Customizable for each institution and user, the EHR can be set up using axiUm’s robust security features to limit what information any user level can see or have access to.
Track and Audit for Any User
Imagine the ability to track historical data for users. axiUm has tracking and auditing features that allow your administrators to see what has changed, who has changed it, what time it was changed and in certain cases, what the field’s previous value was. This ensures that any manipulated data can be traced and reverted if necessary.
axiUm also has the ability to track if a user has viewed as specific screen. This additional layer of security enables administrators to view the workflow path of any specific user.
Field Level Access
Unique to the axiUm program is its ability to enable for users and user groups the ability to edit, view or hide fields, prompts and windows. This granular field level security sets axiUm apart from most other programs and gives your administrators a higher level of control.
Role Based Security
User role based security is achieved when axiUm’s field level access and user group functionality are combined. This allows administrators to easily customize access for a specific job function. For example, you may want cashiers to only have access to payment and receipt functionality. Alternatively, clinicians may have EHR permissions, but researchers may not have access to a patient’s first or last name fields. Regardless of their roles, all of these authorizations can be granted by administrators via axiUm’s role based security.