Teleradiology Security Whitepaper



Similar documents
Mobile Healthcare Security Whitepaper

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

TELE HEALTH CASE STUDY: TELE RADIOLOGY

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

VMware vcloud Air HIPAA Matrix

Cyber-Ark Software and the PCI Data Security Standard

Ensuring the security of your mobile business intelligence

HIPAA Information Security Overview

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Network Security Protocols

DESlock+ Mobile allows you to encrypt and decrypt and attachments, text and files on your ios device.

Connecting Radiologists. Improving the quality of healthcare by providing radiology services worldwide.

The fi rst fully network-based integrated OR

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

A new innovation to protect, share, and distribute healthcare data

Background Information

Bank of Hawaii Protecting Confidential

Healthcare Compliance Solutions

HIPAA, PHI and . How to Ensure your and Other ephi are HIPAA Compliant.

LogMeIn HIPAA Considerations

Using etoken for Securing s Using Outlook and Outlook Express

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Mobile Device Management Version 8. Last updated:

GoToAssist Remote Support HIPAA compliance guide

MediCal QAWeb. Secured online service for Quality Assurance of medical displays

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Bank of Hawaii Protecting Confidential . What's in this User Guide

HIPAA Privacy & Security White Paper

Research Information Security Guideline

Archiving User Guide Outlook Plugin. Manual version 3.1

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

DigiDelivery Client Quick Start

Copyright 2013, 3CX Ltd.

Matrix Technical Support Mailer - 72 Procedure for Image Upload through Server in SATATYA DVR,NVR & HVR

LogMeIn Hamachi. Getting Started Guide

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

ZIMPERIUM, INC. END USER LICENSE TERMS

Electronic Communication In Your Practice. How To Use & Mobile Devices While Maintaining Compliance & Security

FileCloud Security FAQ

HIPAA COMPLIANCE REVIEW

Wakefield Council Secure and file transfer User guide for customers, partners and agencies

Receiving Secure from Citi For External Customers and Business Partners

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

EJGH Encryption User Tip Sheet of 8

HIPAA. considerations with LogMeIn

The CIO s Guide to HIPAA Compliant Text Messaging

Using Voltage Secur

CHIS, Inc. Privacy General Guidelines

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Quest Collaboration Services How it Works Guide

The deployment of OHMS TM. in private cloud

HIPAA Requirements and Mobile Apps

White Paper. Support for the HIPAA Security Rule PowerScribe 360

Online File Folder. Getting Started Guide. Become an Expert at Managing Your Files Online. wind. Online File Folder // Getting Started Guide

White Paper. BD Assurity Linc Software Security. Overview

Frequently Asked Questions. Frequently Asked Questions SSLPost Page 1 of 31 support@sslpost.com

ReadyNAS Remote White Paper. NETGEAR May 2010

Privacy Policy Version 1.0, 1 st of May 2016

MedMail User Manual. Contents. 1.0 Introduction. 2.0 Installing the system. 3.0 Program operation

Secure File and Delivery Application (SFED)

OX Guard Product Guide v1.0 V1.0

Type of Personal Data We Collect and How We Use It

USER GUIDE CLOUDME FOR WD SENTINEL

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

Phone: Fax: Box: 230

Pennsylvania Department of Public Welfare. Bureau of Information Systems OBSOLETE. Secure User Guide. Version 1.0.

ONE Mail Direct for Desktop Software

Novell Filr 1.0.x Mobile App Quick Start

Collaborative Teleradiology

Fuji Synapse PACS Installation Instructions Radiology Specialists of Denver, P.C.

Brainloop Cloud Security

ENSURING YOUR ENTERPRISE IMAGE-VIEWER IS FULLY SECURE

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Fax User Guide 07/31/2014 USER GUIDE

Initial DUO 2 Factor Setup, Install, Login and Verification

Secure SHARE. Controlled Access. Image Sharing with intuition. Compressed. Link to Study. Drag & Drop. View & Download. Compressed. Anonymous.

Circular to All Licensed Corporations on Information Technology Management

SCADA SYSTEMS AND SECURITY WHITEPAPER

HIPAA Security Alert

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Account Restrictions Agreement [ARA] - Required by LuxSci HIPAA Accounts

QUENTRY BEYOND IMAGE SHARING

Transcription:

Teleradiology Security Whitepaper aycan telerad as DICOM image distribution enhancement for PACS environments. ayc_telerad_security_whitepaper_150417_sp_ds. ID77905 Copyright aycan Digitalsysteme GmbH 2015 Page 1 of 10

Table of Content 1. Executive Summary 2. aycan telerad 3. Use cases 4. Security 5. Other aspects 6. References Page 2 of 10

1. Executive Summary Medical professionals want to use teleradiology technology for their needs. They want to send images to other physicians, hospitals or imaging centers. But very often technical and/or bureaucratic hurdles cease such intentions. aycan telerad offers an almost zero-config solution for easy and secure teleradiology by using private cloud technology. Information security regarding confidentiality, integrity, availability and accountability is ensured on a solid level and complies with the current state of the technology. It even follows German data protection law (which is one of the toughest laws about this topic worldwide). Page 3 of 10

2. aycan telerad aycan telerad provides a transparent way to share DICOM images to distant networks. The DICOM images are stacked into cases (at the aycan OsiriX PRO software inside the hospital/imaging center) and sent to other sites. Users have to setup a login at the mobile.aycan.com server. This server will never store any patient data and is only used for establishing a secure point-to-point connection between sender and receiver. The existence of a new case is indicated to the recipient user through a Push Notification service. The system will establish a secure, encrypted ad-hoc SSL tunnel between the devices and send the images to the recipient's workstation. Fig. 1 aycan telerad secure workflow Page 4 of 10

3. Use cases There are at least three typical use cases for the aycan telerad system: 1. Connecting sites. 2. On-call and other remote review, interpretation, and diagnosis of radiological images. 3. Teleconsulting with colleagues. Fig. 2 aycan telerad use cases Page 5 of 10

4. Security The overall security of the Mac computer is documented at the Apple website, section "Security for Mac Computers". Topics are: Service and App Protection Runtime Protection Data Protection Secure Networking 4.1 Confidentiality Confidentiality assures that no unauthorized users have access to the information. There are two possible sources identified which might cause a risk regarding confidentiality: 1. Access to the information during the time when the information is transmitted to the device. 2. Access to the information while the information is on the device. This is addressed by the following topics: Double encryption: Use of encrypted transmission channel (1), data is encrypted during transmission with an asymmetric encryption (2). Data can be stored encrypted on the computer. It is recommended to secure access to the computer via password. The computer should be protected physically. The data is encrypted while it is transmitted and can only be decrypted by the recipient. Page 6 of 10

4.2 Integrity Integrity assures that the information is correct that is, it has not been improperly modified. The data is encrypted during transmission (over an encrypted channel) (see 4.1 Confidentiality). The data is not stored on any server while on its way from sender to receiver (direct point-to-point communication). After the data left the source node and until the data is stored on the target system, there is no possibility to alter the information at the data sets. This is because modification would imply correct decryption and correct encryption after modification, which is not possible with reasonable effort. The data transfer mechanism assures that incomplete or modified transmissions can be detected and that the user is notified. 4.3 Availability Availability suggests that the information will be available when needed. It is in the nature of a teleradiology application that it has to handle the uncertainty of the transmission channel, especially if the area of mobility is not limited to a certain area where somehow controlled transmission channel conditions can be expected, like at a hospital building or campus. Usage at time of critical scenarios is only appropriate, if the network quality is reliably in a very good state. Before data deletion is executed a prompt for confirmation must be done. Page 7 of 10

4.4 Accountability Accountability is the application of identification and authentication to assure that the prescribed access process is being done by an authorized user. Every person who wants to use the system has to have a valid user account. For each user account a unique user name has to be selected. It is recommended not to share user accounts but to have a dedicated account for each person that would like to use the system. People who would like to exchange messages or images, respectively, have to authorize each other before one is able to send data to the other. Each message (either only text messages or messages where image data is attached) has an unambiguous user as the sender of this message. Each message has one (in later versions possibly more) unambiguous user as the addressee(s) of the message. Access to data of a certain user is only possible after successful login. Page 8 of 10

5. Other aspects 5.1 Diagnostic use Certain countries have specific/individual regulations about teleradiological scenarios and/or medical displays for diagnostic use. Users have to check local regulations e.g. whether the display they use is sufficient for diagnostic purposes. The aycan OsiriX PRO software is labeled with a CE-Mark as a Medical Device Class IIb in Europe and with FDA 510(k) Clearance in the USA. Fig. 3: Diagnostic Workstations Page 9 of 10

6. References Security for Mac Computers http://training.apple.com/pdf/osx_wp_security_108.pdf Mobile Healthcare Security Whitepaper http://www.aycan.de/fileadmin/user_upload/pdf/mobile_healthcare-security_whitepaper.pdf aycan OsiriX user manual, section Safety Instructions Page 10 of 10