Jane's Guide

Here's all the help you need to use Jane.


Security

  • Security FAQ

    If you’d like to learn more about Jane’s privacy and security standards, practices, and certifications, you can head to our Security and Trust homepage to learn more.

  • List of Security Features

    When you open an account with Jane, you agree to our Privacy Policy and Terms & Conditions. These documents represent our agreement with you on how Jane will properly handle the health information for which you are the custodian.

  • Activity Log

    Most privacy and data protection regulations want individual users in electronic health record systems to be identified, and even more, they want all activity to be tracked.

  • Auto-Logout Duration

    By default, Jane asks your staff to sign in with their username and password after 1 week of inactivity, but Jane strongly suggests that you shorten the duration to 2 hours so that if someone were to gain access to your device, they would be required to provide their login credentials again after...

  • Email Encryption FAQ for Canada

    At Jane, we love to help people understand the technology side of things to make intelligent decisions and give customers confidence that we’re taking privacy and security very seriously. So, grab a cup of tea & get comfortable — we’d like to get into some detailed Q&A here! 🙂

  • Password Best Practices

    A password is a string of mixed characters. A passphrase is a series of random words strung together (for example, jumpcarseedtownsupport). Passphrases are harder to guess and easier to remember. Either approach works well when you follow these principles:

  • Security and Privacy Best Practices

    Keeping your practice secure takes some setup upfront and good habits over time. This guide covers both: how to configure your Jane account securely, and practices to carry into your broader clinic environment.

  • All About the New Device Sign-in Email

    While this email is meant to notify of a new device sign-in, and that may feel alarming, there are a few reasons you’d receive this email outside of an attempted unauthorized sign-in. Let’s go over some of the reasons this email is triggered:

  • Phishing Safety

    While fishing may be a favourite past-time, phishing is a little bit less fun! We’ve written up this guide to help you understand what phishing is, what signs to look for, and how to keep your device secure despite any phishing attempts that may come your way.

  • What is a SOC 2 report?

    Hi there, it’s Bri from the Privacy and Security Team here at Jane. Our team is responsible for helping to ensure the security of your data and the privacy of your patients. In fact, it’s what our team is dedicated to thinking about all the time. And it’s not just something we prioritize within o...

  • Who should be the Jane Account Owner?

    You may be wondering - who should be listed as the Account Owner? Let’s talk about Account Ownership and what that entails.

  • Receiving Support Securely

    When calling into our support line, please ensure that you do not share sensitive patient information over the phone. Should you need to share a patient example for a profile you need assistance with, please use the patient initials and patient number located in the top right corner of the profile:

  • Third Party Messaging Service FAQ

    We understand that clinics using Jane absolutely depend on reminders and notifications to ensure patients show up on the right day and the right time. A lot of care went into choosing partners to offer these services who have a reputation of securely delivering communications with zero fuss. For ...

  • How To: Reset Your Jane Password

    Finding yourself logged out of Jane? Can't remember your password or username? Here are the high-level steps to get you back on track.
  • 2-Step Verification

    Multi-Factor Authentication is recognized as an important privacy and security safeguard, and it’s a standard tool used to protect sensitive data.

  • Cloud Security White Paper

    We've built Jane with security and privacy as our main focus. It's what drives our culture, training, and hiring processes. And shapes how we've used technology to protect and secure data.

  • Unauthorized Access: What to Do if Your Laptop/Phone is Lost or Stolen

    Oh, no! Your device has just been stolen. What should you do?

  • How to reset your email password and enable Two-Factor Authentication (2FA)

    How to reset your email password and enable Two-Factor Authentication (2FA)
  • Multi-Factor Authentication

    If Multi-Factor Authentication feels like a mouthful, we can help! Let’s walk through what you need to know to keep your staff profile secure.

  • 2-Step Verification: Locked out of your account?

    💡 Jane tip: If you’ve set up both text (SMS) message and authenticator app verification, you can use your non-default method when logging in. Select Try another way on the login screen to choose the other option.