Technology Risk. 1. Does the proposed change apply new or additional information technologies that have substantial potential for privacy intrusion? … No. The core new technologies have been tried and proven over several years and access to the technology is controlled by strict role based access controls and security and audit measures. This method is more secure and safer than previous methods such as printed records, fax, letter and multiple systems. Identity Risk
Appears in 5 contracts
Samples: www.regisa.uk, regisa.uk, regisa.uk
Technology Risk. 1. Does the proposed change apply new or additional information technologies that have substantial potential for privacy intrusion? … No. The core new technologies have been technology and processes are tried and proven over several many years and access to have been in use in the technology is controlled by strict role based access controls and security and audit measures. This method is more secure and safer than previous methods such as printed records, fax, letter and multiple systemsspecific context of Connected Care since 2016. Identity Risk
Appears in 5 contracts
Samples: regisa.uk, www.regisa.uk, regisa.uk
Technology Risk. 1. Does the proposed change apply new or additional information technologies that have substantial potential for privacy intrusion? … NoYes. The However, the core new technologies have been tried and proven over several years and access to the technology is controlled by strict role based access controls and security and audit measures. This method is more secure and safer than previous methods such as printed records, fax, letter and multiple systems. Identity Risk
Appears in 2 contracts
Samples: www.regisa.uk, regisa.uk
Technology Risk. 1. Does the proposed change apply new or additional information technologies that have substantial potential for privacy intrusion? … No. The core new technologies have been technology and processes are tried and proven over several many years and access to have been in use in the technology is controlled by strict role based access controls specific context of Connected Care since 2016 and security and audit measures. This method is more secure and safer than previous methods such for over a decade with the Hampshire CHIE (formerly known as printed records, fax, letter and multiple systemsthe Hampshire Health Record). Identity Risk
Appears in 1 contract
Samples: www.regisa.uk