The Authorizing Official Designated Representative ( AODR) as designated by the Authorizing Official ( AO) or designeeĪnd based upon a recommendation from the POA&M Compliance Enforcement, Unapproved: This technology or standard can be used only if a POA&M review is conducted and signed by In the VA Decision Matrix is considered unapproved for use.Īpproved: The technology/standard has been approved for use.Īpproved w/Constraints: The technology/standard can be used within the specified constraints locatedīelow the decision matrix in the footnote and on the General tab. Any major.minor version that is not listed To ensure that the target version of the technology will be supported. Responsibility to consult the organizations responsible for the desktop, testing, and/or production environments These decisions areīased upon the best information available as of the most current date. The VA Decision Matrix displays the current and future VA IT position regarding different releases of a TRM entry. TRM Technology, obtained from the vendor (or from the release source). The Vendor Release table provides the known releases for the
For additional information or assistance regarding Section 508, please contact the Section 508 Office at Decisions It is 508-compliant and needs no further assessment before use in VA. Prior to use of this technology, users should check with their supervisor, Information Security Officer (ISO), Facility Chief Information Officer (CIO), or local Office of Information and Technology (OI&T) representative to ensure that all actions are consistent with current VA policies and procedures prior to implementation. Users must ensure sensitive data is properly protected in compliance with all VA regulations. Users must ensure their use of this technology/standard is consistent with VA policies and standards, including, but not limited to, VA Handbooks 61 VA Directives 6004, 6513, and 6517 and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS).
Stata itself does not work directly with encrypted files, but a user can save files on and run Stata from an encrypted drive. This technology does not store data in a database as it stores data on the user`s local drive, however, Stata can manipulate data in Open Database Connectivity (ODBC) data sources. The scope of this entry covers all three editions. This technology comes in three editions: Stata/MP, Stata/SE, and Stata/IC. Additionally, Stata creates log files to record what a user types and can re-run a file to duplicate analyses and document steps taken to manage data. Many of Stata`s commands are implemented using Stata`s built-in programming language, Mata, which compiles what users type into bytecode. The analyses conducted can be compiled into publication-quality graphics that can be exported to various applications.
Stata is statistical analysis software that executes statistical tests such as case-control analysis, linear regression, cluster and power analysis, and Bayesian analysis. More information on the proper use of the TRM can be found on the Technologies must be operated and maintained in accordance with Federal and Department security and