{"metadata":{"generator":"Captivate","generatorVersion":"11.5.1","schemaVersion":"","author":"Clinical Systems Training","title":"Cyber Security ","description":"project description","email":"plymouthictservicedesk@nhs.net","website":"http://online.plymouthict.nhs.uk","tags":"","thumbnail":"","source":"assets","durationInFrames":582,"frameRate":30,"totalSlides":3,"width":900,"height":700,"responsive":false,"scalable":true,"launchFile":"index_scorm.html","isVRProject":false},"contentStructure":[{"id":"Image_13","class":"TODO::Senthil","instance":"Image_13","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_14","class":"TODO::Senthil","instance":"Image_14","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_39","class":"TODO::Senthil","instance":"Text_Caption_39","title":"1. IT Security/Data Protection ","roles":{"textData":{}}},{"id":"Text_Caption_40","class":"TODO::Senthil","instance":"Text_Caption_40","title":"CONTINUE ","roles":{"textData":{}}},{"id":"Click_Box_17","class":"TODO::Senthil","instance":"Click_Box_17","roles":{"click":{"subtype":"button"}}},{"id":"Text_Caption_41","class":"TODO::Senthil","instance":"Text_Caption_41","title":"There is an effective audit trail that will identify any user abusing their privileges on the system. It is therefore of paramount importance that you log-off when you have finished using iPM so that no-one else can use your password and associated rights to view patient data without authorisation. You can also lock your computer by pressing Ctrl+Alt+Delete and choosing the Lock Computer option. ","roles":{"textData":{}}},{"id":"Slide5337","class":"Normal Slide","instance":"","thumbnail":"","children":["Image_13","Image_14","Text_Caption_39","Text_Caption_40","Click_Box_17","Text_Caption_41"],"roles":{"slide":{"durationInFrames":15},"navigation":{"navid":"Slide5337"}}},{"id":"Image_15","class":"TODO::Senthil","instance":"Image_15","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_16","class":"TODO::Senthil","instance":"Image_16","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_42","class":"TODO::Senthil","instance":"Text_Caption_42","title":"1. IT Security/Data Protection ","roles":{"textData":{}}},{"id":"Text_Caption_43","class":"TODO::Senthil","instance":"Text_Caption_43","title":"CONTINUE ","roles":{"textData":{}}},{"id":"Click_Box_18","class":"TODO::Senthil","instance":"Click_Box_18","roles":{"click":{"subtype":"button"}}},{"id":"Text_Caption_44","class":"TODO::Senthil","instance":"Text_Caption_44","title":"Under the terms of Data Protection Legislation you are not permitted to access the details of any patient unless this is necessary to your work and you have been given the rights to do so. It is a breach of Data Protection Legislation and a disciplinary offence to view patient data under any other circumstances, including information relating to yourself, your family and friends. As a result of this, access to the iPM system is limited according to the training you have received and based upon the access you require for your job role. ","roles":{"textData":{}}},{"id":"Slide5408","class":"Normal Slide","instance":"","thumbnail":"","children":["Image_15","Image_16","Text_Caption_42","Text_Caption_43","Click_Box_18","Text_Caption_44"],"roles":{"slide":{"durationInFrames":12},"navigation":{"navid":"Slide5408"}}},{"id":"Image_17","class":"TODO::Senthil","instance":"Image_17","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Image_18","class":"TODO::Senthil","instance":"Image_18","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Text_Caption_45","class":"TODO::Senthil","instance":"Text_Caption_45","title":"Section Complete - IT Security/Data Protection ","roles":{"textData":{}}},{"id":"Text_Caption_46","class":"TODO::Senthil","instance":"Text_Caption_46","title":"You have now completed this section. You now have knowledge of IT security and data protection. ","roles":{"textData":{}}},{"id":"Text_Caption_47","class":"TODO::Senthil","instance":"Text_Caption_47","title":" ","roles":{"textData":{}}},{"id":"Image_19","class":"TODO::Senthil","instance":"Image_19","roles":{"click":{"subtype":"button"},"textData":{}}},{"id":"Slide5481","class":"Normal Slide","instance":"","thumbnail":"","children":["Image_17","Image_18","Text_Caption_45","Text_Caption_46","Text_Caption_47","Image_19"],"roles":{"slide":{"durationInFrames":555},"navigation":{"navid":"Slide5481"}}},{"id":"Pool502","class":"pool","roles":{"pool":{"id":502,"name":"Pool1","questions":[]}}},{"id":"iPM Ward Management 2 Security","class":"project","title":"iPM Ward Management 2 Security","children":["Slide5337","Slide5408","Slide5481"],"roles":{"quiz":{"id":458,"branched":false,"submitAll":false,"review":true,"questions":[],"minScore":0,"maxScore":0,"passScore":0}}}],"contentSettings":{"global":{"branchAware":false},"toc":{"enabled":false},"playbar":{"enabled":true,"cc":false,"playPause":true,"back":true,"forward":true,"rewind":true,"close":true,"mute":true,"progressBar":true}},"contentReporting":{"CCCriteria":"view","CCData":{"viewDataIsPercent":true,"viewData":95},"SCCriteria":"view","SCData":{"viewDataIsPercent":true,"viewData":95},"exitNormalIfCompleted":false},"toc":[{"id":"Slide5337","title":"Slide 1"},{"id":"Slide5408","title":"Slide 2"},{"id":"Slide5481","title":"Slide 3"}]}