User Manual
Table Of Contents
- Table of contents
- About this manual
- Introducing the Drystar 5500
- Basic operation (operator mode)
- Advanced operation (Key-operator mode)
- Overview of Key-operator functions
- Stopping the printing process
- Viewing printer information
- Changing the configuration settings
- Printing images
- Saving the configuration settings
- Restoring the configuration settings
- Performing the calibration procedures
- Installation
- Quality control for general radiography applications (DT 2 B & DT 2 C)
- Quality control for mammography application (DT 2 Mammo) (optional)
- Controlling the Drystar 5500 via a remote PC (with browser)
- System description
- Preventive maintenance and replacements
- Troubleshooting
- Equipment information sheet
- Drystar media density response data
- Quality Control Charts
- Remarks for HF-emission and immunity
- Remarks for HF-emission and immunity
- This device is intended for operation in the electromagnetic environment given below. The user of the device should ensure that it is used in such an environment.
- This device is intended for operation in the electromagnetic environment given below. The user of the device should ensure that it is used in such an environment.
- This device is intended for operation in the electromagnetic environment given below. The user of the device should ensure that it is used in such an environment.
- This device is intended for operation in an electromagnetic environment in which the radiated high frequency disturbance variabl...
- Remarks for HF-emission and immunity
- Index
22
2900H EN 20071108Introducing the Drystar 5500
DRYSTAR 5500/5503 REFERENCE MANUAL
Privacy and security
Within the healthcare industry, several standardization efforts are ongoing as
a response to Privacy and Security legislation and regulations. The purpose of
this standardization for hospitals and vendors is to enable information
sharing, interoperability and to support the workflow of hospitals in a
multiple vendor environment.
In order to allow hospitals to comply with HIPAA regulations (Health
Insurance Portability and Accountability Act) and to meet the IHE standards
(Integrated Healthcare Enterprise) some security features are included in the
user interface of the Drystar 5500 (available via the web pages only: under
‘Security tools’. Refer to Chapter 4, ‘Controlling the Drystar 5500 via a remote
PC (with browser)’):
• Product Authentication: HIPAA supported products that communicate with
DICOM use the Transport Layer Security (TLS) protocol. The TLS
protocol uses public key certificates for client and server authentication
(X.509).
• Product Accountability: HIPAA supported products require some level of
user and system activity to be recorded. As a consequence of these actions,
audit records are to be sent to and observed at an Audit Record Repository
(ARR).
• Product User Authentication: 'User Authentication' of HIPAA products
involves password protection for access to User, Key operator, Service
Security/ Administrator and other user interfaces that allow access to
protected health information (PHI). These interfaces include all user
keypads, front panels displays and network connections.
The last two functions are available when access to the Administrator is
granted (i.e. when the Administrator password has been entered correctly).