FAQ

The hantavirus registry – HantaReg is secure, web-based registry project facilitating a world-wide research on epidemiology, clinical courses, as well as diagnostic and treatment approaches of hantavirus diseases.

The international leptospirosis registry – LeptoScope is a novel registry project founded in January 2020 that enables the straightforward and standardized documentation of the disease course of invasive leptospirosis including diagnostic and treatment approaches. Additionally, LeptoScope facilitates to monitor epidemiological trends locally and globally over time.

To be able to log into the registries, at first a personel account has to set up. Therefore, please send an e-mail with your afflinations to our central e-mail address kidneyinfection@uk-koeln.de.

HantaReg and Leptoscope use General Data Protection Regulation (GDPR) compliant platform clinicalsurveys.net. In order to log in, please visit clinicalsurveys.net and log in by entering your username and the password provided by us.

To maximise your experience with both registry plattform users are highly advised to use modern web-browsers. Recent versions of Google Chrome, Microsoft Edge, Internet Explorer, Mozilla Firefox and Safari provide the best user experience and support HantaReg and LeptoScope.

Access to HantaReg and LeptoScope is controlled by the assignment of a secure, invidualized password. Contributors can only view the cases submitted by themselves. All data transmission is encrypted.

HantaReg and LeptoScope use General Data Protection Regulation (GDPR) compliant platform clinicalsurveys.net, which is hosted by QuestBack, Oslo, Norway on servers in Cologne, Germany as part of a software-as-a-service agreement. Data entry is carried out via an interactive macro created by the survey software, which can be accessed via any internet browser using encrypted communication via TLS 1.2 with an AES 256 GCM bit key and ECDHE RSA key exchange certificate provided by COMODO RSA Domain Validation Server. All documented data are automatically collected in the database. Data protection from loss and unauthorized access is ensured regular back up of data, hierarchized management of rights, rigid firewall configuration and authentication protocols.