64 results
What is Secure Log In? Secure Log In is the technology used to confirm your identity by SMS (text ...
Partners HealthCare uses Secure Log In, a secure technology used to log in to web-based applications when you are ...
... at risk than an on-premise environment. The top two threats in cloud are misconfiguration and no visibility (i.e knowing what is happening at any point in time). For this reason, it is essential to work with Research Information ... and receive guidance.
If you are interested in please email: Rob Woltag (Senior Project Manager - ITS) - ...
... transforming information technology and information security in the healthcare industry. Cloud-based solutions provide significant ... ITS) - RWOLTAG@PARTNERS.ORG
*Please log in with your Mass General Brigham credentials. You will see folders ... below: 1. Go to https://rcservices.partners.org/ , log in with your Partners id and password, then click on the software option on ...
... healthcare organization) and have performed yearly training in the protection of Human Subject data (An additional requirement for all IT ... verification of employment as well as sign in and sign out log sheets for tracking access to the server room.
Information physically ... and application availability and responsiveness monitoring, log monitoring, etc.
Data Center Security
Specs and Safety
...
Secure Your Mac
Any Apple product used for business purposes must be ... Policy requires Apple laptops & desktops must be enrolled in the Partners Enterprise Apple Support (PEAS) program. All Macs enrolled in PEAS are required to enable FileVault2 for encryption. For more details on ... the risk of remote exploit of the resource.
Secure Your Mac ...
In an effort to increase email security, Mass General Brigham is disabling ... to access work email. Basic authentication allows you to log in to your email with only a username and password. It leaves you open to ... Modern authentication (i.e., two-factor authentication or Secure Log In ) is the new, secure standard for logging into work email.
...
...
When sending PHI via REDCap emails, you must secure the content. These are your options:
For any of these options, you ... the REDCap survey. The subject will need to authenticate (log in) to the survey before they can view and complete the survey. The respondent ...
Note: Secure Printing is only available for select locations currently such as ... Applications folder, and open Self Service. Log in with your Partners username and password.
...
Purpose
How to signup and send files via Secure File Transfer Service
Please see Secure File Transfer for a ... if you have received an invitation email, click on the link in the invitation email to access the link and register for an account
. ... the file. If they want to send a file back, they need to log in to Secure File Transfer.
Related Articles:
...