Cybersecurity Framework – National Institute of Standards and Technology (NIST) [US] – 2 July 2013

Posted on July 9, 2013. Filed under: Health Informatics | Tags: , |

Cybersecurity Framework – National Institute of Standards and Technology (NIST) [US] – 2 July 2013

Media release

“The Framework will consist of standards, guidelines, and best practices to promote the protection of critical infrastructure. The prioritized, flexible, repeatable, and cost-effective approach of the framework will help owners and operators of critical infrastructure to manage cybersecurity-related risk while protecting business confidentiality, individual privacy and civil liberties.”

Advertisements
Read Full Post | Make a Comment ( Comments Off on Cybersecurity Framework – National Institute of Standards and Technology (NIST) [US] – 2 July 2013 )

New Guide Details Steps from A-to-Z for Preserving Biological Evidence – National Institute of Standards and Technology (NIST) and the Department of Justice’s National Institute of Justice (NIJ) – 30 April 2013

Posted on May 1, 2013. Filed under: Pathology | Tags: , , |

New Guide Details Steps from A-to-Z for Preserving Biological Evidence – National Institute of Standards and Technology (NIST) and the Department of Justice’s National Institute of Justice (NIJ) – 30 April 2013

“A new handbook by the National Institute of Standards and Technology (NIST) and the Department of Justice’s National Institute of Justice (NIJ) provides forensic laboratories, law enforcement agencies and the judicial system with state-of-the-art guidelines and recommended best practices for preserving biological evidence so that it is available at any time to solve “cold cases,” confirm the guilt of criminals or exonerate the innocent.

Biological evidence refers to two types of evidence commonly recovered from crime scenes or collected during criminal investigations: samples of biological material—blood, semen and other bodily fluids; hair; tissue; bones and teeth—or items containing biological material such as a bloody T-shirt. The Biological Evidence Preservation Handbook: Best Practices for Evidence Handlers (NIST Interagency/Internal Report 7928) is designed to help ensure that this evidence has been properly stored to avoid contamination, premature destruction or degradation, and accurately tracked to prevent loss. It was authored and edited by the Technical Working Group on Biological Evidence Preservation, a group of 20 experts from various forensic, law enforcement and scientific disciplines, as well as legal scholars, medical personnel and representatives of relevant professional organizations.

The handbook is divided into five main sections that explain the issues, offer guidelines and make recommendations related to:

Retention—identifying what biological evidence should be kept and for how long;
Safe handling—including the use of protective equipment, the management of spills or accidents, and methods for properly disposing waste;
Packaging and storing—outlining the conditions for storage and how to properly package biological evidence to maintain its integrity;
Chain of custody and tracking—a review of the different evidence-tracking methods available and procedures for improving all aspects of chain-of-custody recordkeeping; and
Disposition—summarizing the best practices for disposing of biological evidence once retention is no longer required by law.”

… continues on the site

Read Full Post | Make a Comment ( Comments Off on New Guide Details Steps from A-to-Z for Preserving Biological Evidence – National Institute of Standards and Technology (NIST) and the Department of Justice’s National Institute of Justice (NIJ) – 30 April 2013 )

Notional Supply Chain Risk Management Practices for Federal Information Systems – NIST – 27 November 2012

Posted on November 28, 2012. Filed under: Health Informatics | Tags: , |

Notional Supply Chain Risk Management Practices for Federal Information Systems – NIST – 27 November 2012

“The National Institute of Standards and Technology (NIST) has published the final version of Notional Supply Chain Risk Management Practices for Federal Information Systems. This guide offers an array of supply chain assurance methods to help federal agencies manage the risks associated with purchasing and implementing information and communications technologies (ICT) products and services.

Security risks introduced via the supply chain—both intentional and unintentional—are substantial and on the rise. The global ICT supply chain’s growing sophistication and increasing speed and scale leave government agencies vulnerable to be exploited through a variety of means, including counterfeit materials, malicious software or untrustworthy products.

The guide describes ICT supply chain risk management as a multidisciplinary practice with a number of interconnected enterprise processes that, when performed correctly, will help departments and agencies manage the risk of using ICT products and services. The publication calls for procurement organizations to establish a coordinated team approach to assess the ICT supply chain risk and to manage this risk by using technical and programmatic mitigation techniques.”

… continues on the site

Read Full Post | Make a Comment ( Comments Off on Notional Supply Chain Risk Management Practices for Federal Information Systems – NIST – 27 November 2012 )

Guidelines on Hardware-Rooted Security in Mobile Devices – NIST – 31 October 2012

Posted on November 20, 2012. Filed under: Health Informatics | Tags: , , |

Guidelines on Hardware-Rooted Security in Mobile Devices – NIST – 31 October 2012

“NIST Provides Draft Guidelines to Secure Mobile Devices

The National Institute of Standards and Technology (NIST) has published draft guidelines that outline the baseline security technologies mobile devices should include to protect the information they handle. Smart phones, tablets and other mobile devices, whether personal or “organization-issued,” are increasingly used in business and government. NIST’s goal in issuing the new guidelines is to accelerate industry efforts to implement these technologies for more cyber-secure mobile devices.

Securing these tools, especially employee-owned products, is becoming increasingly important for companies and government agencies with the growing popularity—and capability—of the devices. Many organizations allow employees to use their own smart phones and tablets, even though their use increases cybersecurity risks to the organization’s networks, data and resources.

Guidelines on Hardware-Rooted Security in Mobile Devices defines the fundamental security components and capabilities needed to enable more secure use of products.”

… continues

Read Full Post | Make a Comment ( Comments Off on Guidelines on Hardware-Rooted Security in Mobile Devices – NIST – 31 October 2012 )

Guidelines on Hardware-Rooted Security in Mobile Devices – Draft – National Institute of Standards and Technology (NIST) – 31 October 2012

Posted on November 2, 2012. Filed under: Health Informatics | Tags: , , |

Guidelines on Hardware-Rooted Security in Mobile Devices – Draft – National Institute of Standards and Technology (NIST) – 31 October 2012

“The National Institute of Standards and Technology (NIST) has published draft guidelines that outline the baseline security technologies mobile devices should include to protect the information they handle. Smart phones, tablets and other mobile devices, whether personal or “organization-issued,” are increasingly used in business and government. NIST’s goal in issuing the new guidelines is to accelerate industry efforts to implement these technologies for more cyber-secure mobile devices.

Securing these tools, especially employee-owned products, is becoming increasingly important for companies and government agencies with the growing popularity—and capability—of the devices. Many organizations allow employees to use their own smart phones and tablets, even though their use increases cybersecurity risks to the organization’s networks, data and resources.”

… continues

Read Full Post | Make a Comment ( Comments Off on Guidelines on Hardware-Rooted Security in Mobile Devices – Draft – National Institute of Standards and Technology (NIST) – 31 October 2012 )

A Human Factors Guide to Enhance EHR Usability of Critical User Interactions when Supporting Pediatric Patient Care – National Institute of Standards and Technology – June 2012

Posted on July 20, 2012. Filed under: Child Health / Paediatrics, Health Informatics, Medical Records | Tags: , , , , |

A Human Factors Guide to Enhance EHR Usability of Critical User Interactions when Supporting Pediatric Patient Care – National Institute of Standards and Technology – June 2012 NIST

“Executive Summary

Adoption of electronic health record (EHR) systems in hospitals and physician practices is accelerating. Usability of EHRs has been identified as an important factor impacting patient safety, and recommendations for improvement have been provided. Pediatric patients have unique characteristics that translate into unique EHR usability challenges. It is not surprising, then, that the adoption of EHRs by pediatric care providers has lagged behind adoption for adult care providers. In this document, we highlight important user interactions that are especially salient for pediatric care and hence to the EHR user-centered design process. These interactions and associated usability recommendations were identified by consensus during a series of teleconferences with experts representing the disciplines of human factors engineering, usability, informatics, and pediatrics in ambulatory care and pediatric intensive care. In addition, extensive peer review was provided by experts in pediatric informatics, emergency medicine, neonatology, pediatrics, human factors engineering, usability engineering,and software development and implementation.

This report details recommendations to enhance EHR usability when supporting pediatric patient care and also identifies promising areas for EHR innovation. Finally, we illustrate unique pediatric considerations in the context of representative clinical scenarios which may be helpful for formative user-centered design approaches and summative usability evaluations.”

Read Full Post | Make a Comment ( Comments Off on A Human Factors Guide to Enhance EHR Usability of Critical User Interactions when Supporting Pediatric Patient Care – National Institute of Standards and Technology – June 2012 )

NIST Releases Technical Guidance for Evaluating Electronic Health Records – 20 March 2012

Posted on March 26, 2012. Filed under: Health Informatics | Tags: |

NIST Releases Technical Guidance for Evaluating Electronic Health Records – 20 March 2012

The National Institute of Standards and Technology (NIST) is an agency of the U.S. Department of Commerce

“An important aspect of any product is how easily someone can use it for its intended purpose, also known as usability. Electronic health records (EHR) that are usable have the potential to improve patient care, which is why the National Institute of Standards and Technology (NIST) has outlined formal procedures for evaluating the usability of EHR systems.

The proposed usability protocol encourages a user-centered approach to the development of EHR systems. It provides methods to measure and address critical errors in user performance before those systems are deployed in a medical setting.”

… continues on the site

Read Full Post | Make a Comment ( Comments Off on NIST Releases Technical Guidance for Evaluating Electronic Health Records – 20 March 2012 )

Liked it here?
Why not try sites on the blogroll...