Data security has become an increasingly important issue in the world today. In order to meet the specific needs of the Research and/or Hospital environment, the 3CPM Company has developed a series of companion program options may be acquired as stand-alone or as integrated options that operate within any full version of the 3CPM® Electrogastrogram.
Three Programs Available
In order to meet the specific needs of the Research and/or Hospital environment, the 3CPM Company has developed a series of companion program options may be acquired as stand-alone or as integrated options that operate within any full version of the 3CPM® Electrogastrogram.
There are 3 companion programs that are available that are designed to improved efficiency, portability, and storage of EGG data. These programs may be purchased separately or as a complete suite of products.
The 3CPM EGG SAS Export Program
The export program allows the export of patient files and the 3CPM data base in order to share data with other sites. It may either stand alone or integrate with any full version of the Electrogastrogram. The user may easily select any number of studies to export in conjuction with the selected database. Once accomplished this allows data to be shared between sites. The exported studies may then be shared and read using one of our Reader Programs.
The 3CPM® Central Data Depot Reader (CDDR)
The CDDR program was designed with multicenter research projects in mind. This particular Reader program option allows the import of studies exported from any full version using the Export program. The program was designed from a research viewpoint so as to protect the integrity of the original data, and permits for protected upload and storage to a centralized location to protect against data loss, theft or manipulation.
The 3CPM® EGG SAS Reader Program
The CDDR program was designed with multicenter research projects in mind. This particular Reader program option allows the import of studies exported from any full version using the Export program. The program was designed from a research viewpoint so as to protect the integrity of the original data, and permits for protected upload and storage to a centralized location to protect against data loss, theft or manipulation.
Security-based Software Programming
Additional software programming services are available to meet the challenging needs of the institutional security environment. Contact us to discuss how we may be able to meet your needs.