BS EN ISO 27789:2013
$198.66
Health informatics. Audit trails for electronic health records
Published By | Publication Date | Number of Pages |
BSI | 2013 | 56 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | Foreword |
7 | Introduction |
9 | Section sec_1 Section sec_2 Section sec_3 1 Scope 2 Normative references 3 Terms and definitions |
12 | Section sec_4 4 Symbols and abbreviated terms |
13 | Section sec_5 Section sec_5.1 Section sec_5.1.1 Section sec_5.1.2 Section sec_5.1.3 Section sec_5.1.4 Section sec_5.1.5 5 Requirements and uses of audit data 5.1 Ethical and formal requirements |
14 | Section sec_5.2 Section sec_5.2.1 Section sec_5.2.2 Section sec_5.2.3 5.2 Uses of audit data |
15 | Section sec_6 Section sec_6.1 Section sec_6.2 Section sec_6.2.1 Table tab_1 Section sec_6.2.2 6 Trigger events 6.1 General 6.2 Details of the event types and their contents |
16 | Table tab_2 Section sec_7 Section sec_7.1 Table tab_3 7 Audit record details 7.1 The general record format |
17 | Section sec_7.2 Section sec_7.2.1 Table tab_4 7.2 Trigger event identification |
18 | Section sec_7.2.2 Table tab_5 Section sec_7.2.3 Section sec_7.2.4 |
19 | Section sec_7.2.5 Table tab_6 Section sec_7.3 Section sec_7.3.1 Section sec_7.3.2 7.3 User identification |
20 | Section sec_7.3.3 Section sec_7.3.4 Section sec_7.3.5 |
21 | Table tab_7 Table tab_8 Section sec_7.3.6 |
22 | Table tab_9 Section sec_7.4 Section sec_7.4.1 7.4 Access point identification |
23 | Table tab_10 Section sec_7.4.2 Section sec_7.5 Section sec_7.5.1 7.5 Audit source identification |
24 | Section sec_7.5.2 Section sec_7.5.3 Section sec_7.5.4 |
25 | Table tab_11 Table tab_12 Section sec_7.6 Section sec_7.6.1 7.6 Participant object identification |
26 | Section sec_7.6.2 Table tab_13 Section sec_7.6.3 |
27 | Table tab_14 Section sec_7.6.4 |
28 | Table tab_15 Section sec_7.6.5 |
29 | Table tab_16 Table tab_17 Section sec_7.6.6 |
30 | Section sec_7.6.7 Section sec_7.6.8 Section sec_7.6.9 Section sec_7.6.10 Section sec_7.6.11 |
31 | Section sec_8 Section sec_8.1 Table tab_18 8 Audit records for individual events 8.1 Access events |
32 | Section sec_8.2 8.2 Query events |
33 | Table tab_19 |
34 | Section sec_9 Section sec_9.1 9 Secure management of audit data 9.1 Security considerations |
35 | Section sec_9.2 Section sec_9.3 Section sec_9.4 Section sec_9.5 9.2 Securing the availability of the audit system 9.3 Retention requirements 9.4 Securing the confidentiality and integrity of audit trails 9.5 Access to audit data |
36 | Annex sec_A Annex sec_A.1 Annex sec_A.2 Annex A (informative) Audit scenarios |
38 | Annex sec_A.3 Annex sec_A.4 |
39 | Annex sec_A.5 Annex sec_A.6 |
40 | Annex sec_A.7 Annex sec_A.8 |
41 | Annex sec_A.9 Annex sec_A.10 Annex sec_A.11 |
42 | Annex sec_A.12 |
43 | Annex sec_B Annex sec_B.1 Figure fig_B.1 Annex B (informative) Audit log services |
44 | Annex sec_B.2 Annex sec_B.3 |
45 | Annex sec_B.4 |
46 | Annex sec_B.5 |
48 | Annex sec_B.6 |
49 | Annex sec_B.7 |
50 | Annex sec_B.8 |
52 | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Reference ref_5 Reference ref_6 Reference ref_7 Reference ref_8 Reference ref_9 Reference ref_10 Reference ref_11 Reference ref_12 Reference ref_13 Reference ref_14 Reference ref_15 Reference ref_16 Reference ref_17 Reference ref_18 Reference ref_19 Reference ref_20 Bibliography |