PHIA: Difference between revisions
TOstryzniuk (talk | contribs) mNo edit summary |
TOstryzniuk (talk | contribs) |
||
| Line 8: | Line 8: | ||
On the computer, the computer itself is password protected, and the Access application is also password protected. The computer used for this is located in a locked office with limited access. The data on the computer is dumped onto a folder on the regional. Only the data collectors of a specific hospital and the data managers have access to this folder. | On the computer, the computer itself is password protected, and the Access application is also password protected. The computer used for this is located in a locked office with limited access. The data on the computer is dumped onto a folder on the regional. Only the data collectors of a specific hospital and the data managers have access to this folder. | ||
{{Discussion}} | |||
* The computer at 7 Oaks is in a locked office, but the office is accessed by '''many''' other people. There have been attempts by local staff to use the computer. Is this secure? [[User:Ttenbergen|Ttenbergen]] 09:03, 11 June 2008 (CDT) | * The computer at 7 Oaks is in a locked office, but the office is accessed by '''many''' other people. There have been attempts by local staff to use the computer. Is this secure? [[User:Ttenbergen|Ttenbergen]] 09:03, 11 June 2008 (CDT) | ||