Activity Tracking
VariantMiner provides comprehensive activity tracking to monitor user actions, system events, and data changes. This feature is essential for compliance, security, and operational oversight.
Overview
Activity tracking captures:
User Actions: All user interactions with the system
Data Changes: Modifications to files, samples, and reports
System Events: Automated processes and system operations
Security Events: Login attempts, permission changes
API Usage: Programmatic access and integrations
Activity Types
User Activities
Authentication: Login/logout events
Navigation: Page visits and section access
Data Operations: File uploads, sample creation, order management
Analysis Actions: Variant filtering, classification, reporting
Administrative: User management, workspace configuration
System Activities
File Processing: VCF processing, database generation
Background Tasks: Automated analysis, cleanup operations
Integration Events: External system communications
Maintenance: System updates, backups, maintenance tasks
Data Audit Trail
Creation: New records created
Modification: Changes to existing data
Deletion: Data removal (soft/hard deletes)
Access: Data viewing and retrieval
Export: Data downloads and exports
Accessing Activity Information
Personal Activity Dashboard
From User Profile:
Click your profile menu (top-right corner)
Select "Activity" tab
View your recent actions and system interactions
Information Displayed:
Recent actions with timestamps
Files accessed and operations performed
Analysis activities and report generation
Login history and session information
Workspace Activity
From Workspace Dashboard:
Navigate to your workspace
Click "Activity" or "Recent Activity" section
View workspace-specific activity feed
Workspace Activity Includes:
All user actions within the workspace
File processing and analysis events
Collaborative activities (comments, sharing)
Administrative changes to workspace
Organization Activity
For Organization Administrators:
Navigate to Organizations section
Select your organization
Click "Activity" tab
Organization-Level Tracking:
User management activities
Workspace creation and modification
Organization-wide policy changes
Cross-workspace activities
Activity Details
Timestamp Information
Precise Timing: Down to millisecond accuracy
Time Zones: Displayed in user's local time zone
UTC Standard: Stored in UTC for consistency
Duration Tracking: How long operations took
User Context
User Identity: Who performed the action
Role Information: User's role at time of action
Session Details: Browser, IP address, location
Authentication Method: How user was authenticated
Action Details
Action Type: Category of activity performed
Target Object: What was acted upon (file, sample, etc.)
Before/After States: Changes made to data
Success/Failure: Whether action completed successfully
System Context
System Version: VariantMiner version at time of action
Server Information: Which server processed the request
Performance Metrics: Response times, resource usage
Error Information: Details about any failures
Activity Search and Filtering
Search Capabilities
Filter activities by:
Date Range: Specific time periods
User: Individual user or group of users
Activity Type: Specific categories of actions
Objects: Particular files, samples, or reports
Success Status: Successful or failed operations
Common Search Patterns
User Activity Review:
User: [specific user]
Date Range: Last 30 days
Activity Type: AllFile Processing Audit:
Activity Type: File Processing
Date Range: [specific period]
Status: FailedSecurity Review:
Activity Type: Authentication
Date Range: Last 7 days
User: All usersExport Options
CSV Format: Spreadsheet-compatible export
JSON Format: Structured data for analysis
PDF Reports: Formatted activity reports
API Access: Programmatic data retrieval
Compliance and Audit
Regulatory Compliance
Activity tracking supports:
HIPAA: Healthcare data access logging
ISO 15189: Medical laboratory quality systems
CAP: College of American Pathologists requirements
GDPR: European data protection regulations
Audit Trail Requirements
Immutable Records: Activity logs cannot be modified
Complete Coverage: All significant actions logged
User Attribution: Clear identification of responsible users
Temporal Accuracy: Precise timing information
Retention Policies
Default Retention: Activities retained for regulatory periods
Extended Retention: Critical events retained longer
Archive Process: Older activities moved to long-term storage
Deletion Policies: Secure removal after retention period
Security Monitoring
Suspicious Activity Detection
System monitors for:
Failed Login Attempts: Multiple failed authentication attempts
Unusual Access Patterns: Access outside normal hours/locations
Privilege Escalation: Attempts to access unauthorized data
Bulk Operations: Large-scale data access or export
Security Alerts
Automated notifications for:
Multiple Failed Logins: Account lockout situations
Administrative Changes: User role or permission modifications
Data Export: Large data downloads or exports
System Access: Access from new devices or locations
Incident Response
When security events occur:
Immediate Logging: Event captured in activity log
Alert Generation: Notifications sent to administrators
Investigation Tools: Detailed activity analysis available
Response Actions: Account lockout, access restriction options
Performance Monitoring
System Performance Tracking
Monitor system health through:
Response Times: How quickly operations complete
Error Rates: Frequency of failed operations
Resource Usage: System resource consumption
User Load: Number of concurrent users and operations
Bottleneck Identification
Activity data helps identify:
Slow Operations: Which processes take longest
Peak Usage: Busiest times and resource constraints
Error Patterns: Common failure points
User Impact: How performance affects user experience
Privacy Considerations
Data Protection
User Privacy: Personal information is protected
Access Control: Activity viewing restricted by permissions
Data Minimization: Only necessary information collected
Anonymization: Research use may anonymize activity data
Consent and Transparency
User Awareness: Users informed about activity tracking
Consent Management: Compliance with consent requirements
Data Subject Rights: Users can request their activity data
Transparency Reports: Regular reporting on data collection
Administrative Tools
Activity Management
Administrators can:
Configure Tracking: Enable/disable specific activity types
Set Retention: Configure how long activities are stored
Manage Access: Control who can view activity information
Generate Reports: Create custom activity reports
Integration Options
SIEM Integration: Export to security information systems
Analytics Platforms: Connect to business intelligence tools
Notification Systems: Route alerts to external systems
API Access: Programmatic access to activity data
Best Practices
For Users
Regular Review: Periodically check your activity for accuracy
Secure Sessions: Log out properly to close sessions
Report Issues: Report suspicious activity to administrators
Follow Policies: Adhere to organizational data use policies
For Administrators
Regular Monitoring: Review activity patterns regularly
Policy Enforcement: Use activity data to enforce policies
Performance Analysis: Monitor system performance trends
Security Reviews: Regular security-focused activity analysis
Need to investigate specific activities? Contact your system administrator for detailed activity analysis and reporting.
Last updated
Was this helpful?