audit trails

46 examples (0.04 sec)
  • This feature of the visitor management system provides security with an audit trail.
  • Modern computer software applications and IT infrastructure have adopted the term event data over audit trail.
  • Each application group has its own audit trail.
  • Some low-end systems do not have adequate security nor audit trails.
  • Audit trail can be used as a digital evidence.
  • Audit trails refer to keeping information about who had recently used or accessed patient records.
  • All activity in all of these areas is journaled (written to the audit trail).
  • More complex systems can maintain a history and audit trail of all changes to the data loaded in the data warehouse.
  • Role based access provides a user access audit trail for traceability requirements.
  • Notes and comments can be added to create an audit trail for each item.
  • The program is not restricted in terms of marker sets and provides a historical audit trail of data changes.
  • Various technologies can be used to implement a paper audit trail.
  • The command has other options which can be used as part of an audit trail recovery for a database.
  • Further, automatic logging of all related audit trail information related to the legal hold notification process is also highly recommended.
  • An audit trail is publicly available for each article.
  • IRU uses these blocks and other information on the audit trail to perform the fastest possible recovery operations.
  • They are secure due to the audit trail available as a result of the sequential numbering.
  • Details of all spreadsheet changes by itself are recorded and become permanently attached to the document to provide an audit trail.
  • Administrators can set up gates between each environment, requiring manual user intervention and providing an audit trail.
  • Common Cause advocates a voter-verified paper audit trail for election machines in all states.
  • Next »