SECURITY

Home / ABOUT/SECURITY

weeererer

Empatix Medical can be configured different ways to ensure the needed level of security. Below are some of the methods and functions that can be used.

  • Empatix Medical can use secure protocols (HTTPs) and/or a one-time password sent as SMS.
  • Each user must be granted access based on his/her work area.
  • Password requirements, such as minimum length.
  • Access based on need-to-know.
  • Logging of user activity.

  • Empatix Medical can use secure protocols (HTTPs) and/or a one-time password sent as SMS
  • User control:
    • Each user must be granted access based on his/her work area
    • Password requirements, like minimum password length
  • Access control:
    • Access based on need-to-know
    • Logging of user activity
  • Backup systems and synchronization of data between front-end server and back-up server
  • Security reports:
    • Who logged in when and who read or edited data, sorted according to medical center, city and region.

Empatix security
We take care of servers and backups Join Now!