Submit a ticket


What are the ACR Connect technical Components? 

    Edge components that interact with local users and systems, cloud components that allow for processing in HIPAA-secure environments where necessary and/or desired, and an array of microservices used to process data and interact with other ACR operational and data processing systems in a consistent and seamless manner, regardless of ingestion method.

Do I need to install software?

    Generally, a local software installation of some kind is strongly encouraged, although ACR Connect can accommodate a wide variety of scenarios. Configuration depends on ACR program and local facility needs. Typical scenarios range from a robust local server with GPU-capable hardware so that all data processing is performed onsite to a light web interface or VPC where most computing is performed in a secure virtual private cloud environment. The ACR engagement and support team will work with each facility to determine the most appropriate configuration of resources.

Will this replace current methods of interacting with the ACR (e.g., registries, clinical research, AIRP)? 

    ACR Connect is the next generation platform and will support all ACR data ingestion and local processing needs. Familiar methods of ingestion such as TRIAD will continue, although the next generation of TRIAD will be ACR Connect compatible and share core infrastructure with other ACR Connect data processing components.

How is the ACR handling security and access to sensitive data? 

    The goal of ACR Connect is to allow sensitive data to remain onsite or in a facility's private cloud instance if preferred. Most data needs can be accommodated by distributed processing (data remains at the site and is processed locally) or through de-identification via local ACR Connect services prior to transmission. Where transmission of limited data sets are necessary, they are maintained in a HIPAA-secure environment. Our engagement teams are experienced working with local security and privacy officers to ensure compliance with local requirements and industry best practices. Access control leverages multi-factor authentication and can interface with local identify providers where desired.

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.