Difference between revisions of "User:Shawndouglas/sandbox/sublevel20"
Shawndouglas (talk | contribs) |
Shawndouglas (talk | contribs) |
||
Line 134: | Line 134: | ||
|- | |- | ||
| style="padding:5px; width:500px;" | | | style="padding:5px; width:500px;" | | ||
[https://www.law.cornell.edu/cfr/text/7/331.17 7 CFR Part 331.17 (c)]<br /> | [https://www.law.cornell.edu/cfr/text/7/331.17 7 CFR Part 331.17 (c)]<br /> | ||
[https://www.law.cornell.edu/cfr/text/9/121.17 9 CFR Part 121.17 (c)]<br /> | [https://www.law.cornell.edu/cfr/text/9/121.17 9 CFR Part 121.17 (c)]<br /> | ||
Line 194: | Line 193: | ||
[https://extranet.who.int/prequal/content/who-technical-report-series WHO Technical Report Series, #986, Annex 2, 15.8–9] | [https://extranet.who.int/prequal/content/who-technical-report-series WHO Technical Report Series, #986, Annex 2, 15.8–9] | ||
| style="background-color:white;" |'''30.4''' The system shall have a mechanism to securely retain data in the system for a specific time period and enable protections that ensure the accurate and ready retrieval of that data throughout the records retention period. | | style="background-color:white;" |'''30.4''' The system shall have a mechanism to securely retain data in the system for a specific time period and enable protections that ensure the accurate and ready retrieval of that data throughout the records retention period. | ||
|- | |||
| style="padding:5px; width:500px;" |[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E-17-6]<br />[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.4.4] | |||
| style="background-color:white;" |'''30.5''' The system shall accurately reflect the system date and time in its use of electronic record time stamps. | |||
|- | |||
| style="padding:5px; width:500px;" |[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E-17-7]<br />[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.6.1] | |||
| style="background-color:white;" |'''30.6''' The system shall require each and every user to be assigned a unique user ID. | |||
|- | |||
| style="padding:5px; width:500px;" | | |||
[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 E-17-8]<br /> | |||
[https://www.law.cornell.edu/cfr/text/21/11.10 21 CFR Part 11.10 (e)]<br /> | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.4.5]<br /> | |||
[https://ec.europa.eu/health/sites/health/files/files/eudralex/vol-4/annex11_01-2011_en.pdf E.U. Annex 11-9] | |||
| style="background-color:white;" |'''30.7''' The system shall prevent the modification, deletion, or disabling of its audit trail, as well as record such attempts. | |||
|- | |||
| style="padding:5px; width:500px;" |[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.4.2] | |||
| style="background-color:white;" |'''30.8''' The system shall be capable of identifying instances of audit processing failure (e.g., write errors, general failure of the audit tool, etc.), sending alerts or notifications to appropriate personnel in such cases. | |||
|- | |- | ||
|} | |} | ||
|} | |} |
Revision as of 20:30, 17 September 2019
This is sublevel20 of my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see my discussion page instead. |
Sandbox begins below
29. Artificial Intelligence and Smart Systems
|