欢迎来到天天文库
浏览记录
ID:12411438
大小:820.50 KB
页数:132页
时间:2018-07-16
《医療情報システムの安全管理に関するガイドライン》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、GuidelinesfortheSecurityManagementoftheMedicalInformationSystemSecondVersion(Thisistemporarytranslationvirsion.)(PleaserefertoaJapaneseversion.)March2007MinistryofHealth,LabourandWelfareAmendmenthistoryVersionno.DateDescriptionFirstversionMarch2005Guidelinespreparedbasedon"Noticeons
2、torageofmedicalcarehistoryandmedicalcarerecordsonelectronicmediaofwhichstoragedutyisstipulatedinregulations"issuedMarch1999andthenotice"Locationofstoringmedicalcarehistoryandotherrecords"issuedMarch2002havebeenconsolidated.Preparedanewasguidelinesincludingtheguidelinesconcerningstor
3、ageofmedicalcarehistoryandmedicalcarerecordsonelectronicmediaofwhichstoragedutyisstipulatedinregulations(includingexternalstorageonmediasuchaspaper)andtheguidelinesforoperating/managinganinformationsystemforprotectionofpersonalinformationinmedical/nursegivinginstitutions.Secondversi
4、onMarch2007"Establishmentofasafenetworkbase"wasdeterminedasatargetinthe"ITNetReformStrategy"(January2006)publishedfromthe"AdvancedInformationCommunicationsTechnologyStrategyHeadquarters(ITStrategyHeadquarters)"inJanuary2006and,inthe"Basicconceptrelatedtoinformationsecuritymeasureson
5、keyinfrastructure"determinedbytheinformationsecuritypolicymeetinginSeptember2005,medicalcarewasdefinedasa"keyinfrastructure"thatwouldhaveseriouseffectsonthenationallifeifaseriousfaultintheITbasetriggeredservicedegradationorshutdownanditwasrequestedtosystemizeandclarifythemeasurestak
6、enagainstdamagetotheITbaseandcyberattacksinthefieldofmedicalcare.Basedonthesesituations,(1)Concerningdefinitionofsecurityrequirementsconcerninganetworksuitedforusebymedicalinstitutions,requirementsforanetworksuitableforinterconnectinginstitutionsrelatedtomedicalcarefromvariousviewpo
7、intsincludingexpectedapplications,threatsonanetwork,measuresagainstthethreats,methodfordiffusionanditsproblemsaredefinedandorganizedinto"6.10Safetymanagementofmedicalandotherpersonalinformationexchangewithoutsiders".(2)ConcerningmeasuresagainstITfaultscausedbynaturaldisastersorcyber
8、attacks,whileproper
此文档下载收益归作者所有