REDCap Web-interface Database System
|
|
|
- Felicity Young
- 10 years ago
- Views:
Transcription
1 REDCap Web-interface Database System Jonathan D. Mahnken, Ph.D. Associate Professor, Department of Biostatistics Director, October 6,
2 What is REDCap? Research Electronic Data Capture (REDCap) [REDCap] is a novel workflow methodology and software solution designed for rapid development and deployment of electronic data capture tools to support clinical and translational research. (Harris et al., 2009) Among key features: User authentication and role-based security Real-time data validation and entry checks Auditing capabilities Uses MySQL relational database 2
3 Selecting REDCap KU ADC new in 2011 Institutional investments Velos eresearch (CRIS) institutional license REDCap growth with the newly-formed Div. of Medical Informatics KU ADC needed a system capable of supporting large, multi-site studies, which typically budget informatics personnel to build ecrfs Able to efficiently support smaller scale projects (e.g., KU ADC pilot projects) with small budgets KUMC approach to ecrf development CRIS: ecrfs built by personnel in Dept. of Biostatistics REDCap: range of options from investigators developing ecrfs (e.g., model described by Harris et al., 2009) to budgeting for informatics support 3
4 Selecting REDCap (cont.) Clinical Core s experience with both programs and preference weighed heavily on our decision Strengths of REDCap Cost Web-based user interface supports multi-site studies Facilitates ecrf development by investigators for small budget projects by creating metadata table in Excel for data dictionary using the Online Designer via web browser Can facilitate link between study specific data with other data captured by the ADC (e.g., UDS) Sharable form set with other ADCs Opted for out-of-the-box REDCap utilization to sharing our database structure with other ADCs 4
5 Data Capture and Workflow Master patient index for all subjects Clinical Core assigns unique KU ADC ID for each subject KU ADC ID used across all ADC forms Links across databases Recruitment UDS and ADC-specific cohort Ability to link pilot study databases 5
6 Data Capture and Workflow (cont.) ADC ID selected from drop-down list Additional subject information displayed to assist with drop-down selection 6
7 Data Capture and Workflow (cont.) 7
8 Form A4: Subject Medications 8
9 Audit Capabilities Creates searchable spreadsheet that captures: User that entered/modified data Date and time Original value New value Reason for change 9
10 Other Features Out-of-the-box features Graphical Data View & Stats for quick univariate descriptive and graphical presentation of cohort data Export facility to statistical software New features can be requested For example, we requested additional input restriction features, which have now been implemented as out-of-the-box features Better facilitates sharing (e.g., across ADCs) 10
11 Back-up and Security REDCap application server Secured from unauthorized access, with access limited to only a few administrators Nightly back-up to different location Uses https to encrypt data transmission REDCap database server Secured from unauthorized access, with access limited to only a few administrators Protected by firewall and intrusion detection system maintained by IR Nightly back-up to different location Daily back-up (up to three times/day) Utilizes Central Authentication Server Common username and password for KUMC applications 11
12 Hosting a REDCap Instance Cost of REDCap ( No cost for REDCap software and support to institutional partners though not open-source Does have infrastructure requirements (not free like air ) Hardware needed to host system Personnel to maintain security, implement upgrades, etc. 12
13 Citing REDCap Recommended citation at Study data were collected and managed using REDCap electronic data capture tools hosted at [YOUR INSTITUTION]. 1 REDCap (Research Electronic Data Capture) is a secure, web-based application designed to support data capture for research studies, providing: 1) an intuitive interface for validated data entry; 2) audit trails for tracking data manipulation and export procedures; 3) automated export procedures for seamless data downloads to common statistical packages; and 4) procedures for importing data from external sources. 1 Paul A. Harris, Robert Taylor, Robert Thielke, Jonathon Payne, Nathaniel Gonzalez, Jose G. Conde, Research electronic data capture (REDCap) - A metadata-driven methodology and workflow process for providing translational research informatics support, J Biomed Inform Apr;42(2):
14 Acknowledgements DMSC: Cathy Price, Suzanne Hunt, Bhargav Adagarla, Russ Waitman Department of Biostatistics: Lexie Brown, Dan Connolly, Kahlia Ford, Mani Nair Clinical Core: Jeff Burns, Brad Amstein, Anne Arthur, David Johnson, Eric Vidoni MGM Core: Russ Swerdlow This work was supported by grants from the NIA (P30AG035982), NACC (U01AG016976), and a CTSA grant from NCRR and NCATS(UL1TR000001; formerly UL1RR033179). The contents are solely the responsibility of the authors and do not necessarily represent the official views of the NIH, NIA, NACC, NCRR, or NCATS. and of course 14
15 Acknowledgements (cont.) Study data were collected and managed using REDCap electronic data capture tools (Harris et al., 2009) hosted at The University of Kansas Medical Center. REDCap (Research Electronic Data Capture) is a secure, web-based application designed to support data capture for research studies, providing: 1) an intuitive interface for validated data entry; 2) audit trails for tracking data manipulation and export procedures; 3) automated export procedures for seamless data downloads to common statistical packages; and 4) procedures for importing data from external sources. 15
16 REFERENCES Paul A. Harris PA, Robert Taylor, Robert Thielke, Jonathon Payne, Nathaniel Gonzalez, Jose G. Conde, Research electronic data capture (REDCap) - A metadata-driven methodology and workflow process for providing translational research informatics support, J Biomed Inform Apr;42(2):
REDCap Data Management
REDCap Data Management How to begin using REDCap to collect and manage your research data CTSC Biomedical Informatics Program What is REDCap? REDCap (Research Electronic Data Capture) is a secure web application
Introduction to REDCap for Clinical Data Collection Shannon M. Morrison, M.S. Quantitative Health Sciences Cleveland Clinic Foundation, Cleveland, OH
Paper RX-01-2013 Introduction to REDCap for Clinical Data Collection Shannon M. Morrison, M.S. Quantitative Health Sciences Cleveland Clinic Foundation, Cleveland, OH Abstract REDCap (Research Electronic
An Overview of REDCap, a secure web-based application for Electronic Data Capture
PharmaSUG 2014 - Paper PO19 An Overview of REDCap, a secure web-based application for Electronic Data Capture Kevin Viel; inventiv Health Clinical and Histonis, Incorporated; Atlanta, GA ABSTRACT REDCap
Data Collection Database options and Data Management considerations. Paul Donnelly George Clinical The George Institute for Global Health
Data Collection Database options and Data Management considerations Paul Donnelly George Clinical The George Institute for Global Health 1 Overview Introduction and types of studies Scope of research studies
Medical Informatics: A Fishing Story
Medical Informatics: A Fishing Story Russ Waitman, PhD Director of Medical Informatics, Associate Professor, Department of Biostatistics Director, Frontiers Biomedical Informatics Assistant Vice Chancellor,
Comparing Excel, Access and REDCap as Data Management Tools for Human Health Research Data
Comparing Excel, Access and REDCap as Data Management Tools for Human Health Research Data Sue Lowry ([email protected]) Database Programmer/Analyst Biostatistical Design and Analysis Center Clinical and
TRACS INSTITUTE CLINICAL DATA MANAGEMENT. Clarence Potter Clinical Data Management Team [email protected] 6-4802
TRACS INSTITUTE CLINICAL DATA MANAGEMENT Clarence Potter Clinical Data Management Team [email protected] 6-4802 Now a word from our Sponsor NC TraCS The North Carolina Translational and Clinical Sciences
BRISSkit: Biomedical Research Infrastructure Software Service kit. Jonathan Tedds. http://www.le.ac.uk/brisskit #brisskit #umfcloud
BRISSkit: Biomedical Research Infrastructure Software Service kit http://www.le.ac.uk/brisskit #brisskit #umfcloud Jonathan Tedds University of Leicester [email protected] @jtedds JISC University Modernisation
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
ACCESSING AND USING PROMIS INSTRUMENTS. Nan Rothrock, PhD Northwestern University June 24, 2014
ACCESSING AND USING PROMIS INSTRUMENTS Nan Rothrock, PhD Northwestern University June 24, 2014 ACCESS VERSUS DATA COLLECTION ACCESS PDFs of short forms and item banks www.assessmentcenter.net DATA COLLECTION
From Fishing to Attracting Chicks
The Greater Plains Collaborative: a PCORNet Clinical Data Research Network s Strategies for Creating an Interoperable Architecture From Fishing to Attracting Chicks Russ Waitman, PhD Associate Professor,
An Introduction to REDCap v5
An Introduction to REDCap v5 Presented by Andre Hackman Department of Biostatistics Biostatistics Center Bloomberg School of Public Health February 19, 2013 DISC Data Informatics Services Core Services
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Choosing A CMS. Enterprise CMS. Web CMS. Online and beyond. Best-of-Breed Content Management Systems. 1300 762 912 [email protected].
Web CMS Enterprise CMS 1300 762 912 [email protected] Sydney 275 alfred st north sydney nsw 2060 Melbourne 21 burwood road hawthorn vic 3122 Choosing A CMS Best-of-Breed Content Management Systems Brisbane
ITAR Compliant Data Exchange
ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/
How To Use Irecruit Software
irecruit is a hosted SaaS (Software as a Service), cloud-based recruiting software designed to provide any size of business a cost effective, affordable and way to manage the recruiting process online.
IT Service Continuity Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
Topics. From paper to EDC. From paper to EDC. From paper to EDC. From paper to EDC
Topics Infermed MACRO - Electronic Data Capture according to GCP Dipl. Inf. A. Fischer I. II. Requirements by GCP III. IV. Heidelberg / January 28, 2008 2 History Idea born in 1970s 1980 - early 1990s:
Project Document Collaboration
QA software Project Management the smart way Project Document Collaboration Web based Project Document Management and Collaboration Solution Get the TeamBinder Advantage Benefits Deploying TeamBinder on
Filestor Digital Asset Management. The way it works
Filestor Digital Asset Management The way it works Filestor is an Advanced Digital Asset Management System Filestor is far more than a Digital Asset Management System as it has been designed to be flexible
The Clinical Research Center
The Clinical Research Center Clinical Research Database and Web Survey Technologies An Overview of products available to Children s Hospital Boston Investigators The Clinical Research Center Page 2 Data
Cloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire
ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire Overview This pre-implementation questionnaire is designed to provide the Boston College Internal Audit Department with a general understanding
FoundationIP. Your scalable, seamless, state-of-the-art solution
FoundationIP FoundationIP Your scalable, seamless, state-of-the-art solution By combining IP expertise with IT innovation, CPA Global has established itself as a technology leader in IP management. We
LONI IMAGE & DATA ARCHIVE USER MANUAL
IMAGE & DATA ARCHIVE USER MANUAL Laboratory of Neuro Imaging Dr. Arthur W. Toga, Director June 2013 INTRODUCTION The LONI (IDA) is a user-friendly environment to archive, search, share, track and disseminate
How Managed File Transfer Addresses HIPAA Requirements for ephi
How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006
Electronic Prescribing of Controlled Substances Technical Framework Panel Mark Gingrich, RxHub LLC July 11, 2006 RxHub Overview Founded 2001 as nationwide, universal electronic information exchange Encompass
How To Use Egnyte
INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Adworks Local Area Marketing. The way it works
Adworks Local Area Marketing The way it works Adworks is an on line local store and dealership marketing system. Retailers, and especially franchises, are facing dramatic changes, in the coming years,
Seamless Web Data Entry for SAS Applications D.J. Penix, Pinnacle Solutions, Indianapolis, IN
Seamless Web Data Entry for SAS Applications D.J. Penix, Pinnacle Solutions, Indianapolis, IN ABSTRACT For organizations that need to implement a robust data entry solution, options are somewhat limited
October 2013 702P00860. Xerox App Studio. Information Assurance Disclosure. Version 2.0
October 2013 702P00860 Xerox App Studio Information Assurance Disclosure Version 2.0 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
USER GUIDE: MaaS360 Services
USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document
The syslog-ng Store Box 3 F2
The syslog-ng Store Box 3 F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
White Paper. The Five Keys to a Successful Document Management System ABSTRACT. www.treenosoftware.com Command Your Content
1 White Paper The Five Keys to a Successful Document Management System ABSTRACT The successful implementation of an electronic document management system begins with a detailed understanding the specific
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
Cybersecurity Health Check At A Glance
This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not
.CRF. Electronic Data Capture and Workflow System for Clinical Trials
.CRF Electronic Data Capture and Workflow System for Clinical Trials Business challenge Most research takes place in different centers simultaneously. These are often located in different cities or even
Building Enterprise Planning Application with Kepion Solution Accelerator. based on Microsoft SQL Server Analysis Services
Building Enterprise Planning Application with Kepion Solution Accelerator based on Microsoft SQL Server Analysis Services Kepion Planning Solution provides enterprise customers an approach to utilize the
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance
RADSpa HIPAA Compliance 1. Introduction 3 1.1. Scope and Field of Application 3 1.2. HIPAA 3 2. Security Architecture 4 2.1 Authentication 4 2.2 Authorization 4 2.3 Confidentiality 4 2.3.1 Secure Communication
Service Level Program for Ariba cloud Services. Service Accessibility Warranty Security Miscellaneous
Service Level Program for Ariba cloud Services Service Accessibility Warranty Security Miscellaneous 1. Service Accessibility Warranty a. Applicability. The Service Accessibility Warranty applies to the
December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Public Health and the Learning Health Care System Lessons from Two Distributed Networks for Public Health
Public Health and the Learning Health Care System Lessons from Two Distributed Networks for Public Health Jeffrey Brown, PhD Assistant Professor Department of Population Medicine Harvard Medical School
Central Administration User Guide
User Guide Contents 1. Introduction... 2 Licensing... 2 Overview... 2 2. Configuring... 3 3. Using... 4 Computers screen all computers view... 4 Computers screen single computer view... 5 All Jobs screen...
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Office of Clinical Research and the. Institute (CTSI) Patricia Emmanuel, MD
Office of Clinical Research and the Clinical and Translational Research Institute (CTSI) Patricia Emmanuel, MD Office of Clinical Research- Priorities Review processes for clinical study implementation,
Deltek Vision 7.0 LA. Technical Readiness Guide
Deltek Vision 7.0 LA Technical Readiness Guide May 15, 2012 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical errors may
Data Storage That Looks at Business the Way You Do. Up. cloud
Data Storage That Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides
Understanding Diagnosis Assignment from Billing Systems Relative to Electronic Health Records for Clinical Research Cohort Identification
Understanding Diagnosis Assignment from Billing Systems Relative to Electronic Health Records for Clinical Research Cohort Identification Russ Waitman Kelly Gerard Daniel W. Connolly Gregory A. Ator Division
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms. As
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Time to Value: Successful Cloud Software Implementation
Time to Value: Successful Cloud Software Implementation Cloud & Data Security 2015 Client Conference About the Presenter Scott Schimberg, CPA, CMA Partner, Consulting, Armanino Scott became a Certified
BKDconnect Security Overview
BKDconnect Security Overview 1 Introduction 1.1 What is BKDconnect 1.2 Site Creation 1.3 Client Authentication and Access 2 Security Design 2.1 Confidentiality 2.1.1 Least Privilege and Role Based Security
The IDG 9074 Remote Access Controller
secure Agent Secure Enterprise Solutions Product Overview The IDG 9074 Remote Access Controller 2448 E. 81 st St, Ste 2000 Tulsa OK 74137-4271 USA Tel: 918.971.1600 Fax: 918.971.1623 www.secureagent.com
DATA COLLECTION OPTIONS. Monica Prudencio, MS Medical Social Sciences, Northwestern University June 10, 2014
DATA COLLECTION OPTIONS Monica Prudencio, MS Medical Social Sciences, Northwestern University June 10, 2014 PAPER Available for short forms Requires manual data entry Scoring (use scoring manuals) PROMIS
Software Update Bulletin
Introducing SendSuite Tracking February 2010 Purpose This bulletin is released to advise SendSuite Tracking users of the new features, enhancements, and improvements in the evolution of the Internal Tracking
Retrieve Form for Data Capture Integrating Epic with REDCap @ Duke
Retrieve Form for Data Capture Integrating Epic with REDCap @ Duke Amy Harris Nordo and Matt Gardner Duke Office of Research Informatics Supported in part by Duke s CTSA grant (UL1TR001117) Clinical Research
U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)
U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC) econsent Trial Project Architectural Analysis & Technical Standards Produced
Intunex Oy Skillhive Service Description 1 / 6
Intunex Oy Skillhive Service Description 1 / 6 About Skillhive Skillhive is a social business application designed for connecting and sharing expertise within organizations. Skillhive enables employees
An Overview of the SaskTel Hosted Contact Centre Solution Design and Delivery Principles, and Core Architecture
23082011 An Overview of the SaskTel Hosted Contact Centre Solution Design and Delivery Principles, and Core Architecture TABLE OF CONTENTS The SaskTel Hosted Contact Centre Solution... 3 Benefits of the
Clinical Data Management (Process and practical guide) Dr Nguyen Thi My Huong WHO/RHR/RCP/SIS
Clinical Data Management (Process and practical guide) Dr Nguyen Thi My Huong WHO/RHR/RCP/SIS Training Course in Sexual and Reproductive Health Research Geneva 2012 OUTLINE Clinical Data Management CDM
Service Asset & Configuration Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the
Statement of Work. Document Management System. January 18, 2012
Statement of Work January 18, 2012 Group 1 David Schlossman Isolina Vargas Abby Zimmerman 1 Document Control Sheet General Information Project Name Document Management System Project Manager IT Project
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
Internet Banking Internal Control Questionnaire
Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?
Task Management. JobTraQ Core Features
Task Management JobTraQ automates human to human workflow and simplifies hierarchical team management of collaborative tasks. JobTraQ also ensures that the correct data is collected and displayed through
MultiSite Manager. User Guide
MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.
