The role of the administrator of the main organization is given to the user who registers the organization in THE MUST. The administrator of the main organization is also responsible for concluding the confidentiality and security agreement and the organization`s registration form. Additional responsibilities include: 1. Authorized users: A database security package is implemented on CDC`s main computer to control unauthorized access to the system. Attempts to access by unauthorized persons are automatically recorded and checked regularly. Access is granted to only a limited number of designated physicians, scientists, statisticians and assistance staff of the Centers for Disease Control (CDC) or their contractors, provided that the system manager fulfills the desired objectives for which the data was collected in this system. To access the online app, all users need access to a PC with Internet access. System Maintenance Authority: Public Health Service Act, Section 301, Research and Investigation (42 U.S.C. 241); Sections 304, 306 and 308 (d), which examine the authority to provide confidentiality guarantees for health research and related activities (42 U.S.C 242 b, k and m (d)). Users must set up a user ID and password with the North Carolina Identity Management Service (NCID). NCID is the standard identity and access management service provided by the State of North Carolina to users in the state of North Carolina. NCID enables its customers to achieve a high level of security and control of access to resources in real time such as the MUST application.
Users can use the NCID service for: routine use of records, including user categories and the purposes of these uses: the following routine uses apply to all records of this system, with the exception of those that are managed under a guarantee of confidentiality in accordance with section 308 (d) of the Public Health Services Act (except in the consent form or insurance declaration): NCID is the standard identity and access management service provided by users of the Office of Information Technology Services to users of the state, premises, business and citizens. NCID enables its customers to achieve a level of security and increased access to real-time resources such as customer-based applications and information calls. The agent and financial advisor of the applicant agency must approve the bid applications through the GEMS. You must have an active NCID to register for GEMS. NCID accounts can apply to ncid.nc.gov/idmdash/ Note: Once the role of primary administrator has been granted to the user, the user can delegate the role of administrator to other users who have registered with the organization. This is useful if the user who registers the organization is not able to manage daily activities like the ones mentioned above. In large organizations, you can delegate the admin role to multiple users of the organization. 3. Procedural guarantees: System security includes automatic locking of accounts, forced changes to passwords, and system control and data access. The protection of computerized records includes the scheduled verification of the valid user`s identification code, account code and password before accepting a terminal session or command transmission, frequently modified passwords, and the vault management system. When Privacy Acts are erased, a special “certified” process is performed, in which the tapes are completely crushed to avoid accidental disclosure of the data.
Additional security measures can be incorporated into the program by the system analyst, which is justified by the sensitivity of the data. Records can be passed on to the appropriate federal authorities and ministry contractors who need to know the information needed to support the ministry`s efforts to respond to rape.