Security and Reliability
Access to the Quintiles Outcome system is based on defined user roles. These roles determine the specific menus, tasks, and information to which a user has access. By integrating this technology with standard procedures for user definition, password selection and updating, and other features, you can prevent unauthorized access to your study and secure your information.
Quintiles Outcome’s security standards meet or exceed those established for privacy protected and/or other sensitive HCFA information sent over the Internet.
Quintiles Outcome focuses not only on collecting but also on securing your data. Your data is your most precious possession and needs to be accessible, where you need it and when you need it. Quintiles Outcome offers a secure facility and failover processes to keep your data safe. Quintiles Outcome maintains system security through both physical and logical methods. Databases are maintained in a secure, access controlled and monitored facility. The mechanisms employed are in-band processes (encryption, authentication, and intrusion detection), out-of-band processes (user identification, secure storage and back-up, data redacting, and non-modifiable audit trails), and system redundancy. Additionally, an external assessment of system security is routinely performed by an independent, expert third party.