Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Password protection

Validation also applies to software. In a simple example, you could create an Excel spreadsheet template with fixed formulae to calculate the mean and standard deviation of a range of data. To validate this template you would enter a set of sample data and verify the template-calculated results against the manually calculated results. In order to be confident that the template could be used for further data sets you would password-protect the cell formulae and verify that they cannot be altered without it. [Pg.27]

All formulas are to be written out by hand with the specific numbers in the right places on a sheet provided for the purpose, and the calculations are to be done by calculator. Caution Write the numbers exactly as printed, do not round any digits, or the quality assurance unit (a sort of corporate vice squad) will not approve the report out of fear that someone could have cheated. A validated program can be used. While an Excel spreadsheet as such needs no validation, a simple cell-formula calls for extensive tests and documentation and proof that the sheet is password protected against fraudulent manipulation. On top of that, the analyst s supervisor is required to confirm the calculation and sign off on... [Pg.147]

Usage The PC access should be limited to the authorized personnel only. The PC should be used for the conduct of the trial only. The PC should not be left on while unattended. The PC should be covered with the protective cover when idle. We recommend the use of a password-protected screen saver. [Pg.609]

Automated randomization systems have been developed using voice response [44] and telephone touch-tone technology [45,46]. Others have used a preloaded password-protected system with hidden encrypted randomization files into the trial s laptop or desktop computers that are used as distributed data collection devices [47] or have developed centralized computer programs that dynamically randomize subjects [48]. [Pg.624]

Several types of software were developed. One programme contains the questionnaire and allows each interviewer to upload all the answers from each interview to an internal common password-protected database accessible via the internet. Another programme displays an overview of each substep of each major step in each supply chain on a webpage, and by clicking on a... [Pg.501]

Services differ with some, you can fill out applications online, and save them (by creating an account which is password protected) so you can work on them a little at a time. Essays may be uploaded from your computer, and then the application may be paid for and submitted online. Other sites simply help you get either a hard or online copy of the application. Here is a list ... [Pg.166]

This Accessible Copy may be stored on the students personal computer or other electronic device, or on a secure password-protected intranet limiting access to the student(s) only. [Pg.2]

In addition, the HP ChemStation provides password protection against accidental data loss or methods changes. The HP ChemStation controls and monitors all GC parameters and maintains a logbook of all system events that occur while the GC system is running. System-suitabihty software, which allows analysts to select from a wide variety of chromatographic parameters to monitor and verify system performance, is also available. [Pg.123]

The software system also contains a suite of password-protected maintenance programs. The unit is able to process 96 samples in 45 minutes or about 768 samples in an eight hour day. [Pg.184]

For editorial teams of Collaborative Review Groups (www.cochrane.org/crgprocedures). This password-protected material contains many procedural resources, including examples of checklists, forms, etc. In addition, the Cochrane Style Guide (www.liv.ac.uk/lstm/ehcap/CSR/home. html) provides guidance to enable people to copy edit Cochrane Reviews and other documents produced within The Cochrane Collaboration in a consistent manner. [Pg.26]

Data tables produced for the DMC should contain separate summaries by treatment group, with the treatment groups labelled A and B (partially blinded). A separate sealed envelope or a password-protected electronic file should be provided to the members with decodes for A and B to enable the DMC members to be completely unblinded. This may seem an elaborate process, but it protects against inadvertent unblinding. [Pg.221]

The spreadsheet is stored as a password-protected file in the folder E Validated Excel templates. The file name is Template CU UV (V.01).xls. ... [Pg.288]

The password-protected file is stored in a secure folder. Nevertheless, a periodic review concerning safety and functionality will be made at least every 12 months. [Pg.291]

Another area of concern for the FDA relates to records sent over public networks, dial-up connections, or public phone lines, accessed through extemal/intemal web servers or by database servers. A number of security issues need to be considered in order to keep these records trustworthy. Intranets may face similar security issues if remote users connect to the central network resources through a local link to an Internet, even when password-protected access for the users is provided to just a small portion of a private network. These systems are considered by the agency as Open Systems (Part 11.30)4. For example, the Internet provides a convenient medium to connect to other networks, but it does not provide reliable security features, such as entity authentication, or protection from hostile users or software. [Pg.105]

The platform is still password protected until the publication of the B. megaterium genome sequence. For accessibility requests contact b.bunk tu-bs.de. [Pg.153]

The following systems are entirely Internet-based and incorporate all elements of submission, review, and manuscript management, unless otherwise noted. They operate with standard browsers and require that authors, editors, and reviewers have Adobe Acrobat Reader to view PDF documents. Authors, reviewers, and editors are offered a secure, password-protected login. Each system incorporates an author home page for the submission, revision, and tracking of manuscripts. Similarly, each system allows referees to submit reviews of manuscripts online. [Pg.68]

Logical Access Different fevels of password System protected by single No password protection in... [Pg.347]

The repository may range from a specific directory on a server, with a work group password protection, to a software package-controlled database repository implementing full database security controls. There may also be a requirement to produce and store multiple renditions of a document within the repository. Specific validation issues include ... [Pg.553]

Security features, such as password protection Control sequences... [Pg.597]

Users should only have read access to spreadsheet applications. All templates should be password protected. The password should not be identical with the NT password because the spreadsheet password does not age. The system owner needs to administer the passwords. If there is no authorization via the operating system (insular workstations), the system owner should define and administer the Specific access authorization. Group access should not be allowed. Only cells receiving an entry should be unprotected (unlocked). Macros need to be hidden and protected from user manipulation. [Pg.738]

Visit the website at to access various resources. Some resources are password-protected, and available only to instructors using this text in their course. Visit the Instructor Companion Site portion of this website to register for a password. [Pg.709]

A decent tablet weight control system should be based on product recipes, provide instant display of compression force distribution, control charts and batch reports on demand, archiving data for subsequent analysis or documentation, give some measure of standardization, be fully compliant with current validation requirements, and provide a multilevel security, e.g., password protection for operator and supervisor... [Pg.3702]

Screen Saver Sets up an automatic screen saver to cover your screen if you have not been active for a certain period of time. Originally used to prevent burned monitors, they are now generally used for entertainment or to password-protect user s desktops. The Screen Saver tab also contains other power settings. [Pg.475]

You can protect sensitive backup data by entering a password for the backup set. Simpiy ciick the Password Protect button to enter a password. This password will be required during the restore process in order to restore the data. [Pg.698]

Not necessarily password protected although content should be restricted to HCPs... [Pg.180]

HCPs and appropriate administrative staff via password protection... [Pg.182]

Appropriate security measures, e.g. password protection, should be used to restrict the target audience as applicable by federal law. A statement such as this product information is intended only for residents of Canada should appear on each web page containing PI. [Pg.185]

The advertisement of prescription-only medicines to the general public is prohibited and access to websites providing information about these products should be restricted to healthcare professionals, but it is not necessary to password protect these sites. The following requirements should be met ... [Pg.188]

Internet There is no specific guidance on the use of the internet in Mexico but advertising on it is subject to the same rules as other advertising. COFEPRIS therefore requires pharmaceutical company advertising on the internet for prescription-only medicines to be restricted to healthcare professionals. Although no rules have been laid down for these levels of security, it is normally administered via the company granting user name and password protection. [Pg.188]


See other pages where Password protection is mentioned: [Pg.294]    [Pg.497]    [Pg.610]    [Pg.186]    [Pg.397]    [Pg.510]    [Pg.219]    [Pg.635]    [Pg.743]    [Pg.711]    [Pg.1936]    [Pg.698]    [Pg.832]    [Pg.180]    [Pg.181]    [Pg.185]   
See also in sourсe #XX -- [ Pg.79 , Pg.123 , Pg.182 ]




SEARCH



Password

© 2024 chempedia.info