Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Password

An example in the medical field is use as a patient card. Basic data (name, address, date of birth, etc) are written as ROM, but the results of ongoing examinations are written as WORM by the doctor in attendance. For data security, code- and passwords can be used. [Pg.154]

Access may be limited through passwords and/or encryption of stored data. [Pg.270]

Today it is usually harder than in the early days of computer control for operators to interfere with the software, override interlocks, or type in coiTect readings. However, many operators acquire keys or passw ords that they should not have, in much the same way as operators have always unofficially acquired and secreted an assortment of tools and adaptors. On one plant an interlock was found to be illegally blocked the password had been disclosed to 40 people, all of whom denied responsi-aility (see Section 14.5 d). [Pg.363]

Stich-tag, fixed day, key date, deadline, -wein, m. sample wine, -wort, n. heading catchword key word code word password cue. [Pg.428]

WebCT/NOW Integration Instructors and students enter ThomsonNOW through their familiar Blackboard or WebCT environment without the need for a separate user name or password and can access all of the ThomsonNOVV assessments and content. Contact your local Thomson representative to learn more. [Pg.1340]

Datasheets Provides password access to GE Plastics product data. [Pg.625]

Computer acceptability Information produced via CAD, CAM, CAE, etc. that may require a password. [Pg.633]

Validation also applies to software. In a simple example, you could create an Excel spreadsheet template with fixed formulae to calculate the mean and standard deviation of a range of data. To validate this template you would enter a set of sample data and verify the template-calculated results against the manually calculated results. In order to be confident that the template could be used for further data sets you would password-protect the cell formulae and verify that they cannot be altered without it. [Pg.27]

For all customers who have a standing order to Topics in Heterocyclic Chemistry, we offer the electronic version via SpringerLink free of charge. Please contact your librarian who can receive a password or free access to the full articles by registering at ... [Pg.7]

All formulas are to be written out by hand with the specific numbers in the right places on a sheet provided for the purpose, and the calculations are to be done by calculator. Caution Write the numbers exactly as printed, do not round any digits, or the quality assurance unit (a sort of corporate vice squad) will not approve the report out of fear that someone could have cheated. A validated program can be used. While an Excel spreadsheet as such needs no validation, a simple cell-formula calls for extensive tests and documentation and proof that the sheet is password protected against fraudulent manipulation. On top of that, the analyst s supervisor is required to confirm the calculation and sign off on... [Pg.147]

Fear of Fraud It is illuminating that there are companies that lock the input to a computer system (specifically a so-called LIMS, a Laboratory Information Management System) in such a manner that it takes the supervisor s password and signature to correct a missed keystroke, even if this is noticed before the (Enter) key is pressed. If the unwitnessed use of the (Backspace) key betrays malicious intent to falsify raw data, then every scientist should be in jail. [Pg.276]

The files are password- and write-protected only the numbers in the colored cells can be changed. The output was optimized for a screen with 800 X 600 resolution. In order that those who use higher resolutions can adapt the graphics to full-screen size, the password is here divulged smac. ... [Pg.394]

Information access breakdowns occur when pertinent information has been stored but it either cannot be accessed for technical reasons or for some reason cannot be found in a meaningful or expedient manner for a particular application. Technical reasons can include legacy databases that are not connected with current systems, incompatibility issues between systems, problems of localized access (information can only be accessed within a site, a group or domain area, or even a personal computer), and authentication (people do not have the required authority to access information they need or cannot remember usernames and passwords). [Pg.233]

File transfer protocol (FTP) technology is a data communication tool that allows sending, accessing, and sharing files quickly and easily through a secure environment. The user logs onto the FTP site with a valid account name and a valid password. This method allows participants to share data files instantly. [Pg.602]

The user logs into the system with valid user id and password credentials from any computer connected to the network. The instantaneous access of the user to the centralized database enables direct entry of the data into a centralized database, whether with LAN, WAN, or VPN. Remote data entry... [Pg.606]

Usage The PC access should be limited to the authorized personnel only. The PC should be used for the conduct of the trial only. The PC should not be left on while unattended. The PC should be covered with the protective cover when idle. We recommend the use of a password-protected screen saver. [Pg.609]

Password security Sharing your password with others is prohibited. Posting passwords on sticky notes is prohibited. [Pg.609]

Automated randomization systems have been developed using voice response [44] and telephone touch-tone technology [45,46]. Others have used a preloaded password-protected system with hidden encrypted randomization files into the trial s laptop or desktop computers that are used as distributed data collection devices [47] or have developed centralized computer programs that dynamically randomize subjects [48]. [Pg.624]

The first draft of the new requirement had draconian security requirements, softened (as is common) after a comment period Demands for biometric identifiers were replaced with password control options. But the revised final regulation was still broad in scope and necessitated extensive documentation and testing for all systems used in the industry (with even stronger controls if the user opted for electronic signatures). [Pg.634]

Demonstrate that stored passwords are encrypted, and that encryp tion uses at least suggested standards. [Pg.641]

Admin changes to passwords Demonstrate that audit trail is... [Pg.641]

Demonstrate that electronic signatures employ at least two distinct components (user ID and password). [Pg.644]

Demonstrate that user ID is displayed at the time of application of the password to execute an electronic signature (i.e., at least one electronic signature component that is only executable by, and designed to be used only by, the individual). [Pg.644]

Demonstrate that passwords (one of the two components of electronic signatures) can only be known to the genuine owners, and cannot be viewed by anyone, including administrators of the account (at operating system and application level). [Pg.644]

Identification codes/ passwords controls shall include maintaining the uniqueness of each combined identification code and password, such that no two individuals have the same combination of identification code and password. [Pg.645]

Identification codes/ passwords controls shall include ensuring that identification code and password issuances are periodically checked, recalled, or revised (e.g., to cover such events as password aging). [Pg.645]

Demonstrate that administrator password management privileges extend only to the ability to reset a password. [Pg.645]

Demonstrate that the user must change the reset password at initial subsequent login. [Pg.645]

Refer also to demo that use of invalid password does not allow access to system or permit electronic signature. [Pg.645]


See other pages where Password is mentioned: [Pg.294]    [Pg.429]    [Pg.497]    [Pg.282]    [Pg.596]    [Pg.610]    [Pg.227]    [Pg.619]    [Pg.638]    [Pg.638]    [Pg.638]    [Pg.638]    [Pg.638]    [Pg.639]    [Pg.641]    [Pg.644]    [Pg.645]   
See also in sourсe #XX -- [ Pg.233 , Pg.638 , Pg.639 ]

See also in sourсe #XX -- [ Pg.7 ]

See also in sourсe #XX -- [ Pg.274 ]

See also in sourсe #XX -- [ Pg.126 , Pg.128 ]




SEARCH



Complex passwords

Password protection

Passwords, electronic signatures

Passwords, regulations

© 2024 chempedia.info