User's Manual

Table Of Contents
16 Administration setup
Security settings
Securitysettingsonthesystemallowyoutomeet
theapplicablesecurityrequirementslistedinthe
HIPAAstandard.Usersareultimately
responsibleforensuringthesecurityand
protectionofallelectronicprotectedhealth
informationcollected,stored,reviewed,and
transmittedonthesystem.
To log in as Administrator
1 OntheAdministrationsetuppage,type
AdministratorintheNamebox.
2 Typetheadministratorpasswordinthe
Passwordbox.
Ifyoudon’thavetheadministratorpassword,
contactSonoSite.(See“SonoSiteTechnical
Support”onpage vii.)
3 SelectLogin.
To log out as Administrator
Turnofforrestartthesystem.
To require user login
YoucansetthesystemtodisplaytheUserLogin
screenatstartup.
1 LoginasAdministrator.
2 IntheUser Loginlist,selectOn.
Onrequiresausernameandpasswordat
startup.
Offallowsaccesstothesystemwithouta
usernameandpassword.
To change the administrator password or let
users change passwords
1 LoginasAdministrator.
2 UnderUser List,selectAdministrator.
3 Doanyofthefollowing:
Changetheadministratorpassword:
UnderUser Information,typethenew
passwordinthePasswordboxand
Confirmbox.(See“Choosingasecure
password”onpage 18.)
•Letuserschangetheirpasswords:Select
thePassword changescheckbox.
4 SelectSave.
User setup
To add a new user
1 LoginasAdministrator.
2 SelectNew.
3 UnderUser Information,fillintheName,
Password,and Confirmboxes.(See“Choosing
asecurepassword”onpage 18.)
4 (Optional)IntheUser box,typetheusers
initialstodisplaytheminthepatientheader
andtheUserfieldinthepatientinformation
form.
5 (Optional)
SelecttheAdministration Access
checkboxtoallowaccesstoalladministration
privileges.
6 SelectSave.
To modify user information
1 LoginasAdministrator.
WARNING:
Health care providers who maintain
or transmit health information are
required by the Health Insurance
Portability and Accountability Act
(HIPAA) of 1996 and the European
Union Data Protection Directive
(95/46/EC) to implement
appropriate procedures: to ensure
the integrity and confidentiality of
information; to protect against any
reasonably anticipated threats or
hazards to the security or integrity
of the information or unauthorized
uses or disclosures of the
information.