Laserfiche WebLink
t <br /> i <br /> ti <br /> Data Acquisition/Archiving i <br /> I <br /> CAS' laboratory data is acquired directly or locally and then transferred to the <br /> centralized acquisition server. All data is eventually moved to the centralized data <br /> acquisition server for reporting and archiving. <br /> I <br /> I <br /> At a minimum, our data systems are backed up every 24 hours. Incremental backups i <br /> are performed several times during the day. The entire system is backed up twice a <br /> month and is stored in secure areas both on and off site. <br /> 1 <br /> E-mail and Data Transfer <br /> I <br /> All CAS facilities are linked via an e-mail system internally and through an Internet j <br /> provider for external messaging. These links have improved communication between <br /> our facilities and with our clients. E-mail has also allowed us greater flexibility and <br /> responsiveness in project management. Our data can be electronically transferred via j <br /> diskette, direct modem transfer to our client's host, or by the Internet when system <br /> compatibility issues are satisfied. <br /> I <br /> System Security <br /> No direct external, non-CAS access, is allowed to any of our network systems. The <br /> LAN is not open for direct external access. The WAN is configured for CAS use only <br /> via a frame relay.The frame relay is a dedicated connection from a trusted agent. <br /> Our external e-mail system and internet access is set up via a single gateway to <br /> prevent unauthorized entry. We have a closed system for company e-mail. Passwords ' <br /> are required on both systems. Files, such as electronic deliverables, are sent through ' <br /> the external e-mail system only via a trusted agent. CAS has standardized on MS I <br /> Exchange® for internal e-mail messaging. Our external messaging system operates <br /> through a single secure gateway. This gateway provides a virus scan for all <br /> attachments sent in and out of the gateway. Because the Internet is not regulated, we <br /> use a limited access approach to provide a firewall for added security. Virus screening <br /> is performed in real time on all network systems. <br /> i <br /> i <br /> i <br /> i <br /> I <br /> Page 28 of 29 <br />