Audit Trail/Logging Features~: Difference between revisions

From VistApedia
Jump to navigationJump to search
No edit summary
 
No edit summary
 
(One intermediate revision by one other user not shown)
Line 6: Line 6:
----
----
[[Category:Immunology Case Registry]]
[[Category:Immunology Case Registry]]
{{Category:Glossary}}
[[Category:Glossary]]
----
; Audit Trail/Logging Features
: The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.
Source: '''Intake and Output V. 4.0 Technical Manual'''
----
[[Category:Intake and Output]]
{{Category:Glossary}}
[[Category:Glossary]]
----
; Audit Trail/Logging Features
: The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.
Source: '''Nursing V. 4.0 Technical Manual and Package Security Guide'''
----
[[Category:Nursing]]
{{Category:Glossary}}
{{Category:Glossary}}
[[Category:Glossary]]
[[Category:Glossary]]

Latest revision as of 06:46, 11 February 2006

Audit Trail/Logging Features
The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.


Source: Immunology Case Registry v.2.1 User Manual


This is a Glossary term from the VistA Documentation Library

Audit Trail/Logging Features
The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.


Source: Intake and Output V. 4.0 Technical Manual


This is a Glossary term from the VistA Documentation Library

Audit Trail/Logging Features
The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.


Source: Nursing V. 4.0 Technical Manual and Package Security Guide


This is a Glossary term from the VistA Documentation Library