Find Mike Wegner's email address and send him a message
Under the Policies and Procedures section, there's a Word document titled Encryption Procedure
Under Frequently Asked Questions, there are three entries covering "Email Encryption"
The links to the department of Health and Human Services will take you to a page on standard encryption procedures
Kodak picture manager
Facebook photo plug-in
An additional antivirus program
None of the above - it is never acceptable to install any software application on your CARE computer without the approval of the I.T. department.
Contact the recipient and ask them to delete the email from their Inbox.
Use the “Recall Message” function in Outlook to recall the message and then re-send it with proper encryption procedures.
Notify Barbara Black, CARE's Privacy Officer, that there has been a potential breach of PHI.
Do nothing this time, but put up a post-it or other note to yourself as a reminder for next time.
As long as you lock your screen (with either the Windows logo-Letter L key combination or Ctrl-Alt-Delete and then "Lock"), it is okay to leave your computer unattended for an extended period of time, to answer the front door or deal with other pressing household matters.
Because your laptop is not part of the computer network of the home office in Chicago, you do not need to install and update anti-virus software.
It is not important to keep PHI away from the eyes of your children or other immediate family members, because their access is covered under your authorization. However, any visitors should be kept out of the room containing potential PHI.
Any printed material that contains PHI or may potentially contain PHI should be kept in a locked cabinet or drawer unless you are actively using it.