Difference between revisions of "User:Shawndouglas/Sandbox"
From LIMSWiki
Jump to navigationJump to searchShawndouglas (talk | contribs) m (Replaced item Z in 1.4.1) |
Shawndouglas (talk | contribs) (Updated some content. Saving and updating more.) |
||
Line 53: | Line 53: | ||
! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''a.''' | | style="padding:5px; width:500px;" |'''a.''' The vendor offers an online and/or on-site demonstration. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''b.''' | | style="padding:5px; width:500px;" |'''b.''' The vendor provides a detailed project plan that includes the project team, timeline, deliverables, and risk and issue management procedures. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''c.''' | | style="padding:5px; width:500px;" |'''c.''' The vendor explains their overall project approach, deliverables, time constraints, and any other criteria for the project. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''d.''' | | style="padding:5px; width:500px;" |'''d.''' The vendor provides reliable cost estimates and pricing schedules, including all products and services in the scope of work. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''e.''' | | style="padding:5px; width:500px;" |'''e.''' The vendor details the amount of time and staff that the purchaser will have to provide for the implementation process. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''f.''' | | style="padding:5px; width:500px;" |'''f.''' The vendor can explain the maintenance and support offered during and after implementation, including times and methods of availability, issue escalation and management, etc. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''g.''' | | style="padding:5px; width:500px;" |'''g.''' The vendor provides a support schedule for the implementation process, including optional support levels, their function, and availability. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''h.''' | | style="padding:5px; width:500px;" |'''h.''' The vendor provides support during the "go-live" period between system validation/operational deployment and final acceptance/beginning of maintenance and support agreements. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''i.''' | | style="padding:5px; width:500px;" |'''i.''' The vendor provides a gap analysis after initial system installation, identifying the deliverables or tasks remaining. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''j.''' | | style="padding:5px; width:500px;" |'''j.''' The vendor provides a table linking each deliverable to the corresponding user requirement specification it fulfills. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''k.''' | | style="padding:5px; width:500px;" |'''k.''' The vendor uses a consistent training methodology for educating new users. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''l.''' | | style="padding:5px; width:500px;" |'''l.''' The vendor supplies [[Laboratory information system|LIS]]-specific training program curricula. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''m.''' | | style="padding:5px; width:500px;" |'''m.''' The vendor provides user, administrator, developer, installation, and reference manuals. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''n.''' | | style="padding:5px; width:500px;" |'''n.''' The vendor provides design qualification documentation. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''o.''' | | style="padding:5px; width:500px;" |'''o.''' The vendor provides installation qualification documentation. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''p.''' | | style="padding:5px; width:500px;" |'''p.''' The vendor provides operation qualification documentation. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''q.''' | | style="padding:5px; width:500px;" |'''q.''' The vendor provides performance qualification documentation during implementation. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''r.''' | | style="padding:5px; width:500px;" |'''r.''' The vendor provides well-documented system upgrades that authorized users can independently install. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''s.''' | | style="padding:5px; width:500px;" |'''s.''' The vendor provides source code for the system. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''t.''' | | style="padding:5px; width:500px;" |'''t.''' The vendor provides an optional comprehensive set of test codes suitable for use by the purchaser. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
Line 148: | Line 148: | ||
! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''a.''' | | style="padding:5px; width:500px;" |'''a.''' The system operates with a traditional client-server architecture, with software installed on each machine that needs to access the system. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''b.''' | | style="padding:5px; width:500px;" |'''b.''' The system operates with a web-based interface, hosted on a server and accessed via a web browser on most any machine. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''c.''' | | style="padding:5px; width:500px;" |'''c.''' The system contains a single, centralized database that supports multiple sites and departments. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''d.''' | | style="padding:5px; width:500px;" |'''d.''' The system's database conforms to the [[ODBC|Open Database Connectivity Standard]] (ODBC). | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''e.''' | | style="padding:5px; width:500px;" |'''e.''' The system is designed so upgrades to the back-end database do not require extensive reconfiguration or effectively cripple the system. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''f.''' | | style="padding:5px; width:500px;" |'''f.''' The system is designed to not be impacted by multiple users or failover processes. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''g.''' | | style="padding:5px; width:500px;" |'''g.''' The system applies security features to all system files. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''h.''' | | style="padding:5px; width:500px;" |'''h.''' The system applies log-in security to all servers and workstations accessing it. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''i.''' | | style="padding:5px; width:500px;" |'''i.''' The system provides a workstation and server authentication mechanism. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''j.''' | | style="padding:5px; width:500px;" |'''j.''' The system applies Secured Socket Layer (SSL) encryption on the web client interface. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''k.''' | | style="padding:5px; width:500px;" |'''k.''' The system encrypts client passwords in a database, with support for multi-case and special characters. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''l.''' | | style="padding:5px; width:500px;" |'''l.''' The system uses TCP/IP as its network transport. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''m.''' | | style="padding:5px; width:500px;" |'''m.''' The system contains an archive utility that doesn't require off-line mode. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''n.''' | | style="padding:5px; width:500px;" |'''n.''' The system allows automated backup and restore capability without support intervention, as well as manual backups. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''o.''' | | style="padding:5px; width:500px;" |'''o.''' The system maintains the transactional history of system administrators. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''p.''' | | style="padding:5px; width:500px;" |'''p.''' The system maintains an analyst communication log, accessible by the administrator. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
Line 226: | Line 222: | ||
! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''a.''' | | style="padding:5px; width:500px;" |'''a.''' The system proves compatible with a variety of hardware environments. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''b.''' | | style="padding:5px; width:500px;" |'''b.''' The system can be utilized with a touch-screen. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
Line 244: | Line 240: | ||
! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''a.''' | | style="padding:5px; width:500px;" |'''a.''' The system proves compatible with a variety of software environments. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''b.''' | | style="padding:5px; width:500px;" |'''b.''' The system utilizes a non-proprietary database such as Oracle or Microsoft SQL Server. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
Line 267: | Line 263: | ||
! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''a.''' | | style="padding:5px; width:500px;" |'''a.''' The system supports [[21 CFR Part 11]] and [[40 CFR Part 3]] requirements, including login security, settable automatic logouts, periodic requirements for mandatory password changes, limits on reusability of passwords, and full electronic signature. | ||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''b.''' The system supports [[ISO/IEC 17025]] requirements. | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''c.''' The system supports [[HIPAA]] requirements. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''d.''' The system supports [[GALP]] and/or [[GAMP]] standards. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''e.''' The system supports the standards of [[The NELAC Institute]]. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''f.''' The system meets government requirements for handling classified information and documents. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''g.''' The system maintains [[audit trail|audit]] and specification violation trails of all data manipulation — such as result and header information changes — as consistent with all applicable regulations and standards. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''h.''' The system maintains audit trails at least as long as the records to which they pertain. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''i.''' The system's audit log retains all data, prohibits any deletions, allows user comments, and allows reporting of contained information. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''j.''' The system provides additional persistent auditing capabilities, such as the audit of cancelled tests and scheduled system functions. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''k.''' The system provides user-selectable [[The NELAC Institute|NELAP]]-compliant internal [[chain of custody]] that tracks all specimens and associated containers from the time they are collected until disposed of. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''l.''' The system provides the ability to insert/manage secure [[ELN feature#Electronic signatures|electronic]] and/or digital signatures. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''m.''' The system incorporates automatic date and time stamping of additions, changes, etc. | ||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''n.''' The system can automatically validate and approve data prior to being moved to the main database. | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
Line 325: | Line 329: | ||
! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''a.''' | | style="padding:5px; width:500px;" |'''a.''' The system allows administrators and other authorized users to configure multiple levels of user rights and security by site location, department, group, [[LIMS feature#Configurable roles and security|role]], and/or specific function. | ||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''b.''' The system allows administrators and users to reset user passwords. | |||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''c.''' The system features and enforces adjustable rules concerning password complexity, reuse, and expiration. | |||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''d.''' The system can lock a user out after a specified number of consecutive failed log-in attempts. | |||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''e.''' The system provides the option for automatic user logout based on keyboard or mouse inactivity. | |||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''f.''' The system makes authority checks to ensure only authorized individuals can use the system to perform an operation. | |||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''g.''' The system allows authorized users to modify records, while also maintaining an audit trail of such actions. | |||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''h.''' The system allows authorized users to manually delete records, while also maintaining an audit trail of such actions. | |||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''i.''' The system prompts users to declare a reason for making changes to or deleting data in the system. | |||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''j.''' The system provides email notification of lockout, security access, and improper workstation access. | |||
| style="background-color:white; padding:5px;" | | |||
| style="background-color:white;" | | |||
|- | |||
| style="padding:5px; width:500px;" |'''k.''' The system provides a mechanism to allow a user read-only access to stored data. | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''l.''' The system allows authorized users to generate a detailed user access record. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''m.''' The system allows authorized users to review audit logs at will. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''n.''' The system allows authorized users to query and print chain of custody for items, cases, projects, and batches. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''o.''' The system allows supervisors to override chain of custody. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''p.''' The system automatically tracks when supervisors review critical result values. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''q.''' The system allows automatic and/or manual holds or locks to be placed on data to ensure it goes unaltered or remains retrievable during a retention period. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''r.''' The system can first feed data from connected non-CFR-compliant instruments through a virtual environment that is compliant (audit trailed, secure, versioned, etc.) before being stored. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''s.''' The system can control whether users are able to export data to portable long-term storage media like a USB flash drive or recordable DVD. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''t.''' The system employs automatic file encryption on stored data. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''u.''' The system employs checks to enforce permitted sequencing of steps and events. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''v.''' The system allows multiple users to connect simultaneously to a contract lab. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''w.''' The system provides read-only access to contract laboratory results. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px; width:500px;" |'''x.''' The system prohibits issuing reports outside of qualified areas while also allowing reports to be viewed locally or remotely based on security application limits and/or specimen ownership. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
Line 515: | Line 559: | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''b.''' | | style="padding:5px; width:500px;" |'''b.''' The system architecture is modular or extensible and can easily and efficiently be modified to facilitate the addition of new functionality as business needs change. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''c.''' | | style="padding:5px; width:500px;" |'''c.''' The system has an application programming interface (API) or a similar software development toolkit (SDK). If web-based, the API should support Simple Object Access Protocol (SOAP), representational state transfer (REST), or both. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
Line 535: | Line 579: | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''g.''' | | style="padding:5px; width:500px;" |'''g.''' The system allows a user to [[LIMS feature#Customizable fields and/or interface|independently add fields]] without requiring reconfiguration of the system, even after routine upgrades and maintenance. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
Line 555: | Line 599: | ||
| style="background-color:white;" | | | style="background-color:white;" | | ||
|- | |- | ||
| style="padding:5px; width:500px;" |'''l.''' | | style="padding:5px; width:500px;" |'''l.''' The system allows for the integration of additional printers and scanners both locally and externally. | ||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style="background-color:white;" | | | style="background-color:white;" | |
Revision as of 18:36, 7 October 2014
This is my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see my discussion page instead. |
Sandbox begins below
1.0 Vendor information
|
1.1 Vendor services
|
1.2 Information technology
1.2.1 General IT
1.2.2 Hardware environment
1.2.3 Software environment
|
1.3 Regulatory compliance and security
1.3.1 Regulatory compliance
1.3.2 Security
|
1.4 General system functions
1.4.1 General functions
1.4.2 Configuration and customization
1.4.3 Receiving and scheduling
1.4.4 Analysis and data entry
1.4.5 Post-analysis and validation
1.4.6 Instruments
1.4.7 External system interfaces
1.4.8 Reporting
1.4.9 Laboratory management
|
1.5 System-specific
The system-specific addendum can be found here.
1.6 Industry-specific
The industry-specific addendum can be found here.
1.7 Custom requirements
|