BS EN ISO 27799:2016 gives guidelines for organizational information security standards and
information security management practices including the selection, implementation and management
of controls taking into consideration the organization's information security risk environment(s).This International Standard defines guidelines to support the interpretation and implementation in
health informatics of ISO/IEC 27002 and is a companion to that International Standard.4)
This International Standard provides implementation guidance for the controls described in
ISO/IEC 27002 and supplements them where necessary, so that they can be effectively used for
managing health information security. By implementing this International Standard, healthcare
organizations and other custodians of health information will be able to ensure a minimum requisite
level of security that is appropriate to their organization's circumstances and that will maintain the
confidentiality, integrity and availability of personal health information in their care.This International Standard applies to health information in all its aspects, whatever form the
information takes (words and numbers, sound recordings, drawings, video, and medical images),
whatever means are used to store it (printing or writing on paper or storage electronically), and
whatever means are used to transmit it (by hand, through fax, over computer networks, or by post), as
the information is always be appropriately protected.This International Standard and ISO/IEC 27002 taken together define what is required in terms of
information security in healthcare, they do not define how these requirements are to be met. That is
to say, to the fullest extent possible, this International Standard is technology-neutral. Neutrality with
respect to implementing technologies is an important feature. Security technology is still undergoing
rapid development and the pace of that change is now measured in months rather than years. By
contrast, while subject to periodic review, International Standards are expected on the whole to remain
valid for years. Just as importantly, technological neutrality leaves vendors and service providers free
to suggest new or developing technologies that meet the necessary requirements that this International
Standard describes.As noted in the introduction, familiarity with ISO/IEC 27002 is indispensable to an understanding of
this International Standard.The following areas of information security are outside the scope of this International Standard:methodologies and statistical tests for effective anonymization of personal health information;methodologies for pseudonymization of personal health information (see Bibliography for a brief
description of a Technical Specification that deals specifically with this topic);network quality of service and methods for measuring availability of networks used for health
informatics;data quality (as distinct from data integrity).Cross References:ISO/IEC 27000ISO/IEC 27002ISO/IEC 11770-1ISO/IEC 11770-2ISO/IEC 11770-3ISO/TS 14441:2013ISO 15489-1ISO 17090-1ISO 17090-2ISO 17090-3ISO/TR 17791:2013ISO/TS 17975ISO/IEC 18028-4:2005ISO 21091ISO/TS 21298ISO 22301ISO 22313ISO 22600-1ISO 22600-2ISO 22600-3ISO/TS 25237ISO/IEC 27001:2013ISO/IEC 27005ISO/IEC 27007ISO/IEC/TR 27008ISO/IEC 27031ISO/IEC 27033-1ISO/IEC 27033-2ISO/IEC 27033-3ISO/IEC 27033-4ISO/IEC 27033-5ISO/IEC 27035ISO/IEC 27036-1ISO/IEC 27036-2ISO/IEC 27036-3ISO/IEC 27037ISO 27789:2013ISO 22857ISO/IEC 29100ISO/IEC 29101ISO 31000All current amendments available at time of purchase are included with the purchase of this document.