Module 2: Lesson 1: Topic 4: Security
CORC uses various security features to restrict access to the application and requires CORC users
to have a secure Internet connection.
For security purposes, CORC has a 15-minute "timeout" feature. That means that after a CORC user
logs onto CORC, they will be logged out automatically after 15 minutes of inactivity. Any data that
was not saved before that timeout will be lost.
Additional CORC access restrictions include:
- All users must have a user account which contains a unique user name and password
- Only UAAs can create user accounts for users at their facility
-
Only HCAI can create user accounts for UAAs. A completed Hospital User Account Administrator
Agreement is required
-
All users - whether they are Hospital Users or UAAs - can access information only for the
hospitals to which they are assigned
HCAI recommends that you restrict access to your CABG Data by minimizing the number of user accounts
you create.
Secure Computer Connection
CORC uses a type of data encryption called Secure Socket Layer (SSL) to make sure that hospital's
CABG Data cannot be intercepted when it is transmitted over the Internet. To ensure the highest level
of security, CORC requires users to use Internet Explorer (IE) version 7.0 (or higher) with 128-bit
Secured Socket Layer (SSL).
Although this may sound technical, it's not something to worry about. Users may already be using IE
with 128-bit encryption and not know it. If you're not, it's simple to fix. If you receive a security
error message when you try to access CORC, you'll know you need to upgrade your version of IE. Check
with your Information Technology (IT) department on how to do this, or go directly to Microsoft's
website to download a free IE security update.
HCAI strongly suggests that you check with your
IT department before loading any software on your PC.
User Activity Logs
For security purposes, CORC keeps track of the users who log onto CORC, when they exit CORC, and the
functions they perform while in CORC.
More information on CORC's security is contained in the TAB labeled
Security [Module 5].
Now, let's review what we've covered in this lesson.