Access Logs

Access logs provide high-level logging of system access to be used for HIPAA reporting and similar requirements. Access logs capture operator access to results and high-level RALS™ SYSTEM access.

Jump to a heading on this page:
Institution Access
Adding
Editing
Cloning
Deactivating or Deleting
Fields

Institution Access

Access logs do not have an institution identity; all access logs can be viewed by any operator with the appropriate permission. However, institution access still applies to records (e.g. results) referenced in access logs. In summary, an operator may be able to see that access to a record occurred without being able to view the details of that record.

Adding

Access logs cannot be manually added.

Editing

Access logs cannot be edited.

Cloning

Access logs cannot be cloned.

Deactivating or Deleting

Access logs cannot be deactivated nor deleted.

Fields

When viewing access logs in a data table, the fields are defined as follows:

Field Notes
General
Key Unique identifier
Access Time Time the access event occurred
Access Operator Operator who made access
Type Record type accessed
Event Specific form of access
Records Unique identifiers of accessed records