{"id":374710,"date":"2024-10-20T02:39:58","date_gmt":"2024-10-20T02:39:58","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-tr-213322021\/"},"modified":"2024-10-26T04:38:52","modified_gmt":"2024-10-26T04:38:52","slug":"bsi-pd-iso-tr-213322021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-tr-213322021\/","title":{"rendered":"BSI PD ISO\/TR 21332:2021"},"content":{"rendered":"
This document provides an overview of security and privacy considerations for Electronic Health Records (EHR) in a cloud computing service that users can leverage when selecting a service provider.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4 Abbreviated terms 5 Cloud computing 5.1 General 5.2 Overview of cloud computing <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.3 Cloud computing roles and activities 5.4 Cloud capabilities types and cloud service categories <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.5 Cloud deployment models <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.6 Cloud computing information system security capabilities <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 6 Considerations for health information in cloud computing environment 6.1 Overview <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.2 Health information security 6.2.1 Overview of Teleworking Policies and Procedures 6.2.2 Telework and portable devices <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.3 Information security policies 6.3.1 Overview 6.3.2 Information security and protection of PII and PHI <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.3.3 Availability <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.3.4 Cloud deployment models considerations 6.3.5 Audit trail and logs <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.3.6 Cryptography and obfuscation <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.3.7 Retention, backup, and deletion 6.3.8 Access control and multi-client segmentation <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6.3.9 Change management 6.3.10 Disaster recovery <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6.3.11 Testing and evaluation 6.3.12 Information management <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex A (informative) Example guidance from the UK for selecting and risk managing cloud based digital health services <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex B (informative) Detailed advice and guidance <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Annex C (informative) Service classification recommendations <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Health informatics. Cloud computing considerations for the security and privacy of health information systems<\/b><\/p>\n |