CUMC Home | Columbia University | Jobs at CUMC | Contact CUMC | Find People
     
Columbia University Medical Center logo,  Columbia University Medical Center Information Technology
For support: call extension 5-Help (212-305-4357) or email us
 
 

CUMC Privacy and Security Training

Any CUMC faculty, staff or students who did not complete annual training by the April 30th deadline may have had access to system resources including Email, RASCAL, CROWN, AXIUM and the Columbia Libraries revoked. The only way to regain access is by completing your training; once finished you will automatically regain access within two business days.

Columbia University values the importance of openly communicating and sharing information, while promoting the safety and security of all students, faculty and staff. To protect sensitive data and computer systems while strengthening security awareness, the University offers Security Awareness Training.

The Columbia University HIPAA Covered Entity, which includes the Columbia University Medical Center, is governed by the HIPAA and HITECH regulations. As part of that governance, all members of the Covered Entity workforce must complete this training on an annual basis. This training is comprised of three modules:

  • HIPAA Privacy
  • Security Essentials CUMC
  • Data Attestation

To access the Security Awareness Training modules, go to: http://securitytraining.columbia.edu and log in with your Columbia UNI and password.

  • Any new faculty, staff and/or students MUST complete the training within 30 days AND before receiving access to any Information Systems at the medical center.
  • Required annual training for all faculty, staff and students was made available on December 1st, 2014 and must be completed by April 30th, 2015.
Failure to complete the training modules will result in a loss of access to system resources, such as RASCAL, CROWN, AXIUM, Columbia Libraries, and email. If training is completed after a missed deadline, access will be automatically restored within two business days. Continued failure could result in suspension or termination.

For a complete list and description of each training module please see below.

Security Essentials CUMC

Security breaches are caused by the loss or theft of computers and devices, accidental sharing of information and social engineering. It is important that we understand the full impact of a breach to the University (e.g., fines and lawsuits, public embarrassment, loss of valuable assets). This training will help:

  • Define information security breaches, provide examples, explain their root cause and walk you through the steps to prevent them.
  • Explain how to safely use computing devices, create strong passwords and protect information when traveling or working remotely.
  • Explain how to use the CUMC Email system.
  • Explain common threats, such as social engineering, phishing and account compromises.

HIPAA Privacy

HIPAA applies to the employees, faculty and students within the covered entity of the University. This training module will define Electronic Protected Health Information and the Federal Health Insurance Portability and Accountability Act of 1996 (“HIPAA”).

  • Training addresses private health information (PHI) and its impact on health care providers, as well as understanding of the 18 identifiers, time factors and formats in which private health information can be communicated.
  • Will help you gain a better comprehension of how the HIPAA Security rule addresses the confidentiality, integrity and availability of protected health information in an electronic form.
  • Learn why Columbia is designated as a Hybrid Entity, and how that changes privacy rule requirements.
  • Learn why Columbia Medical Centers, New York Presbyterian Hospital and Weill Cornell Medical Center form an Organized Health Care Arrangement (OHCA), allowing them to share PHI with one another that have common patients.

Data Attestation

All members of the Covered Entity workforce must attest on an annual basis whether or not they have access to, store, or process PHI and/or PII, and the manner in which the data are protected.



| TOP |

Last updated 5/12/2015