Application Security Practice Management

Customize user access and role based configuration to ensure maximum application security.

SepThin

Custom User Access

PracticeStudio's advanced role-based Security feature allows administrators to grant or deny access to specific areas of the software based on user or clinic role.

User access can be customized to a level of granularity unseen in other products. For example, you can limit a user's access to the entire Cash Drawer function or only to the specific action of opening the cash drawer manually.

Charting
SepThin
Charting

Role-Based Configuration

Create and maintain clinic roles:

  • Add new roles to the system or edit the permissions associated with pre-configured roles (Billing, Front Desk, Insurance, Nurse, Provider, etc.).
  • Assign individual permissions and/or groups of permissions to each role; users assigned that role will then inherit those permissions.
SepThin

User-Level Permissions

  • Assign one or more roles to each user; the user will inherit the permissions assigned to each of his/her roles.
  • Override permissions inherited from the user's roles if necessary.
  • Set security parameters that apply to an individual user (force him to change his password the next time he logs in, override the global session timeout, mark him as inactive, etc.).
  • Assign a restriction set to any individual permission or group of permissions: restriction sets override access settings based on day of week, time of day, and workstation.
Charting
SepThin
Charting

Global Preferences

  • Password strength (length, complexity),
  • Password policies (minimum time between password changes, unique passwords before reuse, etc.),
  • Login regulations (number of failed login attempts allowed before the user is locked out, minimum time between failed login attempts, etc.), and
  • Session locking (amount of inactive time that can pass before a session automatically locks).
SepThin

Security Auditing

  • Specify the types of events that will be audited,
  • Access audit records in the Event Log Viewer—and filter records by type, user, user session, and/or date range if desired,
  • Format audit records as Audit Trail and Node Authentication (ATNA) compliant RFC-3881 messages and send directly to a Syslog Server, and/or
  • Send audit records to an XDS Repository.
Charting
SepThin