User Access Security – You Need to Be a Detective

When:  Sep 28, 2018 from 1:00 PM to 2:00 PM (CT)
Implementing MT 6.1 is a big undertaking. A big part of that undertaking is your users and how they access the system to do their jobs. To accomplish the right balance between the ability to do their jobs and maintain appropriate security, you need to do a lot of investigating. Like a detective, you look for clues and follow leads to solve the mystery.

This webinar will show what to include in your investigation and things to think about while building users in your new system. We will cover the considerations pre build and go through the steps of what it takes to put all the pieces of your access/security together. We will discuss the differences in building users in MEDITECH 6.1 and previous versions. Some of the other topics covered will be:

  • To convert or not convert users and providers from the old system
  • MPAs vs Access Groups and how they relate
  • Person Templates and how they can ultimately save you time building users, not only for the implementation but going forward in your system
  • Why it is important to have a MIS person lead for your organization
Then finally we will share some tips and tricks that we have learned along the way.

Presenters:
Peggy Bull is an Applications Integration Analyst and the MIS Team Lead for a MAGIC to MEDITECH 6.15 implementation at Northern Montana Healthcare in Havre, MT.

Kim Eldred is Senior Consultant with Cornerstone Advisors LLC.