Management of Security

The system is username and password controlled. Security settings can be adjusted per Role which would limit user access according to your organisational requirements.

User Access Control:

All users, regardless of frequency of use, must have unique login credentials and access authority to work in the Incident Module. Security protocols strictly prohibit the sharing or transferring of login credentials, ensuring data integrity and compliance.

Access:

• I-Manage Compliance (I-MC) operates on a Cloud-Based infrastructure, ensuring accessibility at any time and from anywhere, 24/7.
• Formal authorization, setup, and security configuration are role-based, meticulously managing access privileges, processes, and information access.
• Access is controlled through username and password authentication, enhancing system security.

Authentication:

• A single authentication process is subject to discussion and implementation based on specific requirements and detailed project specifications.

Two-Step and Person Verification:

• Prioritizing safety, the module incorporates a two-step verification process for isolations. Additionally, individual verification by authorized personnel adds an extra layer of security, confirming that the isolation is executed by qualified individuals.

Role-based Access Control:

• Granular Security Settings:

Security configurations can be finely tuned on a per-role basis, allowing tailored access restrictions. Specific workflows can also be restricted through these security settings.

• Audit Trail:

Every interaction within the system, including clicks and transactions, is meticulously recorded, providing a comprehensive audit trail.

Data Transmission and Storage:

• Direct Server Interaction:

No transactions are transmitted via the internet. Users work directly on the server managed by Oracle, minimizing the risk of security breaches during data transmission.

• Data Recording:

All changes made within the system are recorded, offering transparency. User login details and session durations are logged, allowing administrators to monitor user activity effectively.

Integration and Authentication:

• Compatibility with Current Systems:

Integration with existing systems is feasible, ensuring a seamless connection with your current infrastructure.

• Single User Authentication:

Implementation of a single-user authentication process can be discussed and implemented for additional security measures.

Session Management:

• Automatic Session Timeout:

To enhance security, the system is configured to automatically cancel a user session if idle for more than 15 minutes. Users are then required to log in again for continued access.

User Activity Reports:

• Detailed User Activity Reports:

Comprehensive reports on user activity are available, providing insights into system usage patterns and potential security concerns.

Backup and Disaster Recovery:

Managed by Oracle:

• Frequent Backup Points:

Oracle, the system’s infrastructure provider, manages backups and disaster recovery. Backup points are created every 15 minutes, ensuring that recent data can be restored in case of any unforeseen issues or disasters. This approach contributes to the system’s robust data protection and business continuity measures.

Need help with compliance?

Reach out to us today to find out more about how i-Manage Compliance can help you get up to standard.