Difference between revisions of "User:Shawndouglas/sandbox/sublevel3"
From LIMSWiki
< User:Shawndouglas | sandbox
Jump to navigationJump to searchShawndouglas (talk | contribs) (Modifying more content) |
Shawndouglas (talk | contribs) (Modified items.) |
||
Line 3: | Line 3: | ||
| type = notice | | type = notice | ||
| style = width: 960px; | | style = width: 960px; | ||
| text = This is | | text = This is sublevel3 of my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see [[User_talk:Shawndouglas|my discussion page]] instead.<p></p> | ||
}} | }} | ||
Line 26: | Line 26: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:1200px;" |'''1.0 | | style="padding:5px; width:1200px;" |'''1.0.000''' The system can be tried via an online and/or on-site demonstration. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 40: | Line 40: | ||
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | {| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | ||
|- | |- | ||
! colspan=" | ! colspan="2" style="color:DarkSlateGray; text-align:left; padding-left:40px;"| 1.1.1 '''General IT''' | ||
|- | |- | ||
! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ||
Line 46: | Line 46: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:1200px;" |'''1.1 | | style="padding:5px; width:1200px;" |'''1.1.100''' The system operates with a traditional client-server architecture, with software installed on each machine that needs to access the system. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 52: | Line 52: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.101''' The system operates with a web-based interface, hosted on a server and accessed via a web browser on most any machine. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 58: | Line 58: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.102''' The system contains a single, centralized database that supports multiple sites and departments. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 64: | Line 64: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.103''' The system's database conforms to the [[ODBC|Open Database Connectivity Standard]] (ODBC). | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 70: | Line 70: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.104''' The system is designed so upgrades to the back-end database do not require extensive reconfiguration or effectively cripple the system. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 76: | Line 76: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.105''' The system is designed to not be impacted by multiple users or failover processes. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 82: | Line 82: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.106''' The system applies security features to all system files. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 88: | Line 88: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.107''' The system applies log-in security to all servers and workstations accessing it. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 94: | Line 94: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.108''' The system provides a workstation and server authentication mechanism. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 100: | Line 100: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.109''' The system applies Secured Socket Layer (SSL) encryption on the web client interface. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 106: | Line 106: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.110''' The system encrypts client passwords in a database, with support for multi-case and special characters. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 112: | Line 112: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.111''' The system uses TCP/IP as its network transport. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 118: | Line 118: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.112''' The system allows automated backup and restore capability without support intervention, as well as manual backups. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 124: | Line 124: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.113''' The system maintains the transactional history of system administrators. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 134: | Line 134: | ||
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | {| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | ||
|- | |- | ||
! colspan=" | ! colspan="2" style="color:DarkSlateGray;text-align:left; padding-left:40px;"| 1.1.2 '''Hardware environment''' | ||
|- | |- | ||
! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ||
Line 140: | Line 140: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.200''' The system proves compatible with a variety of hardware environments. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 146: | Line 146: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.201''' The system can be utilized with a touch-screen.| | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 156: | Line 156: | ||
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | {| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | ||
|- | |- | ||
! colspan=" | ! colspan="2" style="color:DarkSlateGray;text-align:left; padding-left:40px;"| 1.1.3 '''Software environment''' | ||
|- | |- | ||
! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ||
Line 162: | Line 162: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.300''' The system proves compatible with a variety of software environments. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 168: | Line 168: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.1 | | style="padding:5px; width:500px;" |'''1.1.301''' The system utilizes a non-proprietary database such as Oracle or Microsoft SQL Server. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 182: | Line 182: | ||
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | {| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | ||
|- | |- | ||
! colspan=" | ! colspan="2" style="color:DarkSlateGray; text-align:left; padding-left:40px;"| 1.2.1 '''Regulatory compliance''' | ||
|- | |- | ||
! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ||
Line 188: | Line 188: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.100''' The system can generate accurate and complete copies of records in both a human-readable and original electronic format for review and copying. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 194: | Line 194: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.101''' The system supports [[21 CFR Part 11]] and [[EU Annex 11]] requirements, including log-in security, settable automatic logouts, periodic requirements for mandatory password changes, limits on reusability of passwords, and full electronic signature. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 200: | Line 200: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.102''' The system supports USP <232>/<233> requirements. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 206: | Line 206: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.103''' The system supports [[GALP]] and/or [[GAMP]] standards. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 212: | Line 212: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.104''' The system supports the U.S. DoD 5015.2 Standard. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 218: | Line 218: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.105''' The system maintains date- and time-stamped [[audit trail|audit trails]] of all data manipulation — such as changes to results, data analysis parameters, and methods — as consistent with all applicable regulations and standards, making the information available for review, copying, and reporting to authorized users. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 224: | Line 224: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.106''' The system audit log retains all data, prohibits any deletions, and allows user comments. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 230: | Line 230: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.107''' The system maintains audit trails at least as long as the records to which they pertain. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 236: | Line 236: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.108''' The system provides additional persistent auditing capabilities, such as the audit of cancelled uploads and scheduled system functions. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 242: | Line 242: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.109''' The system provides the ability to both automatically and manually add secure [[ELN feature#Electronic signatures|electronic signatures]] to documents and other data. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 248: | Line 248: | ||
|- | |- | ||
| style="padding:5px;" | | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2 | | style="padding:5px; width:500px;" |'''1.2.110''' The system can automatically validate and approve data prior to being moved to the main database. | ||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | ! style="background-color:white; width:100px;"| Response: | ||
Line 255: | Line 255: | ||
|} | |} | ||
===1. | ===1.2.2 Security=== | ||
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | {| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | ||
|- | |- | ||
! colspan=" | ! colspan="2" style="color:DarkSlateGray;text-align:left; padding-left:40px;"| 1.2.2 '''Security''' | ||
|- | |- | ||
! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ||
! style="color:brown; background-color:#ffffee; width: | ! style="color:brown; background-color:#ffffee; width:1200px;"| Requirement # and requirement | ||
|- | |||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.200''' The system allows administrators and other authorized users to configure multiple levels of user rights and security by site location, department, group, [[LIMS feature#Configurable roles and security|role]], and/or specific function. | |||
|- | |||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | |||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.2.201''' The system allows administrators and users to reset user passwords. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.202''' The system features and enforces adjustable rules concerning password complexity, reuse, and expiration. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.203''' The system can lock a user out after a specified number of consecutive failed log-in attempts. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.204''' The system provides the option for automatic user logout based on keyboard or mouse inactivity. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.205''' The system makes authority checks to ensure only authorized individuals can use the system to perform an operation. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.206''' The system allows authorized users to modify records, while also maintaining an audit trail of such actions. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.207''' The system allows authorized users to manually delete records, while also maintaining an audit trail of such actions. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.208''' The system prompts users to declare a reason for making changes to or deleting data in the system. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.209''' The system allows authorized users to generate a detailed user access record. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.210''' The system provides email notification of lockout, security access, and improper workstation access. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.211''' The system provides a mechanism to allow a user read-only access to stored data. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.212''' The system allows automatic and/or manual holds or locks to be placed on data to ensure it goes unaltered or remains retrievable during a retention period. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.213''' The system can first feed data from connected non-CFR-compliant instruments through a virtual environment that is compliant (audit trailed, secure, versioned, etc.) before being stored. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.214''' The system can control whether users are able to export data to portable long-term storage media like a USB flash drive or recordable DVD. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.215''' The system employs automatic file encryption on stored data. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.2.216''' The system employs checks to enforce permitted sequencing of steps and events. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
|- | |||
|- | |||
|} | |} | ||
|} | |} | ||
==1. | ==1.3 General system functions== | ||
{| | {| | ||
| STYLE="vertical-align:top;"| | | STYLE="vertical-align:top;"| | ||
===1. | ===1.3.1 General functions=== | ||
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | {| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0" | ||
|- | |- | ||
! colspan=" | ! colspan="2" style="color:DarkSlateGray; text-align:left; padding-left:40px;"| 1.3.1 '''General functions''' | ||
|- | |- | ||
! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code | ||
! style="color:brown; background-color:#ffffee; width: | ! style="color:brown; background-color:#ffffee; width:1200px;"| Requirement # and requirement | ||
|- | |||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.100''' The system offers non-SDMS trained personnel the ability to easily access system data via an intuitive, user-friendly Windows-type graphical user interface (GUI) which permits the display of stored data. | |||
|- | |||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | |||
|- | |- | ||
| style="padding:5px; width:500px;" |''' | | style="padding:5px;" | | ||
| style="padding:5px; width:500px;" |'''1.3.101''' The system allows authorized users to configure their GUI to a specific language, character set, and time zone. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.102''' The system permits remote access for users, system admins, and support agents. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.103''' The system allows for the use of navigation keys to freely move from field to field. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.104''' The system allows tabular data to be sorted and filtered. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.105''' The system can send on-screen output to a printer or file without contradicting view-only statuses. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.106''' The system contains one or more spell-check dictionaries that allow authorized users to add, edit, or remove entries. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.107''' The system uses human-readable metadata tags to better describe, index, and store all captured and archived data. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.108''' The system can generate metadata tags via derived value rules. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.109''' The system allows users to manually add metadata tags to files. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.110''' The system provides full metadata, keyword, and field [[LIMS feature#Query capability|search capability]], including the use of multiple search criteria. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.111''' The system allows users to search for similar records based upon a set of metadata tag values. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.112''' The system allows users to build, save, and edit queries for future use. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.113''' The system can automate the search for and extraction of pertinent data, including the export of that data to external applications for additional processing and calculation. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.114''' The system allows users to attach comments to data and files. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.115''' The system's file viewer/explorer allow users to view native, processed, and archived data in its native file structure. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.116''' The system can link objects to other objects, e.g. linking a standard operating procedure (SOP) to a test result. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.117''' The system [[LIMS feature#Alarms and/or alerts|notifies users]] of events like the scheduling and completion of tasks. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.118''' The system includes the ability to set up alerts via email. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.119''' The system offers integrated or online user help screens. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
| style=" | |- | ||
| style="padding:5px;" | | |||
| style="padding:5px; width:500px;" |'''1.3.120''' The system includes data analysis and calculation tools. | |||
|- | |- | ||
! style="background-color:white; width:100px;"| Response: | |||
| style="background-color:white; padding:5px;" | | | style="background-color:white; padding:5px;" | | ||
|- | |||
|- | |||
|} | |} | ||
Revision as of 20:11, 21 October 2014
This is sublevel3 of my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see my discussion page instead. |
Sandbox begins below
- Y: Meets requirement in commercial off-the-shelf solution as delivered/configured (or vendor provides service)
- YC: Meets requirement only with customization (additional code, using a third-party application, etc.)
- N: Does not meet requirement
- I: Informational response only, N/A
1.0 Demonstration
|
1.1 Information technology
1.1.1 General IT
1.1.2 Hardware environment
1.1.3 Software environment
|
1.2 Regulatory compliance and security
1.2.1 Regulatory compliance
1.2.2 Security
|
1.3 General system functions
1.3.1 General functions
1.4.2 Configuration and customization
1.4.3 Data capture
1.4.4 Data archiving and migration
1.4.5 Instruments
1.4.6 External system interfaces
1.4.7 Reporting
|
1.5 Custom requirements
|