• The system must be secure. Prevent data loss or theft of data being intercepted on the way to the reception - transmission within the LIS system
• system provides support for the right to use the system in the form Role Base Access Control and Attribute Base Access Control can.
การแปล กรุณารอสักครู่..
