EasyManua.ls Logo

OCULUS Keratograph 5M - Cybersecurity Instructions

OCULUS Keratograph 5M
104 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
4 Safety Instructions
Instruction Manual Keratograph 5M (G/77000/XXXX/EN – Rev05) 17 / 106
4.12 Cybersecurity Instructions
The device itself was not designed to connect via a coupled computer
to the internet or other network, or to portable media, as the device
does not require a network or internet connection to function.
User who elect to connect the device coupled computer to the internet
or other network for other purposes are responsible for ensuring that it
is done so in a controlled manner.
Data responsibility
The device itself is not designed to connect with the internet, but only
with a computer. It does not require the internet to function.
Do not connect with the internet while using the device. It is considered
misuse.
If you elect to connect the computer to the internet for other purposes
you are responsible for ensuring data security.
Device Security
It is the responsibility of the authorized user to ensure that the
Keratograph 5M device is not left unlocked, or otherwise unsecured
when not in use, to ensure that non-authorized medical, professional, or
otherwise unapproved personnel are not exposed to, or gain access to,
ePHI.
User Responsibility
User names or passwords must not be shared with colleagues or others,
even if they are permitted by law and provider policy to view the same
type of information (e.g. two operators reviewing the same examina-
tions).
Operators have access to patients’ ePHI and must not take snap-shots,
screenshots or pictures (e.g. using another device) of any information
viewed through the device.
Operators should not enter identifying data into the device. All the data
on the device should be de-identified and relate to the Examinations ID
and not to the patient.
Reporting Device Security or Privacy Breaches
Operators must contact their local IT department and disclose any sus-
pected or confirmed compromised user accounts, and any other privacy
or security breaches.
Recovering from Compromised Accounts or Devices
When accounts are considered compromised, devices are lost, or unau-
thorized access is discovered or suspected, the Healthcare Organiza-
tion’s IT network administrators suspend and modify the user login
criteria and issue new login credentials for the user to access their ac-
count securely.
Unavailable Service
Users should report unavailable service or prohibited access to informa-
tion to their local Healthcare Organization’s IT department.
Precautions
To ensure cyber security in order to the usage of the device, the fol-
lowing security measures should be considered. Contact your com-
puter administrator:

Table of Contents

Related product manuals