Product Security - GE HEALTHCARE CARESCAPE Monitor B650 Technical Manual

Hide thumbs Also See for CARESCAPE Monitor B650:
Table of Contents

Advertisement

CARESCAPE Monitor B650

3.5 Product security

The patient monitoring software incorporates an assortment of security features designed to
allow a flexible approach to safe and secure implementation, focusing on the principles of
confidentiality, integrity, and availability. These features assist you in using the system in a
manner that protects patient privacy and security in your setting, and also addresses
expectations for the environment where the system will be used.
3.5.1 Security features
Access control
Access control is the overall mechanism used to determine and enforce the following:
Who has access
How individuals gain access
When access is permitted
What information may be accessed
Other than clinical and Webmin applications, access to other subsystems (for example BIOS) is
restricted. The clinical and Webmin application interfaces have a role-based access control (for
example, biomed and clinical). A user may log into these interfaces (for example, Webmin) to
perform operations that are limited to the generic user. See the user and technical manuals for
detailed information on available features.
Authentication
Authentication is the process of proving individual identity, and is a key element in an access
control system. In the clinical and Webmin applications, there are certain features that require
user authentication. To access these features, the user must log into the clinical and Webmin
applications with a valid username and password.
Authorization
Authorization is the process of granting and revoking access to information, and is another key
element in an access control system. Although primarily an administrative process that is
driven by an organization's policies and procedures, the patient monitor contains features that
will help implement and enforce an organization's method.
Both clinical and Webmin applications have an authorization mechanism to provide
information to the user.
Audit
The ability to record and examine system activity is crucial to a successful information security
program, as well as a regulatory requirement in most environments. The patient monitor stores
system and Webmin access logs.
22
2081903-001

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents