Frequently Asked Questions

How do I sign up?

Signing up for ClinicianNexus is completely free. It’s really easy as well. Just click sign up and our onboarding wizard will walk you through all of your most important configurations.

How long does implementation take?

Currently we offer materials for a self-guided implementation which includes the following:
Implementation eBook
1 Page Cheat Sheet
How to Articles at help.cliniciannexus.com
Timeline:
Your pace

When our premium subscription plan is available we will provide a ClinicianNexus Led implementation plan.

What user types are included in ClinicianNexus?

The following user types exist within our platform: Administrators, Coordinators, Students, and Report viewers.

What if my affiliated schools or clinical sites aren’t in ClinicianNexus?

You can refer your direct contacts at your affiliated schools or clinical sites right within ClinicianNexus. If you need some help explaining the benefits, just reach out to our team and we can help you do that.

We also offer a 1.5 day workshop for your entire community to get on the same page!

Learn more here: ClinicianNexus Workshop.

Who else is using ClinicianNexus?

Over 50 hospitals and 30 schools across the United States use ClinicianNexus to connect and manage clinical rotations. Once you sign up, you can search for hospital, school, coordinator, and student profiles.

Is our data safe?

We run ClinicianNexus on Microsoft Azure and our servers are located in North Central, USA. The Microsoft Azure cloud infrastructure has been architected to be one of the most secure cloud computing environments available on the planet. 

In addition to the security features built into Azure, we ensure the following:

  • Data is encrypted in transit and at rest

  • Passwords are hashed and salted in accordance with OWASP guidelines

  • Our platform is FERPA compliant

  • Our system performs transaction log backups every 10 minutes, differential backups every 3 hours, and full backups weekly.

  • We contract with a third party security company to ensure we follow the latest security protocols and to have an unbiased auditor of our security practices

  • We perform a full security review, including vulnerability scans, penetration tests, policy reviews, and threat analysis annually.

  • Administrators can require staff to use Two-Factor Authentication