SlideShare a Scribd company logo
1 of 5
PROTECT PATIENT DATA
• Destroy paper copies of
patient’s information as
soon as possible. Don’t
leave printed
information out where
others have access to
it.

1
888-239-7941

• Make sure computer
screens aren’t visible to
those in the waiting or
check-in areas. Install
privacy filters on
monitors if privacy is a
concern.

2

• Install anti-virus,
intrusion detection, and
firewall software on all
facility computers. Run
computer and systems
checks often.

3
WWW.ACESMEDICAL.COM
PROTECT PATIENT DATA
• Do not use social security
numbers as your patient
unique identifier.
• Computers and servers
that contain patient data
should be locked and
secured.

4&5
888-239-7941

• Log out of your EHR
whenever you leave your
computer. All passwords
should remain confidential
and staff should not share
individual passwords.

6

• Create complex passwords
that don’t include easily
guessed information.
Passwords should never be
written down and should
be changed every three
months.

7
WWW.ACESMEDICAL.COM
PROTECT PATIENT DATA
• If an employee leaves
the practice, their
status should be
changed to inactive
immediately.

8
888-239-7941

• Use audit trails to
determine which
employees are
forgetting to log off the
computer or can
access information
they don’t need to.

9

• Make sure everyone is
on the same page about
your facility’s security
policies and is
knowledgeable on why
these policies are so
important.

10
WWW.ACESMEDICAL.COM
ACES MEDICAL
FOR MORE VIDEOS BY ACES MEDICAL, PLEASE VISIT:
WWW.YOUTUBE.COM/USER/ACESMEDICAL

888-239-7941

WWW.ACESMEDICAL.COM

More Related Content

Similar to ACES Medical - 10 easy things to protect patient data

10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small BusinessSYMBIONT, INC.
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityGreat Bay Software
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfklodianelezi1
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatanceKudzi Chikwatu
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Security Policy
Security PolicySecurity Policy
Security PolicyHuda Seyam
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are comingErnest Staats
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
OWASP ATL - Social Engineering Technical Controls Presentation
OWASP ATL - Social Engineering Technical Controls PresentationOWASP ATL - Social Engineering Technical Controls Presentation
OWASP ATL - Social Engineering Technical Controls PresentationOWASP Atlanta
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architectureImran Khan
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecurityMetrics
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Security & Privacy - Lecture D
Security & Privacy - Lecture DSecurity & Privacy - Lecture D
Security & Privacy - Lecture DCMDLearning
 

Similar to ACES Medical - 10 easy things to protect patient data (20)

10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Poicy 121
Poicy 121Poicy 121
Poicy 121
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Security Policy
Security PolicySecurity Policy
Security Policy
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Physical security
Physical securityPhysical security
Physical security
 
OWASP ATL - Social Engineering Technical Controls Presentation
OWASP ATL - Social Engineering Technical Controls PresentationOWASP ATL - Social Engineering Technical Controls Presentation
OWASP ATL - Social Engineering Technical Controls Presentation
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
Securing Your Remote Access Desktop Connection
Securing Your Remote Access Desktop ConnectionSecuring Your Remote Access Desktop Connection
Securing Your Remote Access Desktop Connection
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
Security & Privacy - Lecture D
Security & Privacy - Lecture DSecurity & Privacy - Lecture D
Security & Privacy - Lecture D
 

More from Diana with ACES Medical

ACES Medical - What reports should I run to monitor my AR (Part II)
ACES Medical - What reports should I run to monitor my AR (Part II)ACES Medical - What reports should I run to monitor my AR (Part II)
ACES Medical - What reports should I run to monitor my AR (Part II)Diana with ACES Medical
 
ACES Medical - What is a care coordinator?
ACES Medical - What is a care coordinator?ACES Medical - What is a care coordinator?
ACES Medical - What is a care coordinator?Diana with ACES Medical
 
ACES Medical - Five reasons to outsource EHR hosting
ACES Medical - Five reasons to outsource EHR hostingACES Medical - Five reasons to outsource EHR hosting
ACES Medical - Five reasons to outsource EHR hostingDiana with ACES Medical
 
ACES Medical - Tips for recruiting a new physician
ACES Medical - Tips for recruiting a new physicianACES Medical - Tips for recruiting a new physician
ACES Medical - Tips for recruiting a new physicianDiana with ACES Medical
 
ACES Medical - Four reasons to outsource physician recruiting
ACES Medical - Four reasons to outsource physician recruitingACES Medical - Four reasons to outsource physician recruiting
ACES Medical - Four reasons to outsource physician recruitingDiana with ACES Medical
 
ACES Medical - How to choose a clearinghouse
ACES Medical - How to choose a clearinghouseACES Medical - How to choose a clearinghouse
ACES Medical - How to choose a clearinghouseDiana with ACES Medical
 
ACES Medical - Is there truly a gender gap between male and female physicians?
ACES Medical - Is there truly a gender gap between male and female physicians?ACES Medical - Is there truly a gender gap between male and female physicians?
ACES Medical - Is there truly a gender gap between male and female physicians?Diana with ACES Medical
 
ACES Medical - Five security features your EHR should have
ACES Medical - Five security features your EHR should haveACES Medical - Five security features your EHR should have
ACES Medical - Five security features your EHR should haveDiana with ACES Medical
 
ACES Medical - What’s the difference between stage 1 and 2 MU?
ACES Medical - What’s the difference between stage 1 and 2 MU?ACES Medical - What’s the difference between stage 1 and 2 MU?
ACES Medical - What’s the difference between stage 1 and 2 MU?Diana with ACES Medical
 
ACES Medical - How should my clearinghouse be helping me prepare for ICD-10?
ACES Medical - How should my clearinghouse be helping me prepare for ICD-10?ACES Medical - How should my clearinghouse be helping me prepare for ICD-10?
ACES Medical - How should my clearinghouse be helping me prepare for ICD-10?Diana with ACES Medical
 
ACES Medical - As a practice manager, what should I do to prepare for ICD-10?
ACES Medical - As a practice manager, what should I do to prepare for ICD-10?ACES Medical - As a practice manager, what should I do to prepare for ICD-10?
ACES Medical - As a practice manager, what should I do to prepare for ICD-10?Diana with ACES Medical
 
ACES Medical - 11 questions before purchasing a new EHR system
ACES Medical - 11 questions before purchasing a new EHR systemACES Medical - 11 questions before purchasing a new EHR system
ACES Medical - 11 questions before purchasing a new EHR systemDiana with ACES Medical
 

More from Diana with ACES Medical (12)

ACES Medical - What reports should I run to monitor my AR (Part II)
ACES Medical - What reports should I run to monitor my AR (Part II)ACES Medical - What reports should I run to monitor my AR (Part II)
ACES Medical - What reports should I run to monitor my AR (Part II)
 
ACES Medical - What is a care coordinator?
ACES Medical - What is a care coordinator?ACES Medical - What is a care coordinator?
ACES Medical - What is a care coordinator?
 
ACES Medical - Five reasons to outsource EHR hosting
ACES Medical - Five reasons to outsource EHR hostingACES Medical - Five reasons to outsource EHR hosting
ACES Medical - Five reasons to outsource EHR hosting
 
ACES Medical - Tips for recruiting a new physician
ACES Medical - Tips for recruiting a new physicianACES Medical - Tips for recruiting a new physician
ACES Medical - Tips for recruiting a new physician
 
ACES Medical - Four reasons to outsource physician recruiting
ACES Medical - Four reasons to outsource physician recruitingACES Medical - Four reasons to outsource physician recruiting
ACES Medical - Four reasons to outsource physician recruiting
 
ACES Medical - How to choose a clearinghouse
ACES Medical - How to choose a clearinghouseACES Medical - How to choose a clearinghouse
ACES Medical - How to choose a clearinghouse
 
ACES Medical - Is there truly a gender gap between male and female physicians?
ACES Medical - Is there truly a gender gap between male and female physicians?ACES Medical - Is there truly a gender gap between male and female physicians?
ACES Medical - Is there truly a gender gap between male and female physicians?
 
ACES Medical - Five security features your EHR should have
ACES Medical - Five security features your EHR should haveACES Medical - Five security features your EHR should have
ACES Medical - Five security features your EHR should have
 
ACES Medical - What’s the difference between stage 1 and 2 MU?
ACES Medical - What’s the difference between stage 1 and 2 MU?ACES Medical - What’s the difference between stage 1 and 2 MU?
ACES Medical - What’s the difference between stage 1 and 2 MU?
 
ACES Medical - How should my clearinghouse be helping me prepare for ICD-10?
ACES Medical - How should my clearinghouse be helping me prepare for ICD-10?ACES Medical - How should my clearinghouse be helping me prepare for ICD-10?
ACES Medical - How should my clearinghouse be helping me prepare for ICD-10?
 
ACES Medical - As a practice manager, what should I do to prepare for ICD-10?
ACES Medical - As a practice manager, what should I do to prepare for ICD-10?ACES Medical - As a practice manager, what should I do to prepare for ICD-10?
ACES Medical - As a practice manager, what should I do to prepare for ICD-10?
 
ACES Medical - 11 questions before purchasing a new EHR system
ACES Medical - 11 questions before purchasing a new EHR systemACES Medical - 11 questions before purchasing a new EHR system
ACES Medical - 11 questions before purchasing a new EHR system
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

ACES Medical - 10 easy things to protect patient data

  • 1.
  • 2. PROTECT PATIENT DATA • Destroy paper copies of patient’s information as soon as possible. Don’t leave printed information out where others have access to it. 1 888-239-7941 • Make sure computer screens aren’t visible to those in the waiting or check-in areas. Install privacy filters on monitors if privacy is a concern. 2 • Install anti-virus, intrusion detection, and firewall software on all facility computers. Run computer and systems checks often. 3 WWW.ACESMEDICAL.COM
  • 3. PROTECT PATIENT DATA • Do not use social security numbers as your patient unique identifier. • Computers and servers that contain patient data should be locked and secured. 4&5 888-239-7941 • Log out of your EHR whenever you leave your computer. All passwords should remain confidential and staff should not share individual passwords. 6 • Create complex passwords that don’t include easily guessed information. Passwords should never be written down and should be changed every three months. 7 WWW.ACESMEDICAL.COM
  • 4. PROTECT PATIENT DATA • If an employee leaves the practice, their status should be changed to inactive immediately. 8 888-239-7941 • Use audit trails to determine which employees are forgetting to log off the computer or can access information they don’t need to. 9 • Make sure everyone is on the same page about your facility’s security policies and is knowledgeable on why these policies are so important. 10 WWW.ACESMEDICAL.COM
  • 5. ACES MEDICAL FOR MORE VIDEOS BY ACES MEDICAL, PLEASE VISIT: WWW.YOUTUBE.COM/USER/ACESMEDICAL 888-239-7941 WWW.ACESMEDICAL.COM