User's Manual Part 2
Table Of Contents
- Table of contents
- Introducing the Drystar5300
- Basic operation (Operator mode)
- Advanced operation (Key-operator mode)
- Overview of key-operator functions
- Viewing printer information
- Accessing the Show settings menu
- Viewing general information
- Viewing input tray information
- Viewing network (DICOM) information
- Viewing general image quality information
- Viewing default densitometer information
- Viewing image quality information of a modality
- Viewing installed data-sets information
- Viewing logical printers information
- Changing the configuration settings
- Printing images
- Saving the configuration settings
- Restoring the configuration settings
- Maintaining optimal image quality
- Service actions
- Quality control procedure
- Installation operations
- Controlling the Drystar5300 via a remote PC (with browser)
- System description
- Preventive maintenance
- Troubleshooting
- Equipment information sheet
- Drystar media density response data
- Quality Control Charts
- Index
14
2920B EN 20031206
Privacy and security
Within the healthcare industry, several standardization efforts are ongoing as
a response to Privacy and Security legislation and regulations. The purpose
of this standardization for hospitals and vendors is to enable information
sharing, interoperability and to support the workflow of hospitals in a multiple
vendor environment.
In order to allow hospitals to comply with HIPAA regulations (Health
Insurance Portability and Accountability Act) and to meet the IHE standards
(Integrated Healthcare Enterprise) some security features are included in the
user interface of the Drystar 5300 (available via the web pages only: under
‘Security tools’. Refer to Chapter 4, ‘Controlling the Drystar 5300 via a remote
PC (with browser)’):
• User authentication. The administrator can configure different user accounts.
Each account consists of a user name and a password.
• Audit logging. This implies logging to a central log server of specific Drystar 5300
‘actions’, e.g. startup/shutdown, user authentication (failures), received print job
ID information, etc.
• Node authentication, using certificates. Working with SSL (Secure Sockets
Layer) allows secure communications over an insecure network. SSL is the
security layer on top of TCP/IP.
The first two functions are available when access to the Administrator is
granted (i.e. when the Administrator password has been correctly entered).
To activate the SSL, please contact your Agfa representative.










