Attention A T users. To access the menus on this page please perform the following steps. 1. Please switch auto forms mode to off. 2. Hit enter to expand a main menu option (Health, Benefits, etc). 3. To enter and activate the submenu links, hit the down arrow. You will now be able to tab or arrow up or down through the submenu options to access/activate the submenu links.

VA Technical Reference Model v 24.4

Wound Zoom Analysis Software
Wound Zoom Analysis Software Technology

General InformationGeneral Information help

Technologies must be operated and maintained in accordance with Federal and Department security and privacy policies and guidelines. More information on the proper use of the TRM can be found on the TRM Proper Use Tab/Section.

Website: Go to site
Description: Wound Zoom Analysis Software is a solution for managing wound care data. It was designed to make documentation, detection, and prevention easier for wound care clinicians. This technology allows users to manage patient lists, track wound healing, adjust reports, create measurements, and manage the data on the Wound Zoom Camera.

By default, all data is stored locally in an encrypted (Secure Hash Algorithm 512) SQLite Database. When the Wound Zoom Camera device is used in online mode, the data is synchronized immediately to the central server and only stored locally short term (for list functionality and requested data browsing). When the device is used in offline mode, all newly captured data is stored locally until the device is back online. Data is then synchronized to the cloud and purged from the local database. Authentication is required to access the three-dimensional (3D) application and connect to server-side resources. Any data stored on the device is encrypted at rest (SHA512).

Data is synchronized to Wound Zoom cloud services (residing on the Microsoft Azure platform). Authentication is handled through Azure Active Directory services.

The TRM decisions in this entry only apply to technologies and versions owned, operated, managed, patched, and version-controlled by VA. This includes technologies deployed as software on VMs within VA-controlled cloud environments (e.g. VA Enterprise Cloud (VAEC)). Cloud services provided by the VAEC and those controlled and managed by an external Cloud Service Provider (i.e. SaaS) are not in the purview of the TRM. For more information on the use of cloud services and cloud-based products within VA, including VA private clouds, please see the Enterprise Cloud Solutions Office (ECSO) Portal at:
Technology/Standard Usage Requirements: Users must ensure their use of this technology/standard is consistent with VA policies and standards, including, but not limited to, VA Handbooks 6102 and 6500; VA Directives 6004, 6513, and 6517; and National Institute of Standards and Technology (NIST) standards, including Federal Information Processing Standards (FIPS). Users must ensure sensitive data is properly protected in compliance with all VA regulations. Prior to use of this technology, users should check with their supervisor, Information Security Officer (ISO), Facility Chief Information Officer (CIO), or local Office of Information and Technology (OI&T) representative to ensure that all actions are consistent with current VA policies and procedures prior to implementation.
Section 508 Information: This technology has not been assessed by the Section 508 Office. The Implementer of this technology has the responsibility to ensure the version deployed is 508-compliant. Section 508 compliance may be reviewed by the Section 508 Office and appropriate remedial action required if necessary. For additional information or assistance regarding Section 508, please contact the Section 508 Office at
Decision: View Decisions

Decision Source: TRM Mgmt Group
Decision Process: One-VA TRM v19.5
Decision Date: 05/28/2019 at 12:17:29 UTC
Introduced By: TRM Request
Vendor Name: Wound Zoom
- The information contained on this page is accurate as of the Decision Date (05/28/2019 at 12:17:29 UTC).