EPIC CLN 251-252 Study Set 3 - KW, EPIC CLN 251-252 Study Set 2 Exam 2024
EPIC CLN 251-252 Study Set 3 - KW, EPIC CLN 251-252 Study Set 2 Exam 2024 Name two things that are defined by your role record. -Correct Answer-Roles define your default Startup Activity, the Hyperspace toolbar, options under the Epic button, the maximum number of workspaces a user can have open, automatic timeout settings, and whether your user's last login department will default the next time she logs in. Explain the difference between role and security. -Correct Answer-Security determines a user's access to functionality. Role determines where that functionality will appear for a user in Hyperspace. What function does the Role record perform in Epic? -Correct Answer-A role record determines the layout and ground rules of Hyperspace. Security Class Scenario: Your organization wants its hospital charge nurses to have administrative access to the Patient List activity (Inpatient security point 1 - Patient List Administrator). Otherwise, their access should be the same as that of other inpatient nurses (who use the MODEL IP NURSE Inpatient security class). How would you efficiently take care of this need? -Correct Answer-• Duplicate the MODEL IP NURSE Inpatient security class, and call the duplicate something like IP CHARGE NURSE. • Add to the duplicate the desired security point. Link all of the charge nurses' user records (or a charge nurse user template) to this duplicate security class. How do you duplicate a security class? -Correct Answer-Log in to Text as your administrator > From the Training Application Access menu, select Chronicles. > (Hint: The Training Application Access menu is the initial menu after logging in to Text. If you are in text but not on this screen, press PAGE UP until you reach this screen.) > Enter "ECL" at the Database initials prompt. > Go to Enter Data > Duplicate Security Class. > Duplicate the "TRNCLN PEDS IP SECURITY CLASS" security class. > Enter a new ID and write it down > In Hyperspace, use Chart Search to find "Inpatient Security." > Open the new id. > In the Comments field, enter a more specific title such as first year residents > In the Search field on the Security Points tab, enter "notes cosign required" and press ENTER > In front of security point 28 - Notes Cosign Required, click the button to make the security point active. > In the Search field on the Security Points tab, enter "order sets" and press ENTER. > In front of security point 193 - Edit My Order Sets, click the button to make the security point inactive. 13. Click Accept to save and close your record. Foundation security class -Correct Answer-• Epic's Foundation System serves as a starting point for customers, as it is configured with providers, users, roles, security classes, profiles, and other settings that reflect our recommendations and best practices. Security Points -Correct Answer-• Security points are individual keys to pieces of Epic functionality. • Each activity (like Chart Review) is associated with one or more security points. If a user has the security point, he has access to the activity. If he does NOT have the required security point, then he will not be able to launch the activity. • In most cases, the user won't even see the activity, or it might appear as grayed out. • Security points are typically referred to by the type of security class they are found in (Inpatient, EpicCare, Emergency, Shared, etc.) and a number. Security Class -Correct Answer-• One function of the user template is to assign access to activities in Epic. This access is controlled by records in the Security Class (ECL) master file. Security class records can be shared, so assigning them in the template is an efficient way to grant access to groups of users. • Instead of giving individual security points directly to users, security points of the same type are lumped into security classes, like rings of keys, and then assigned to the appropriate groups of users. Which type of security controls access to hospital functionality, like the MAR and Doc Flowsheets? -Correct Answer-Inpatient Security Which three security classes does every user need? -Correct Answer-Inbasket, Shared, and Reporting Workbench Explain the difference between a security class and a security point. -Correct Answer-A security point grants access to a single piece of functionality; it's like a key. A security class is a collection of security points, like a key ring. Users are linked to security classes either directly or via a template; users are not linked directly to security points. What function does security perform in Epic? -Correct Answer-Security controls access to functionality— what a user is or is not allowed to do in the system. Who (or what) needs a provider record? -Correct Answer-A person or resource if at least one of the following criteria are met: • Credentials to display or a specialty/d
Geschreven voor
- Instelling
- EPIC CLN 251-252
- Vak
- EPIC CLN 251-252
Documentinformatie
- Geüpload op
- 5 februari 2024
- Aantal pagina's
- 18
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
epic cln 251 252 study set 3 kw epic cln 251 25
Ook beschikbaar in voordeelbundel