Difference between revisions of "Audit Trail/Logging Features~"

From VistApedia
Jump to: navigation, search
 
 
(One intermediate revision by one other user not shown)
Line 6: Line 6:
 
----
 
----
 
[[Category:Immunology Case Registry]]
 
[[Category:Immunology Case Registry]]
 +
{{Category:Glossary}}
 +
[[Category:Glossary]]
 +
----
 +
 +
; Audit Trail/Logging Features
 +
: The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.
 +
 +
 +
Source: '''Intake and Output V. 4.0 Technical Manual'''
 +
----
 +
[[Category:Intake and Output]]
 +
{{Category:Glossary}}
 +
[[Category:Glossary]]
 +
----
 +
 +
; Audit Trail/Logging Features
 +
: The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.
 +
 +
 +
Source: '''Nursing V. 4.0 Technical Manual and Package Security Guide'''
 +
----
 +
[[Category:Nursing]]
 
{{Category:Glossary}}
 
{{Category:Glossary}}
 
[[Category:Glossary]]
 
[[Category:Glossary]]

Latest revision as of 06:46, 11 February 2006

Audit Trail/Logging Features
The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.


Source: Immunology Case Registry v.2.1 User Manual


This is a Glossary term from the VistA Documentation Library

Audit Trail/Logging Features
The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.


Source: Intake and Output V. 4.0 Technical Manual


This is a Glossary term from the VistA Documentation Library

Audit Trail/Logging Features
The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.


Source: Nursing V. 4.0 Technical Manual and Package Security Guide


This is a Glossary term from the VistA Documentation Library