Chapter 7 Networking; Cybersecurity Measures; Personal Information Safety - EDAN iM3 User Manual

Vital signs monitor
Hide thumbs Also See for iM3:
Table of Contents

Advertisement

Vital Signs Monitor User Manual

Chapter 7 Networking

The monitor can be connected to the wired network and the wireless network. If the monitor is
networked, a network symbol is displayed on the screen.
NOTE
1
Be aware that some network-based functions may be limited for monitors on wireless
networks in comparison to those on wired networks.
2
When selecting dynamic IP mode, check the IP address from MFM-CMS.

7.1 Cybersecurity Measures

7.1.1 Personal Information Safety

Protecting personal health information is a major component of security strategy. To protect the
personal information and ensure the proper device performance, the user should take necessary
precautions in accordance with local laws and regulations and institution's policies. EDAN
recommends health care organizations or medical institutions to implement a comprehensive and
multifaceted strategy to protect the information and systems from internal and external security
threats.
To ensure the patients' safety and protect their personal health information, the user should
implement practices or measures that include:
1. Physical safeguards - physical safety measures to ensure that unauthorized personnel do not
have access to the monitor.
2. Operational safeguards - safety measures during operation.
3. Administrative safeguards - safety measures in management.
4. Technical safeguards - safety measures in technical field.
1
The access/operation of the monitor is restricted to authorized personnel only. Assign
only staff with a specific role the right to use the monitor.
2
Ensure that all device components maintaining personal information (other than
removable media) are physically secure.
3
Ensure that the data are deleted after the patient is discharged (Refer to Section
Deleting Data Stored in the Storage Device).
4
Ensure that the monitor is connected only to the device authorized/approved by
EDAN. Users should operate all EDAN deployed and supported monitors within
EDAN authorized specifications, including EDAN approved software, software
configuration, security configuration, etc.
5
Protect all the passwords to prevent unauthorized changes. Only the manufacturer's
service personnel are allowed to modify the Factory Maintain settings.
CAUTION
- 39 -
Networking

Advertisement

Table of Contents
loading

Table of Contents