Shopping Cart

No products in the cart.

BS EN ISO 27789:2013

$198.66

Health informatics. Audit trails for electronic health records

Published By Publication Date Number of Pages
BSI 2013 56
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
6 Foreword
7 Introduction
9 Section sec_1
Section sec_2
Section sec_3
1 Scope
2 Normative references
3 Terms and definitions
12 Section sec_4
4 Symbols and abbreviated terms
13 Section sec_5
Section sec_5.1
Section sec_5.1.1
Section sec_5.1.2
Section sec_5.1.3
Section sec_5.1.4
Section sec_5.1.5
5 Requirements and uses of audit data
5.1 Ethical and formal requirements
14 Section sec_5.2
Section sec_5.2.1
Section sec_5.2.2
Section sec_5.2.3
5.2 Uses of audit data
15 Section sec_6
Section sec_6.1
Section sec_6.2
Section sec_6.2.1
Table tab_1
Section sec_6.2.2
6 Trigger events
6.1 General
6.2 Details of the event types and their contents
16 Table tab_2
Section sec_7
Section sec_7.1
Table tab_3
7 Audit record details
7.1 The general record format
17 Section sec_7.2
Section sec_7.2.1
Table tab_4
7.2 Trigger event identification
18 Section sec_7.2.2
Table tab_5
Section sec_7.2.3
Section sec_7.2.4
19 Section sec_7.2.5
Table tab_6
Section sec_7.3
Section sec_7.3.1
Section sec_7.3.2
7.3 User identification
20 Section sec_7.3.3
Section sec_7.3.4
Section sec_7.3.5
21 Table tab_7
Table tab_8
Section sec_7.3.6
22 Table tab_9
Section sec_7.4
Section sec_7.4.1
7.4 Access point identification
23 Table tab_10
Section sec_7.4.2
Section sec_7.5
Section sec_7.5.1
7.5 Audit source identification
24 Section sec_7.5.2
Section sec_7.5.3
Section sec_7.5.4
25 Table tab_11
Table tab_12
Section sec_7.6
Section sec_7.6.1
7.6 Participant object identification
26 Section sec_7.6.2
Table tab_13
Section sec_7.6.3
27 Table tab_14
Section sec_7.6.4
28 Table tab_15
Section sec_7.6.5
29 Table tab_16
Table tab_17
Section sec_7.6.6
30 Section sec_7.6.7
Section sec_7.6.8
Section sec_7.6.9
Section sec_7.6.10
Section sec_7.6.11
31 Section sec_8
Section sec_8.1
Table tab_18
8 Audit records for individual events
8.1 Access events
32 Section sec_8.2
8.2 Query events
33 Table tab_19
34 Section sec_9
Section sec_9.1
9 Secure management of audit data
9.1 Security considerations
35 Section sec_9.2
Section sec_9.3
Section sec_9.4
Section sec_9.5
9.2 Securing the availability of the audit system
9.3 Retention requirements
9.4 Securing the confidentiality and integrity of audit trails
9.5 Access to audit data
36 Annex sec_A
Annex sec_A.1
Annex sec_A.2
Annex A
(informative)

Audit scenarios

38 Annex sec_A.3
Annex sec_A.4
39 Annex sec_A.5
Annex sec_A.6
40 Annex sec_A.7
Annex sec_A.8
41 Annex sec_A.9
Annex sec_A.10
Annex sec_A.11
42 Annex sec_A.12
43 Annex sec_B
Annex sec_B.1
Figure fig_B.1
Annex B
(informative)

Audit log services

44 Annex sec_B.2
Annex sec_B.3
45 Annex sec_B.4
46 Annex sec_B.5
48 Annex sec_B.6
49 Annex sec_B.7
50 Annex sec_B.8
52 Reference ref_1
Reference ref_2
Reference ref_3
Reference ref_4
Reference ref_5
Reference ref_6
Reference ref_7
Reference ref_8
Reference ref_9
Reference ref_10
Reference ref_11
Reference ref_12
Reference ref_13
Reference ref_14
Reference ref_15
Reference ref_16
Reference ref_17
Reference ref_18
Reference ref_19
Reference ref_20
Bibliography
BS EN ISO 27789:2013
$198.66