PHIA: Difference between revisions

TOstryzniuk (talk | contribs)
mNo edit summary
TOstryzniuk (talk | contribs)
Line 8: Line 8:
On the computer, the computer itself is password protected, and the Access application is also password protected. The computer used for this is located in a locked office with limited access. The data on the computer is dumped onto a folder on the regional. Only the data collectors of a specific hospital and the data managers have access to this folder.   
On the computer, the computer itself is password protected, and the Access application is also password protected. The computer used for this is located in a locked office with limited access. The data on the computer is dumped onto a folder on the regional. Only the data collectors of a specific hospital and the data managers have access to this folder.   


== Discussion ==
{{Discussion}}
* The computer at 7 Oaks is in a locked office, but the office is accessed by '''many''' other people. There have been attempts by local staff to use the computer. Is this secure? [[User:Ttenbergen|Ttenbergen]] 09:03, 11 June 2008 (CDT)
* The computer at 7 Oaks is in a locked office, but the office is accessed by '''many''' other people. There have been attempts by local staff to use the computer. Is this secure? [[User:Ttenbergen|Ttenbergen]] 09:03, 11 June 2008 (CDT)