Difference between revisions of "User:Shawndouglas/sandbox/sublevel3"

From LIMSWiki
Jump to navigationJump to search
(Modifying more content)
(Modified items.)
Line 3: Line 3:
| type      = notice
| type      = notice
| style    = width: 960px;
| style    = width: 960px;
| text      = This is sublevel1 of my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see [[User_talk:Shawndouglas|my discussion page]] instead.<p></p>
| text      = This is sublevel3 of my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see [[User_talk:Shawndouglas|my discussion page]] instead.<p></p>
}}
}}


Line 26: Line 26:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:1200px;" |'''1.0-000''' The system can be tried via an online and/or on-site demonstration.
   | style="padding:5px; width:1200px;" |'''1.0.000''' The system can be tried via an online and/or on-site demonstration.
  |-  
  |-  
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 40: Line 40:
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
  |-
  |-
   ! colspan="3" style="color:DarkSlateGray; text-align:left; padding-left:40px;"| 1.1.1 '''General IT'''
   ! colspan="2" style="color:DarkSlateGray; text-align:left; padding-left:40px;"| 1.1.1 '''General IT'''
  |-
  |-
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
Line 46: Line 46:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:1200px;" |'''1.1-100''' The system operates with a traditional client-server architecture, with software installed on each machine that needs to access the system.
   | style="padding:5px; width:1200px;" |'''1.1.100''' The system operates with a traditional client-server architecture, with software installed on each machine that needs to access the system.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 52: Line 52:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-101''' The system operates with a web-based interface, hosted on a server and accessed via a web browser on most any machine.  
   | style="padding:5px; width:500px;" |'''1.1.101''' The system operates with a web-based interface, hosted on a server and accessed via a web browser on most any machine.  
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 58: Line 58:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-102''' The system contains a single, centralized database that supports multiple sites and departments.
   | style="padding:5px; width:500px;" |'''1.1.102''' The system contains a single, centralized database that supports multiple sites and departments.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 64: Line 64:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-103''' The system's database conforms to the [[ODBC|Open Database Connectivity Standard]] (ODBC).
   | style="padding:5px; width:500px;" |'''1.1.103''' The system's database conforms to the [[ODBC|Open Database Connectivity Standard]] (ODBC).
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 70: Line 70:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-104''' The system is designed so upgrades to the back-end database do not require extensive reconfiguration or effectively cripple the system.
   | style="padding:5px; width:500px;" |'''1.1.104''' The system is designed so upgrades to the back-end database do not require extensive reconfiguration or effectively cripple the system.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 76: Line 76:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-105''' The system is designed to not be impacted by multiple users or failover processes.
   | style="padding:5px; width:500px;" |'''1.1.105''' The system is designed to not be impacted by multiple users or failover processes.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 82: Line 82:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-106''' The system applies security features to all system files.
   | style="padding:5px; width:500px;" |'''1.1.106''' The system applies security features to all system files.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 88: Line 88:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-107''' The system applies log-in security to all servers and workstations accessing it.
   | style="padding:5px; width:500px;" |'''1.1.107''' The system applies log-in security to all servers and workstations accessing it.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 94: Line 94:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-108''' The system provides a workstation and server authentication mechanism.
   | style="padding:5px; width:500px;" |'''1.1.108''' The system provides a workstation and server authentication mechanism.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 100: Line 100:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-109''' The system applies Secured Socket Layer (SSL) encryption on the web client interface.
   | style="padding:5px; width:500px;" |'''1.1.109''' The system applies Secured Socket Layer (SSL) encryption on the web client interface.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 106: Line 106:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-110''' The system encrypts client passwords in a database, with support for multi-case and special characters.
   | style="padding:5px; width:500px;" |'''1.1.110''' The system encrypts client passwords in a database, with support for multi-case and special characters.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 112: Line 112:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-111''' The system uses TCP/IP as its network transport.
   | style="padding:5px; width:500px;" |'''1.1.111''' The system uses TCP/IP as its network transport.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 118: Line 118:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-112''' The system allows automated backup and restore capability without support intervention, as well as manual backups.
   | style="padding:5px; width:500px;" |'''1.1.112''' The system allows automated backup and restore capability without support intervention, as well as manual backups.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 124: Line 124:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-113''' The system maintains the transactional history of system administrators.
   | style="padding:5px; width:500px;" |'''1.1.113''' The system maintains the transactional history of system administrators.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 134: Line 134:
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
  |-  
  |-  
   ! colspan="3" style="color:DarkSlateGray;text-align:left; padding-left:40px;"| 1.1.2 '''Hardware environment'''
   ! colspan="2" style="color:DarkSlateGray;text-align:left; padding-left:40px;"| 1.1.2 '''Hardware environment'''
  |-
  |-
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
Line 140: Line 140:
  |-   
  |-   
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-200''' The system proves compatible with a variety of hardware environments.
   | style="padding:5px; width:500px;" |'''1.1.200''' The system proves compatible with a variety of hardware environments.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 146: Line 146:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-201''' The system can be utilized with a touch-screen.|
   | style="padding:5px; width:500px;" |'''1.1.201''' The system can be utilized with a touch-screen.|
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 156: Line 156:
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
  |-  
  |-  
   ! colspan="3" style="color:DarkSlateGray;text-align:left; padding-left:40px;"| 1.1.3 '''Software environment'''
   ! colspan="2" style="color:DarkSlateGray;text-align:left; padding-left:40px;"| 1.1.3 '''Software environment'''
  |-
  |-
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
Line 162: Line 162:
  |-   
  |-   
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-300''' The system proves compatible with a variety of software environments.
   | style="padding:5px; width:500px;" |'''1.1.300''' The system proves compatible with a variety of software environments.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 168: Line 168:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.1-301''' The system utilizes a non-proprietary database such as Oracle or Microsoft SQL Server.
   | style="padding:5px; width:500px;" |'''1.1.301''' The system utilizes a non-proprietary database such as Oracle or Microsoft SQL Server.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 182: Line 182:
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
  |-  
  |-  
   ! colspan="3" style="color:DarkSlateGray; text-align:left; padding-left:40px;"| 1.2.1 '''Regulatory compliance'''
   ! colspan="2" style="color:DarkSlateGray; text-align:left; padding-left:40px;"| 1.2.1 '''Regulatory compliance'''
  |-
  |-
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
Line 188: Line 188:
  |-   
  |-   
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-100''' The system can generate accurate and complete copies of records in both a human-readable and original electronic format for review and copying.
   | style="padding:5px; width:500px;" |'''1.2.100''' The system can generate accurate and complete copies of records in both a human-readable and original electronic format for review and copying.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 194: Line 194:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-101''' The system supports [[21 CFR Part 11]] and [[EU Annex 11]] requirements, including log-in security, settable automatic logouts, periodic requirements for mandatory password changes, limits on reusability of passwords, and full electronic signature.
   | style="padding:5px; width:500px;" |'''1.2.101''' The system supports [[21 CFR Part 11]] and [[EU Annex 11]] requirements, including log-in security, settable automatic logouts, periodic requirements for mandatory password changes, limits on reusability of passwords, and full electronic signature.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 200: Line 200:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-102''' The system supports USP <232>/<233> requirements.
   | style="padding:5px; width:500px;" |'''1.2.102''' The system supports USP <232>/<233> requirements.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 206: Line 206:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-103''' The system supports [[GALP]] and/or [[GAMP]] standards.
   | style="padding:5px; width:500px;" |'''1.2.103''' The system supports [[GALP]] and/or [[GAMP]] standards.
  |-   
  |-   
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 212: Line 212:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-104''' The system supports the U.S. DoD 5015.2 Standard.
   | style="padding:5px; width:500px;" |'''1.2.104''' The system supports the U.S. DoD 5015.2 Standard.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 218: Line 218:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-105''' The system maintains date- and time-stamped [[audit trail|audit trails]] of all data manipulation — such as changes to results, data analysis parameters, and methods — as consistent with all applicable regulations and standards, making the information available for review, copying, and reporting to authorized users.
   | style="padding:5px; width:500px;" |'''1.2.105''' The system maintains date- and time-stamped [[audit trail|audit trails]] of all data manipulation — such as changes to results, data analysis parameters, and methods — as consistent with all applicable regulations and standards, making the information available for review, copying, and reporting to authorized users.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 224: Line 224:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-106''' The system audit log retains all data, prohibits any deletions, and allows user comments.
   | style="padding:5px; width:500px;" |'''1.2.106''' The system audit log retains all data, prohibits any deletions, and allows user comments.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 230: Line 230:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-107''' The system maintains audit trails at least as long as the records to which they pertain.
   | style="padding:5px; width:500px;" |'''1.2.107''' The system maintains audit trails at least as long as the records to which they pertain.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 236: Line 236:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-108''' The system provides additional persistent auditing capabilities, such as the audit of cancelled uploads and scheduled system functions.
   | style="padding:5px; width:500px;" |'''1.2.108''' The system provides additional persistent auditing capabilities, such as the audit of cancelled uploads and scheduled system functions.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 242: Line 242:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-109''' The system provides the ability to both automatically and manually add secure [[ELN feature#Electronic signatures|electronic signatures]] to documents and other data.
   | style="padding:5px; width:500px;" |'''1.2.109''' The system provides the ability to both automatically and manually add secure [[ELN feature#Electronic signatures|electronic signatures]] to documents and other data.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 248: Line 248:
  |-  
  |-  
   | style="padding:5px;" |
   | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2-110''' The system can automatically validate and approve data prior to being moved to the main database.
   | style="padding:5px; width:500px;" |'''1.2.110''' The system can automatically validate and approve data prior to being moved to the main database.
  |-
  |-
   ! style="background-color:white; width:100px;"| Response:
   ! style="background-color:white; width:100px;"| Response:
Line 255: Line 255:
|}
|}


===1.3.2 Security===
===1.2.2 Security===
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
  |-  
  |-  
   ! colspan="3" style="color:DarkSlateGray;text-align:left; padding-left:40px;"| 1.3.2 '''Security'''
   ! colspan="2" style="color:DarkSlateGray;text-align:left; padding-left:40px;"| 1.2.2 '''Security'''
  |-
  |-
  ! style="color:brown; background-color:#ffffee; width:500px;"| Request for information
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
   ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response
   ! style="color:brown; background-color:#ffffee; width:1200px;"| Requirement # and requirement
|- 
  | style="padding:5px;" |
  | style="padding:5px; width:500px;" |'''1.2.200''' The system allows administrators and other authorized users to configure multiple levels of user rights and security by site location, department, group, [[LIMS feature#Configurable roles and security|role]], and/or specific function.
|-
  ! style="background-color:white; width:100px;"| Response:
  | style="background-color:white; padding:5px;" |
  |-  
  |-  
   | style="padding:5px; width:500px;" |'''a.''' The system allows administrators and other authorized users to configure multiple levels of user rights and security by site location, department, group, [[LIMS feature#Configurable roles and security|role]], and/or specific function.
  | style="padding:5px;" |
  | style="background-color:white; padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.201''' The system allows administrators and users to reset user passwords.
  | style="background-color:white;" |
  |-
  |-
   | style="padding:5px; width:500px;" |'''b.''' The system allows administrators and users to reset user passwords.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.202''' The system features and enforces adjustable rules concerning password complexity, reuse, and expiration.
  |-
  |-
   | style="padding:5px; width:500px;" |'''c.''' The system features and enforces adjustable rules concerning password complexity, reuse, and expiration.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
   | style="padding:5px;" |
  | style="padding:5px; width:500px;" |'''1.2.203''' The system can lock a user out after a specified number of consecutive failed log-in attempts.
  |-
  |-
   | style="padding:5px; width:500px;" |'''d.''' The system can lock a user out after a specified number of consecutive failed log-in attempts.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.204''' The system provides the option for automatic user logout based on keyboard or mouse inactivity.
  |-
  |-
   | style="padding:5px; width:500px;" |'''e.''' The system provides the option for automatic user logout based on keyboard or mouse inactivity.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.205''' The system makes authority checks to ensure only authorized individuals can use the system to perform an operation.
  |-
  |-
   | style="padding:5px; width:500px;" |'''f.''' The system makes authority checks to ensure only authorized individuals can use the system to perform an operation.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.206''' The system allows authorized users to modify records, while also maintaining an audit trail of such actions.
  |-
  |-
   | style="padding:5px; width:500px;" |'''g.''' The system allows authorized users to modify records, while also maintaining an audit trail of such actions.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.207''' The system allows authorized users to manually delete records, while also maintaining an audit trail of such actions.
  |-
  |-
   | style="padding:5px; width:500px;" |'''h.''' The system allows authorized users to manually delete records, while also maintaining an audit trail of such actions.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.208''' The system prompts users to declare a reason for making changes to or deleting data in the system.
  |-
  |-
   | style="padding:5px; width:500px;" |'''i.''' The system prompts users to declare a reason for making changes to or deleting data in the system.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.209''' The system allows authorized users to generate a detailed user access record.
  |-
  |-
   | style="padding:5px; width:500px;" |'''j.''' The system allows authorized users to generate a detailed user access record.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.210''' The system provides email notification of lockout, security access, and improper workstation access.
  |-
  |-
   | style="padding:5px; width:500px;" |'''k.''' The system provides email notification of lockout, security access, and improper workstation access.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
   | style="padding:5px;" |
  | style="padding:5px; width:500px;" |'''1.2.211''' The system provides a mechanism to allow a user read-only access to stored data.
  |-
  |-
   | style="padding:5px; width:500px;" |'''l.''' The system provides a mechanism to allow a user read-only access to stored data.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.212''' The system allows automatic and/or manual holds or locks to be placed on data to ensure it goes unaltered or remains retrievable during a retention period.
  |-
  |-
   | style="padding:5px; width:500px;" |'''m.''' The system allows automatic and/or manual holds or locks to be placed on data to ensure it goes unaltered or remains retrievable during a retention period.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.213''' The system can first feed data from connected non-CFR-compliant instruments through a virtual environment that is compliant (audit trailed, secure, versioned, etc.) before being stored.
  |-
  |-
   | style="padding:5px; width:500px;" |'''n.''' The system can first feed data from connected non-CFR-compliant instruments through a virtual environment that is compliant (audit trailed, secure, versioned, etc.) before being stored.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
   | style="padding:5px;" |
  | style="padding:5px; width:500px;" |'''1.2.214''' The system can control whether users are able to export data to portable long-term storage media like a USB flash drive or recordable DVD.
  |-
  |-
   | style="padding:5px; width:500px;" |'''o.''' The system can control whether users are able to export data to portable long-term storage media like a USB flash drive or recordable DVD.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.215''' The system employs automatic file encryption on stored data.
  |-
  |-
   | style="padding:5px; width:500px;" |'''p.''' The system employs automatic file encryption on stored data.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.2.216''' The system employs checks to enforce permitted sequencing of steps and events.
  |-
  |-
   | style="padding:5px; width:500px;" |'''q.''' The system employs checks to enforce permitted sequencing of steps and events.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
  | style="background-color:white;" |
  |-  
  |-
|}
|}
|}
|}


==1.4 General system functions==
==1.3 General system functions==
{|  
{|  
  | STYLE="vertical-align:top;"|
  | STYLE="vertical-align:top;"|
===1.4.1 General functions===
===1.3.1 General functions===
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"
  |-  
  |-  
   ! colspan="3" style="color:DarkSlateGray; text-align:left; padding-left:40px;"| 1.4.1 '''General functions'''
   ! colspan="2" style="color:DarkSlateGray; text-align:left; padding-left:40px;"| 1.3.1 '''General functions'''
  |-
  |-
  ! style="color:brown; background-color:#ffffee; width:500px;"| Request for information
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
   ! style="color:brown; background-color:#ffffee; width:100px;"| Requirement code
   ! style="color:brown; background-color:#ffffee; width:700px;"| Vendor response
   ! style="color:brown; background-color:#ffffee; width:1200px;"| Requirement # and requirement
|- 
  | style="padding:5px;" |
  | style="padding:5px; width:500px;" |'''1.3.100''' The system offers non-SDMS trained personnel the ability to easily access system data via an intuitive, user-friendly Windows-type graphical user interface (GUI) which permits the display of stored data.
|-
  ! style="background-color:white; width:100px;"| Response:
  | style="background-color:white; padding:5px;" |
  |-  
  |-  
   | style="padding:5px; width:500px;" |'''a.''' The system offers non-SDMS trained personnel the ability to easily access system data via an intuitive, user-friendly Windows-type graphical user interface (GUI) which permits the display of stored data.
  | style="padding:5px;" |
  | style="background-color:white; padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.101''' The system allows authorized users to configure their GUI to a specific language, character set, and time zone.
  | style="background-color:white;" |
  |-
  |-
   | style="padding:5px; width:500px;" |'''b.''' The system allows authorized users to configure their GUI to a specific language, character set, and time zone.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.102''' The system permits remote access for users, system admins, and support agents.
  |-
  |-
   | style="padding:5px; width:500px;" |'''c.''' The system permits remote access for users, system admins, and support agents.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.103''' The system allows for the use of navigation keys to freely move from field to field.
  |-
  |-
   | style="padding:5px; width:500px;" |'''d.''' The system allows for the use of navigation keys to freely move from field to field.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.104''' The system allows tabular data to be sorted and filtered.
  |-
  |-
   | style="padding:5px; width:500px;" |'''e.''' The system allows tabular data to be sorted and filtered.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.105''' The system can send on-screen output to a printer or file without contradicting view-only statuses.
  |-
  |-
   | style="padding:5px; width:500px;" |'''f.''' The system can send on-screen output to a printer or file without contradicting view-only statuses.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
   | style="padding:5px;" |
  | style="padding:5px; width:500px;" |'''1.3.106''' The system contains one or more spell-check dictionaries that allow authorized users to add, edit, or remove entries.
  |-
  |-
   | style="padding:5px; width:500px;" |'''g.''' The system contains one or more spell-check dictionaries that allow authorized users to add, edit, or remove entries.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
   | style="padding:5px;" |
  | style="padding:5px; width:500px;" |'''1.3.107''' The system uses human-readable metadata tags to better describe, index, and store all captured and archived data.
  |-
  |-
   | style="padding:5px; width:500px;" |'''h.''' The system uses human-readable metadata tags to better describe, index, and store all captured and archived data.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.108''' The system can generate metadata tags via derived value rules.
  |-
  |-
   | style="padding:5px; width:500px;" |'''i.''' The system can generate metadata tags via derived value rules.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.109''' The system allows users to manually add metadata tags to files.
  |-
  |-
   | style="padding:5px; width:500px;" |'''j.''' The system allows users to manually add metadata tags to files.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
   | style="padding:5px;" |
  | style="padding:5px; width:500px;" |'''1.3.110''' The system provides full metadata, keyword, and field [[LIMS feature#Query capability|search capability]], including the use of multiple search criteria.
  |-
  |-
   | style="padding:5px; width:500px;" |'''k.''' The system provides full metadata, keyword, and field [[LIMS feature#Query capability|search capability]], including the use of multiple search criteria.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.111''' The system allows users to search for similar records based upon a set of metadata tag values.
  |-
  |-
   | style="padding:5px; width:500px;" |'''l.''' The system allows users to search for similar records based upon a set of metadata tag values.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.112''' The system allows users to build, save, and edit queries for future use.
  |-
  |-
   | style="padding:5px; width:500px;" |'''m.''' The system allows users to build, save, and edit queries for future use.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.113''' The system can automate the search for and extraction of pertinent data, including the export of that data to external applications for additional processing and calculation.
  |-
  |-
   | style="padding:5px; width:500px;" |'''n.''' The system can automate the search for and extraction of pertinent data, including the export of that data to external applications for additional processing and calculation.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.114''' The system allows users to attach comments to data and files.
  |-
  |-
   | style="padding:5px; width:500px;" |'''o.''' The system allows users to attach comments to data and files.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.115''' The system's file viewer/explorer allow users to view native, processed, and archived data in its native file structure.
  |-
  |-
   | style="padding:5px; width:500px;" |'''p.''' The system's file viewer/explorer allow users to view native, processed, and archived data in its native file structure.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.116''' The system can link objects to other objects, e.g. linking a standard operating procedure (SOP) to a test result.
  |-
  |-
   | style="padding:5px; width:500px;" |'''q.''' The system can link objects to other objects, e.g. linking a standard operating procedure (SOP) to a test result.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
   | style="padding:5px;" |
  | style="padding:5px; width:500px;" |'''1.3.117''' The system [[LIMS feature#Alarms and/or alerts|notifies users]] of events like the scheduling and completion of tasks.
  |-
  |-
   | style="padding:5px; width:500px;" |'''r.''' The system [[LIMS feature#Alarms and/or alerts|notifies users]] of events like the scheduling and completion of tasks.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.118''' The system includes the ability to set up alerts via email.
  |-
  |-
   | style="padding:5px; width:500px;" |'''s.''' The system includes the ability to set up alerts via email.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.119''' The system offers integrated or online user help screens.
  |-
  |-
   | style="padding:5px; width:500px;" |'''t.''' The system offers integrated or online user help screens.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
   | style="background-color:white;" |
|-
  | style="padding:5px;" |
   | style="padding:5px; width:500px;" |'''1.3.120''' The system includes data analysis and calculation tools.
  |-
  |-
   | style="padding:5px; width:500px;" |'''u.''' The system includes data analysis and calculation tools.
   ! style="background-color:white; width:100px;"| Response:
   | style="background-color:white; padding:5px;" |
   | style="background-color:white; padding:5px;" |
  | style="background-color:white;" |
  |-  
  |-
|}
|}



Revision as of 20:11, 21 October 2014

Sandbox begins below

  • Y: Meets requirement in commercial off-the-shelf solution as delivered/configured (or vendor provides service)
  • YC: Meets requirement only with customization (additional code, using a third-party application, etc.)
  • N: Does not meet requirement
  • I: Informational response only, N/A


1.0 Demonstration

1.0 Demonstration
Requirement code Requirement # and requirement
1.0.000 The system can be tried via an online and/or on-site demonstration.
Response:

1.1 Information technology

1.1.1 General IT

1.1.1 General IT
Requirement code Requirement # and requirement
1.1.100 The system operates with a traditional client-server architecture, with software installed on each machine that needs to access the system.
Response:
1.1.101 The system operates with a web-based interface, hosted on a server and accessed via a web browser on most any machine.
Response:
1.1.102 The system contains a single, centralized database that supports multiple sites and departments.
Response:
1.1.103 The system's database conforms to the Open Database Connectivity Standard (ODBC).
Response:
1.1.104 The system is designed so upgrades to the back-end database do not require extensive reconfiguration or effectively cripple the system.
Response:
1.1.105 The system is designed to not be impacted by multiple users or failover processes.
Response:
1.1.106 The system applies security features to all system files.
Response:
1.1.107 The system applies log-in security to all servers and workstations accessing it.
Response:
1.1.108 The system provides a workstation and server authentication mechanism.
Response:
1.1.109 The system applies Secured Socket Layer (SSL) encryption on the web client interface.
Response:
1.1.110 The system encrypts client passwords in a database, with support for multi-case and special characters.
Response:
1.1.111 The system uses TCP/IP as its network transport.
Response:
1.1.112 The system allows automated backup and restore capability without support intervention, as well as manual backups.
Response:
1.1.113 The system maintains the transactional history of system administrators.
Response:

1.1.2 Hardware environment

1.1.2 Hardware environment
Requirement code Requirement # and requirement
1.1.200 The system proves compatible with a variety of hardware environments.
Response:
1.1.201 The system can be utilized with a touch-screen.|
Response:

1.1.3 Software environment

1.1.3 Software environment
Requirement code Requirement # and requirement
1.1.300 The system proves compatible with a variety of software environments.
Response:
1.1.301 The system utilizes a non-proprietary database such as Oracle or Microsoft SQL Server.
Response:

1.2 Regulatory compliance and security

1.2.1 Regulatory compliance

1.2.1 Regulatory compliance
Requirement code Requirement # and requirement
1.2.100 The system can generate accurate and complete copies of records in both a human-readable and original electronic format for review and copying.
Response:
1.2.101 The system supports 21 CFR Part 11 and EU Annex 11 requirements, including log-in security, settable automatic logouts, periodic requirements for mandatory password changes, limits on reusability of passwords, and full electronic signature.
Response:
1.2.102 The system supports USP <232>/<233> requirements.
Response:
1.2.103 The system supports GALP and/or GAMP standards.
Response:
1.2.104 The system supports the U.S. DoD 5015.2 Standard.
Response:
1.2.105 The system maintains date- and time-stamped audit trails of all data manipulation — such as changes to results, data analysis parameters, and methods — as consistent with all applicable regulations and standards, making the information available for review, copying, and reporting to authorized users.
Response:
1.2.106 The system audit log retains all data, prohibits any deletions, and allows user comments.
Response:
1.2.107 The system maintains audit trails at least as long as the records to which they pertain.
Response:
1.2.108 The system provides additional persistent auditing capabilities, such as the audit of cancelled uploads and scheduled system functions.
Response:
1.2.109 The system provides the ability to both automatically and manually add secure electronic signatures to documents and other data.
Response:
1.2.110 The system can automatically validate and approve data prior to being moved to the main database.
Response:

1.2.2 Security

1.2.2 Security
Requirement code Requirement # and requirement
1.2.200 The system allows administrators and other authorized users to configure multiple levels of user rights and security by site location, department, group, role, and/or specific function.
Response:
1.2.201 The system allows administrators and users to reset user passwords.
Response:
1.2.202 The system features and enforces adjustable rules concerning password complexity, reuse, and expiration.
Response:
1.2.203 The system can lock a user out after a specified number of consecutive failed log-in attempts.
Response:
1.2.204 The system provides the option for automatic user logout based on keyboard or mouse inactivity.
Response:
1.2.205 The system makes authority checks to ensure only authorized individuals can use the system to perform an operation.
Response:
1.2.206 The system allows authorized users to modify records, while also maintaining an audit trail of such actions.
Response:
1.2.207 The system allows authorized users to manually delete records, while also maintaining an audit trail of such actions.
Response:
1.2.208 The system prompts users to declare a reason for making changes to or deleting data in the system.
Response:
1.2.209 The system allows authorized users to generate a detailed user access record.
Response:
1.2.210 The system provides email notification of lockout, security access, and improper workstation access.
Response:
1.2.211 The system provides a mechanism to allow a user read-only access to stored data.
Response:
1.2.212 The system allows automatic and/or manual holds or locks to be placed on data to ensure it goes unaltered or remains retrievable during a retention period.
Response:
1.2.213 The system can first feed data from connected non-CFR-compliant instruments through a virtual environment that is compliant (audit trailed, secure, versioned, etc.) before being stored.
Response:
1.2.214 The system can control whether users are able to export data to portable long-term storage media like a USB flash drive or recordable DVD.
Response:
1.2.215 The system employs automatic file encryption on stored data.
Response:
1.2.216 The system employs checks to enforce permitted sequencing of steps and events.
Response:

1.3 General system functions

1.3.1 General functions

1.3.1 General functions
Requirement code Requirement # and requirement
1.3.100 The system offers non-SDMS trained personnel the ability to easily access system data via an intuitive, user-friendly Windows-type graphical user interface (GUI) which permits the display of stored data.
Response:
1.3.101 The system allows authorized users to configure their GUI to a specific language, character set, and time zone.
Response:
1.3.102 The system permits remote access for users, system admins, and support agents.
Response:
1.3.103 The system allows for the use of navigation keys to freely move from field to field.
Response:
1.3.104 The system allows tabular data to be sorted and filtered.
Response:
1.3.105 The system can send on-screen output to a printer or file without contradicting view-only statuses.
Response:
1.3.106 The system contains one or more spell-check dictionaries that allow authorized users to add, edit, or remove entries.
Response:
1.3.107 The system uses human-readable metadata tags to better describe, index, and store all captured and archived data.
Response:
1.3.108 The system can generate metadata tags via derived value rules.
Response:
1.3.109 The system allows users to manually add metadata tags to files.
Response:
1.3.110 The system provides full metadata, keyword, and field search capability, including the use of multiple search criteria.
Response:
1.3.111 The system allows users to search for similar records based upon a set of metadata tag values.
Response:
1.3.112 The system allows users to build, save, and edit queries for future use.
Response:
1.3.113 The system can automate the search for and extraction of pertinent data, including the export of that data to external applications for additional processing and calculation.
Response:
1.3.114 The system allows users to attach comments to data and files.
Response:
1.3.115 The system's file viewer/explorer allow users to view native, processed, and archived data in its native file structure.
Response:
1.3.116 The system can link objects to other objects, e.g. linking a standard operating procedure (SOP) to a test result.
Response:
1.3.117 The system notifies users of events like the scheduling and completion of tasks.
Response:
1.3.118 The system includes the ability to set up alerts via email.
Response:
1.3.119 The system offers integrated or online user help screens.
Response:
1.3.120 The system includes data analysis and calculation tools.
Response:

1.4.2 Configuration and customization

1.4.2 Configuration and customization
Request for information Requirement code Vendor response
a. The system architecture is modular or extensible and can easily and efficiently be modified to facilitate the addition of new functionality as business needs change.
b. The system has an application programming interface (API) or a similar software development toolkit (SDK). If web-based, the API should support Simple Object Access Protocol (SOAP), representational state transfer (REST), or both.
c. The system allows a user to independently add fields without requiring reconfiguration of the system, even after routine upgrades and maintenance.
d. The system allows for the integration of additional printers and scanners both locally and externally.

1.4.3 Data capture

1.4.3 Data capture
Request for information Requirement code Vendor response
a. The system can manage and store both sample- and non-sample-related data, including images from microscopes, GCMS scans of peaks, PDF files, spreadsheets, or even raw data files from instrument runs for later processing.
b. The system can manage and store media objects like digital photos, bitmaps, movies, and audio files.
c. The system allows multiple native instruments and users to enter data into the system simultaneously without disruption.
d. The system can interface with and import existing data from other databases and file shares.
e. The system supports data capture from a Citrix-based environment.
f. The system allows file indexes to be stored centrally while associated files are stored geographically.
g. The system allows users to organize captured data by project, date, location, instrument, etc.
h. The system can route captured data based upon specified metadata tags.
i. The system allows full on-screen review and approval of native instrument data prior to database commitment.
j. The system keeps all captured data and its format intact and captures modifications of that data as a version, including date and time of those modifications, for regulatory purposes.
k. The system has a tool that allows users to capture data printed to it as a searchable PDF file.
l. The system can automatically normalize and store incoming data to a technology-neutral format like XML.
m. The system allows incoming and entered files to be converted into other open formats like JCAMP-DX, TraML, mzML, mzXML, AnIML, pepXML, and protXML.
n. The system can capture and store native instrument and processed data based on a scheduled time or a real-time event, such as upon file creation.
o. The system allows users to manually upload instrument data files that are not part of a scheduled upload.
p. The system allows for the specification of a retention period for captured native instrument and processed data and can enact it based on date-based metadata fields or a future event.
q. The system can remove data from client machines upon upload and/or backup, based on a schedule or retention policy.
r. The system allows users to review, restore, and reprocess original native instrument data on the original instrument acquisition software.
s. The system allows users to open and view captured native instrument files without restoring them.
t. The system allows captured processed data to be reused by other applications without having to reprocess it.
u. The system provides a method to extract data points from captured processed data and present it in a human-readable format.
v. The system can parse captured data files containing specified metadata into a live results table.

1.4.4 Data archiving and migration

1.4.4 Data archiving and migration
Request for information Requirement code Vendor response
a. The system provides data archiving functionality for all contained data, without requiring an off-line mode.
b. The system allows for a configurable scheduled archive, not requiring human interaction with the data to be archived.
c. The system allows for a scheduled archive of data directly captured from a specific native instrument.
d. The system permits native instrument data to be archived and restored with its original directory structure.
e. The system allows for the specification of a retention period for archived and migrated data and can enact it based on date-based metadata fields or a future event.
f. The system ensures that held or locked native instrument data not captured during a scheduled archive will be captured during the next scheduled archive.
g. The system can perform archive and restore functions simultaneously with data capture and viewing functions, without disruption.
h. The system allows native instrument and processed data migrated from an old SDMS version to be backed up and restored without alteration.

1.4.5 Instruments

1.4.5 Instruments
Request for information Requirement code Vendor response
a. The system bilaterally interfaces with instruments and related software based on the Unix and Windows platforms.
b. The system can download data directly from laboratory instruments.
c. The system can track and report on the usage of attached laboratory instruments.
d. The system can automatically (or manually allow an authorized user to) remove an instrument from potential use when it falls out of tolerance limit or requires scheduled calibration.
e. The system maintains a reportable database of preventative maintenance, calibration, and repair records for attached laboratory instruments.
f. The system can schedule calibration, verification, and maintenance tasks on attached instruments and make that schedule available for viewing.
g. The system allows users to create and edit instrument maintenance profiles.

1.4.6 External system interfaces

1.4.6 External system interfaces
Request for information Requirement code Vendor response
a. The system supports a library of common electronic data deliverable (EDD) formats.
b. The system can transfer data to and from other record management systems.
c. The system integrates with Microsoft Exchange services.
d. The system can import data from and export data to Microsoft Word, Excel, Access, and/or Powerpoint.
e. The system can interface with non-Microsoft programs.
f. The system can interface with enterprise resource planning (ERP) systems.
g. The system can interface with internal and external laboratory systems like laboratory information management systems (LIMS) and electronic laboratory notebooks (ELNs).
h. The system can leverage the application programming interface (API) of other systems to establish integration between systems.
i. The system provides a real-time interface for viewing live and stored data transactions and errors generated by interfaced instruments and systems.
j. The system supports dockable mobile devices and handles information exchange between them and the system.
k. The system supports the use of optical character recognition (OCR) software.

1.4.7 Reporting

1.4.7 Reporting
Request for information Requirement code Vendor response
a. The system includes a versatile report writer and forms generator that can generate reports from any data in the system.
b. The system can interface with a third-party reporting application.
c. The system allows the development of custom templates for different types of reports.
d. The system maintains template versions and renditions, allowing management and tracking of the template over time.
e. The system uses Microsoft Office tools for formatting reports.
f. The system provides multiple ways to visualize data in reports, including graphs, trend bars, pie charts, spectrum, etc. for the purpose of presenting information and identifying trends.
g. The system makes graphic and tabular data vector-scalable in reports.
h. The system allows for internal hyperlinking to source data in reports.
i. The system allows users to manually adjust inaccurate data parsing routines for reports.
j. The system can indicate whether a report is preliminary, amended, corrected, or final while retaining revision history.
k. The system can automatically generate laboratory reports of findings and other written documents.
l. The system provides an ad-hoc web reporting interface to report on user-selected criteria.
m. The system can automatically generate and post periodic static summary reports on an internal web server.
n. The system can transmit reports in a variety of ways including fax, e-mail, print, and website in formats like RTF, PDF, HTML, XML, DOC, XLS, and TXT.
o. The system supports PDF/A, an ISO-standardized version of the Portable Document Format (PDF).
p. The system includes a rules engine to determine the recipients of reports and other documents based on definable parameters.
q. The system provides printer-friendly audit trails for cleaner reporting of audit data.
r. The system provides an interface for external clients to search, generate, and view processed data reports based on metadata tags.
s. The system provides document workflow management tools for streamlining their creation, review, modification, and approval.

1.5 Custom requirements

1.5 Custom requirements
Request for information Requirement code Vendor response
a.
b.
c.
d.
e.
f.
g.
h.
i.
h.
i.
j.