How secure is my data

LogTag® files are encrypted and contain checks to detect if the file changed since it was originally created. If the software detects that a file has been tampered with, or has become corrupted, the software will not open the file.

LogTag® devices will also insert error detection codes automatically during recordings, which are used to detect data errors. When these detection codes for a block of recordings fail the integrity validation, the relevant readings are marked as non validated readings. Non validated readings are displayed differently to validated readings to indicate that they have failed their integrity test.

Non validated recordings typically occur in the scenarios following scenarios:

  1. One or more readings in the non validated block of readings is not the genuine recorded value.

  2. A communications or hardware failure has occurred during the transfer of the data from the LogTag® to the computer. Try downloading the recordings from the LogTag® again; make sure the contacts on the back of the LogTag® are clean, the contact pins in the Interface Cradle slot are clean and return evenly to their normal position when the LogTag® is removed.

Since the software does not modify any of the recorded data within a LogTag® file at any time, if the software can open the file, regardless of how long ago it was created, the contents of the file will still represent the original recorded information retrieved from the LogTag®.

Therefore, the files created by the LogTag® Analyzer software meet all criteria for data integrity and data security as set forth in the US FDA 21 CFR Part 11 regulations. The firmware code that is embedded in the processor chip of each LogTag® cannot be extracted or reverse-assembled. Accordingly, data sets that are recorded in the memory of the LogTag® cannot be downloaded or modified except by being transferred to a LogTag® file. There is no way to interfere with the process of the transfer of information between the LogTag® and the software in such a way that data integrity would be compromised.