Difference between revisions of "Audit Trail/Logging Features~"
From VistApedia
Line 17: | Line 17: | ||
---- | ---- | ||
[[Category:Intake and Output]] | [[Category:Intake and Output]] | ||
+ | {{Category:Glossary}} | ||
+ | [[Category:Glossary]] | ||
+ | ---- | ||
+ | |||
+ | ; Audit Trail/Logging Features | ||
+ | : The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach. | ||
+ | |||
+ | |||
+ | Source: '''Nursing V. 4.0 Technical Manual and Package Security Guide''' | ||
+ | ---- | ||
+ | [[Category:Nursing]] | ||
{{Category:Glossary}} | {{Category:Glossary}} | ||
[[Category:Glossary]] | [[Category:Glossary]] |
Latest revision as of 06:46, 11 February 2006
- Audit Trail/Logging Features
- The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.
Source: Immunology Case Registry v.2.1 User Manual
This is a Glossary term from the VistA Documentation Library |
- Audit Trail/Logging Features
- The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.
Source: Intake and Output V. 4.0 Technical Manual
This is a Glossary term from the VistA Documentation Library |
- Audit Trail/Logging Features
- The use of automated software procedures to determine if the security controls implemented for protection of computer systems are being circumvented and to identify the potential source of the security breach.
Source: Nursing V. 4.0 Technical Manual and Package Security Guide
This is a Glossary term from the VistA Documentation Library |