2. Ensuring Confidentiality: Personal password required, never leave the computer terminal unattended, do not leave client information displayed on the monitor, shred all unneeded computer-generated worksheets, know the facility’s policy and procedure for correcting an entry error, follow agency procedure for correcting or documenting sensitive materials, IT personnel must install a firewall to protect the server from unauthorized access
3. General Guidelines for Recording: Date and time, Timing, Legibility, Permanence, Accepted Terminology, Correct Spelling and Grammar, Signature, Accuracy, Sequence, Appropriateness, Completeness, Conciseness, Legal Prudence