Team:SUSTC-Shenzhen-B/safety.html
From 2013.igem.org
(Difference between revisions)
Line 116: | Line 116: | ||
</div> | </div> | ||
</div> | </div> | ||
- | <div class="main container | + | <div class="main container page"> |
+ | <div class="peek"> | ||
+ | <div class="ui vertical pointing secondary menu"> | ||
+ | <a class="active item">Safety form</a> | ||
+ | </div> | ||
+ | </div> | ||
<div class="page-container"> | <div class="page-container"> | ||
<h2 class="ui dividing header">Safety form</h2> | <h2 class="ui dividing header">Safety form</h2> |
Revision as of 17:25, 28 October 2013
Safety
Below are contens modified from iGEM Software Division Coding Practices Questionnaire
Safety form
No | Question | Answer |
---|---|---|
1 | Are you using the iGEM Software repository at github.com/igemsoftware? If you have instead stored your code elsewhere, please explain where and why you have put it there. If your code is not in the iGEM repository, are you using any version control system such as Git, CVS, or SVN? | Yes, we have uploaded our software to the iGEM Software repository. |
2a | Does your software store any private data supplied by the user? (For example: the user's name and email address, passwords, DNA sequences, circuit designs, etc.) If yes, please describe what kind of data is stored. If no, skip the rest of this question and move on to question 3. | Yes, our software stores user's name, e-mail address, passwords, experiment data and circuit designs supplied by the users. It also stores chat records between users. But people can choose to open their e-mail address,experiment data and circuit designs to the public. And we advocate this. |
2b | What is the URL or IP address where the user's private data is stored? Where is the physical computer or hard drive that contains the user's private data? | Our website is http://circuitplus.org/. Our database is stored in the Internet. For the place of user's private data, there is a file that stores all data of one certain user's information. The URL is not final defined yet. But it would be ordered perfectly. We will upload a text file (.txt) to define all URL after the software is completed. And for the local data, users can set the file path and store data both on the Internet and physical computer. |
2c | Please describe any encryption, password protection, etc. that you use to protect the user's data. (It is not mandatory to have such protections, but if you do, describe them.) | We do not store users’ password by clear-text passwords or reversible encryption. Meanwhile, we use the prevailing and secure Salt + Hash method to store users’ password. In this way, despite that the server is compromised, the hacker still cannot get the original passwords. |
3 | Does your software include any other security features? Please describe them here. | Yes. We do not record any information related to users’ account or IP to correspond to users’ uploaded information in any way wherever it states Complete Anonymous. We will not ask for signing in unless to make sure this user is a registered user. Though in this way, users’ information is still away to be recorded. |
4 | Does your software let the user create a design by choosing parts/genes from a list/database, such as the Registry? If so, which lists/databases are included? Is there any restriction on which parts/genes the user can choose? | No. |
5 | Does your software allow users to write new data into any public lists or databases? If so, do you check the new data for errors before allowing it to be written? | Yes, users are allowed to submit their own circuit. The information will be added to our own database. Before this, we will check it for errors. |
6 | Does your software include any other features that encourage the user to create safe designs? Please describe them here. | We set two kinds of registered users, average and professional. The professional users have an addition function that they can audit circuit information submitted by all users. On one hand, the audition will encourage users to make their design safer to earn satisfaction. On the other hand, the privilege can lead average users become professional; in turn the submitted designs will be safer. |
7 | Is your team also doing biological work in a wet lab? | No. |