Answer-assigned security to the proper functionality
/.A user should only be granted access to the content - Answer-that your organization
feels they should be using.
/.The basis of all staff-related build are the ________ and __________records. Each
staff member has a unique provider and/or user record. - Answer-provider (SER); user
(EMP)
/.The _______ master file can be thought of as a directory of clinicians who are affiliated
with your organization. The ______ master file includes one record for every clinician
who provides care to your patients. - Answer-Provider; Provider
/.Remember that the term "provider" in Epic means both - Answer-clinicians and
resources.
/.The _________master file contains one record for every person who logs in to your
instance of Epic. - Answer-User
/.User templates are _______ that are used to configure groups of users. - Answer-EMP
records
/.____________records are used in conjunction with user and provider records to give
employees access to activities in the system. - Answer-Security and Role
/.____________ is used to give "access" or "permission" to activities and information
within Epic - Answer-Security
/.There are two key security concepts: - Answer-security points and security classes.
/.Grants access to one feature within Epic. Think of these like a key that grants you
access to one room.
If a user has a security point, they have access to an activity. If they do NOT have the
required security point, then the activity will not be available to them; they won't even
see it. - Answer-Security Point
/.Grouping of security points that grant access to related activities and functionality in an
Epic application. Think of this as a ring of keys (security points). - Answer-Security
Class