Security

The main security measure is related to the protection against unauthorized access.

Access protection

Patient data are confidential data having to be specially protected. The prevention of an unauthorized access is mainly based on:

  • 1. Authorization
  • 2. Authentication
  • 3. Traceability

Each of these three methods assures the security of the patient data.

1. Authorization

rules the assignment rights for using the system. Depending on the level of authorization, differentialized limitations and requirements apply to the user.

User groupings

User groups with different priviledges and authorizations can be defined.

New users are simply assigned to one or more group(s).

2. Authentication

is the identity checking of the user. Login procedures with username and password are standardly implemented.

Security levels

Complex authentication always comes along with complexity for the user. DALTI allows different security levels that can be adapted by the on-site administrator in case of need, for finding hence the perfect compromize between convenience (for the user) and 100% security.

Automatic logout

Automatic logouts can be run based on timeouts, or at a predefined system time. On this way, the user is not obliged to logout actively during any absence. After an automatic logout and successive re-login, the system continues the work at the status having been left before.

Extended user access code

In case of highest security requirements or for simplifying the login procedure, smart cards or a biometrical system can be used.

3. Traceability

Any activity in and via DALTI can be stored in logfiles.
Logging complexity is determined by the administrator.
Each wished type of activity is logged by a simple checkmarking in the administration tool.

The system log provides traceability. It records all the modifications of the data. By security reasons, only the administrator has access rights to the log.

USB dongle

DALTI uses so-called dongles. These are small USB sticks containing data and encryption programms protecting software and archive data against unauthorized access. Additionally, other information can be included.

Top