<Past |
Future> |
Summer 2018 R.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Spring 2019 R.x |
Divest [2, 4, 5, 6] |
Divest [2, 5, 6, 7] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Fall 2019 R.x |
Divest [2, 4, 5, 6] |
Divest [2, 5, 6, 7] |
Divest [2, 5, 6, 7] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Spring 2020 R.x |
Approved w/Constraints [2, 4, 5, 6] |
Divest [2, 5, 6, 7] |
Divest [2, 5, 6, 7] |
Divest [2, 5, 6, 7] |
Divest [2, 5, 6, 7] |
Divest [2, 5, 6, 8] |
Divest [2, 5, 6, 8] |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Winter 2021 R.x |
Unapproved |
Approved w/Constraints [2, 5, 6, 7] |
Approved w/Constraints [2, 5, 6, 7] |
Approved w/Constraints [2, 5, 6, 7] |
Approved w/Constraints [2, 5, 6, 7] |
Divest [2, 5, 6, 8] |
Divest [2, 5, 6, 8] |
Divest [2, 5, 6, 8] |
Divest [2, 9, 10, 11] |
Divest [2, 9, 10, 11] |
Divest [2, 9, 10, 11] |
Unapproved |
Spring 2021 R.x |
Unapproved |
Approved w/Constraints [2, 5, 6, 7] |
Approved w/Constraints [2, 5, 6, 7] |
Approved w/Constraints [2, 5, 6, 7] |
Approved w/Constraints [2, 5, 6, 7] |
Divest [2, 5, 6, 8] |
Divest [2, 5, 6, 8] |
Divest [2, 5, 6, 8] |
Divest [2, 9, 10, 11] |
Divest [2, 9, 10, 11] |
Divest [2, 9, 10, 11] |
Unapproved |
Winter 2022 R.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [2, 5, 6, 8] |
Approved w/Constraints [2, 5, 6, 8] |
Approved w/Constraints [2, 5, 6, 8] |
Divest [2, 9, 10, 11] |
Divest [2, 9, 10, 11] |
Divest [2, 9, 10, 11] |
Divest [2, 10, 12, 13] |
Fall 2022 R.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Divest [2, 9, 10, 11] |
Divest [2, 9, 10, 11] |
Divest [2, 9, 10, 11] |
Divest [2, 10, 12, 13] |
Winter 2023 R.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [2, 9, 10, 11] |
Approved w/Constraints [2, 9, 10, 11] |
Approved w/Constraints [2, 9, 10, 11] |
Divest [2, 10, 12, 13] |
Spring 2023 R.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Divest [2, 10, 12, 13] |
Summer 2023 R.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Approved w/Constraints [2, 10, 12, 13] |
Fall 2023 R.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Spring 2024 R.x |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
Unapproved |
| | [1] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [2] | Technology must remain patched and operated in accordance with Federal and Department security policies and guidelines in order to mitigate known and future security vulnerabilities. | | [3] | Per the May 5th, 2015 memorandum from the VA Chief Information Security Officer (CISO) FIPS 140-2 Validate Full Disk Encryption (FOE) for Data at Rest in Database Management Systems (DBMS) and in accordance with Federal requirements and VA policy, database management must use Federal Information Processing Standards (FIPS) 140-2 compliant encryption to protect the confidentiality and integrity of VA information at rest at the application level. If FIPS 140-2 encryption at the application level is not technically possible, FIPS 140-2 compliant full disk encryption (FOE) must be implemented on the hard drive where the DBMS resides. Appropriate access enforcement and physical security control must also be implemented. All instances of deployment using this technology should be reviewed to ensure compliance with VA Handbook 6500 and National Institute of Standards and Technology (NIST) standards. It is the responsibility of the system owner to work with the local CIO (or designee) and Information Security Officer (ISO) to ensure that a compliant DBMS technology is selected and that if needed, mitigating controls are in place and documented in a System Security Plan (SSP). | | [4] | Users must ensure that Microsoft Word, Microsoft Structured Query Language (SQL) Server, and Microsoft .NET Framework are implemented with VA-approved baselines. (refer to the ‘Category’ tab under ‘Runtime Dependencies’) | | [5] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISO (Information Security Officer) to ensure compliance with VA Handbook 6500. | | [6] | Per the May 5th, 2015 memorandum from the VA Chief Information Security Officer (CISO) FIPS 140-2 Validate Full Disk Encryption (FOE) for Data at Rest in Database Management Systems (DBMS) and in accordance with Federal requirements and VA policy, database management must use Federal Information Processing Standards (FIPS) 140-2 compliant encryption to protect the confidentiality and integrity of VA information at rest at the application level. If FIPS 140-2 encryption at the application level is not technically possible, FIPS 140-2 compliant full disk encryption (FOE) must be implemented on the hard drive where the DBMS resides. Appropriate access enforcement and physical security control must also be implemented. All instances of deployment using this technology should be reviewed to ensure compliance with VA Handbook 6500 and National Institute of Standards and Technology (NIST) standards. It is the responsibility of the system owner to work with the local CIO (or designee) and Information Security Officer (ISO) to ensure that a compliant DBMS technology is selected and that if needed, mitigating controls are in place and documented in a System Security Plan (SSP). | | [7] | Users must ensure that Microsoft Word, Microsoft Structured Query Language (SQL) Server, Microsoft Internet Information Service (IIS), and Microsoft .NET Framework are implemented with VA-approved baselines. (refer to the ‘Category’ tab under ‘Runtime Dependencies’) | | [8] | Users must ensure that Microsoft Word, Microsoft Structured Query Language (SQL) Server, Microsoft Internet Information Service (IIS), and Microsoft .NET Framework are implemented with VA-approved baselines. (refer to the ‘Category’ tab under ‘Runtime Dependencies’)
This technology requires using a Universal Service Bus (USB) technology to transfer data into the records. As such, proper precautions need to be taken to protect data. | | [9] | Users must ensure that Microsoft Internet Information Service (IIS) and Microsoft Structured Query Language (SQL) Server are implemented with VA-approved baselines. (refer to the ‘Category’ tab under ‘Runtime Dependencies’)
This technology requires using a Universal Service Bus (USB) technology to transfer data into the records. As such, proper precautions need to be taken to protect data.
Users must utilize approved internet browsers, as Microsoft Internet Explorer has reached End of Life status. See Category Tab for details.
Users must not utilize the Secure Sockets Layer (SSL) protocol, as it is unapproved for use on the TRM.
Per the Security Policy Product Review, users must abide by the following constraints:
- The latest version of this product is VoiceOver PRO Basic which was released on November 24, 2021.
- Voicebrook announced an expansion of its suite of pathology reporting solutions with the launch of VoiceOver PRO Basic.
- VoiceOver PRO Basic is a slimmed-down version of the company’s revolutionary reporting solution, VoiceOver PRO Premium.
- The difference between Basic and Premium is as following:
- Basic is a budget-friendly version of PRO that features the essential reporting tools labs need, like Report Builder (Classic), CAP eCC, and standardized templated content to create traditional narrative reports.
- Basic builds reports using a combination of free-text and templates.
- There is a level of “self-service” that users can opt to use in Basic, which offers flexibility in how they wish to use the software.
- Premium comes with all the foundational features of Basic, plus a full suite of synoptic reporting tools and role-based templates.
- With Premium’s Report Builder, all data in the report is discrete, not just simple text. That results in more smart behaviors like automatically calculating fields, changing plurality, and picklists.
- Operating Systems supported by VoiceOver PRO include:
- Windows 8
- Windows 10
- Windows 7 is not supported by VoiceOver PRO as Microsoft announced to discontinue their support for it.
- The vendor was non-responsive in the information gathering process; unable to determine 508 compliancy.
| | [10] | Per the May 5th, 2015 memorandum from the VA Chief Information Security Officer (CISO) FIPS 140-2 Validate Full Disk Encryption (FOE) for Data at Rest in Database Management Systems (DBMS) and in accordance with Federal requirements and VA policy, database management must use Federal Information Processing Standards (FIPS) 140-2 compliant encryption to protect the confidentiality and integrity of VA information at rest at the application level. If FIPS 140-2 encryption at the application level is not technically possible, FIPS 140-2 compliant full disk encryption (FOE) must be implemented on the hard drive where the DBMS resides. Appropriate access enforcement and physical security control must also be implemented. All instances of deployment using this technology should be reviewed to ensure compliance with VA Handbook 6500 and National Institute of Standards and Technology (NIST) standards. It is the responsibility of the system owner to work with the local CIO (or designee) and Information System Security Officer (ISSO) to ensure that a compliant DBMS technology is selected and that if needed, mitigating controls are in place and documented in a System Security Plan (SSP). | | [11] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with VA Handbook 6500. | | [12] | Users must ensure that Firefox, Google Chrome, Microsoft Word, Microsoft Internet Information Service (IIS) and Microsoft Structured Query Language (SQL) Server are implemented with VA-approved baselines. (refer to the ‘Category’ tab under ‘Runtime Dependencies’)
This technology requires using a Universal Service Bus (USB) technology to transfer data into the records. As such, proper precautions need to be taken to protect data.
Users must utilize approved internet browsers, as Microsoft Internet Explorer has reached End of Life status. See Category Tab for details.
Users must not utilize the Secure Sockets Layer (SSL) protocol, as it is unapproved for use on the TRM.
Per the Security Policy Product Review, users must abide by the following constraints:
- The latest version of this product is VoiceOver PRO Basic which was released on November 24, 2021.
- Voicebrook announced an expansion of its suite of pathology reporting solutions with the launch of VoiceOver PRO Basic.
- VoiceOver PRO Basic is a slimmed-down version of the company’s revolutionary reporting solution, VoiceOver PRO Premium.
- The difference between Basic and Premium is as following:
- Basic is a budget-friendly version of PRO that features the essential reporting tools labs need, like Report Builder (Classic), CAP eCC, and standardized templated content to create traditional narrative reports.
- Basic builds reports using a combination of free-text and templates.
- There is a level of “self-service” that users can opt to use in Basic, which offers flexibility in how they wish to use the software.
- Premium comes with all the foundational features of Basic, plus a full suite of synoptic reporting tools and role-based templates.
- With Premium’s Report Builder, all data in the report is discrete, not just simple text. That results in more smart behaviors like automatically calculating fields, changing plurality, and picklists.
- Operating Systems supported by VoiceOver PRO include:
- Windows 8
- Windows 10
- Windows 7 is not supported by VoiceOver PRO as Microsoft announced to discontinue their support for it.
- The vendor was non-responsive in the information gathering process; unable to determine 508 compliancy.
| | [13] | Veterans Affairs (VA) users must ensure VA sensitive data is properly protected in compliance with all VA regulations. All instances of deployment using this technology should be reviewed by the local ISSO (Information System Security Officer) to ensure compliance with both VA Handbook 6500 and VA Directive 6500. |
|
Note: |
At the time of writing, version Spring 2024 is the most current version, released 03/24/2024. |