Managing a UNIX-based Treatment Planning System



Similar documents
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

HIPAA Compliance Use Case

RecoveryVault Express Client User Manual

Fundamentals of UNIX Lab Networking Commands (Estimated time: 45 min.)

BestSync Tutorial. Synchronize with a FTP Server. This tutorial demonstrates how to setup a task to synchronize with a folder in FTP server.

Online Backup Client User Manual

1. Product Information

Online Backup Client User Manual Linux

NAS 253 Introduction to Backup Plan

Project Management Triangle

Backing Up TestTrack Native Project Databases

Division of IT Security Best Practices for Database Management Systems

Online Backup Linux Client User Manual

Online Backup Client User Manual

I-STOP: What You Need to Know. Lyuba Konopasek, MD Designated Institutional Official NewYork-Presbyterian Hospital August 26, 2013

There s a variety of software that can be used, but the approach described here uses freely available Cygwin software: (1) Cygwin/X (2) Cygwin/openssh

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Shellshock Security Patch for X86

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS

Configure Cisco Emergency Responder Disaster Recovery System

Using Network Attached Storage with Linux. by Andy Pepperdine

SecureVault Online Backup Service FAQ

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Managing Cisco ISE Backup and Restore Operations

Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely

USFSP Network Security Guidelines

ELECTRONIC MEDICAL RECORDS (EMR) STREAMLINE CH I PROCESS. Ping Xia, Ph.D. Head of Medical Physics Department of Radiation Oncology Cleveland Clinic

SPICE EduGuide EG0015 Security of Administrative Accounts

Managing Access Control in PresSTORE

WS_FTP Pro for Windows 95/98/NT

Remote Access to Unix Machines

GUARD1 PLUS SE Administrator's Manual

THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY

Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008.

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Acronis Backup & Recovery 11

Access Control and Audit Trail Software

Online Backup Client User Manual

Author A.Kishore/Sachin VNC Background

Acronis Backup & Recovery 11.5 Quick Start Guide

DHHS Information Technology (IT) Access Control Standard

Setting Up Specify to use a Shared Workstation as a Database Server

Incremental Backup Script. Jason Healy, Director of Networks and Systems

11. Oracle Recovery Manager Overview and Configuration.

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA USA

ElephantDrive Cloud Backup Module Contents

Mac OS X Server Migration Guide

Administrators Guide Multi User Systems. Calendar Year

XenDesktop 5 Database Sizing and Mirroring Best Practices

How To Write A Health Care Security Rule For A University

Installing LearningBay Enterprise Part 2

SPI Backup via Remote Terminal

Tivoli Enterprise Monitoring Server "HOT" backup

Xopero Centrally managed backup solution. User Manual

LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc.

Data Stored on a Windows Server Connected to a Network

Using Secure4Audit in an IRIX 6.5 Environment

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Click to begin. Maitre'D Full System Backup & Restore

PuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version

Backup and Restore with 3 rd Party Applications

ARIA ONCOLOGY INFORMATION SYSTEM RADIATION ONCOLOGY

ClockWork Enterprise 5

4cast Server Specification and Installation

Introduction Deploying Deep Freeze Enterprise with BigFix

1. Installation Overview

QuickDNS 4.6 Installation Instructions

Connecting to the Remote Desktop Service

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free

Installation and Setup: Setup Wizard Account Information

Cisco Unified CM Disaster Recovery System

New Lab Intro to KDE Terminal Konsole

Administration of Symantec Enterprise Vault 10.0 for Exchange. Version: Demo. Page <<1/12>>

The Ultimate Remote Database Administration Tool for Oracle, SQL Server and DB2 UDB

Juris and Juris Suite 2.5 Service Pack 2. Installation Guide

HIPAA Security Alert

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Frequently Asked Questions The next section includes FAQs to help you to access and use your student account.

Rev C. DBDS Backup and Restore Procedures For System Release 2.2 Through 4.3

Norton Mobile Privacy Notice

Windows 8 Backup, Restore & Recovery By John Allen

Bitrix Site Manager. VMBitrix Virtual Machine. Quick Start And Usage Guide

MapGuide Open Source Repository Management Back up, restore, and recover your resource repository.

Installation Overview

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc.

CASHNet Secure File Transfer Instructions

FTP Use. Internal NPS FTP site instructions using Internet Explorer:

Module 5 Introduction to Processes and Controls

XCloner Official User Manual

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

BSDI Advanced Fitness & Wellness Software

Data Stored on a Windows Computer Connected to a Network

Advanced Administration

Transcription:

Managing a UNIX-based Treatment Planning System Jenghwa Chang Radiation Oncology, NewYork-Presbyterian Hospital/Weill Cornell Medical College

System management: Policy and procedure System manager User management Privilege assignment Scripting Synchronize preferences Killing processes Database integrity Backup and recovery, Plan locking Anonymizing patient data

UNIX-like Operating Systems From Wikipedia, the free encyclopedia

Pinnacle³ TPS Manufactured by Philip Healthcare A general purpose TPS for external beam RT and brachytherpy Current version: 9.6 Operating system-solaris 10 bash-3.00$ uname -a SunOS nysgpinnapp0 5.10 Generic_142910-17 i86pc i386 i86pc Management on two levels: System level: need good knowledge of UNIX Application level: very familiar with Pinnacle³

Challenges of Enterprise TPS-Security Concerns Treatment Planning Room

Pinnacle at NYPH 3 Gbs Enterprise servers at SunGard Data Center (NJ) NYPH WCMC (upper east side) Citrix Server NYPH CUMC (Washington Height) 1 Gbs 100 Mbs VPN 1 Gbs Stich Radiation Center: 12 thin client Workstations Centralized Treatment Planning: 11 thin client Workstations PC access: 10 P3PC licenses Radiation Oncology: 17 thin client workstations

Treatment Planning at NYPH Treatment planning system: Pinnacle 9.6 ~40 Thin Client workstations ~10 P3PC through Citrix Technology 3D, IMRT, VMAT SRS, SBRT, IGRT Patient load: 140 daily Staff: Planners: 7 Physicians: 14 Physicists: 14 Medical residents: 12 Physics residents: 5 R&V: Mosaiq Electronic chart QCL (quality control list) for flow control.

System-level Management Mainly performed by IT and vendor but it will be more efficient if you can perform: User creation and deletion Kill certain user process when necessary You need to know: How to telnet a UNIXlike system A few UNIX commands UNIX file structures How to kill processes

System Management-Application Level Institutions Plans Physics Configuration Backup and Archive Mainly performed by physicists/dosimetrists. Requires clearly defined policy and procedures considering the clinical need and available manpower.

Yes, we all joke about P&P but the reality is that we need them to Run the TP operation fairly, effectively and efficiently Deal with many users, each with different personality and individual need. Be prepared when there is an emergency. Say NO to people with unreasonable requests.

Avoid illogical and insane P&P! Identify problem Develop Enforce Discuss Identify real problems Discussion: get all (planner, physicist, physician ) part Enforce: ask for the endorsement of higher-ups (e.g., chairman) if necessary.

System Managers Know the password for Super user for Solaris OS for system level management Configure in Pinnacle for application level management How many? Too many raises security concern. Too few might cause clinical inconvenience. Negotiate with IT and find the optimal number.

NYPH System Manager Policy The Pinnacle system management team consists of: Director of Centralized Treatment Planning (CTP). System manager for CTP. System manager for TDSI. System manager for Weill Cornell Medical Center (WCMC) campus System manager for Columbia University Medical Center (CUMC) campus Each member of the Pinnacle system management team will be given the password for root login to perform the following tasks: Creation of user accounts. Management of the patient database. Backing up, restoring or transferring patients among institutions. Killing certain user processes when necessary.

A system manager might be called anytime, anywhere so you will need Good knowledge of the operating system Very familiar with TP software VPN (virtual private network) allowing you to connect to the server from anywhere Terminal emulator on your computer Email and cell phone access 24/7

A Real-life Example

Good old days: p3rtp p3rtp Simple and convenient but Almost anyone in this business can log into your system Every mistake is made by p3rtp Every plan is locked by p3rtp Is acceptable only if All workstations locked in a room. Only planners have accessed Treatment Planning Room

The single most important technique for TPS security is user control For enterprise TPS, universal login Causes major security concerns Is against the institution policy IT wouldn t allow it Every user must have His/her own account and Login password Change password periodically

NYPH User Management Policy 1. Each user must have an individual login account. 2. A new user should contact the Pinnacle system managers to request an individual login account. 3. A new user account will be issued after the new user a. Goes through the orientation. b. Presents certificates for HIPPA pivacy and Security trainings. 4. Must change the password immediately, and should change the password periodically afterwards. 5. The individual login replaces the planner s signature in a locked plan.

Three Types of Institutions Clinical institutions: One for each campus Contains approximately three months worth of clinical patient data Archive institutions: Patients planned from three months ago Created monthly for each campus. Short lived: archived after creation. Research/training institutions: created for research or training purposes.

Scripting-system level UNIX commands are submitted to the Operating System via a (e.g., c, sh, bash ) shell Script: a file containing UNIX shell commands is known as a (shell) script. Very important for system manager: User creation Kill a processes Synchronize preferences Privilege assignment Many other system-level management functions

Scripting-application level The same system-level shell scripting extensively used by Pinnacle TPS. Very powerful tool for Standardizing TP approach Improving TP productivity To take the most advantage: Don t just rely on Pinnacle Know how to edit scripts Familiar with the OS

Useful UNIX References UNIX commands http://mally.stanford.edu/~sr/computing/basicunix.html http://www.math.utah.edu/lab/unix/unixcommands.html UNIX scripting http://en.wikipedia.org/wiki/shell_script http://www.dartmouth.edu/~rc/classes/ksh/

Privilege Management Use basic file permissions, i.e, ugo and wrx. Every user has the same privilege except for superuser. It is an ultimate crime if a regular user: Delete a patient or Move a patient from one institution to another We cannot prevent the crimes but we can find the offenders

Synchronize Preference Pinnacle preference files: used to set default values s for various functions when Pinnacle starts Why synchronize: to standardize the work environment for all users.

How to synchronize? Maintain the preference files for a standard user according to the TP P&P. Synchronize: copy the preference files of the standard user to other user s home directory. Manual synchronization: impossible for > 80 users User script to help

Sometimes you have to kill a process When to kill and how to find the process: Session frozen: use ps Screen locked: use ps Plan opened by others: use ptree Hung process: use Top How to kill: Open an x-term Log in super user Use kill -9 processno Remember to remind people: What is not saved will be lost

NYP Plan Locking Policy Prior to printing out the plan, the treatment planner should lock the approved plan in the Pinnacle TPS.

Why lock the plan? Some non-planners like to improve the plan themselves Prevents inadvertent change of the plan after approval Replaces the planner s signature: Very useful for EMR Need individual login

Database Integrity Patient data are stored as: Database data: patient demographics, plan info, image set name and location System data files: images, plans, structures It is possible to delete system data without updating the database. Fix: rebuild the database: Immediately delete system data files When you detect inconsistency between database and system data. Periodically rebuild the database is NOT recommended for the enterprise system.

Backup and Archive Backup: Periodic back up patient data Purpose: to prevent data loss Consideration: what to backup and frequency (daily, weekly or monthly) Archive: Remove the data from the system after the backup Purposes: reduce system burden, speed up operation Consideration: frequency (all patients in one month or every case?)

Backup Mechanisms Existing mechanisms: RAID 5: part of the system Remote data back: service provided by contractor (e.g., Sungard ) Local back, i.e., DIY Still need to local backup? YES because: RAID 5 may fail: we have experienced it It takes time to restore from remote backup Timely restore if needed Can retrieve an older version of a plan

NYPH Backup Policy Weekly : backup clinical institutions and research institutions being modified. Monthly: backup all institutions. Using the Pinnacle backup tool. Data (tar files and index files) backed up to the Pinnacle backup directory and copied to a network drive. Integrity of selected tar files tested after backup.

NYPH Archive Policy At the time an archive institution is created, it is backed up to The archive directory in Pinnacle The network archive drive. The integrity of archive tested by restoring selected patients to Pinnacle. The archive institution deleted. The index files created for backup are kept for future restore.

Why anonymizing patient data? For patient data in research or training institutions. Protect patient privacy if the data is used for non-clinical purposes. HIPPA requirements. For federal funded research project, the patient data must be anonymized.

Anonimization Two step process: Anonymize the database data Anonymize data files Database data: Straightforward. Change the patient demographics directly. Data files: Tricky. Call Pinnacle to get the instructions for your Pinnacle version. You might need to rebuild the database.