Unimark EC3000 Series Especificaciones Pagina 171

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 278
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 170
AIMS Attachment A: AIMS Statement of Work
Page 111 of 130
3.10.5 Security, Performance and Management
A. Security
1. Authorized users shall log into the system using a unique user name
and password. Depending on assigned user access privileges, the
user shall be either granted or denied access to individual applications.
In no case shall any user identified via user name and password as an
airline employee or any other user without proper authorization gain
access to any other airline's data, other than that pertaining to their
own flights and baggage. Data that can be viewed at the user's
workstation pertaining to data by airlines other than the user's airline
shall be limited to data that can be viewed on public displays.
2. The system administrator shall be able to add, delete, set, and change
user privileges and access authorization via a GUI. System security
parameters shall be configurable by the system administrator.
3. The AIMS workstations shall have an "inactivity timeout period" such
that if any workstation is determined to be inactive by having no
input/output performed at that workstation for the defined timeout
period, that workstation shall be automatically logged out of the
application.
4. The timeout feature shall be turned on or off by the system
administrator. The timeout period shall be configurable by the system
administrator.
5. The occurrence of an inactivity timeout occurring as described above
shall be recorded in the fault log, showing date, time, workstation
identifier, and the user name of the user who was logged in at the time
when the inactivity timeout occurred.
6. The AIMS shall prevent a user name from being logged in more than
one time concurrently.
7. The AIMS shall provide an audit trail of all transactions. The audit trail
shall track on a per user basis. The audit trail file shall indicate any
changes that occurred to applications configuration, data structure, or
database fields/records, and shall contain the date and time of the
change, the user identification of the user who made the change, and
the details of the change.
8. The AIMS shall provide automated tracking of the audit trail database,
and shall alert the system administrator when this file has exceeded
pre-determined size restrictions. The system administrator shall then
have the ability to archive this database, along with the ability to
restore it for reporting purposes. The system shall also include the
option of a “rolling window”. In this case, the audit trail database shall
Exhibit 3
Page 171 of 278
Vista de pagina 170
1 2 ... 166 167 168 169 170 171 172 173 174 175 176 ... 277 278

Comentarios a estos manuales

Sin comentarios