Search
Filter your search results by first selecting a content type. You can continue to narrow down the search results by selecting a topic. If you still can't find what you are looking for, use the Get Help tab on the right.
Types of content
Topics
KnowledgeBase Topics
Other
59 results
… HOWTO: Secure Log In using Okta Verify … Mass General Brigham uses …
… INFO: Secure Log In Overview and FAQs … What is Secure Log In? … …
… Best Practices on Using REDCap's API Methods … REDCap is a secure application supported by Mass General Brigham, … has all the necessary physical and operational securities in place to meet or exceed Federal and State security and … these power point slides: REDCap API Security Training Log into REDCap at least once using the Service Account …
… Brigham username (e.g. jha12) and password and click … Log In … button Click … Continue. … A file named … CA …
… HOWTO: Setup LRS Secure Badge Printing for Macs … Note: … Secure Printing is … … Applications … folder, and open … Self … Service. … Log in with your Mass General Brigham username and password. … 2. …
… Started … Overview … The ERIS NSBackup Service provides secure backup for work-related data (system files are … Brigham username and password credentials through Secure Log In / OKTA. NSBackup is cloud-based. For a backup to complete, …
… provide security appropriate for HIPAA associated work. In any analysis it is prudent to minimize risk, beginning … PHI. Filenames appear in job scripts and may enter server log files which can be shared with hardware vendors during … ERIS staff list. The cluster is located in the same secure data centers that contains Partners clinical IT …
… it? … Syncplicity is an easy-to-use, cost-effective, and secure file storage and sharing service. Syncplicity is very … solution that is backed by EMC, a global leader in cloud, big data and trusted IT. … Why do I need it? … … email address listed in the request. Once you are logged in, select Install to download the Syncplicity client …
… Brigham Information Systems is implementing several security initiatives to ensure the best possible measures are in place to protect our network. As part of these efforts, … unreadable to anyone who lacks the proper credentials to log on to your system. To check, open … My Computer … and …
… System: … Mac OSX 10.15 or greater … Computer enrolled in PEAS*. … If your computer is not enrolled in PEAS, please … working at BWH using Kronos Scheduling have an Information Security documented exception for this requirement. … … … 1. Launch Self Service from the Applications folder and log in 2. Locate the Citrix Workspace application and click … …