How to establish the hospital information system security policies / 中国医疗器械杂志
Chinese Journal of Medical Instrumentation
; (6): 124-130, 2008.
Article
in Zh
| WPRIM
| ID: wpr-309627
Responsible library:
WPRO
ABSTRACT
It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.
Full text:
1
Index:
WPRIM
Main subject:
Hospital Information Systems
/
Computer Security
/
Policy
Language:
Zh
Journal:
Chinese Journal of Medical Instrumentation
Year:
2008
Type:
Article