Welcome to CORC HCAI Logo

Module 2: Lesson 1: Topic 4: Security

CORC uses various security features to restrict access to the application and requires CORC users to have a secure Internet connection.

For security purposes, CORC has a 15-minute "timeout" feature. That means that after a CORC user logs onto CORC, they will be logged out automatically after 15 minutes of inactivity. Any data that was not saved before that timeout will be lost.

Additional CORC access restrictions include:
  1. All users must have a user account which contains a unique user name and password
  2. Only UAAs can create user accounts for users at their facility
  3. Only HCAI can create user accounts for UAAs. A completed Hospital User Account Administrator Agreement is required
  4. All users - whether they are Hospital Users or UAAs - can access information only for the hospitals to which they are assigned
HCAI recommends that you restrict access to your CABG Data by minimizing the number of user accounts you create.

Secure Computer Connection

CORC uses a type of data encryption called Secure Socket Layer (SSL) to make sure that hospital's CABG Data cannot be intercepted when it is transmitted over the Internet. To ensure the highest level of security, CORC requires users to use Internet Explorer (IE) version 7.0 (or higher) with 128-bit Secured Socket Layer (SSL).

Although this may sound technical, it's not something to worry about. Users may already be using IE with 128-bit encryption and not know it. If you're not, it's simple to fix. If you receive a security error message when you try to access CORC, you'll know you need to upgrade your version of IE. Check with your Information Technology (IT) department on how to do this, or go directly to Microsoft's website to download a free IE security update. HCAI strongly suggests that you check with your IT department before loading any software on your PC.

User Activity Logs

For security purposes, CORC keeps track of the users who log onto CORC, when they exit CORC, and the functions they perform while in CORC.

More information on CORC's security is contained in the TAB labeled Security [Module 5].

Now, let's review what we've covered in this lesson.