Difference between revisions of "User:Shawndouglas/Sandbox"
From LIMSWiki
Jump to navigationJump to searchShawndouglas (talk | contribs) m (Replaced item Z in 1.4.1)  | 
				Shawndouglas (talk | contribs)   (Updated some content. Saving and updating more.)  | 
				||
| Line 53: | Line 53: | ||
   ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  |    ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  | ||
  |-    |   |-    | ||
   | style="padding:5px; width:500px;" |'''a.'''   |    | style="padding:5px; width:500px;" |'''a.''' The vendor offers an online and/or on-site demonstration.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-    |   |-    | ||
   | style="padding:5px; width:500px;" |'''b.'''   |    | style="padding:5px; width:500px;" |'''b.''' The vendor provides a detailed project plan that includes the project team, timeline, deliverables, and risk and issue management procedures.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''c.'''   |    | style="padding:5px; width:500px;" |'''c.''' The vendor explains their overall project approach, deliverables, time constraints, and any other criteria for the project.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''d.'''   |    | style="padding:5px; width:500px;" |'''d.''' The vendor provides reliable cost estimates and pricing schedules, including all products and services in the scope of work.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''e.'''   |    | style="padding:5px; width:500px;" |'''e.''' The vendor details the amount of time and staff that the purchaser will have to provide for the implementation process.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''f.'''   |    | style="padding:5px; width:500px;" |'''f.''' The vendor can explain the maintenance and support offered during and after implementation, including times and methods of availability, issue escalation and management, etc.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''g.'''   |    | style="padding:5px; width:500px;" |'''g.''' The vendor provides a support schedule for the implementation process, including optional support levels, their function, and availability.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''h.'''   |    | style="padding:5px; width:500px;" |'''h.''' The vendor provides support during the "go-live" period between system validation/operational deployment and final acceptance/beginning of maintenance and support agreements.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''i.'''   |    | style="padding:5px; width:500px;" |'''i.''' The vendor provides a gap analysis after initial system installation, identifying the deliverables or tasks remaining.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''j.'''   |    | style="padding:5px; width:500px;" |'''j.''' The vendor provides a table linking each deliverable to the corresponding user requirement specification it fulfills.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''k.'''   |    | style="padding:5px; width:500px;" |'''k.''' The vendor uses a consistent training methodology for educating new users.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''l.'''   |    | style="padding:5px; width:500px;" |'''l.''' The vendor supplies [[Laboratory information system|LIS]]-specific training program curricula.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''m.'''   |    | style="padding:5px; width:500px;" |'''m.''' The vendor provides user, administrator, developer, installation, and reference manuals.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''n.'''   |    | style="padding:5px; width:500px;" |'''n.''' The vendor provides design qualification documentation.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''o.'''   |    | style="padding:5px; width:500px;" |'''o.''' The vendor provides installation qualification documentation.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''p.'''   |    | style="padding:5px; width:500px;" |'''p.''' The vendor provides operation qualification documentation.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''q.'''   |    | style="padding:5px; width:500px;" |'''q.''' The vendor provides performance qualification documentation during implementation.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''r.'''   |    | style="padding:5px; width:500px;" |'''r.''' The vendor provides well-documented system upgrades that authorized users can independently install.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''s.'''   |    | style="padding:5px; width:500px;" |'''s.''' The vendor provides source code for the system.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''t.'''   |    | style="padding:5px; width:500px;" |'''t.''' The vendor provides an optional comprehensive set of test codes suitable for use by the purchaser.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
| Line 148: | Line 148: | ||
   ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  |    ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  | ||
  |-    |   |-    | ||
   | style="padding:5px; width:500px;" |'''a.'''   |    | style="padding:5px; width:500px;" |'''a.''' The system operates with a traditional client-server architecture, with software installed on each machine that needs to access the system.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''b.'''   |    | style="padding:5px; width:500px;" |'''b.''' The system operates with a web-based interface, hosted on a server and accessed via a web browser on most any machine.   | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''c.'''   |    | style="padding:5px; width:500px;" |'''c.''' The system contains a single, centralized database that supports multiple sites and departments.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''d.'''   |    | style="padding:5px; width:500px;" |'''d.''' The system's database conforms to the [[ODBC|Open Database Connectivity Standard]] (ODBC).  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''e.'''   |    | style="padding:5px; width:500px;" |'''e.''' The system is designed so upgrades to the back-end database do not require extensive reconfiguration or effectively cripple the system.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''f.'''   |    | style="padding:5px; width:500px;" |'''f.''' The system is designed to not be impacted by multiple users or failover processes.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''g.'''   |    | style="padding:5px; width:500px;" |'''g.''' The system applies security features to all system files.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''h.'''   |    | style="padding:5px; width:500px;" |'''h.''' The system applies log-in security to all servers and workstations accessing it.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''i.'''   |    | style="padding:5px; width:500px;" |'''i.''' The system provides a workstation and server authentication mechanism.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''j.'''   |    | style="padding:5px; width:500px;" |'''j.''' The system applies Secured Socket Layer (SSL) encryption on the web client interface.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''k.'''   |    | style="padding:5px; width:500px;" |'''k.''' The system encrypts client passwords in a database, with support for multi-case and special characters.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''l.'''   |    | style="padding:5px; width:500px;" |'''l.''' The system uses TCP/IP as its network transport.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''m.'''   |    | style="padding:5px; width:500px;" |'''m.''' The system contains an archive utility that doesn't require off-line mode.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''n.'''   |    | style="padding:5px; width:500px;" |'''n.''' The system allows automated backup and restore capability without support intervention, as well as manual backups.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''o.'''   |    | style="padding:5px; width:500px;" |'''o.''' The system maintains the transactional history of system administrators.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''p.'''   |    | style="padding:5px; width:500px;" |'''p.''' The system maintains an analyst communication log, accessible by the administrator.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
| Line 226: | Line 222: | ||
   ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  |    ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  | ||
  |-    |   |-    | ||
   | style="padding:5px; width:500px;" |'''a.'''   |    | style="padding:5px; width:500px;" |'''a.''' The system proves compatible with a variety of hardware environments.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''b.'''   |    | style="padding:5px; width:500px;" |'''b.''' The system can be utilized with a touch-screen.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
| Line 244: | Line 240: | ||
   ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  |    ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  | ||
  |-    |   |-    | ||
   | style="padding:5px; width:500px;" |'''a.'''   |    | style="padding:5px; width:500px;" |'''a.''' The system proves compatible with a variety of software environments.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''b.'''   |    | style="padding:5px; width:500px;" |'''b.''' The system utilizes a non-proprietary database such as Oracle or Microsoft SQL Server.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
| Line 267: | Line 263: | ||
   ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  |    ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  | ||
  |-    |   |-    | ||
   | style="padding:5px; width:500px;" |'''a.'''   |    | style="padding:5px; width:500px;" |'''a.''' The system supports [[21 CFR Part 11]] and [[40 CFR Part 3]] requirements, including login security, settable automatic logouts, periodic requirements for mandatory password changes, limits on reusability of passwords, and full electronic signature.  | ||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''b.''' The system supports [[ISO/IEC 17025]] requirements.  | |||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''c.''' The system supports [[HIPAA]] requirements.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''d.''' The system supports [[GALP]] and/or [[GAMP]] standards.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''e.''' The system supports the standards of [[The NELAC Institute]].  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''f.''' The system meets government requirements for handling classified information and documents.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''g.''' The system maintains [[audit trail|audit]] and specification violation trails of all data manipulation — such as result and header information changes — as consistent with all applicable regulations and standards.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''h.''' The system maintains audit trails at least as long as the records to which they pertain.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''i.''' The system's audit log retains all data, prohibits any deletions, allows user comments, and allows reporting of contained information.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''j.''' The system provides additional persistent auditing capabilities, such as the audit of cancelled tests and scheduled system functions.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''k.''' The system provides user-selectable [[The NELAC Institute|NELAP]]-compliant internal [[chain of custody]] that tracks all specimens and associated containers from the time they are collected until disposed of.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''l.''' The system provides the ability to insert/manage secure [[ELN feature#Electronic signatures|electronic]] and/or digital signatures.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''m.''' The system incorporates automatic date and time stamping of additions, changes, etc.  | ||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''n.''' The system can automatically validate and approve data prior to being moved to the main database.  | |||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
| Line 325: | Line 329: | ||
   ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  |    ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response  | ||
  |-    |   |-    | ||
   | style="padding:5px; width:500px;" |'''a.'''   |    | style="padding:5px; width:500px;" |'''a.''' The system allows administrators and other authorized users to configure multiple levels of user rights and security by site location, department, group, [[LIMS feature#Configurable roles and security|role]], and/or specific function.  | ||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''b.''' The system allows administrators and users to reset user passwords.  | |||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''c.''' The system features and enforces adjustable rules concerning password complexity, reuse, and expiration.  | |||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''d.''' The system can lock a user out after a specified number of consecutive failed log-in attempts.  | |||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''e.''' The system provides the option for automatic user logout based on keyboard or mouse inactivity.  | |||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''f.''' The system makes authority checks to ensure only authorized individuals can use the system to perform an operation.  | |||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''g.''' The system allows authorized users to modify records, while also maintaining an audit trail of such actions.  | |||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''h.''' The system allows authorized users to manually delete records, while also maintaining an audit trail of such actions.  | |||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''i.''' The system prompts users to declare a reason for making changes to or deleting data in the system.  | |||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''j.''' The system provides email notification of lockout, security access, and improper workstation access.  | |||
  | style="background-color:white; padding:5px;" |  | |||
  | style="background-color:white;" |  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |'''k.''' The system provides a mechanism to allow a user read-only access to stored data.  | |||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''l.''' The system allows authorized users to generate a detailed user access record.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''m.''' The system allows authorized users to review audit logs at will.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''n.''' The system allows authorized users to query and print chain of custody for items, cases, projects, and batches.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''o.''' The system allows supervisors to override chain of custody.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''p.''' The system automatically tracks when supervisors review critical result values.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''q.''' The system allows automatic and/or manual holds or locks to be placed on data to ensure it goes unaltered or remains retrievable during a retention period.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''r.''' The system can first feed data from connected non-CFR-compliant instruments through a virtual environment that is compliant (audit trailed, secure, versioned, etc.) before being stored.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''s.''' The system can control whether users are able to export data to portable long-term storage media like a USB flash drive or recordable DVD.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''t.''' The system employs automatic file encryption on stored data.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''u.''' The system employs checks to enforce permitted sequencing of steps and events.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''v.''' The system allows multiple users to connect simultaneously to a contract lab.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''w.''' The system provides read-only access to contract laboratory results.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''  |    | style="padding:5px; width:500px;" |'''x.''' The system prohibits issuing reports outside of qualified areas while also allowing reports to be viewed locally or remotely based on security application limits and/or specimen ownership.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
| Line 515: | Line 559: | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''b.'''   |    | style="padding:5px; width:500px;" |'''b.''' The system architecture is modular or extensible and can easily and efficiently be modified to facilitate the addition of new functionality as business needs change.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''c.'''   |    | style="padding:5px; width:500px;" |'''c.''' The system has an application programming interface (API) or a similar software development toolkit (SDK). If web-based, the API should support Simple Object Access Protocol (SOAP), representational state transfer (REST), or both.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
| Line 535: | Line 579: | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''g.'''   |    | style="padding:5px; width:500px;" |'''g.''' The system allows a user to [[LIMS feature#Customizable fields and/or interface|independently add fields]] without requiring reconfiguration of the system, even after routine upgrades and maintenance.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
| Line 555: | Line 599: | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
  |-  |   |-  | ||
   | style="padding:5px; width:500px;" |'''l.'''   |    | style="padding:5px; width:500px;" |'''l.''' The system allows for the integration of additional printers and scanners both locally and externally.  | ||
   | style="background-color:white; padding:5px;" |  |    | style="background-color:white; padding:5px;" |  | ||
   | style="background-color:white;" |  |    | style="background-color:white;" |  | ||
Revision as of 18:36, 7 October 2014
| 
   | 
This is my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see my discussion page instead. | 
Sandbox begins below
1.0 Vendor information
  | ||||||||||||||||||
1.1 Vendor services
  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1.2 Information technology
1.2.1 General IT
 1.2.2 Hardware environment
 1.2.3 Software environment
  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1.3 Regulatory compliance and security
1.3.1 Regulatory compliance
 1.3.2 Security
  | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1.4 General system functions
1.4.1 General functions
 1.4.2 Configuration and customization
 1.4.3 Receiving and scheduling
 1.4.4 Analysis and data entry
 1.4.5 Post-analysis and validation
 1.4.6 Instruments
 1.4.7 External system interfaces
 1.4.8 Reporting
 1.4.9 Laboratory management
  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
1.5 System-specific
The system-specific addendum can be found here.
1.6 Industry-specific
The industry-specific addendum can be found here.
1.7 Custom requirements
  | ||||||||||||||||||||||||||||||||||||||||||







