PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.240 Applications of information technology>35.240.80 IT applications in health care technology>PD ISO/TR 11636:2009 Health informatics. Dynamic on-demand virtual private network for health information infrastructure
Sponsored link
immediate downloadReleased: 2010-03-31
PD ISO/TR 11636:2009 Health informatics. Dynamic on-demand virtual private network for health information infrastructure

PD ISO/TR 11636:2009

Health informatics. Dynamic on-demand virtual private network for health information infrastructure

Format
Availability
Price and currency
English Secure PDF
Immediate download
376.80 EUR
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
37.68 EUR
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
113.04 EUR
English Hardcopy
In stock
376.80 EUR
Standard number:PD ISO/TR 11636:2009
Pages:82
Released:2010-03-31
ISBN:978 0 580 61898 7
Status:Standard
DESCRIPTION

PD ISO/TR 11636:2009


This standard PD ISO/TR 11636:2009 Health informatics. Dynamic on-demand virtual private network for health information infrastructure is classified in these ICS categories:
  • 35.240.80 IT applications in health care technology

This Technical Report explains the network requirements in the healthcare field, the network security of an open network for the healthcare field, and the minimum guidelines for security management of health information exchange, including personal data, between external institutions.

These requirements will assist in understanding the operation of security and evaluation of security issues in the healthcare field, and the usefulness of a managed VPN, like a dynamic on-demand VPN.

This Technical Report introduces examples of security measures taken in a dynamic on-demand VPN for exchange of medical information; it is not intended to specify the dynamic on-demand VPN itself.

These examples provide network solutions to potential risks in such a user environment.