DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Book

Securing Telehealth Remote Patient Monitoring Ecosystem

by National Institute of Standards and Technology (NIST)

Reading Time: 1 min read
in Book, Healthcare

Healthcare Delivery Organizations (HDOs) are leveraging a combination of telehealth capabilities, such as remote patient monitoring (RPM) and videoconferencing, to treat patients in their homes. These modalities are used to treat numerous conditions, such as patients battling chronic illness or requiring postoperative monitoring.

As use of these capabilities continues to grow, it is important to ensure that the infrastructure supporting them can maintain the confidentiality, integrity, and availability of patient data, and to ensure the safety of patients. It is also important to ensure the privacy of patient data by considering the privacy engineering objectives of predictability, manageability, and disassociability of data.

The goal of this project is to provide a practical solution for securing the telehealth RPM ecosystem. NIST encourage technology providers to submit a Letter of Interest should they have a commercially available product suited for the build.

This book includes the Department of Homeland Security document titled: “HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework”.

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.
Tags: BooksHealthcareHealthcare BooksHealthcare Delivery OrganizationsNational Institute of Standards and TechnologyNISTSecuring Telehealth Remote Patient Monitoring Ecosystem
ADVERTISEMENT

Related Posts

The Weakest Link by Arun Vishwanath

The Weakest Link by Arun Vishwanath

April 26, 2023
Some Security Investigations on Smartphone Platform

Some Security Investigations on Smartphone Platform

April 18, 2023
Mobile Offensive Security Pocket Guide

Mobile Offensive Security Pocket Guide

April 18, 2023
Mobile Forensics – The File Format Handbook

Mobile Forensics – The File Format Handbook

April 18, 2023

More Articles

Alerts

BrokenSesame Flaws in Alibaba Cloud Services

April 21, 2023
Alerts

CISA Adds one Known Exploited Vulnerability

July 1, 2022
Document

Human Rights and Hacktivism: The Cases of Wikileaks and Anonymous

April 22, 2022
Alerts

Hackers plant backdoors in WinRAR SFX files

April 4, 2023
Quotes

“It’s becoming increasingly difficult for the bitcoin naysayers…”

March 4, 2021
Incidents

REvil ransomware to blame for UnitingCare Queensland’s April attack

May 5, 2021
Alerts

ICS Advisory (ICSA-21-056-03) – Rockwell Automation Logix Controllers

March 1, 2021
Certification

Certified Data Protection Officer (CDPO)

March 24, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.