Search results
From LIMSWiki
Jump to navigationJump to search
- ...mes to come from your data integrity efforts: your work will be easier and protected from loss, results will be easier to organize and analyze, and you’ll hav ...IT group have sufficient protection in place to allow access and still be protected? Note, however, any requirement for a cloud-based system would render this218 KB (34,907 words) - 16:00, 29 March 2024
- |alt = <!-- Alternative text for images --> ...laws such as [[HIPAA]] and other regulations which govern data storage for protected health [[information]] and human genetic data. The fact that scientific ins42 KB (6,067 words) - 20:36, 26 June 2018
- |alt = <!-- Alternative text for images --> ...ncerns are addressed in the engineering of road vehicles and that they are protected against different cyberattacks.<ref name=":11" />94 KB (12,503 words) - 17:15, 16 March 2023
- |alt = <!-- Alternative text for images --> ...outlined above can serve to represent sensitive datasets without divulging protected information. Moreover, these descriptive files can be made available and di65 KB (9,385 words) - 16:33, 29 April 2024
- |alt = <!-- Alternative text for images --> ...scientific results. While Bio-Formats has proved successful for microscopy images, the greater scientific community was lacking a domain-independent framewor21 KB (2,888 words) - 22:10, 24 January 2017
- |alt = <!-- Alternative text for images --> ...arily showing the detailed metadata that would allow others to reuse those images for biological research. This encourages biologists to share their data as148 KB (20,856 words) - 16:28, 29 April 2024
- |alt = <!-- Alternative text for images --> ...G.2.2.14306.96962 |accessdate=21 July 2021}}</ref> However, moving to more protected and resilient digital infrastructures in healthcare is a challenge because100 KB (13,544 words) - 18:31, 6 October 2021
- |alt = <!-- Alternative text for images --> #How are the current cloud-based eHealth systems being protected?60 KB (8,281 words) - 20:49, 19 September 2021
- |alt = <!-- Alternative text for images --> ...ed from MMTC is de-identified, such that no [[Protected health information|protected health information]] (PHI) or identifying information is utilized by end-us62 KB (7,916 words) - 23:58, 26 December 2023
- |alt = <!-- Alternative text for images --> ...r interface, accessed using a web browser. The following business layer is protected by a security layer, which enforces user authentication and authorization.56 KB (7,883 words) - 19:57, 19 September 2021
- |alt = <!-- Alternative text for images --> ...sks due to their different security requirements and infrastructures to be protected. For instance, financial and healthcare organizations have [[Regulatory com136 KB (18,556 words) - 18:40, 6 October 2021
- |alt = <!-- Alternative text for images --> ...firewall). The secure REDCap system is used for storing data considered [[protected health information]] (PHI) under HIPAA. The global system, on the other han76 KB (10,420 words) - 23:03, 7 June 2022
- |alt = <!-- Alternative text for images --> ...security and user authentication mechanism when processing and applying [[Protected health information|personal health information]]. Transport Layer Security60 KB (8,652 words) - 18:40, 15 March 2021
- |alt = <!-- Alternative text for images --> ...n issue which connects the cybersecurity expert to the users who are being protected. Relating back to concerns regarding the risks inherent in publicizing vuln67 KB (9,997 words) - 21:00, 19 September 2021
- |alt = <!-- Alternative text for images --> ...run it are constructed from this input. The application’s output (text or images) can be directly displayed in bioGUI.</blockquote>97 KB (13,006 words) - 00:53, 7 January 2020
- |alt = <!-- Alternative text for images --> ..., along with proper access control is highly necessary as data breaches of protected data can lead to massive fines, forcing institutions to severely limit the85 KB (12,769 words) - 19:38, 22 March 2021
- |alt = <!-- Alternative text for images --> * ''licensed versus unlicensed'', which refers to the operation in a protected band, such as cellular bands versus operation in unlicensed bands, such as85 KB (11,018 words) - 18:48, 6 October 2021
- |alt = <!-- Alternative text for images --> ...2018 |accessdate=23 November 2018}}</ref> Although unauthorized access to protected data may be aided by technical vulnerabilities in networked computer system47 KB (6,188 words) - 18:25, 18 June 2019
- |alt = <!-- Alternative text for images --> ...estrictions on where they can be held, requiring them to be kept local and protected. All computation and storage within the cloud infrastructure must be done o68 KB (9,594 words) - 18:38, 22 December 2020
- |alt = <!-- Alternative text for images --> ...commands. In particular, system administrator accounts should be strictly protected (e.g., via two-factor authentication) and monitored (e.g., via sudo logging62 KB (8,461 words) - 19:39, 19 September 2021