LIMS Security

In addition to our chain of custody features, Progeny LIMS provides robust security at all levels of access within the database, and puts you in full control to edit and manage each user's access according to your needs.

User and Class Based Security

Progeny's role based security system applies restrictions on what each user can perform or view throughout the sample lifecycle.  User and class level restrictions can be set to specific samples, storage locations, workflows and more.  Manage passwords and logins.  General permissions, such as access to folders, fields, form design, and spreadsheets, are also available.

  • Set Restrictions on Sample Use

    Define custom restrictions on how each sample is used according to your lab's requirements.
  • Full Audit Trail

    You can turn on auditing for any sample or field in the database.  Run audit reports detailing changes made including previous entry, new entry and user info with a date/time stamp.
  • Compliance

    Progeny's security features on data collection and storage allows your lab environment to meet industry standard compliant regulations, including GLP, 21 CFR Part 11, HIPAA and FDA.


user security

Next Steps