資源描述:
《醫(yī)療情報(bào)システムの安全管理に関するガイドライン》由會(huì)員上傳分享,免費(fèi)在線(xiàn)閱讀,更多相關(guān)內(nèi)容在教育資源-天天文庫(kù)。
1、GuidelinesfortheSecurityManagementoftheMedicalInformationSystemSecondVersion(Thisistemporarytranslationvirsion.)(PleaserefertoaJapaneseversion.)March2007MinistryofHealth,LabourandWelfareAmendmenthistoryVersionno.DateDescriptionFirstversionMarch2005Guidelinespreparedbasedon"Noticeons
2、torageofmedicalcarehistoryandmedicalcarerecordsonelectronicmediaofwhichstoragedutyisstipulatedinregulations"issuedMarch1999andthenotice"Locationofstoringmedicalcarehistoryandotherrecords"issuedMarch2002havebeenconsolidated.Preparedanewasguidelinesincludingtheguidelinesconcerningstor
3、ageofmedicalcarehistoryandmedicalcarerecordsonelectronicmediaofwhichstoragedutyisstipulatedinregulations(includingexternalstorageonmediasuchaspaper)andtheguidelinesforoperating/managinganinformationsystemforprotectionofpersonalinformationinmedical/nursegivinginstitutions.Secondversi
4、onMarch2007"Establishmentofasafenetworkbase"wasdeterminedasatargetinthe"ITNetReformStrategy"(January2006)publishedfromthe"AdvancedInformationCommunicationsTechnologyStrategyHeadquarters(ITStrategyHeadquarters)"inJanuary2006and,inthe"Basicconceptrelatedtoinformationsecuritymeasureson
5、keyinfrastructure"determinedbytheinformationsecuritypolicymeetinginSeptember2005,medicalcarewasdefinedasa"keyinfrastructure"thatwouldhaveseriouseffectsonthenationallifeifaseriousfaultintheITbasetriggeredservicedegradationorshutdownanditwasrequestedtosystemizeandclarifythemeasurestak
6、enagainstdamagetotheITbaseandcyberattacksinthefieldofmedicalcare.Basedonthesesituations,(1)Concerningdefinitionofsecurityrequirementsconcerninganetworksuitedforusebymedicalinstitutions,requirementsforanetworksuitableforinterconnectinginstitutionsrelatedtomedicalcarefromvariousviewpo
7、intsincludingexpectedapplications,threatsonanetwork,measuresagainstthethreats,methodfordiffusionanditsproblemsaredefinedandorganizedinto"6.10Safetymanagementofmedicalandotherpersonalinformationexchangewithoutsiders".(2)ConcerningmeasuresagainstITfaultscausedbynaturaldisastersorcyber
8、attacks,whileproper