NF EN ISO 27799

NF EN ISO 27799

September 2008
Standard Cancelled

Health informatics - Information security management in health using ISO/IEC 27002

ISO 27799:2008 defines guidelines to support the interpretation and implementation in health informatics of ISO/IEC 27002 and is a companion to that standard. ISO 27799:2008 specifies a set of detailed controls for managing health information security and provides health information security best practice guidelines. By implementing this International Standard, healthcare organizations and other custodians of health information will be able to ensure a minimum requisite level of security that is appropriate to their organization's circumstances and that will maintain the confidentiality, integrity and availability of personal health information. ISO 27799:2008 applies to health information in all its aspects; whatever form the information takes (words and numbers, sound recordings, drawings, video and medical images), whatever means are used to store it (printing or writing on paper or electronic storage) and whatever means are used to transmit it (by hand, via fax, over computer networks or by post), as the information must always be appropriately protected.

View the extract
Main informations

Collections

National standards and national normative documents

Publication date

September 2008

Number of pages

75 p.

Reference

NF EN ISO 27799

ICS Codes

35.240.80   IT applications in health care technology

Classification index

S97-220

Print number

1 - 25/09/2008

International kinship

European kinship

EN ISO 27799:2008
Sumary
Health informatics - Information security management in health using ISO/IEC 27002

ISO 27799:2008 defines guidelines to support the interpretation and implementation in health informatics of ISO/IEC 27002 and is a companion to that standard.

ISO 27799:2008 specifies a set of detailed controls for managing health information security and provides health information security best practice guidelines. By implementing this International Standard, healthcare organizations and other custodians of health information will be able to ensure a minimum requisite level of security that is appropriate to their organization's circumstances and that will maintain the confidentiality, integrity and availability of personal health information.

ISO 27799:2008 applies to health information in all its aspects; whatever form the information takes (words and numbers, sound recordings, drawings, video and medical images), whatever means are used to store it (printing or writing on paper or electronic storage) and whatever means are used to transmit it (by hand, via fax, over computer networks or by post), as the information must always be appropriately protected.

Standard replaced by (1)
NF EN ISO 27799
October 2016
Standard Current
Health informatics - Information security management in health using ISO/IEC 27002

<p>ISO 27799:2016 gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking into consideration the organization's information security risk environment(s).</p> <p>It defines guidelines to support the interpretation and implementation in health informatics of ISO/IEC 27002 and is a companion to that International Standard.</p> <p>ISO 27799:2016 provides implementation guidance for the controls described in ISO/IEC 27002 and supplements them where necessary, so that they can be effectively used for managing health information security. By implementing ISO 27799:2016, healthcare organizations and other custodians of health information will be able to ensure a minimum requisite level of security that is appropriate to their organization's circumstances and that will maintain the confidentiality, integrity and availability of personal health information in their care.</p> <p>It applies to health information in all its aspects, whatever form the information takes (words and numbers, sound recordings, drawings, video, and medical images), whatever means are used to store it (printing or writing on paper or storage electronically), and whatever means are used to transmit it (by hand, through fax, over computer networks, or by post), as the information is always be appropriately protected.</p> <p>ISO 27799:2016 and ISO/IEC 27002 taken together define what is required in terms of information security in healthcare, they do not define how these requirements are to be met. That is to say, to the fullest extent possible, ISO 27799:2016 is technology-neutral. Neutrality with respect to implementing technologies is an important feature. Security technology is still undergoing rapid development and the pace of that change is now measured in months rather than years. By contrast, while subject to periodic review, International Standards are expected on the whole to remain valid for years. Just as importantly, technological neutrality leaves vendors and service providers free to suggest new or developing technologies that meet the necessary requirements that ISO 27799:2016 describes.</p> <p>As noted in the introduction, familiarity with ISO/IEC 27002 is indispensable to an understanding of ISO 27799:2016.</p> <p>The following areas of information security are outside the scope of ISO 27799:2016:</p> <p>a) methodologies and statistical tests for effective anonymization of personal health information;</p> <p>b) methodologies for pseudonymization of personal health information (see Bibliography for a brief description of a Technical Specification that deals specifically with this topic);</p> <p>c) network quality of service and methods for measuring availability of networks used for health informatics;</p> <p>d) data quality (as distinct from data integrity).</p>

Table of contents
View the extract
  • Avant-propos
    iv
  • Introduction
    v
  • 1 Domaine d'application
    1
  • 1.1 Généralités
    1
  • 1.2 Exclusions du domaine d'application
    1
  • 2 Références normatives
    2
  • 3 Termes et définitions
    2
  • 3.1 Termes médicaux
    2
  • 3.2 Termes relatifs à la sécurité de l'information
    3
  • 4 Termes abrégés
    5
  • 5 Sécurité de l'information de santé
    6
  • 5.1 Objectifs de la sécurité de l'information de santé
    6
  • 5.2 Sécurité de l'information au sein du contrôle de l'information
    7
  • 5.3 Contrôle de l'information au sein de la gouvernance clinique et d'entreprise
    7
  • 5.4 Informations de santé devant être protégées
    7
  • 5.5 Les menaces et les vulnérabilités relatives à la sécurité des informations de santé
    8
  • 6 Plan d'action pratique pour la mise en oeuvre de l'ISO/IEC 27002
    9
  • 6.1 Taxinomie de l'ISO 27002 et de l'ISO 27001
    9
  • 6.2 Engagement de la direction pour la mise en oeuvre de l'ISO/IEC 27002
    10
  • 6.3 Mise en oeuvre, fonctionnement, entretien et perfectionnement de l'ISMS
    10
  • 6.4 Planification: mise en oeuvre de l'ISMS
    11
  • 6.5 Application: Mise en oeuvre et fonctionnement de l'ISMS
    20
  • 6.6 Contrôle: surveillance et révision de l'ISMS
    21
  • 6.7 Actions: entretien et amélioration de l'ISMS
    23
  • 7 Les implications médicales de l'ISO/IEC 27002
    23
  • 7.1 Généralités
    23
  • 7.2 Politique d'information de la sécurité
    23
  • 7.3 Organisation de la sécurité des informations
    25
  • 7.4 Gestion du patrimoine
    28
  • 7.5 Sécurité des ressources humaines
    30
  • 7.6 Sécurité physique et environnementale
    32
  • 7.7 Gestion de l'exploitation et des communications
    34
  • 7.8 Contrôle d'accès
    40
  • 7.9 Acquisition, développement et maintenance des systèmes d'information
    44
  • 7.10 Gestion des incidents relatifs à la sécurité de l'information
    46
  • 7.11 Aspects de la sécurité de l'information en matière de gestion de la continuité de l'activité
    47
  • 7.12 Conformité
    48
  • Annexe A (informative) Menaces pesant sur la sécurité des informations de santé
    50
  • Annexe B (informative) Tâches et documents relatifs au système de gestion de la sécurité informatique
    55
  • Annexe C (informative) Avantages potentiels et attributs requis des outils d'assistance
    59
  • Bibliographie
    62
ZOOM ON ... the Requirements department
To comply with a standard, you need to quickly understand its issues in order to determine its impact on your activity.

The Requirements department helps you quickly locate within the normative text:
- mandatory clauses to satisfy,
- non-essential but useful clauses to know, such as permissions and recommendations.

The identification of these types of clauses is based on the document “ISO / IEC Directives, Part 2 - Principles and rules of structure and drafting of ISO documents ”as well as on a constantly enriched list of verbal forms.

With Requirements, quickly access the main part of the normative text!

With Requirements, quickly access the main part of the normative text!
Need to identify, monitor and decipher standards?

COBAZ is the simple and effective solution to meet the normative needs related to your activity, in France and abroad.

Available by subscription, CObaz is THE modular solution to compose according to your needs today and tomorrow. Quickly discover CObaz!

Request your free, no-obligation live demo

I discover COBAZ