Privacy policy in the KELLY registry, in CZECH only ( PDF file, 165 kB)
Data are collected in the electronic database, which is based on CLADE-IS robust system. The system has been specifically designed for the collection of large amounts of data in clinical trials and/or clinical registries. It is fully customised to the structure and requirements of the project. The on-line application is accessible to users via any internet browser. Records are stored under a specific identity number (ID) which does not allow any backward identification of any individual patient. The unequivocal identification of patient is only known to the attending physician or to an authorised healthcare professional.
Only authorised users can access the system after entering a valid username and password. The system of user rights is one of key functions in the administration of user accounts. Users can be assigned various levels of authorisation so that they have access to selected functions or parts of the system.
Apart from this, an automatic log-out is done after a predefined period of user's inactivity. This function is aimed to prevent a misuse of an unoccupied computer if the user forgets to log out. Centralised user account management is provided by IBA Helpdesk.
Data are validated on both client and server side. There are also additional validations — any detected problems are reported (queries). Each server is automatically backed up before any changes to the system are carried out (every night). Procedures and safeguards are enforced to ensure that backup data cannot be accidentally overwritten. Latest copies of data from servers are always available in case of an adverse event to ensure a quick resumption of the service. In addition, the system provides an audit-trail functionality, which ensures chronological recording of all activities that have affected registered data.
The security of the IT infrastructure through which IBA provides its data management services is ensured on two independent levels: 1) security of data, 2) physical security of servers.
1. Data security:
2. Physical security:
All data entered into CLADE-IS passes through several steps of validation. All checks are programmed and validated into the system. This process is performed simultaneously with the creation of the database.