the necessity of administering security functions through
user permissions, passwords, digital signatures, and
authentication of files, the use of an audit trail
feature is a necessary component of any truly secure
database. The audit trail constructs logs within the
database so that user activities may be traced, or
file histories may be reconstructed. In this way, any
inconsistencies or problems in the collection can be
tracked and associated with known events and users.
administrators to track activities related to image
manipulation, including moving, deleting, annotating,
creation and modification of other file types (e.g. reports, presentations) are also logged.
signatures and user ID’s are logged, allowing
association of activity with users
trails may be sorted by the image activity, by
user activity, by electronic signatures, by date,
and other criteria as reports are created.
CFR Part 11 specifications for audit trails
and logging tools.