The choice around what situations represent a possible safety breach is pushed by a risk intelligence module which is developed in to the bundle.Every single event is logged, so this Component of the program is plan-neutral — it just supplies a list of gatherings by which Assessment may possibly reveal repetition of steps or suspiciously assorted