Research Article
The Evolving Role of Information Technology in Haemovigilance Systems
Table 3
Safety measures implemented by the surveyed haemovigilance Web sites.
| Safety measure | Web-based information system | Total | A | B | C | D | E | F | G | H | I | J | K |
| Access to site is password protected | Y | Y | Y | Y | Y | N | Y | Y | Y | Y | Y | 10 | Data privacy, that is, each participant is granted access only to his/her data | Y | N | Y | Y | Y | N | Y | Y | N | Y | Y | 8 | Data anonymity, namely, by masking the identification of clinical facilities, patients, and so forth | Y | N | Y | Y | Y | N | Y | N | Y | Y | Y | 8 | Data operation conditioned by user credential | Y | N | Y | Y | N | N | Y | Y | N | Y | Y | 7 | User sessions | Y | N | Y | Y | N | N | Y | N | N | Y | Y | 6 | Secure HTTP | Y | N | N | Y | Y | N | N | N | N | N | Y | 4 | Encryption of sensitive data | N | N | N | Y | N | N | N | N | N | N | N | 1 | Authentication with a national professional health card | Y | N | N | N | N | N | N | N | N | N | N | 1 | Total of safety measures implemented | 7 | 1 | 5 | 7 | 4 | 0 | 5 | 3 | 2 | 5 | 6 | ā |
|
|
Letters A to K represent the haemovigilance systems. The columns referring to outsourced systems are in italic.
|