Security - OsteoSys SONOST-2000 User Manual

Hide thumbs Also See for SONOST-2000:
Table of Contents

Advertisement

User's Manual (Confidential)
OsteoSys Co., Ltd.
Model Designation : SONOST-2000
DOC. No. : OT01-2R7123
7

Security

SEC.1. Introduction
This section describes the security features, functionality and management requirements
of OsteoSys software. The manual is intended to assist medical facilities in using the
system in a manner that protects the privacy and security of patients and to perform
their work in accordance with national regulatory requirements. This section also covers
the expected software usage environment.
Software users should use risk management procedures to assess and prioritize security
and privacy risks. Based on your risk assessment, you can make the most of the
software's performance. Risk assessments should be closely compared to compliance and
patient safety as well as security. If security mitigation is inconsistent with patient safety,
patient safety is considered a high priority.
SEC.2. Security features
The software includes security features designed to allow flexible access to safety and
security implementations, with a focus on the principles of confidentiality, integrity and
availability. Throughout this document, information about the performance and use of
these features is described.
NOTE !
A user can change system security function in configuration menu.
SEC.3. Access control
Access control is a comprehensive mechanism used to determine and enforce the
following:
• Access subject
• How to secure access
94

Advertisement

Table of Contents
loading

Table of Contents