CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Events
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Book

Securing Telehealth Remote Patient Monitoring Ecosystem

by National Institute of Standards and Technology (NIST)

Reading Time: 1 min read
in Book, Healthcare

Healthcare Delivery Organizations (HDOs) are leveraging a combination of telehealth capabilities, such as remote patient monitoring (RPM) and videoconferencing, to treat patients in their homes. These modalities are used to treat numerous conditions, such as patients battling chronic illness or requiring postoperative monitoring.

As use of these capabilities continues to grow, it is important to ensure that the infrastructure supporting them can maintain the confidentiality, integrity, and availability of patient data, and to ensure the safety of patients. It is also important to ensure the privacy of patient data by considering the privacy engineering objectives of predictability, manageability, and disassociability of data.

The goal of this project is to provide a practical solution for securing the telehealth RPM ecosystem. NIST encourage technology providers to submit a Letter of Interest should they have a commercially available product suited for the build.

This book includes the Department of Homeland Security document titled: “HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework”.

GET BOOK

*Disclaimer: As an Amazon Associate we earn from qualifying purchases.
Tags: BooksHealthcareHealthcare BooksHealthcare Delivery OrganizationsNational Institute of Standards and TechnologyNISTSecuring Telehealth Remote Patient Monitoring Ecosystem
ADVERTISEMENT

Related Posts

Identity Management with Biometrics

Identity Management with Biometrics

January 23, 2023
Multimedia Security 2: Biometrics, Video Surveillance and Multimedia Encryption

Multimedia Security 2: Biometrics, Video Surveillance and Multimedia Encryption

January 23, 2023
Improving Android’s Device Security using Behavioral Bio-metrics

Improving Android’s Device Security using Behavioral Bio-metrics

January 23, 2023
Binary Code Fingerprinting for Cybersecurity

Binary Code Fingerprinting for Cybersecurity

January 23, 2023

More Articles

Book

A Parent’s Guide to Cyberstalking and Cyberbullying

September 28, 2022
Definition

DNA matching – Definitions

January 25, 2023
Alerts

Dell Security Advisory

October 5, 2021
Course

Cyber Security for Nonprofits Using Salesforce

January 20, 2023

[Control Systems] Fernhill Software, Ltd. Security Advisory

January 6, 2022
Incidents

Iranian Hackers Strike Diamond Industry with Data-Wiping Malware in Supply-Chain Attack

December 9, 2022
Incidents

Hack on a Services Firm’s Vendor Affects 271,000 Patients

December 20, 2022

Machine Learning Methods for Malware Detection

October 24, 2020
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.