Audit Compliance Training for ImageNow Managers

advertisement
IMAGENOW
Meeting Compliance
Understanding Standards & Procedures
WHY ARE WE HERE?
• To learn the steps each office needs to take to meet the
compliance requirements for NDSU’s internal document
imaging audit.
• Campus Audit is reported to NDUS each year (June) by
NDSU Chief IT Security Officer
• Audit is conducted to meet requirements of NDUS Policy
1901.4
NDUS POLICY 1901.4
Purpose:
“The purpose of this procedure is to establish an imaging
procedure for all NDUS institutions that create, use, and
manage digital images on optical imaging systems.”
NDUS POLICY 1901.4
Procedure Summary:
2. “Institutions shall create and follow documentation that
outlines and describes system hardware and software
specifications and written policies and procedures that
document the creation, maintenance, use and
preservation of digital images within the system.”
3. “Training schedules that include initial instruction as
well as regular, ongoing retraining must be implemented
to ensure that employees understand the policies and
procedures and any changes that may occur.”
INITIAL ACCESS & TRAINING
Checklist Item #1
• Procedures for electronic imaging of documents have
been formally documented and are provided to
individuals who have been given access or duties related
to imaging documents.
Translation:
• Do you have training documents and/or user manuals
prepared for first-time ImageNow users?
INITIAL ACCESS & TRAINING
Create Tutorials for the Basics:
•
•
•
•
•
Logging In, Logging Off, & Password Changes
Toolbar Icons, Interface & Default Settings
How to Search
How to Scan/QA/Link
How to Upload & Link using ImageNow Printer
Resources:
• ImageNow User Manual (PDF, hard copy, Client Help)
• Internal Customized Tutorials
CONFIDENTIAL DATA TRAINING
Checklist Item #2
• Individuals with access to data and system have been
given appropriate training regarding policies and
procedures for security and safety of data stored and
manipulated within system. The training is ongoing and
is updated according to changes in policy and federal law.
Checklist Item #9
• All those assigned access and use the system have
undergone basic training on handling and use of
confidential data and have signed confidentiality
agreements.
CONFIDENTIAL DATA TRAINING
Translation:
• Have users reviewed data privacy policy & completed
confidential data training before using ImageNow?
How do we Comply?
• Log and file (date of training, who attended, who provided training)




NDUS Data Privacy Training
Signed Confidentiality Agreement
Responsibility Review
Security/Confidentiality Topic during Staff Meeting
SCANNING & QA TRAINING
Checklist Item #10
• Individuals who perform the scan or validation function
have received additional training on document quality
assurance.
How do we Comply?
• Create separate training tutorial for scanning process
• Make sure VRS settings are optimized for all documents
• Do not allow “Bypass QA” setting for scanning profiles
SYSTEM OVERSIGHT
Checklist Item #3
• An individual(s) has been assigned the responsibility to
oversee and manage the training of assigned personnel.
Translation:
• Each participating office needs to have a designated
ImageNow “Manager”
Why is this Required?
• Act as a “point of contact” for each office
• Limits number of users who can access & change security
• In charge of keeping & collecting audit compliance data
SYSTEM OVERSIGHT
Checklist Item #12
• Logs of individual training are maintained by the
person(s) managing the oversight of those who use the
system.
Translation:
• ImageNow “Managers” need to keep track of which users
have received which types of training and when.
How do we Comply?
• A spreadsheet will be developed and distributed to help
managers track user training.
SYSTEM OVERSIGHT
Proposed Spreadsheet:
• Record completed training dates for each user
• Submit copy of spreadsheet for audit each year
Name
Role
Data
Privacy
Conf.
Data
1st Time
User
Scan
& QA
Resp.
Review
Staff
Meeting
User #1
Power
User
08/23/2004
07/01/2012
09/15/2010
10/10/2010
03/01/2011
04/26/2012
User #2
Manager
11/03/1995
07/01/2012
05/21/2007
10/10/2010
06/01/2011
04/26/2012
User #3
Staff
03/17/2008
07/01/2012
09/15/2010
10/10/2010
09/01/2011
04/26/2012
User #4
Student
09/30/2011
07/01/2012
10/15/2011
10/15/2011
12/01/2011
04/26/2012
SECURITY MANAGEMENT
Checklist Item #4
• Separation of duties is in place for individuals who have
been given access to the imaging system. (For example
the person who scans in a document does not have the
ability to delete a document.)
Checklist Item #6
• Formally documented procedures have been established
to ensure that only authorized personnel can create,
copy, annotate, or access digital images within the
system. This access is granted based on specific need for
use of the system.
SECURITY MANAGEMENT
Translation:
• Assign user security settings according to function
• Don’t grant more access than absolutely necessary
Keep track of:
•
•
•
•
•
•
Who is responsible for scanning?
Who can delete linked documents?
Who can view documents in which drawers?
Who can view certain document types?
Who can edit custom properties, notes, annotations?
Who can print, save, or email imaged documents?
DOCUMENT VALIDATION
Checklist Item #5
• A validation process using a sampling technique has been
implemented to verify that the scanned document
matches the original document. This process is
conducted and documented each quarter.
Checklist Item #11
• Logs are collected, monitored and documented to verify
reproduction accuracy and reliability according to the
original document.
DOCUMENT VALIDATION
Validation Process:
• ImageNow Documents
1.
2.
3.
4.
Search for documents created on certain date
Randomly select documents (note Date, ID#, DocType, & # of pages)
Locate selected documents in hard copy archive
Confirm quality of the documents
• Hard Copy Documents
1. Randomly select documents from hard copy archive
2. Search for documents in ImageNow
3. Confirm quality of scanned documents
DOCUMENT VALIDATION
VALIDATION PROCESS DEMONSTRATION
Nancy Kasper
Registration & Records
USER MANAGEMENT
Checklist Item #7
• Those employees no longer needing access to the system
have been removed.
Process:
• ImageNow “Manager” deactivates user account in
ImageNow and removes user from all associated groups
 Or contact Viet to have him deactivate the user
• Notify your IT Liaison to include removal of “ImageNow
service tag” when the Help Desk ticket requesting end of
IT services is submitted
DOCUMENT MANAGEMENT
Checklist Item #8
• Digital images that are the records of documented
business processes have been linked to the business
processes that created them.
Translation:
• Documents are stored in “Drawers” of the department
that created them
• Drawer names are changed when documents transfer
between departments
 “View” access is usually retained by original department
DOCUMENT MANAGEMENT
Checklist Item #13
• All digital images are destroyed according to NDSU
Records and Retention policy and procedure 713.
Translation:
• Documents need to be purged based on the document
retention schedule (www.ndsu.edu/recordsmanagement)
Process:
1. Query is run for ID#s of “inactive students” (last 5 years?)
2. ImageNow is searched for documents “In List”
3. Index fields & custom properties determine purge items
DOCUMENT MANAGEMENT
Checklist Item #14
• All data that is stored as an image is classified according
to NDUS policy and procedure 1901.2.
Translation:
• “Any electronic data asset of the NDUS or Institution shall
be classified as Public, Private or Confidential according
to the following standards.” – NDUS 1901.2
How do we comply?
• “Confidential” drawers can be created for highly sensitive
documents that can only be accessed by designated
users
DOCUMENT AUDITING
Checklist Item #15
• A system “audit trail” is in place to document who, the
date and time, and what was accessed for the previous
12 months. This “audit trail” is maintained and available
for review.
How do we comply?
• “Audit” setting in ImageNow is turned on for:






Add Annotations
Document Copy
Document Create
Document Create via Batch
Document Delete
Document Move





Document Page Delete
Document Restore
Document Send to Recycle Bin
Document View
User Login
QUESTIONS?
Download