Recent Updates
-
Open and Log In to SOAPware
Updated on: Jul 03, 2017
-
Security Auditing in SOAPware
Updated on: Jul 03, 2017
<p>Once Security has been set up and all staff members have a unique login and password, it is possible to track changes and events in SOAPware connecting modifications made to patient information to a specific user. To be able to search the Audit Logs, a SOAPware Standard or SOAPware Profession... -
Deleting Users & Reassign Tasks
Updated on: Jul 03, 2017
-
Setting Practice Security Defaults
-
Security- Encounter Type
Updated on: Jul 03, 2017
<p>This lesson will discuss security settings for the encounter type. This security privilege will allow a user to select whether the encounter is a Face to Face or Non Face to Face Encounter for the SOAPnote documentation to be applied. By default, the encounters will be flagged "Face to Face". ... -
Security - Drug Interaction Filtering
<p>This lesson will show how to enable/disable drug/allergy interaction alerts at the user level. Drug/Allergy interaction alerts can also be enabled/disabled at the group or role level. Remember, changing a user at the user level, will override what is indicated at the group or role level.</p>... -
Emergency Access Role
Updated on: Jul 03, 2017
This lesson will demonstrate the steps necessary to permit an authorized user (who is authorized for emergency situations), to access electronic health information during an emergency.
-
Groups and Roles in Security
Updated on: Jul 03, 2017
<p>SOAPware Groups describe a set of privileges that can be applied to a selection individual users. Groups can be thought of as departments within an office, and a listing the responsibilities and limitations of members of that group. Users can belong to any number of groups simultaneously, and ... -
Users in Security
Updated on: Jul 03, 2017
Users are the individuals accessing SOAPware. Everyone needing access to SOAPware, will need to be set up as a specific, individual user.
-
Security Settings
Updated on: Jul 03, 2017
To gain access to Security, a user must be granted the access rights of a System Administrator. Before beginning to assign security settings, the System Administrator should become familiar with the functions related to Groups, Roles and Users.