You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Turn on more accessible mode
Turn off more accessible mode
Skip Ribbon Commands
Skip to main content
Turn off Animations
Turn on Animations
To navigate through the Ribbon, use standard browser navigation keys. To skip between groups, use Ctrl+LEFT or Ctrl+RIGHT. To jump to the first Ribbon tab use Ctrl+[. To jump to the last selected command use Ctrl+]. To activate a command, use Enter.
Tab 1 of 3.
Tab 2 of 3.
Tab 3 of 3.
LCRDM nieuwe stijl
RDM per universiteit
RDM per HBO
RDM per UMC
Organisatie en initiatieven
The regulation of who or what is privileged to enter/use an IT service. Permission to access an IT service is called authorization.
The obligation to explain and justify conduct.
An Advanced Clinical Research Information System is a complex constellation of capabilities that can assist in the management of patients during clinical trials and rapidly assemble data assets for research questions. It also provides data mining and research process support to meet the needs of clinical and translational research, and related biostatistics and biocomputation. It may includes open-source components.
Current Research Information System (CRIS)
Initially, it was a directory service for Windows domain networks included in Windows Server operating systems. Eventually, it became an umbrella term for directory-based identity-related services, which are used to authenticate and authorize users and computers in a Windows domain network.
Analytics to Data
Within the workspace analytics is created or incorporated from an analytics repository (repository might resides outside workspace). The analytics is sent to one or more federated stored data that resides outside the workspace (could be a different workspace) and returns (aggregated and/or pseudo/anonymized) outcomes to the workspace. There is no (direct) human access to the targeted data.
Click here for linked document
The irreversible delinking of identifying information from associated data.
Pseudonymisation or Coding
The Application Layer depicts application services that support the business, and the application components that realize them (logical level).
ArchiMate is an open and independent enterprise architecture modeling language to support the description, analysis and visualization of architecture within and across business domains in an unambiguous way.
The fundamental organization of a system embodied in its components, their relationships to each other, and to the environment, and the principles guiding its design and evolution.
RDM Reference Architecture
Architecture Building Block (ABB)
A constituent of the architecture model that describes a single aspect of the overall model.
Assessment of vendor solutions
The process of determining whether the solutions (/products) can be incorporated in the service catalogue and how they are positioned.
(The (vendor) solutions building blocks can be assessed by deriving the other viewpoints in the Reference Architecture Framework from the solutions viewpoint. Especially important is here the RDM policy viewpoint of the Reference architecture; to which RDM policy requirements does the solution adhere.)
Self Assessment of Vendor solutions
A systematic review to evaluate adherence to applicable laws and policies.
Verifying the identity of an user by validating the credentials (e.g. username, password) provided by the user.
(Attribute-based) Authorization (AuthZ)
Determining whether an entity (e.g. user) has permission to access (parts of) IT services. This can be done on the basis of credentials (e.g. username, password) or on the basis of entity attributes (e.g. roles, group memberships).