Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

User identification

Identification To the nonplastic user and even certain plastic users, identification of over 35,000 plastics tends to be either misleading or confusing even though this situation should never exist. As explained in this book, certain specific plastics meet certain product requirements. [Pg.245]

Plasma levels on pulmonary administration corresponded to those resulting from i.v. administration, Tmax being reached in 2 min (Fig. 18). The electronic control of the AerX system offers interesting opportunities, for example with regard to narcotic safety, such as user identification or lock-out times after a certain number of applications within a certain period to prevent overdosing. [Pg.261]

Controlled Access. Access to the physical archives (e.g., file cabinets and freezers) is controlled by locks and the archive management. Access to electronic files is controlled by secret user identification (ID) numbers. Well designed electronic data storage software records or stores the ID number of any user that enters or changes data and when that entry or change occurred. [Pg.64]

The following features must be implemented Automatic logoff, Unique user identification. In addition, at least one of the other listed implementation features must be a procedure to corroborate that an entity is who it claims to be. automatic logoff biometrics password PIN telephone callback token unique user identification... [Pg.108]

System security is managed by a scheme providing for the assignment of each command to any one or more of sixteen security keys. Every user is assigned one or more of the defined keys and allowed to execute only those commands which his keys enable. Initially defined during system installation, the security tables are maintained by assigning user identification, password and security key. Access to the security tables is controlled by the scheme itself - the tables being easily modified on-line, but only by one with the required authorization. [Pg.24]

It is important to appreciate that some data may be transient and will never be stored to durable media, while other transient data may be processed to derive data before being stored. Both transient and stored data must be protected from unauthorized, inadvertent, or malicious modification. It is expected that a register of authorized users, identification codes, and scope of authority of individuals to input or change data is maintained. Some computer systems lock-down data, denying all write-access. Secnrity arrangement is discussed in detail elsewhere in this chapter. [Pg.295]

Align security measures for the computer system with your corporation s Information Asset Protection Policies (lAPP) and coordinate with the building and/or plant security plans. For some systems, strict compliance with specific security requirements mentioned in the lAPP may not be possible given proprietary system limitations. Examples may include unique user identification codes, specified lengths for user identification codes and passwords, or inactivity time-outs. Use a deviation change process to document and justify these situations. [Pg.633]

Are there procedures that address the loss or compromise of user identification devices (cards/tokens, etc.) or passwords including electronic de-authorization, immediate and urgent reporting, and rigorous control of temporary or permanent replacements 11.300(c), 11.300(d)... [Pg.872]

Authentication is usually performed by entering a unique user identification (ID) and password. If data are transferred automatically from external software, the source system either must provide a similar mechanism to identify a valid user or the external system has to log on to the record manager with a unique identifier. In any case, data that are entering a compliant-ready record manager require this identification. The authentication needs to be logged with a date and time stamp in an audit trail. The same requirement applies to the modification of data that already exist in the record, if the user is not already in an authenticated session. In fully regulated environments, a reason for the modification has to be supplied before changes can be made. [Pg.294]

User identification in a typical SDS scenario is performed by the target software. [Pg.323]

User identification Record activities accessed by user(s) 21 CFR 11 A11.10 Specification, design, OQ... [Pg.125]

Biometric- Fingerprint, voice identification, corneal Enables user identification via... [Pg.580]

Biometric- Behavioral patterns of interaction, such as Enables user identification via behavioral... [Pg.580]

Orr RJ, Abowd GD (2000) The smart floor A mechanism for natural user identification and tracking. In CHI 00 CHI 00 extended abstracts on Human factors in computing systems, pp 275-276, New York, NY, USA, ACM... [Pg.168]

Orr Robert J. and Abowd D. Gregory The Smart Floor A Mechanism for Natural User Identification and Tracking Proceedings, April 2000 Conference on Human Factors in Computing Systems (CHI 2000), The Hague, Netherlands. [Pg.34]

Main security solutions proposed to address security requirements of patient-monitoring systems reside in the areas of encryption and secure communication. Access-control techniques need to be developed to address the privacy issues in eHealth applications. In particular, procedures for authentication (user identification) and authorization (access right checking) are essential for acceptable and sustainable eHealth applications. The authentication function ensures that users are indeed who they claim to be. Therefore, an unauthorized party should not be able to receive or access a patient s medical data. Various techniques being considered include a combination of different authentication atomics. These atomics include biometric information (fingerprint, retina scan, typing pattern, etc.) and information the user knows (mother s maiden name), user possessions (e.g., smart card identification systems), and may also include current location and/or the end-user terminal identity (media access control [MAC] hardware address) and time of access. [Pg.360]

Require user identification and valid password to be entered before the PC can be booted. [Pg.2129]

LOGINID LOGIN identification user identification LOGOFF closing of an online search and breaking off the data transfer. LOGON always contains the access to the host computer via the NUA, the network user address, and the -> password, also -> AUTOLOGON is possible. The procedures differ from host to host. [Pg.297]

NUI Network User Identification, code for allowing access, which must be applied at the network operators. [Pg.298]

Password code to hinder misuse by unauthorized persons. To access the host, —> user identification and password are required. [Pg.299]

User identification is assigned with the host contract together with the password. It is a kind of customer number, which allows the access to the host and is used as code for the Invoices. Synonyms are LOGINID and USERID (ID = Identification),... [Pg.302]


See other pages where User identification is mentioned: [Pg.1037]    [Pg.224]    [Pg.29]    [Pg.189]    [Pg.577]    [Pg.429]    [Pg.429]    [Pg.458]    [Pg.407]    [Pg.426]    [Pg.427]    [Pg.3]    [Pg.182]    [Pg.2126]    [Pg.307]    [Pg.375]    [Pg.864]    [Pg.126]    [Pg.126]    [Pg.302]   
See also in sourсe #XX -- [ Pg.126 , Pg.128 ]




SEARCH



© 2024 chempedia.info