Infozara offers RIHAD as a service with the following features:
Security is one of the most important points that must be taken into account in information management..
Security in communications via the application is strengthened by the addition of a SSL Web Security Certificate installed in the web and outsourced to a Certificate Authority.
This Certificate:
certifies that the communication between user and application, is performed safely and with mechanisms that prevent tampering and unauthorized access to the information transmitted;
verifies the identity of the entity checking that the site, which supports the Service, is owned or managed by it and that this company is legally organized under the jurisdiction.
Access security. RIHAD users access in a private way and the application enables different functionalities according to the role assigned.
Each role is in connection with the process execution permissions granted for the user. In case of a correct access the application checks the role assigned to the user and only enables the protocols that can be executed with that role.
In order to use the application, a subject must be added as a user into the system, specifying the user name, the password and the appropriate permissions.
Each user will have a unique identifier that can be recognized by the application.
Furthermore, to ensure the data, the continuity of service and avoid loss in case of disaster, daily backups are performed in geographically separate locations.
The service offers 24x7 availability, that is, 24 hours a day, 7 days a week.
This is a web application, that is, it’s not necessary any installation in your PC and the access is ubiquitous, only internet connection is required.
Compliance with standards and norms
RIHAD, since its implementation, is in compliance with the Law on Biomedical Research, ensuring sample, data and process traceability.
Additionally, the view layer has been developed following these standards: the guidelines of usability established by Jakob Nielsen, the directives of accessibility for the web content 1,0 and the specifications of the World Wide Web Consortium (W3C).
Also point out that access is secured by the encrypted transfer protocol TLS.