Access Logs
Access logs provide high-level logging of system access to be used for HIPAA reporting and similar requirements. Access logs capture operator access to results and high-level RALS™ SYSTEM access.
Jump to a heading on this page:
Institution Access
Adding
Editing
Cloning
Deactivating or Deleting
Fields
Institution Access
Access logs do not have an institution identity; all access logs can be viewed by any operator with the appropriate permission. However, institution access still applies to records (e.g. results) referenced in access logs. In summary, an operator may be able to see that access to a record occurred without being able to view the details of that record.
Adding
Access logs cannot be manually added.
Editing
Access logs cannot be edited.
Cloning
Access logs cannot be cloned.
Deactivating or Deleting
Access logs cannot be deactivated nor deleted.
Fields
When viewing access logs in a data table, the fields are defined as follows:
Field | Notes |
---|---|
General | |
Key | Unique identifier |
Access Time | Time the access event occurred |
Access Operator | Operator who made access |
Type | Record type accessed |
Event | Specific form of access |
Records | Unique identifiers of accessed records |