Your browser doesn't support javascript.
loading
How to establish the hospital information system security policies / 中国医疗器械杂志
Chinese Journal of Medical Instrumentation ; (6): 124-130, 2008.
Article in Chinese | WPRIM | ID: wpr-309627
ABSTRACT
It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.
Subject(s)
Full text: Available Index: WPRIM (Western Pacific) Main subject: Hospital Information Systems / Computer Security / Policy Language: Chinese Journal: Chinese Journal of Medical Instrumentation Year: 2008 Type: Article

Similar

MEDLINE

...
LILACS

LIS

Full text: Available Index: WPRIM (Western Pacific) Main subject: Hospital Information Systems / Computer Security / Policy Language: Chinese Journal: Chinese Journal of Medical Instrumentation Year: 2008 Type: Article