System introduction
23
2106778-001
3.6 Product security
The patient monitoring software incorporates an assortment of security features designed to
allow a flexible approach to safe and secure implementation, focusing on the principles of
confidentiality, integrity, and availability. These features assist you in using the system in a
manner that protects patient privacy and security in your setting, and also addresses
expectations for the environment where the system will be used.
3.6.1 Security features
Access control
Access control is the overall mechanism used to determine and enforce the following:
•
Who has access
•
How individuals gain access
•
When access is permitted
•
What information may be accessed
Other than clinical and Webmin applications, access to other subsystems (for example BIOS) is
restricted. The clinical and Webmin application interfaces have a role-based access control (for
example, biomed and clinical). A user may log into these interfaces (for example, Webmin) to
perform operations that are limited to the generic user. See the user and service manuals for
detailed information on available features.
Authentication
Authentication is the process of proving individual identity, and is a key element in an access
control system. In the clinical and Webmin applications, there are certain features that require
user authentication. To access these features, the user must log into the clinical and Webmin
applications with a valid username and password.
Authorization
Authorization is the process of granting and revoking access to information, and is another key
element in an access control system. Although primarily an administrative process that is
driven by an organization’s policies and procedures, the patient monitor contains features that
will help implement and enforce an organization’s method.
Both clinical and Webmin applications have an authorization mechanism to provide
information to the user.
Audit
The ability to record and examine system activity is crucial to a successful information security
program, as well as a regulatory requirement in most environments. The patient monitor stores
system and Webmin access logs.
Malicious software protection
Vigilant defense on many levels is required to keep systems free from compromise by
malicious software. Effective protection requires cooperation and partnership between GE and
our customers.
Based on the Linux Operating System, the patient monitor has a built-in firewall to allow
external communication to occur on a limited number of ports on the IX Network.
The following product features contribute to defense against malicious software:
•
System integrity checking
Summary of Contents for CARESCAPE Monitor B850
Page 12: ...CARESCAPE Monitor B850 4 2106778 001 For your notes ...
Page 16: ...CARESCAPE Monitor B850 8 2106778 001 For your notes ...
Page 56: ...CARESCAPE Monitor B850 48 2106778 001 For your notes ...
Page 76: ...CARESCAPE Monitor B850 68 2106778 001 For your notes ...
Page 112: ...CARESCAPE Monitor B850 104 2106778 001 For your notes ...
Page 128: ...CARESCAPE Monitor B850 120 2106778 001 For your notes ...
Page 156: ...CARESCAPE Monitor B850 148 2106778 001 ...
Page 160: ...CARESCAPE Monitor B850 152 2106778 001 For your notes ...
Page 177: ...Service parts 169 2106778 001 13 3 Exploded view ...
Page 178: ...CARESCAPE Monitor B850 170 2106778 001 For your notes ...
Page 182: ...CARESCAPE Monitor B850 A 4 4 2106778 001 Notes Used service parts Signature Date ...
Page 186: ...CARESCAPE Monitor B850 B 4 4 2106778 001 For your notes ...
Page 190: ...CARESCAPE Monitor B850 C 4 4 2106778 001 For your notes ...
Page 191: ......