Info Security
The purpose of info security is protecting sensitive healthcare data and ensuring the integrity, confidentiality, and availability of the information managed by the system. This is important in a healthcare setting due to the sensitive nature of patient data and the strict regulatory requirements.
Through APIs and other features, information security products can create new assets in Legacy TMS, then populate the Information Security fields with values from the information security provider.
Your organization's administrator sets up a default form within the Classic TMS modules, which varies its display of tabs, field groupings, and fields, depending on whether it's in Create, Update, or Query mode.
The tabs and fields you see within this content may differ from those configured by your organization's administrator. Use this information as a guideline.
The default page view is List view, which displays all information in a spreadsheet-like format. Card view is where you can view the same items as blocks. You have the option to switch between views on desktop platforms. Click either the list or card icon located at the upper right of the list. Mobile phone and tablet devices only display Card view.
Info security:
-
Operating system type: Select the type of operating system from the information security provider. For instance, Windows, macOS, Linux, iOS, and so on.
-
Remote access type: Remote access allows you to connect to systems from remote locations. Select the method by which remote access is enabled for each asset. For example, VPN and cloud services.
-
Application entity title (AET): Refers to a software application or a device that participates in a DICOM network communication. Enter the unique identifier that allows for secure communication between DICOM-compliant devices and applications.
-
Unique device identifier (UDI): Refers to a system used to uniquely identify medical devices within the healthcare sector. Enter a unique UDI for each medical device asset, ensuring that each device can be uniquely identified and tracked throughout its lifecycle.
-
Major operating system number: Select the primary version number of the operating system running on the aforementioned computer or device. Major numbers typically identify significant system updates, whereas minor numbers identify smaller updates and bug fixes.
-
Minor operating system number: Select the minor version number of the operating system. This helps in determining exact level of an operating system, especially when applying security patches and understanding any system vulnerabilities.
-
Operating system build number: Enter the build number, which is a unique identifier assigned to a specific software version during development and corresponds to a specific iteration of the software.
-
Firmware version: Refers to the specific iteration of the software programmed into the read-only memory of a hardware device. Enter the firmware version which helps maintain an accurate inventory of assets and ensuring that all devices are up to date with the latest security patches.
External references: Refers to a variety of resources or documentation that provide additional information or authoritative guidance related to the security of assets. These resources are external to the organization. To add an external reference, click Add, enter the information in the dialog that opens, and click Add.
-
External system identifier: Reference number or code that uniquely identifies the external reference or document.
-
External system name: This is the the name or designation of a system that is outside of your organization's direct control.
Network adapter information: These are details about the hardware and software components that enable a computer or device to connect to a network.
-
Number: Unique device identifier.
-
Network adapter type description: Category or classification of a network interface card (NIC) or controller that determines the kind of network connection it provides and the supported protocols.
-
Connection status type description: The current state of a network connection to a device. It indicates whether the device is successfully connected to a network.