|
|
Chapter V - Technical Considerations |
Article 14: Security |
|
|
Chapter V - Technical Considerations |
Article 15: Testing and audit |
|
|
Chapter V - Technical Considerations |
Article 13: Technical requirements |
|
|
Article 13: Technical requirements |
13.3 Establishment of gateway software for data transformation |
|
|
Article 13: Technical requirements |
13.1 Adoption of payload-agnostic standards for machine communication |
|
|
Article 13: Technical requirements |
13.2 Preference for structured data exchange with support for unstructured data |
|
|
Article 14: Security |
14.5 Secure communication and end-to-end security for health data |
|
|
Article 14: Security |
14.9 Requiring cybersecurity assessments to meet security requirements |
|
|
Article 14: Security |
14.4 Transmission of health data only to trusted entities |
|
|
Article 14: Security |
14.8 Notification and active monitoring of security incidents in health data exchange |
|
|
Article 14: Security |
14.1 Ensuring the security and confidentiality of health data |
|
|
Article 14: Security |
14.3 Preventive measures against unauthorized processing and data loss |
|
|
Article 14: Security |
14.6 Training personnel on cybersecurity risks in EHR-systems |
|
|
Article 14: Security |
14.7 Establishing audit trails for inspection by authorised bodies |
|
|
Article 14: Security |
14.2 Designing secure and trustworthy information systems with data protection |
|
|
Article 15: Testing and audit |
15.5 Establishing audit trails for monitoring health data exchange |
|
|
Article 15: Testing and audit |
15.4 Recording incidents and cross-border communication |
|
|
Article 15: Testing and audit |
15.2 Perform end-to-end testing |
|
|
Article 15: Testing and audit |
15.3 Promoting automated validation tools for interoperability |
|
|
Article 15: Testing and audit |
15.1 Demonstrate compliance |