Welcome Guest !

Welcome to International Lab Ordering & Reporting


(1) Unauthorized access to the application is prohibited.
(2) The company's security policy provides for the monitoring, collection and recording of activity on company owned or leased computing resources.
(3) Any unauthorized activity observed could be subject to temporary or permanent access restrictions. The specific language for which, must be approved by the legal department.