+ All Categories
Home > Health & Medicine > Discover Introduction to REDCap

Discover Introduction to REDCap

Date post: 30-Nov-2014
Category:
Upload: starsurguk
View: 481 times
Download: 1 times
Share this document with a friend
Description:
STARSurg Introduction to REDCap
11
STARSurgII : DISCOVER Protocol Launch 16 th September 2014, Royal College of Surgeons of England REDCap Data System
Transcript
Page 1: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

REDCap Data System

Page 2: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

Research Electronic Data Capture

Page 3: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

Why use REDCap?

• REDCap gives you control of the data

• REDCap is more powerful and flexible

• REDCap is more secure

Page 4: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

How secure?

“At rest” encryption is in place on the database server. Access control is achieved by directly administered usernames and passwords, with limitation of collaborator access to institution-specific data. Passwords are stored as an encrypted one-way hash of the password. Accounts are disabled after 5 failed login attempts. Users are auto logged out after 30 minutes of no activity. Users are forced to change password after 90 days. Daily audit tracking of users is in place.

Data is protected by being stored in MySQL databases on a separate server. This server is behind a firewall and can only be accessed from the IP address of the web server. An SSL-tunnel encrypts communication between the web and databases servers. File upload is secured between servers using the WebDAV protocol with SSL. “At rest” encryption is in place on the database server (aes-xts-plain64:sha256 with 512-bit keys). Operating security updates are installed automatically. Antivirus software runs to a scheduled protocol on the web server.

REDCap has a built-in audit trail that automatically logs all user activity and logs all pages viewed by every user, including contextual information (e.g. the project or record being accessed). Whether the activity be entering data, exporting data, modifying a field, running a report, or add/modifying a user, among a plethora of other activities, REDCap logs all actions. The logging record can itself be viewed within a project by users that have been given privileges to view the Logging page. The Logging page allows such users to view or export the entire audit trail for that project, and also to filter the audit trail in various ways based upon the type of activity and/or user. The built-in audit trail in REDCap allows administrators to be able to determine all the activity and all the data viewed or modified by any given user.

Page 5: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

Disadvantages

• Audit departments

Page 6: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

Registration

Page 7: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

Logging in

[email protected]

Page 8: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

Page 9: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

Page 10: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

www.STARSurg.org

Page 11: Discover Introduction to REDCap

STARSurgII : DISCOVER Protocol Launch16th September 2014, Royal College of Surgeons of England

Summary

• REDCap is good

• Make sure your lead has the correct email address

• Check your spam

• Technical issues can be resolved easily!


Recommended