Use Instructions
Vital Signs Monitor User Manual Networking
- 29 -
Chapter 8 Networking
The device can be connected to the wireless network and can be connected to hospital systems
(such as HIS) via the HL7 protocol. If the monitor is networked, a network icon is
displayed on the screen.
8.1 Cybersecurity Measures
8.1.1 Personal Information Safety
Protecting personal health information is a major component of security strategy. To protect the
personal information and ensure the proper device performance, the user should take necessary
precautions in accordance with local laws and regulations and institution‘s policies. EDAN
recommends health care organizations or medical institutions to implement a comprehensive and
multifaceted strategy to protect the information and systems from internal and external security
threats.
To ensure the patients‘ safety and protect their personal health information, the user should
implement practices or measures that include:
1. Physical safeguards - physical safety measures to ensure that unauthorized personnel do not
have access to the monitor.
2. Operational safeguards - safety measures during operation.
3. Administrative safeguards - safety measures in management.
4. Technical safeguards - safety measures in technical field.
CAUTION
1 The access/operation of the monitor is restricted to authorized personnel only. Assign
only staff with a specific role the right to use the monitor.
2 Ensure that all device components maintaining personal information are physically
secure.
3 Ensure that the monitor is connected only to the device authorized/approved by
EDAN. Users should operate all EDAN deployed and supported monitors within
EDAN authorized specifications, including EDAN approved software, software
configuration, security configuration, etc.
4 Protect all the passwords to prevent unauthorized changes. Only the manufacturer‟s
service personnel are allowed to modify the Factory Maintain settings.
5 Anti-virus measures such as USB device virus scanning should be carried out prior to
using USB flash drive.
6 DoS and DDoS protection of the router or switch must be turned on for defensing
against attacks.