Guideline IT Security
On November 21, the Johner Institute, together with TÜV SÜD, TÜV Nord, and with the support of Dr. Heidenreich (Siemens), published a guideline on IT security specifically for medical device manufacturers.
IT security (also known as information security) refers to the capability of IT systems (and the associated organizations) to ensure the confidentiality, availability, and integrity of systems and data.
Content
This page provides an overview and links to relevant articles on the following topics:
The acronym CIA makes it easy to remember the objectives of IT security:
Other objectives are sometimes added to this list:
Safety plays a vital role in the healthcare sector. Its objective is to avoid (physical) harm to patients, users, and third parties.
Please note the article on IT security in healthcare, which deals with the special challenges and regulatory requirements for IT security in healthcare and medical technology.
In Europe, the following laws, among others, must be observed:
Additionally, the standard IEC 81001-5-1 is about to be harmonized.
In the USA, for example, the following are relevant
Another article takes a look at security patches from a regulatory perspective, another at the role of the Software Bill of Materials SBOM.
The thoughts on IT security for legacy devices are helpful.
The Johner Institute’s guide to IT security serves as a checklist for manufacturers. The requirements are easy to check because they are organized according to the software life-cycle and formulated as binary answerable criteria.
Many standards claim to formulate best practices. Manufacturers should consider these to ensure IT security aligns with the state of the art.
The standards reference methods that contribute to strengthening IT security. These are presented in the following articles:
Other articles address specific technical and organizational contexts:
Do you still have questions, for example, about IT security? Then, please take advantage of our free micro-consulting.
The Johner Institute will be happy to support you so that you can ensure the IT security of your devices and organization and avoid unnecessary trouble:
Please do not hesitate to contact us! The Johner Institute team looks forward to helping you!
On November 21, the Johner Institute, together with TÜV SÜD, TÜV Nord, and with the support of Dr. Heidenreich (Siemens), published a guideline on IT security specifically for medical device manufacturers.
The EU General Data Protection Regulation must be complied with starting at 25 May 2018, at the latest. Many companies, amongst them also medical device manufacturer and operators such as hospitals, are not adequately prepared. This article gives you a review of the main concepts and requirements of the General Data Protection Regulation and examines…
DetailsTIR 57 is a “Technical Information Report” from the American AAMI. It is intended to assist in recognizing and controlling risks due to inadequate IT security of medical devices, thus fulfilling the requirements of ISO 14971 for risk management.
DetailsWe need your consent before you can continue on our website. If you are under 16 and wish to give consent to optional services, you must ask your legal guardians for permission. We use cookies and other technologies on our website. Some of them are essential, while others help us to improve this website and your experience. Personal data may be processed (e.g. IP addresses), for example for personalized ads and content or ad and content measurement. You can find more information about the use of your data in our privacy policy. You can revoke or adjust your selection at any time under Settings.
If you are under 16 and wish to give consent to optional services, you must ask your legal guardians for permission. We use cookies and other technologies on our website. Some of them are essential, while others help us to improve this website and your experience. Personal data may be processed (e.g. IP addresses), for example for personalized ads and content or ad and content measurement. You can find more information about the use of your data in our privacy policy. Here you will find an overview of all cookies used. You can give your consent to whole categories or display further information and select certain cookies.