Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Access rights

In Marin I ran into situations time and again when someone I knew couldn t enter the hospital because there was new carpet, or couldn t get a pap smear or a breast exam, or couldn t take kids to the ER or to a clinic because of chemical barriers. I began working with some of the disability activists in Marin County and San Francisco and tried to learn what the laws were. In 1985 I started a newsletter, called The Reactor, about civil rights and access rights for people with chemical and electric magnetic field sensitivities. [Pg.94]

The security and flexibihty of the program can be illustrated by the following account of the manner in which it is used by the analyst. On loading, the program asks the user to type his name and a password. The name is used to mark all entries for the current session in the event log, and the password estabhshes the user s access rights to the file. There are three levels of access ... [Pg.80]

If the quality manual is written and used in electronic form, first of all the same requirements have to be met. There must be a system for managing the access rights on the files, a system to ensure that no unauthorized documents is placed on the system, that all withdrawn documents are stored for later information and that all documents are securely backed up. [Pg.159]

Management of access rights (read/write and read only)... [Pg.159]

For example, three different passwords are created to access the software system controlling lyophilizer. Each password is given a different access level. Using these passwords and an existing one, selected system functions requiring different authorization levels are initiated. The systems must refuse to start a tested function unless a proper password having correct access rights is supplied. [Pg.427]

Access control decision function are defined using access right lists,7 such as Access Control Lists (ACLs), and these allow the allocation of use, read, write, execute, delete, or create privileges. Access controls enable a system to be designed in such way that a supervisor, for example, will be able to access information on a group of employees, without everyone else on the network having access to this information. [Pg.108]

The use of authority checks (Part 11.10(g)), when applicable, to determine if the identified individual has been authorized to use the system, and has the necessary access rights, operate a device, or to perform the operation required. [Pg.110]

One of the key controls for audit trails is the linking of the electronic record with the audit trail. It must not be possible to modify audit trails access rights to audit trial information must be limited to print and/or read only. The combination of authentication, digital certificates, encryption and ACLs, provides the technical mechanisms needed to control the access to audit trail files. [Pg.116]

The XXXX computer system is able to allocate either any or all of the system configurable access rights to each of three user levels as defined in Appendix 1. M C... [Pg.152]

Allocation of all configurable access rights to individual users requires onscreen confirmation by System Administrator. D N... [Pg.152]

Review accuracy of lists of active users. Review user access profiles for access rights that are no longer required. Review rmauthorized access attempts. [Pg.313]

Procedures and user manuals may be outdated, with users relying on typed or handwritten instruetions to supplement or replace old manuals. Procedures for operating the computer system should be reviewed and updated as necessary to reflect the current use of the system. Training reeords should be eurrent and refleet training in these npdated procedures. Access rights should be cheeked as appropriate and authorized. Role specifications may need to be updated. Business Continuity Plans should also be reviewed and amendments made as required. [Pg.350]

User group (= access level), where each user group has access rights for its own or all lower access levels... [Pg.664]

Changed records are flagged with a blue triangle as soon as the audit trail is switched on To be done over the file access rights (see Chapter 11) To be handled over system access Not relevant... [Pg.740]

Electronic authorization of security configuration and access rights... [Pg.855]

Access rights maintenance Detect and investigate security breaches... [Pg.858]

Access rights must still be managed for each apphcation as access levels for one system may not be appropriate for all systems... [Pg.861]

Calculations, interfaces,. .. tested access rights defined and limited, if applicable backup/restore procedure available training of technical staff and users Accuracy and reliability of data ensured... [Pg.4]

Nevertheless, additional organization measures are needed to ensure that persons who left the company or their positions are removed from the access rights groups. The process should be described in an SOP or working procedure. It should include the case when someone leaves the company or retires, which can usually be resolved by going to the sources where the information is readily available. This is the human resource department or the IT support group, which manages the access to networks. They are usually the first to know after HR who has left the company. [Pg.12]

Requirements for controls are based on definition of closed or open system. Under these definitions there isno direct correlation between, for example, using a publicphone line and an open system. Compliance with closed versus open standards is determined by how access rights to the data or documents are established and controlled by the owner(s) of this information. A system is defined as closed if access to the system containing the records or data is under the control of person(s) responsible for the content of the records or data in the system. A system is defined as open if access to the system is not under the control of the person(s) responsible for the content of the records therein. For example, dial-in retrieval over a public phone is closed where the records being accessed are under the control of the persons responsible for their content, whereas storage of records on a third party system is open because access to the records themselves is under the control of the third party. Sections 11.10 and 11.30 of the Final Rule list, respectively, the control measures required for establishing a closed or open system. [Pg.2562]

Finally, you may specify the access rights and password(s) for the share. There are three options for access rights when you re using the share-level security scheme. Click the radio button next to the option you want to use ... [Pg.734]

Once you have specified the share name, comments, and access rights, click OK to share the folder. Notice that the folder now has a hand underneath it, indicating that it is being shared (Figure 18.11). [Pg.734]

You have just granted someone share-level access to a folder in your Windows 9x system. What are the three access rights available (Select all that apply.)... [Pg.768]

A, B, D. Read-Only, Full Access, and Depends on Password are the three options for access rights. These options are accessible by right-clicking the shared folder and choosing Sharing. [Pg.770]

High capital cost of roads, access, right-of-way. [Pg.179]

The Committee was informed by the European Medicines Agency (EMEA) of a proposed approach to facilitate inspections and to avoid duplication of inspections. A GMP database was being established in the European Union by Member States that would provide information on and outcome of inspections. The database was expected to be released in 2006. Access rights were being discussed with WHO, the Pharmaceutical Inspection Cooperation Scheme (PIC/S), the European Directorate for the Quality of Medicines (EDQM) and other organizations. Different levels of access will exist including one for public access and others for national medicine regulatory authorities, WHO and PIC/S. [Pg.11]

Furthermore, for conferences to be secure, access rights and authentication are necessary. In SCCS tins is done using a password for each user and an additional acknowledgement by the conference leader. Thus, unknown users do not have access to the conferences. Also, an encryption of data is optional by using the Multicast Transport Protocol (MTP) [959] for point-to-multipoint transmission [453]. [Pg.295]

Workspace entries can be created by default in a personal mode. In personal mode, the document is visible only to the author until the entry is ready for publishing it in a team. A workspace document can be released to other users of the workspace. At this stage, the document is made available for review to a predefined list of users according to a publication policy, and only users with appropriate access rights are able to see the document. [Pg.314]

Electronic data management software has to provide a user management system on different levels. Whereas authentication is typically performed via user ID and password, access rights are defined via membership of users in departments, teams, and roles. The following structure shows a potential organization ... [Pg.328]

A role is a group of access rights that either defines access to individual modules (e.g., user management system, template creation module) or to individual task-related functions (e.g., IT administrator, reviewer, approver) of the software. [Pg.328]

In the simplest model, a document or file is created in a department that defines the users and their access rights according to the static organization of an institution or company. In contrast, a team represents a usually temporary new constellation of users. This is helpful for the typical study or project organization, where several scientists from different departments work for a limited time on a collaborative task. Teams can cover multiple laboratories or users, each of which may have rights in the team other than what they have in their default department. [Pg.329]

A record, file, or document created within a team derives the access rights from the team s definition rather than from the department. The important difference to file-based storage is that now the record inherits the access rights rather than the software environment. [Pg.329]


See other pages where Access rights is mentioned: [Pg.120]    [Pg.383]    [Pg.70]    [Pg.307]    [Pg.543]    [Pg.870]    [Pg.9]    [Pg.12]    [Pg.2562]    [Pg.2565]    [Pg.540]    [Pg.76]    [Pg.355]    [Pg.310]    [Pg.328]   
See also in sourсe #XX -- [ Pg.76 ]




SEARCH



© 2024 chempedia.info