July 31, 2015 | This course is primarily for the advanced patient privacy monitoring user. You will learn about advanced reporting capabilities and analytics, types of custom reports and summary reports, the access count vs. distinct count, as well as, the sort function and group function.
July 31, 2015 | This course is designed for the primary user of the Patient Privacy Monitoring application. You will learn how to run quick reports for user and patient monitoring, create new and custom reports, and share these reports.
July 21, 2015 | This course will show you how to use the mapping summary menu to gain a better understanding of the data fields provided in your audit logs and how they are then mapped into the application to produce desired reports.
July 9, 2015 | This course is designed to show the end user how to proactively review the most current audit log data availability, including how to confirm the successful load of files each day and the event time stamp start and end times contained within a particular file.
June 23, 2015 | This course is designed for the primary user of Patient Privacy Monitoring. The main focus is on the Investigations created from the Enforced Policies and Alerts.
June 3, 2015 | This course is designed for the primary user of the Patient Privacy Monitoring application. You will be introduced to Enforced Policies and shown how to customize the home page, as well as, how to create, share and review Enforced Policies.
May 28, 2015 | This course explains how to interpret data and make determinations of business appropriate behavior vs. inappropriate access via audit logs. You will learn how to update alert statuses, understand important fields, and read data.
May 20, 2015 | This course is designed for IT Operations and IT Security staff who will be responsible for the setup and maintenance of the FairWarning Patient Privacy Monitoring solution. It will cover user creation, access roles and password changes.
May 13, 2015 | This course is designed for IT Operations and IT Security staff and reviews the steps required to turn on auditing in the Cerner Millennium application.
May 12, 2015 | This course will discuss the speed to value methodology as well as best practices for the four phases of implementation: Kick Off, Data Sources Consumed, Enable Analytics and Enforced Policies, and Training.