Frequently Asked Questions
How long does implementation take?
We offer two types of implementation so that you can choose what works best for you and your organization.
Self-Guided Implementation Includes:
1 Page Cheat Sheet
How to Articles at help.cliniciannexus.com
ClinicianNexus Led Implementation Includes:
1 Dedicated ClinicianNexus Team Member
Unlimited Chat & Phone Support
Scoping [1-2 Weeks]
Initial Build [1-2 Weeks]
Communicate with Schools/Students [1 Week]
Train & Detailed Configuration [2-7 weeks]
Review & Go Live! [1 Week]
How do I sign up?
Signing up for ClinicianNexus is completely free. It’s really easy as well. Just click sign up and our onboarding wizard will walk you through all of your most important configurations.
What user types are included in ClinicianNexus?
The following user types exist within our platform: Site Administrators, Coordinators, Preceptors, and Report viewers.
Who else is using ClinicianNexus?
Over 50 hospitals and 30 schools across the United States use ClinicianNexus to connect and manage clinical rotations. Once you sign up, you can search for hospital, school, coordinator, and student profiles.
What if my affiliated schools or clinical sites aren’t in ClinicianNexus?
You can refer your direct contacts at your affiliated schools or clinical sites right within ClinicianNexus. If you need some help explaining the benefits, just reach out to our team and we can help you do that.
We also offer a 1.5 day workshop for your entire community to get on the same page!
Learn more here: ClinicianNexus Workshop.
Is our data safe?
We run ClinicianNexus on Microsoft Azure and our servers are located in North Central, USA. The Microsoft Azure cloud infrastructure has been architected to be one of the most secure cloud computing environments available on the planet.
In addition to the security features built into Azure, we ensure the following:
Data is encrypted in transit and at rest
Passwords are hashed and salted in accordance with OWASP guidelines
Our platform is FERPA compliant
Our system performs transaction log backups every 10 minutes, differential backups every 3 hours, and full backups weekly.
We contract with a third party security company to ensure we follow the latest security protocols and to have an unbiased auditor of our security practices
We perform a full security review, including vulnerability scans, penetration tests, policy reviews, and threat analysis annually.
Administrators can require their staff to use Two-Factor Authentication