OsteoSys SONOST-2000 User Manual page 101

Hide thumbs Also See for SONOST-2000:
Table of Contents

Advertisement

User's Manual (Confidential)
OsteoSys Co., Ltd.
Model Designation : SONOST-2000
To ensure the integrity and authenticity of HEALTH DATA, authorized users must access
and modify the health information in an approved manner.
NOTE !
A doctor who has access to health information must use the correct password to
modify health information.
SEC.18. HEALTH DATA Storage and Confidentiality
To provide security of health data stored in products or media, OsteoSys uses a database
and a specific file system.
In order to access, view, and modify patient health data, it is necessary to obtain access
to the database and to interpret the specific file system.
By applying these multiple security policies, we maintain the security of health data stored
in products or media.
SEC.19. Security operations
Security operations are best implemented as part of an overall "depth defense"
information assurance strategy used through information technology systems that
address personal, physical security, and technology. The hierarchical approach to defense
in depth limits the risk that a system can be compromised by the failure of a single
security safeguard.
SEC.20. Health Data De-Identification
Patient health data is provided non-identifiable by unauthorized users by default.
Authorized users may use dedicated software to access and identify patient health data.
CAUTION !
Please check the health data is de-identificated when sharing with third parties.
DOC. No. : OT01-2R7123
101

Advertisement

Table of Contents
loading

Related Products for OsteoSys SONOST-2000

Table of Contents