[THIN] Re: Assistance requested...

  • From: "Michael Pardee" <pardeemp@xxxxxxxxx>
  • To: thin@xxxxxxxxxxxxx
  • Date: Fri, 20 Jun 2008 14:54:20 +0000

Doesn't matter Greg, they all *think* they are computer experts either way. 
-----Original Message-----
From: "Greg Reese" <gareese@xxxxxxxxx>

Date: Fri, 20 Jun 2008 09:05:52 
To:thin@xxxxxxxxxxxxx
Subject: [THIN] Re: Assistance requested...


i'm not sure which is worse. A doc that knows how to use the computer or one 
that doesn't


On Fri, Jun 20, 2008 at 9:02 AM, <GTaylor@xxxxxxxx <mailto:GTaylor@xxxxxxxx> > 
wrote:
 
 
 
J 
  
Yep, they start getting warning several days ahead of time, the normal users 
reads it and changes the password.  Just try to get a doctor to do that…..nah, 
they would rather hit the helpdesk and complain, not even realizing that it's 
their butts we're saving….. 
  
 
 
----------------
 
From: thin-bounce@xxxxxxxxxxxxx <mailto:thin-bounce@xxxxxxxxxxxxx>  
[mailto:thin-bounce@xxxxxxxxxxxxx <mailto:thin-bounce@xxxxxxxxxxxxx> ] On 
Behalf Of Greg Reese
 Sent: Thursday, June 19, 2008 12:24 PM
 To: thin@xxxxxxxxxxxxx <mailto:thin@xxxxxxxxxxxxx> 
 Subject: [THIN] Re: Assistance requested... 


 
  
nevermind that the users now can't login and the helpdesk is flooded with calls 
to fix passwords....
 
 Just kidding.  we did the something similar.  But i've already said too much. 
:^) 
 
On Thu, Jun 19, 2008 at 1:02 PM, <GTaylor@xxxxxxxx <mailto:GTaylor@xxxxxxxx> > 
wrote: 
 
 
We took JCAHO and Ernest & Young requirements and beefed them up a touch.  This 
way we easily pass a Joint Commission inspection and a financial audit. 
  
George 
  
  
 
 
From: thin-bounce@xxxxxxxxxxxxx <mailto:thin-bounce@xxxxxxxxxxxxx>  
[mailto:thin-bounce@xxxxxxxxxxxxx <mailto:thin-bounce@xxxxxxxxxxxxx> ] On 
Behalf Of Chad Schneider (IT)
 Sent: Friday, June 13, 2008 2:18 PM
 To: 
thin@xxxxxxxxxxxxx <mailto:thin@xxxxxxxxxxxxx> 
 Subject: [THIN] Assistance requested... 
  
 
I have been asked to get information from those in Healthcare IT, regarding 
your network password policies.  We have some discussions going on about are we 
overly compliant, under complaint, what are others doing? 
 
  
 
What I am looking for is... 
 
  
 
Your network user account (AD) password rules.... 
 
# of characters (min/max) 
 
Password Age (Min/max) 
 
Required characters (alpha/numeric/upper/lower/special/etc.) 
 
Password History 
 
  
 
Any assistance in this is greatly appreciated, as I need to put together a 
report of "our peers" for management. 
 
  
 
Thanks! 
 
  
 
  
Chad Schneider
 Systems Engineer
 ThedaCare IT
 920-735-7615 
  
 
----------------
 

 Regional Health's mission is to provide and support health care excellence in 
partnership with the communities we serve.
 
 Note: The information contained in this message, including any attachments, 
may be privileged, confidential, or protected from disclosure under state or 
federal laws . If the reader of this message is not the intended recipient, or 
an employee or agent responsible for delivering this message to the intended 
recipient, you are hereby notified that any dissemination, distribution, or 
copying of this communication is strictly prohibited. If you have received this 
communication in error, please notify the Sender immediately by a "reply to 
sender only" message and destroy all electronic or paper copies of the 
communication, including any attachments. 
  


 
 
----------------
 
 Regional Health's mission is to provide and support health care excellence in 
partnership with the communities we serve.
 
 Note: The information contained in this message, including any attachments, 
may be privileged, confidential, or protected from disclosure under state or 
federal laws . If the reader of this message is not the intended recipient, or 
an employee or agent responsible for delivering this message to the intended 
recipient, you are hereby notified that any dissemination, distribution, or 
copying of this communication is strictly prohibited. If you have received this 
communication in error, please notify the Sender immediately by a "reply to 
sender only" message and destroy all electronic or paper copies of the 
communication, including any attachments.
 
 

Other related posts: