CYBER Login and Security - PowerPoint PPT Presentation

1 / 27
About This Presentation
Title:

CYBER Login and Security

Description:

Update user profiles and status at 'go live,' but individual users will control ... Fred Flintstone would have the user name of FFlintstone. Assign a unique password ... – PowerPoint PPT presentation

Number of Views:21
Avg rating:3.0/5.0
Slides: 28
Provided by: sallyw1
Category:

less

Transcript and Presenter's Notes

Title: CYBER Login and Security


1
CYBERLogin and Security
August 26, 2009
2
CYBER Welcome Screen
  • The System Functions button is the starting point
    for all of the functions performed by the
    Security Administrator.

3
Security Administrator Responsibilities
4
  • Enroll new users
  • Update user profiles and status at go live, but
    individual users will control their own profiles.
  • Submit security requests to CSA

5
Where do I get a login?
6
Existing Providers
  • Logins will be provided directly to all
    individual users within your agency who have a
    login from the previous system.
  • Temporary passwords will be assigned that are
    agency specific.

7
What if I am a New Provider?
  • Your agency will be given a Provider ID.
  • The Security Administrator will have 72 hours to
    set up their own account.
  • They will be responsible for setting up the
    individual user accounts.

8
How do I add a new user?
  • Left-click on the Systems Functions button from
    the CYBER Welcome Screen.
  • From there, left-click Add New User.

9
  • To the right is what the form will look like.
  • Required fields are the First and Last Name,
    Login Name, and either the Email Address or a
    Phone Number.
  • When complete, simply left-click the Accept
    button.

10
What kind of login and password should I be
assigning?
  • Assign a unique user name
  • For example, use the first letter of the persons
    first name followed by their last name.
  • Fred Flintstone would have the user name of
    FFlintstone.
  • Assign a unique password
  • It is only temporary.
  • It must follow the rules of password creation.

11
What Level of Security do I need to Assign?
  • At the Security Administrator level, you do not
    need to assign any level of security.
  • Only one level of access can be created.

12
PasswordRequirements
13
  • Upon the first login, all users will be prompted
    to change their password.
  • Your password must be at least 8 characters long.

14
Password Example
  • Passwords must contain at least one of each of
    the following
  • Upper case letter
  • Lower case letter
  • Symbol
  • Number
  • For example, here is a form of the word
    childcare
  • Ch1ldc_at_r3

15
My Login Does Not Work!
  • Contact the PerformCare Help Desk,
  • which will not be
  • operational until 9/8/09.
  • 877-736-9176
  • helpdesk_at_performcarenj.org

16
What else does the user need to do when they
first login to CYBER?
17
HIPAA
  • The HIPAA Release and Confidentiality statement
    will need to be electronically signed.
  • Scrolling through the statement and clicking the
    Accept button will electronically attach your
    signature, stating that you agree to the terms.
  • The form can also be printed at the users
    request.

18
Things to do when CYBER goes live
  • Review your agencys user profiles if they have
    been transferred over from previous system.
  • Make any necessary changes.
  • Users will also have the ability to make changes
    themselves.
  • Provide new users with their system login and
    password.

19
What about user security?
  • All existing security roles from the prior system
    will transfer to CYBER.
  • If you are a new user, you will have base level
    access.

20
User Security
21
(No Transcript)
22
Other General Info
23
User Need Higher Access Rights?
  • The Security Administrator from within your
    agency will complete an online form, which will
    be sent to a CSA or a
  • CSA Representative for review.

24
How many Security Administrators should an Agency
have?
  • Security Administrator Privileges should be
    granted to at least two persons with Supervisory
    level authority.
  • It is always recommended to have at least one
    more person who can perform the role if necessary.

25
Who actually should have access to CYBER?
  • Make sure it is only those individuals who work
    directly with children and their families.
  • Before adding a new user, consider the role of
    the individual.
  • If you are unsure, contact a CSA or a CSA
    Representative .

26
Your Submitted Questions
27
Thank you for your participation in todays
training!
Write a Comment
User Comments (0)
About PowerShow.com