Sunteți pe pagina 1din 3

Med-Info

International expert information


for the medical device industry IT security for
medical devices

This Med-Info applies to: 3) the medical device, together with the IT network, is not
medical devices intended to be incorporated under the control of the medical device manufacturer.
into an IT network
Why does a medical device manufacturer
Background need to consider IT security?
Many medical devices are designed to allow the exchange Regulatory demands that require medical device
of data with other devices. The manufacturer of relevant manufacturers to consider IT security include:
medical devices must check whether this data exchange MDD, Annex I, Section I, General Requirements
is subject to regulatory (or legal) IT security requirements, - Item 1: The devices must be designed and
and, if so, must make sure that the medical devices comply manufactured in such a way that [] they will not
with these requirements as far as applicable. In the case compromise the clinical condition or the safety of
of medical devices, compliance with IT security requirements patients, or the safety and health of users or, where
covers technical solutions designed into the medical device applicable, other persons provided that any risks []
and descriptive information (as part of the accompanying are compatible with a high level of protection of health
documentation). and safety.
- Item 2: The solutions adopted by the manufacturer
The healthcare delivery organization needs to comply with for the design and construction of the devices must
the IT security requirements of the complete medical IT conform to safety principles, taking account of the
network system. It therefore needs to get the information generally acknowledged state of the art.
on the medical device from the medical device manufacturer EN ISO 14971:2012, clause 4.3: The manufacturer shall
and the necessary technical provisions of the medical compile documentation on known and foreseeable
device to allow for compliance with the overall IT security hazards associated with the medical device in both
demands. normal and fault conditions.
IEC 60601-1:2012, clause 14.6.1: NOTE: In addition to
When is IT security applicable the material given in Annex E of ISO 14971:2007, the
to a medical device? list of possible causes for hazards associated with
Criteria for the applicability of IT security to PEMS can include: [] lack of data security, including
medical devices: its effects on data privacy, and particularly vulnerability
1) The medical device incorporates a Programmable to tampering, unintended interaction with other
Electrical Medical System (PEMS); and programs and viruses.
2) the PEMS is designed to be connected to an
IT-network; and

TV SD Product Service GmbH


IEC 60601-1:2012, clause 14.13: If the PEMS is intended to benefits (for example interoperability), this international
be incorporated into an IT network [] the manufacturer standard defines the roles, responsibilities, and activities
shall make available instructions for implementing such that are necessary for risk management of IT networks
connections including the following: incorporating medical devices to address safety,
a) [] effectiveness, and data and system security (the key
d) the technical specifications of the network properties). [] This standard applies to responsible
connection of the PEMS including security organizations, medical device manufacturers, and
specifications providers of other information technology for the
e) the intended information flow between the PEMS, the purpose of risk management of an IT network
IT network and other devices on the IT network, and incorporating medical devices as specified by the
the intended routing through the IT network responsible organization.
NOTE 1: This can include aspects of effectiveness
and data and system security as related to basic FDA guidances:
safety and essential performance (see also Clause Content of Premarket Submissions for Management
H.6 and IEC 80001-1:2010). of Cybersecurity in Medical Devices: 2014
IEC 60601-1:2012, Annex A, subclause 14.11: [] PEMS Postmarket Management of Cybersecurity in Medical
validation can include tests for a high volume of data, Devices: 2016
heavy loads or stresses, human factors, security, Design Considerations and Premarket Submissions
performance, configuration compatibility, fault testing, Recommendations for Interoperable Medical
documentation and safety. Devices: 2016
IEC 60601-1:2012, Annex H.7.2: [] Supplementing
Annex E of ISO 14971:2007, at least the following Legal demands that require medical device
initiating events or circumstances that can lead to manufacturers to consider IT security are e.g.:
hazardous situations associated with IT-networks national laws for data security (e.g. in Germany:
should be considered: [] security (viruses, worms, Bundesdatenschutzgesetz, Gesetz zur Erhhung
unauthorized software updates or upgrades). der Sicherheit informationstechnischer Systeme
EN 62304:2015, clause 5.2.2: As appropriate to the (IT-Sicherheitsgesetz)).
medical device software, the manufacturer shall legal requirements regarding record storage/availability
include in the software requirements: of medical patient records (e.g. 10 years for diagnostic
a) [] X-ray patient records, according to Section 28 of the
e) security requirements German X-Ray Directive (Rntgenverordnung))
NOTE 3: Examples include:
- those related to the compromise What are the major IT security goals pursued?
of sensitive information, Major IT security goals:
- authentication, Overall goal
- authorization, Prevention of unacceptable risk caused by data security
- audit trail, threats (and compliance with legal requirements)
- communication integrity, and Sub-goals
- system security/malware protection. a) Adequate protection of medical data against
EN 62304:2015, clause 9.1: The MANUFACTURER degradation of confidentiality, integrity, and availability
shall prepare a PROBLEM REPORT for each problem b) Adequate protection of medical data against creation,
detected in the MEDICAL DEVICE SOFTWARE. manipulation, or deletion by unauthorized persons
PROBLEM REPORTS shall include a statement of c) Focus on data security threats due to tampering,
criticality (for example, effect on performance, SAFETY, unintended interaction with other programs and viruses
or SECURITY) as well as other information that may aid
in the resolution of the problem (for example, devices What are typical IT security threats to be
affected, supported accessories affected). considered for medical devices?
IEC 80001-1:2010: Recognizing that medical devices Typical major IT security threats to be considered
are incorporated into IT networks to achieve desirable for medical devices include:
compromised data confidentiality How can TV SD Product Service help you?
compromised data integrity TV SD Product Service supports you with a
compromised availability of data comprehensive portfolio of services:
inadequate detection, response, training in the requirements and challenges
or recovery of IT security threats of IT security for medical devices
gap analysis of existing processes and device
What does this mean for you as a documentation regarding IT security aspects
medical device manufacturer? for medical devices
Manufacturers of medical devices must determine whether certification of the quality management system
IT security requirements apply to their medical device. according to the ISO 27000 series and IEC 80001 series
If applicable, the medical device needs to adequately testing services related to IT security aspects
support compliance with regulatory and legal IT security
requirements. The means to comply with these requirements Your contact partner at TV SD Product Service
typically include technical solutions designed into the can provide further information.
medical device and descriptive information (as part of
the product-accompanying documentation). The extent Olaf Teichert
of documentation and the effectiveness of the means Phone: +49 89 5008-4156
provided should be based on risk management. The correct Email: olaf.teichert@tuev-sued.de
and effective implementation of the provided means needs
to be tested by the manufacturer, as far as related to his Dr. Markus Siebert
medical device. The medical device manufacturer needs Phone: +49 89 5008-4127
to have a system in place to ensure adequate maintenance Email: markus.siebert@tuev-sued.de
of IT security for already marketed devices.

2016 TV SD Product Service GmbH I PS-MKG/MHS/medinfo/1.1/en/DE

TV SD Product Service GmbH, Medical and Health Services, Ridlerstr. 65, 80339 Munich
www.tuev-sued.com/medinfo

S-ar putea să vă placă și