Skip to main content
. 2020 Jul 29;44(9):149. doi: 10.1007/s10916-020-01605-7

Table 3.

System requirements (SR)

SR1 Secure login with encryption of username and passwords
SR2 Secure access to data for authorized personnel only
SR3 Anonymous data storage
SR4 24/7 Access to data and services