security Rule, What Every Bronson Computer User Should Know! ! <ul><ul><li>Password Management </li></ul></ul><ul><ul><li>Workstation Security </li></ul></ul><ul><ul><li>Computer Viruses & Malicious Code </li></ul></ul><ul><ul><li>Privacy & Auditing </li></ul></ul>
    16. 16. Electronic Communication Policy <ul><li>All Computer Resources are property of BHG </li></ul><ul><li>Provide Guidelines for acceptable BHG computer use </li></ul><ul><li>Direction for reporting computer issues </li></ul><ul><li>Responsibility for computer users. </li></ul>
    17. 17. E-mail <ul><li>Desktop Access </li></ul><ul><li>Web Access </li></ul>
    18. 18. E-mail Guidelines <ul><li>Check e-mails once every shift worked </li></ul><ul><li>Respond to e-mails in a timely manner </li></ul><ul><li>Include meaningful subject line </li></ul><ul><li>Verify e-mail recipients before sending any messages </li></ul><ul><li>Keep e-mails professional, courteous, and respectful of others </li></ul><ul><li>Proofread e-mails prior to sending </li></ul><ul><li>AVOID WRITING IN ALL CAPS </li></ul>
    19. 19. E-mail Guidelines <ul><li>Never send confidential information via e-mail. </li></ul><ul><li>E-mail that could be construed as obscene, threatening, offensive or libelous is not acceptable. </li></ul><ul><li>Never forward / generate chain-mail. </li></ul><ul><li>Avoid sending excessive personal messages; keep e-mail for business use generally. </li></ul><ul><li>Avoid sending large e-mails or attachments to many people, many times. </li></ul><ul><li>Use distribution lists sparingly. </li></ul><ul><li>Send “High Priority” messages only as warranted. </li></ul><ul><li>Bronson reserves the right to audit e-mail; all e-mails are property of Bronson. </li></ul>
    20. 20. Sample Emails <ul><li>Dear Susan, </li></ul><ul><li>Hello, we believe your account may have been compromised. Please provide your ID and Password so we can fix this for you! </li></ul><ul><li>Your ID </li></ul><ul><li>Your Password: </li></ul><ul><li>If you do not comply within 24 hours, your account will be deactivated. </li></ul><ul><li>Mike </li></ul><ul><li>The Team </li></ul>Dear Susan    Hello, your account has been used in detected being used in another country, please click here to update your account information. Karen Trusted Bank Member Services
    21. 21. Phishing: Don’t Get Hooked <ul><li>These e-mails are not legitimate! </li></ul><ul><li>What is Phishing? (pronounced “fishing”) </li></ul><ul><ul><li>The MASS collection of data through direct or automated e-mails. </li></ul></ul><ul><li>Persons or malicious programs asking you for your ID, passwords, social security number, credit card information or other personal information; many times posing as an authority or threatening actions. </li></ul><ul><li>Data collected is used to gain access to other computer systems and ultimately commit identity theft and/or financial fraud. </li></ul>
    22. 22. Phishing: Avoid the Hook! <ul><li>These e-mails are not legitimate! </li></ul><ul><ul><li>DO NOT provide any information through these types of e-mails or click on web links. </li></ul></ul><ul><ul><li>DO NOT reply to these emails in any way. </li></ul></ul><ul><ul><li>BHG has technology to block the majority of these types of email, but you may get one. </li></ul></ul><ul><ul><li>BHG will never threaten to disable your account if action is not taken. </li></ul></ul><ul><ul><li>Contact the IT Support Center at ext. 6330 if you receive any such e-mails. </li></ul></ul>
    23. 23. Internet Access <ul><li>All employees have access to the Internet regardless of title, position, etc. </li></ul><ul><li>Internet is available from any Bronson workstation on the network. </li></ul><ul><li>All activity on the Internet is monitored and logged. </li></ul><ul><li>All material viewed is scanned for offensive material and viruses </li></ul>
    24. 24. Internet Guidelines <ul><li>Do not download content, such as: </li></ul><ul><ul><li>Screensavers </li></ul></ul><ul><ul><li>Software </li></ul></ul><ul><ul><li>Internet Browser toolbars </li></ul></ul><ul><ul><li>Music </li></ul></ul><ul><li>Do not use Internet access to transmit confidential, political, obscene, threatening, or harassing materials. </li></ul><ul><li>Inform the Support Center immediately of any unusual occurrence at ext. 6330. </li></ul>
    25. 25. Software Guidelines <ul><li>Bronson has Windows XP for all stations and established minimum guidelines for each PC. </li></ul><ul><li>Contact the Support Center at ext. 6330 for all software requests (manager approval is required). </li></ul><ul><li>All software and licenses are stored in I.T. </li></ul><ul><li>Do not install Internet software, freeware, shareware. </li></ul><ul><li>Do not alter your computer’s configuration. </li></ul>
    26. 26. Copyright Protected Media <ul><li>Do not use Bronson computers or network to store, transmit, “share”, convert or duplicate copyright protected media, such as: </li></ul><ul><ul><li>Software (games and general purpose) </li></ul></ul><ul><ul><li>Music files (MP3’s and CD) </li></ul></ul><ul><ul><li>Movies (electronic files and DVD) </li></ul></ul><ul><ul><li>E-books </li></ul></ul><ul><ul><li>Any other electronic files or physical media purchased. </li></ul></ul><ul><li>PC’s are routinely scanned for unauthorized media and management is notified when occurrences are found. </li></ul>
    27. 27. Software Piracy <ul><li>The Law: </li></ul><ul><ul><li>Unauthorized duplication of software constitutes copyright infringement and is a federal offense, regardless of why it’s done. </li></ul></ul><ul><ul><li>Penalties </li></ul></ul><ul><ul><ul><li>Liability for damages up to $150,000 for each work infringed </li></ul></ul></ul><ul><ul><ul><li>Criminal penalties: </li></ul></ul></ul><ul><ul><ul><ul><li>$250,000 per occurrence / per title </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Jail time up to 5 years </li></ul></ul></ul></ul><ul><ul><li>The absence of knowledge, or even intent, does not negate the infringement and is not a defense in a copyright infringement law suit. </li></ul></ul>
    28. 28. Questions? <ul><li>E-mail: [email_address] </li></ul><ul><li>Phone: (269) 341- 6330 </li></ul><ul><li>Thank you! Have a good day at Bronson New Hire Orientation </li></ul><ul><li>Halle’ A. Hudson </li></ul><ul><li>Customer & Service Excellence Manager </li></ul>