Difference between revisions of "User:Shawndouglas/sandbox/sublevel1"
Shawndouglas (talk | contribs) (Moving SDMS research to sandbox) |
Shawndouglas (talk | contribs) (Updated through 1.3) |
||
Line 300: | Line 300: | ||
! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''a.''' | | style="padding:5px; width:500px;" |'''a.''' The system supports [[21 CFR Part 11]] and [[EU Annex 11]] requirements, including login security, settable automatic logouts, periodic requirements for mandatory password changes, limits on reusability of passwords, and full electronic signature. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''b.''' | | style="padding:5px; width:500px;" |'''b.''' The system supports USP <232>/<233> requirements. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''c.''' | | style="padding:5px; width:500px;" |'''c.''' The system supports [[GALP]] and/or [[GAMP]] standards. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''d.''' | | style="padding:5px; width:500px;" |'''d.''' The system maintains date- and time-stamped [[audit trail|audit trails]] of all data manipulation — such as changes to results, data analysis parameters, and methods — as consistent with all applicable regulations and standards, making the information available for review, copying, and reporting to authorized users. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''e.''' | | style="padding:5px; width:500px;" |'''e.''' The system's audit log retains all data, prohibits any deletions, and allows user comments. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''f.''' | | style="padding:5px; width:500px;" |'''f.''' The system maintains audit trails at least as long as the records to which they pertain. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''g.''' | | style="padding:5px; width:500px;" |'''g.''' The system provides additional persistent auditing capabilities, such as the audit of cancelled uploads and scheduled system functions. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''h.''' | | style="padding:5px; width:500px;" |'''h.''' The system provides the ability to both automatically and manually add secure [[ELN feature#Electronic signatures|electronic signatures]] to documents and other data. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''i.''' | | style="padding:5px; width:500px;" |'''i.''' | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''j.''' | | style="padding:5px; width:500px;" |'''j.''' | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
Line 358: | Line 350: | ||
! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''a.''' | | style="padding:5px; width:500px;" |'''a.''' The system allows administrators and other authorized users to configure multiple levels of user rights and security by site location, department, group, [[LIMS feature#Configurable roles and security|role]], and/or specific function. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''b.''' The system allows administrators and users to reset user passwords. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''c.''' The system features and enforces adjustable rules concerning password complexity, reuse, and expiration. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''d.''' The system can lock a user out after a specified number of consecutive failed login attempts. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''e.''' The system provides the option for automatic user logout based on keyboard or mouse inactivity. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''f.''' The system allows authorized users to modify records, while also maintaining an audit trail of such actions. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''g.''' The system prompts users to declare a reason for making changes to data in the system. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''h.''' The system allows authorized users to manually delete records, while also maintaining an audit trail of such actions. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''i.''' The system allows authorized users to generate a detailed user access record. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''j.''' The system provides email notification of lockout, security access, and improper workstation access. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''k.''' The system provides a mechanism to allow a user read-only access to stored data. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''l.''' The system allows automatic and/or manual holds or locks to be placed on data to ensure it goes unaltered or remains retrievable during a retention period. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | |
Revision as of 17:47, 25 September 2014
This is sublevel1 of my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see my discussion page instead. |
Sandbox begins below
The intention of this document is 1. to assist labs searching for a laboratory informatics product with identifying their system needs and 2. to help labs better determine if a specific vendor/product meets their requirements in the form of a request for information (RFI). The idea is to allow users to incorporate a standardized specifications sheet in their comparison of various laboratory informatics products.
This questionnaire lists the extensive requirements of a scientific data management system (SDMS). It attempts to be comprehensive and includes many items that do not apply to every lab. Additionally, some laboratories' requirements include a functionality item not common to other labs. The last section, 1.7 "Custom functions," is designed for the vendor to insert any additional functionality that doesn't fall under the categories provided.
When referencing a particular item for someone else, use the section number followed by the requirement letter, e.g. 1.4.2.f for "Does your system allow the administrator to create custom screens, applications, and reports? Please give details."
Requirement code and notes
In responding to each requirement, the vendor must select a requirement code from the following:
- Y: Meets requirement in commercial off-the-shelf solution as delivered/configured (or vendor provides service)
- YC: Meets requirement only with customization (additional code, using a third-party application, etc.)
- N: Does not meet requirement
- I: Informational response only, N/A
The vendor should ideally enter a requirement code and a response for each functionality question.
Printing or saving
The print/export options in the navigation on the far left give you a few options for saving this and other pages, printing them for later.
Note: Tables are currently not being rendered in PDFs as we like through the MediaWiki Collection extension. While we sure would love for you to make a PDF of this document, be warned: the tables don't format as intended, using either the "Create a book" or "Download as PDF" processes. For now you're best off selecting "Printable version" and printing that instead.
1.0 Vendor information
|
1.1 Vendor services
|
1.2 Information technology
1.2.1 General IT
1.2.2 Hardware environment
1.2.3 Software environment
|
1.3 Regulatory compliance and security
1.3.1 Regulatory compliance
1.3.2 Security
|
1.4 General system functions
1.4.1 General functions
1.4.2 Configuration and customization
1.4.3 Receiving and scheduling
1.4.4 Analysis and data entry
1.4.5 Post-analysis and validation
1.4.6 Instruments
1.4.7 External system interfaces
1.4.8 Reporting
1.4.9 Laboratory management
|
1.5 System-specific
The system-specific addendum can be found here.
1.6 Industry-specific
The industry-specific addendum can be found here.
1.7 Custom requirements
|