{"id":349494,"date":"2024-10-20T00:37:02","date_gmt":"2024-10-20T00:37:02","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-22600-12014\/"},"modified":"2024-10-26T00:18:29","modified_gmt":"2024-10-26T00:18:29","slug":"bs-en-iso-22600-12014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-22600-12014\/","title":{"rendered":"BS EN ISO 22600-1:2014"},"content":{"rendered":"

This multi-part International Standard defines principles and specifies services needed for managing privileges and access control to data and\/or functions.<\/p>\n

It focuses on communication and use of health information distributed across policy domain boundaries. This includes healthcare information sharing across unaffiliated providers of healthcare, healthcare organizations, health insurance companies, their patients, staff members, and trading partners by both individuals and application systems ranging from a local situation to a regional or even national situation.<\/p>\n

It specifies the necessary component-based concepts and is intended to support their technical implementation. It will not specify the use of these concepts in particular clinical process pathways.<\/p>\n

This part of ISO 22600 proposes a template for the policy agreement. It enables the comparable documentation from all parties involved in the information exchange.<\/p>\n

This part of ISO 22600 excludes platform-specific and implementation details. It does not specify technical communication services and protocols which have been established in other standards. It also excludes authentication techniques.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
4<\/td>\nForeword <\/td>\n<\/tr>\n
6<\/td>\nForeword <\/td>\n<\/tr>\n
7<\/td>\nIntroduction <\/td>\n<\/tr>\n
9<\/td>\nSection sec_1
Section sec_2
Section sec_3
Section sec_3.1
1\tScope
2\tNormative references
3\tTerms and definitions <\/td>\n<\/tr>\n
10<\/td>\nSection sec_3.2
Section sec_3.3
Section sec_3.4
Section sec_3.5
Section sec_3.6
Section sec_3.7
Section sec_3.8
Section sec_3.9 <\/td>\n<\/tr>\n
11<\/td>\nSection sec_3.10
Section sec_3.11
Section sec_3.12
Section sec_3.13
Section sec_3.14
Section sec_3.15
Section sec_3.16
Section sec_3.17
Section sec_3.18
Section sec_3.19
Section sec_3.20 <\/td>\n<\/tr>\n
12<\/td>\nSection sec_3.21
Section sec_3.22
Section sec_3.23
Section sec_3.24
Section sec_4
Section sec_5
Section sec_5.1
Section sec_5.2
Section sec_5.2.1
4\tAbbreviated terms
5\tGoal and structure of privilege management and access control
5.1\tGoal of privilege management and access control
5.2\tStructure of privilege management and access control <\/td>\n<\/tr>\n
13<\/td>\nSection sec_5.2.2
Section sec_5.2.3
Section sec_5.2.3.1 <\/td>\n<\/tr>\n
14<\/td>\nSection sec_5.2.3.2
Section sec_5.2.4
Section sec_5.2.5
Section sec_5.2.6 <\/td>\n<\/tr>\n
15<\/td>\nSection sec_5.2.7
Section sec_5.2.8 <\/td>\n<\/tr>\n
17<\/td>\nFigure fig_1
Section sec_6
Section sec_6.1
6\tPolicy agreement
6.1\tOverview <\/td>\n<\/tr>\n
18<\/td>\nSection sec_6.2
Section sec_6.3
Section sec_6.4
Section sec_6.5
Section sec_6.6
6.2\tIdentification
6.3\tPatient consent
6.4\tPatient privacy
6.5\tInformation identification
6.6\tInformation location <\/td>\n<\/tr>\n
19<\/td>\nSection sec_6.7
Section sec_6.8
Section sec_6.9
Section sec_6.10
Section sec_6.11
Section sec_6.12
Section sec_6.13
6.7\tInformation integrity
6.8\tSecurity
6.9\tAuthorization
6.10\tRole structures
6.11\tAssignment and attestation authorities
6.12\tDelegation rights
6.13\tValidity time <\/td>\n<\/tr>\n
20<\/td>\nSection sec_6.14
Section sec_6.15
Section sec_6.16
Section sec_6.17
Section sec_6.18
Section sec_6.19
Section sec_6.20
6.14\tAuthentication of users\/roles
6.15\tAccess
6.16\tPolicy agreement validity period
6.17\tEthics
6.18\tSecure audit trail
6.19\tAudit check
6.20\tRisk analysis <\/td>\n<\/tr>\n
21<\/td>\nSection sec_6.21
Section sec_6.22
Section sec_7
6.21\tContinuity and disaster management
6.22\tFuture system developments
7\tDocumentation <\/td>\n<\/tr>\n
22<\/td>\nAnnex sec_A
Annex sec_A.1
Annex sec_A.2
Annex sec_A.3
Annex\u00a0A
\n(informative)<\/p>\n

Example of a documentation template <\/td>\n<\/tr>\n

24<\/td>\nAnnex sec_A.4
Annex sec_A.4.1 <\/td>\n<\/tr>\n
25<\/td>\nAnnex sec_A.4.2 <\/td>\n<\/tr>\n
26<\/td>\nAnnex sec_A.4.3 <\/td>\n<\/tr>\n
27<\/td>\nAnnex sec_A.4.4 <\/td>\n<\/tr>\n
29<\/td>\nAnnex sec_B
Annex sec_B.1
Annex sec_B.2
Annex sec_B.2.1
Annex sec_B.2.2
Annex sec_B.2.3
Annex sec_B.2.4
Annex\u00a0B
\n(informative)<\/p>\n

Example of an information exchange policy agreement <\/td>\n<\/tr>\n

30<\/td>\nAnnex sec_B.2.5
Annex sec_B.2.6
Annex sec_B.2.7 <\/td>\n<\/tr>\n
31<\/td>\nAnnex sec_B.3
Annex sec_B.3.1
Annex sec_B.3.1.1
Annex sec_B.3.1.2
Annex sec_B.3.1.3
Annex sec_B.3.2
Annex sec_B.3.2.1
Annex sec_B.3.2.2
Annex sec_B.3.2.3
Annex sec_B.3.2.4
Annex sec_B.3.2.5
Annex sec_B.3.3
Annex sec_B.3.3.1 <\/td>\n<\/tr>\n
32<\/td>\nAnnex sec_B.3.3.2
Annex sec_B.3.3.3
Annex sec_B.3.3.4
Annex sec_B.3.4
Annex sec_B.3.4.1
Annex sec_B.3.4.2
Annex sec_B.3.4.3
Annex sec_B.3.5
Annex sec_B.3.6
Annex sec_B.3.6.1
Annex sec_B.3.6.2
Annex sec_B.3.7
Annex sec_B.3.7.1
Annex sec_B.3.7.2
Annex sec_B.3.7.3
Annex sec_B.3.8
Annex sec_B.3.8.1 <\/td>\n<\/tr>\n
33<\/td>\nAnnex sec_B.3.8.2
Annex sec_B.3.9
Annex sec_B.3.9.1
Annex sec_B.3.9.2
Annex sec_B.3.10
Annex sec_B.3.10.1
Annex sec_B.3.10.2
Annex sec_B.3.11
Annex sec_B.3.11.1
Annex sec_B.3.11.2
Annex sec_B.3.11.3
Annex sec_B.3.12
Annex sec_B.3.12.1
Annex sec_B.3.12.2
Annex sec_B.3.13 <\/td>\n<\/tr>\n
34<\/td>\nAnnex sec_B.3.14
Annex sec_B.3.14.1
Annex sec_B.3.14.2
Annex sec_B.3.14.3
Annex sec_B.3.14.4
Annex sec_B.3.15
Annex sec_B.3.16
Annex sec_B.3.17
Annex sec_B.3.17.1
Annex sec_B.3.17.2
Annex sec_B.3.17.3
Annex sec_B.3.17.4
Annex sec_B.3.17.5 <\/td>\n<\/tr>\n
35<\/td>\nReference ref_1
Reference ref_2
Reference ref_3
Reference ref_4
Reference ref_5
Reference ref_6
Reference ref_7
Reference ref_8
Reference ref_9
Reference ref_10
Reference ref_11
Reference ref_12
Reference ref_13
Reference ref_14
Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Health informatics. Privilege management and access control – Overview and policy management<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2014<\/td>\n38<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":349504,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[704,2641],"product_tag":[],"class_list":{"0":"post-349494","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-240-80","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/349494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/349504"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=349494"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=349494"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=349494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}