Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science

Size: px
Start display at page:

Download "Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science"

Transcription

1 Communicating mhealth Security & Privacy Risks Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science SITH2, Dartmouth College, May 15, 2012 Supported in part by a Sloan Research Fellowship, NSF CNS , HHS 90TR0003/01. Any opinions, findings, and conclusions expressed in this material are those of the authors and do not necessarily reflect the views of the NSF. UNIVERSITY OF MASSACHUSETTS AMHERST Department of Computer Science

2 Correctness is easy. Security is hard. Photo by Kevin Fu 2

3 Disclosures n Support from NSF, HHS, DHS, IOM, Microsoft Research, Symantec, McAfee n Visiting scientist, FDA n Board member, NIST ISPAB n Patent pending technology: Ultra-low power flash memory Zero-power security Hat: zazzle.com n This presentation is based on both my own research and the research of others. None of the opinions, findings, or conclusions necessarily reflect the views of my past or present employers. 3

4 mhealth S&P Risks n Bacon theory of wireless mhealth risks Great benefits Great risks n Risks of complacency, unaccountability Sterile technique for mhealth? Culture change? 4

5 Networking + Wireless! Photos from: Medtronic 5

6 Benefits of Wireless, But... Photo by Kevin Medtronic museum 6

7 Wirelessly Induce Fatal Heart Rhythm MHz MICS band, nominal range several meters n Command shock sends 35 J in ~1 msec to the T-wave n Designed to induce ventricular fibrillation n No RF amplification necessary n [Halperin et al., IEEE Symposium on Security & Privacy 2008] spqr.cs.umass.edu Prof. Kevin Fu mhealth Security & Privacy 7

8 Wireless Makes Everything Better? 8 [Photos: uncyclopedia.wikia.com/wiki/bacon & Cisco & bacondujour.blogspot.com]

9 How significant are intentional, malicious malfunctions in software?

10 The Tylenol Scare of 1982 [Source: trutv crime library] 10

11 21 CFR and Security (a)general. The Food and Drug Administration has the authority under the Federal Food, Drug, and Cosmetic Act (the act) to establish a uniform national requirement for tamper-evident packaging of OTC drug products that will improve the security of OTC drug packaging 11

12 Bad People Do Exist: Vandals 12

13

14 Disease to Malware:Days to Hours Slide from Howie Shrobe and others FluTE: Chao et al., PLoS Computational Biology,

15 Privacy: Wardrobe Malfunctions 15

16 Medical Device Cybersecurity 1. Implantable medical devices should be trustworthy 2. Improved security will enable medical device innovation Physicians should their wash hands. Doctors are gentlemen and therefore their hands are always clean. Dr. Ignaz Semmelweis Dr. Charles Meigs

17 Medical Device Cybersecurity 1. Implantable medical devices should be trustworthy 2. Improved security will enable medical device innovation Physicians Medical should devices their should wash be secure. hands. Doctors are You re gentlemen so negative. and therefore There are their no security hands are always problems. clean. Dr. Ignaz Semmelweis Dr. Charles Meigs

Archimedes Center for Medical Device Security. Supported in part by NSF CNS , CNS , HHS 90TR0003/01, and a Sloan Research Fellowship.

Archimedes Center for Medical Device Security. Supported in part by NSF CNS , CNS , HHS 90TR0003/01, and a Sloan Research Fellowship. Archimedes Center for Medical Device Security Kevin Fu, Ph.D. Associate Professor Security & Privacy Research Group Computer Science & Engineering University of Michigan http://secure-medicine.org/ Supported

More information

Panel on Economic Incentives for Medical Device Cybersecurity

Panel on Economic Incentives for Medical Device Cybersecurity Panel on Economic Incentives for Medical Device Cybersecurity Wednesday, February 1, 2012 9:00 am - 10:30 am Marriott Residence Inn, 1199 Vermont Avenue NW Brian Fitzgerald Deputy Director, Division of

More information

Medical Device Cybersecurity: FDA Perspective

Medical Device Cybersecurity: FDA Perspective Medical Device Cybersecurity: FDA Perspective Suzanne B. Schwartz MD, MBA Associate Director for Science and Strategic Partnerships Office of the Center Director (OCD) Center for Devices and Radiological

More information

State of US Telemedicine Industry

State of US Telemedicine Industry State of US Telemedicine Industry Prepared for ETSI Sophia Antipolis, France 6 May 2014 Agenda Current State of Healthcare in the US Industry dynamics Adoption of telemedicine/mhealth/digital health Healthcare

More information

MEDICAL DEVICE SECURITY. A Focus on Patient Safety February, 2018

MEDICAL DEVICE SECURITY. A Focus on Patient Safety February, 2018 MEDICAL DEVICE SECURITY A Focus on Patient Safety February, 2018 WHO I AM Adam Brand I Am The Cavalry Director Privacy and Security, Protiviti Focus on Medical Device Healthcare Security Custom EEG Manufacturing,

More information

Some example UW security lab projects, related to emerging technologies. Tadayoshi Kohno CSE 484, University of Washington

Some example UW security lab projects, related to emerging technologies. Tadayoshi Kohno CSE 484, University of Washington Some example UW security lab projects, related to emerging technologies Tadayoshi Kohno CSE 484, University of Washington Wireless Implantable Medical Devices Computation and wireless capabilities lead

More information

Team Science in mhealth Research

Team Science in mhealth Research Team Science in mhealth Research Sherry Pagoto, PhD Co-Founder, UMass Center of mhealth and Social Media Associate Professor of Medicine Division of Preventive and Behavioral Medicine University of Massachusetts

More information

Mementos. pmnr ä~äoê~íoêó. System Support for Long-Running Computations on RFID-Scale Devices

Mementos. pmnr ä~äoê~íoêó. System Support for Long-Running Computations on RFID-Scale Devices Mementos pmnr ä~äoê~íoêó System Support for Long-Running Computations on RFID-Scale Devices Benjamin Ransford*, UMass Amherst Jacob Sorber, Dartmouth College Kevin Fu, UMass Amherst http://spqr.cs.umass.edu/mementos

More information

FDA & Medical Device Cybersecurity

FDA & Medical Device Cybersecurity FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US

More information

CS Computer Security in the Physical World:

CS Computer Security in the Physical World: CS 598 - Computer Security in the Physical World: Project Submission #1 & Pacemakers and Implantable Cardiac Defibrillators Professor Adam Bates Fall 2016 Oct 4th Deliverable Choose one of your project

More information

1

1 April 21, 2016 Dr. Suzanne Schwartz Center for Devices and Radiological Health Food and Drug Administration 10903 New Hampshire Ave., Bldg. 66, Rm. 5418 Silver Spring, MD 20993-0002 Dear Dr. Suzanne Schwartz,

More information

Security and Smartness for Medical Sensor Networks in Personalized Mobile Health Systems

Security and Smartness for Medical Sensor Networks in Personalized Mobile Health Systems Security and Smartness for Medical Sensor Networks in Personalized Mobile Health Systems I. Nikolaevskiy, D. Korzun, Andrei Gurtov Aalto University 23.04.2014 FRUCT 15 Motivation for Medical ICT Population

More information

4A Healthcare Data Security & Privacy

4A Healthcare Data Security & Privacy 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits

More information

In addition, below we offer our responses to the questions posed in the Federal Register Notice announcing the availability of the Draft Guidance:

In addition, below we offer our responses to the questions posed in the Federal Register Notice announcing the availability of the Draft Guidance: 701 Pennsylvania Avenue, NW Suite 800 Washington, D.C. 20004 2654 Tel: 202 783 8700 Fax: 202 783 8750 www.advamed.org September 24, 2015 Division of Dockets Management (HFA305) Food and Drug Administration

More information

Kostas Giokas MONITORING OF COMPLIANCE ON AN INDIVIDUAL TREATMENT THROUGH MOBILE INNOVATIONS

Kostas Giokas MONITORING OF COMPLIANCE ON AN INDIVIDUAL TREATMENT THROUGH MOBILE INNOVATIONS Kostas Giokas MONITORING OF COMPLIANCE ON AN INDIVIDUAL TREATMENT THROUGH MOBILE INNOVATIONS AIM RESEARCH TEAM BIOMEDICAL ENGINEERING LABORATORY NATIONAL TECHNICAL UNIVERSITY OF ATHENS WHAT IS MHEALTH?

More information

FDA CDRH perspective on new technologies in inhaler products

FDA CDRH perspective on new technologies in inhaler products 2017 IPAC RS/ISAM Joint Workshop New Frontiers in Inhalation Technology FDA CDRH perspective on new technologies in inhaler products Linda Ricci Associate Director ODE DH Office of Device Evaluation Center

More information

Protecting Global Medical Telemetry Infrastructure

Protecting Global Medical Telemetry Infrastructure Protecting Global Medical Telemetry Infrastructure Benessa Defend, Mastooreh Salajegheh, Kevin Fu, and Sozo Inoue University of Massachusetts Amherst and Kyushu University {defend,negin,kevinfu}@cs.umass.edu,

More information

Secrets of successful medical device connectivity. Agenda 4/5/17. * The secrets:

Secrets of successful medical device connectivity. Agenda 4/5/17. * The secrets: Secrets of successful medical device connectivity Bill Saltzstein Code Playbook Vancouver 2017 Agenda * The secrets: * All medical devices shall be connected * You shall understand the requirements requirements

More information

Mobile Health Apps: A Primer

Mobile Health Apps: A Primer Mobile Health Apps: A Primer René Quashie Senior Counsel Epstein Becker Green July 2014 2014 Epstein Becker & Green, P.C. All Rights Reserved. ebglaw.com 1 Agenda 1. mhealth Publishers 2. Status of the

More information

MEDICAL DEVICE CYBERSECURITY: FDA APPROACH

MEDICAL DEVICE CYBERSECURITY: FDA APPROACH MEDICAL DEVICE CYBERSECURITY: FDA APPROACH CYBERMED SUMMIT JUNE 9TH, 2017 SUZANNE B. SCHWARTZ, MD, MBA ASSOCIATE DIRECTOR FOR SCIENCE & STRATEGIC PARTNERSHIPS CENTER FOR DEVICES AND RADIOLOGICAL HEALTH

More information

The Human Touch: Develop a Patient-Centric Injection Device

The Human Touch: Develop a Patient-Centric Injection Device The Human Touch: Develop a Patient-Centric Injection Device Molly Story, PhD 27 September 2017 Photo credits: Why should we care about being patient-centric? The FDA tells us: Our drugs must be safe and

More information

Below we ve highlighted several of the key points from the final guidance document.

Below we ve highlighted several of the key points from the final guidance document. On September 6, 2017, the Food and Drug Administration (FDA or the Agency) released its final guidance document, Design Considerations and Pre-Market Submission Recommendations for Interoperable Medical

More information

The Evolving Role of Primary Care and Technology in Cardiology

The Evolving Role of Primary Care and Technology in Cardiology The Evolving Role of Primary Care and Technology in Cardiology Peter Tilkemeier, MD, MMM, FACC Chair, Department of Medicine Greenville Health System Professor, University of South Carolina School of Medicine

More information

Intrinsically Secure, Open, and Safe Cyber physically Enabled, Life critical Essential Services (ISOSCELES) Adventium Labs

Intrinsically Secure, Open, and Safe Cyber physically Enabled, Life critical Essential Services (ISOSCELES) Adventium Labs Intrinsically Secure, Open, and Safe Cyber physically Enabled, Life critical Essential Services (ISOSCELES) ACSAC 2016 Todd Carpenter Chief Engineer todd.carpenter@adventiumlabs.com This material is based

More information

Briefing on Report: Oversight of the Privacy & Security of Health Data Collected by Entities Not Regulated by HIPAA HL7 Mobile Health Workgroup

Briefing on Report: Oversight of the Privacy & Security of Health Data Collected by Entities Not Regulated by HIPAA HL7 Mobile Health Workgroup Briefing on Report: Oversight of the Privacy & Security of Health Data Collected by Entities Not Regulated by HIPAA HL7 Mobile Health Workgroup September 21, 2016 Devi Mehta, JD, MPH, Privacy Policy Analyst,

More information

Center for Devices and Radiological Health Premarket Approval Application Critical to Quality

Center for Devices and Radiological Health Premarket Approval Application Critical to Quality This document is scheduled to be published in the Federal Register on 09/12/2017 and available online at https://federalregister.gov/d/2017-19258, and on FDsys.gov 4164-01-P DEPARTMENT OF HEALTH AND HUMAN

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

14th AMC Security & Privacy Conference June 12, 2018

14th AMC Security & Privacy Conference June 12, 2018 Emerging Security & Privacy Issues Arising From the Proliferation of Devices in the Health Care Workplace 14th AMC Security & Privacy Conference June 12, 2018 SPEAKERS 2 Robert C. Van Arnam Partner & Chair,

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

Smartphone Applications as Adjuncts to Medical Devices: A Case Study in mhealth Regulation

Smartphone Applications as Adjuncts to Medical Devices: A Case Study in mhealth Regulation The image part with relationship ID rid2 was not found in the file. The image part with relationship ID rid14 was not found in the file. Smartphone Applications as Adjuncts to Medical Devices: A Case Study

More information

10/18/2016. Preparing Your Organization for a HHS OIG Information Security Audit. Models for Risk Assessment

10/18/2016. Preparing Your Organization for a HHS OIG Information Security Audit. Models for Risk Assessment Preparing Your Organization for a HHS OIG Information Security Audit David Holtzman, JD, CIPP/G CynergisTek, Inc. Brian C. Johnson, CPA, CISA HHS OIG Section 1: Models for Risk Assessment Section 2: Preparing

More information

Cyber Risk and Networked Medical Devices

Cyber Risk and Networked Medical Devices Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

A Wireless Identification System to Assist Sight- Constrained People

A Wireless Identification System to Assist Sight- Constrained People A Wireless Identification System to Assist Sight- Constrained People Dec06-06 5 December 2006 Client: Mr. Curtis Chong Iowa Department for the Blind Faculty Advisor: Dr. Zhengdao Wang Team: Jerad Harmsen

More information

The Next Frontier in Medical Device Security

The Next Frontier in Medical Device Security The Next Frontier in Medical Device Security Session #76, February 21, 2017 Denise Anderson, President, NH-ISAC Dr. Dale Nordenberg, Executive Director, MDISS 1 Speaker Introduction Denise Anderson, MBA

More information

How mhealth s Mobile-to-Mobile Platform can be Translated to the Medical Home Model

How mhealth s Mobile-to-Mobile Platform can be Translated to the Medical Home Model How mhealth s Mobile-to-Mobile Platform can be Translated to the Medical Home Model WILLIAM C. THORNBURY, M.D. FAAFP Founder, mevisit Technologies (on all master slides) Disclosure Statement Dr. Thornbury

More information

Introduction to EZ430 RF2500

Introduction to EZ430 RF2500 Michigan State University Introduction to EZ430 RF2500 ECE480 Design Team 8 Daniel Sun 3/17/2015 Introduction The EZ430 RF2500 is an TI product that allows the user to practice real time control programming

More information

The Use of Mobile Phones in Health Care Selected US Army Medical Department Projects and Research Focus

The Use of Mobile Phones in Health Care Selected US Army Medical Department Projects and Research Focus The Use of Mobile Phones in Health Care Selected US Army Medical Department Projects and Research Focus Colonel Ronald Poropatich, MD United States Army Medical Research and Materiel Command (USAMRMC)

More information

An Update on the Activities and Progress of the mhealth Regulatory Coalition Prepared for the 2011 Medical Device Connectivity Conference

An Update on the Activities and Progress of the mhealth Regulatory Coalition Prepared for the 2011 Medical Device Connectivity Conference An Update on the Activities and Progress of the mhealth Regulatory Coalition Prepared for the 2011 Medical Device Connectivity Conference Dane Stout The Anson Group September 8, 2011 MRC Background Formed

More information

Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules. David Bodenheimer Evan Wolff Kate Growley

Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules. David Bodenheimer Evan Wolff Kate Growley Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules David Bodenheimer Evan Wolff Kate Growley Regulating Information The Internet of Things: Peering into the Future Cybersecurity

More information

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA Preventing the Unthinkable: Issues in MedTech Cyber Security Trends and Policies MassMEDIC Cambridge, Mass Thursday Oct 1, 2015 Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations &

More information

HIPAA Your Privacy Rights

HIPAA Your Privacy Rights This Notice Describes How Medical Information About You May Be Used And Disclosed And How You Can Get Access To This Information. Please Review It Carefully. PASS of Atlanta is required by law to keep

More information

Mobile Health (mhealth) Applications in a Health Care Environment

Mobile Health (mhealth) Applications in a Health Care Environment Mobile Health (mhealth) Applications in a Health Care Environment Brandon Goulter, Facility Compliance Professional Steven Baruch, Senior Compliance Director Agenda Overview of Mobile Health Applications

More information

2015 Annual Convention

2015 Annual Convention 2015 Annual Convention Date: Saturday, October 10, 2015 Time: 8:00 am 9:00 am Location: Gaylord National Harbor Resort and Convention Center, Chesapeake 7/8/9 Title: Activity Type: Speaker: Mobile Health

More information

The MovingLife Project

The MovingLife Project The MovingLife Project MObile ehealth for the VINdication of Global LIFEstyle change and disease management solutions Stakeholders Conference The MovingLife Roadmaps Brussels 18 April 2013 Alessio Gugliotta

More information

April 28, Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers Lane, Room 1061 Rockville, MD 20852

April 28, Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers Lane, Room 1061 Rockville, MD 20852 701 Pennsylvania Avenue, NW Suite 800 Washington, D.C. 20004 2654 Tel: 202 783 8700 Fax: 202 783 8750 www.advamed.org Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers

More information

Development of a Process Assessment Model for Assessing Security of IT Networks Incorporating Medical Devices against ISO/IEC

Development of a Process Assessment Model for Assessing Security of IT Networks Incorporating Medical Devices against ISO/IEC Development of a Process Assessment Model for Assessing Security of IT Networks Incorporating Medical Devices against ISO/IEC 15026-4 Anita Finnegan, Fergal Mc Caffery and Gerry Coleman Regulated Software

More information

Compliance. TODAY August Creative passion, collaboration, and soft skills in Compliance

Compliance. TODAY August Creative passion, collaboration, and soft skills in Compliance Compliance TODAY August 2016 A PUBLICATION OF THE HEALTH CARE COMPLIANCE ASSOCIATION WWW.HCCA-INFO.ORG Creative passion, collaboration, and soft skills in Compliance an interview with Walter E. Johnson

More information

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018

Celebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018 Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more

More information

Withdrawal of Notice of Intent to Temporarily Place Mitragynine and 7- AGENCY: Drug Enforcement Administration, Department of Justice

Withdrawal of Notice of Intent to Temporarily Place Mitragynine and 7- AGENCY: Drug Enforcement Administration, Department of Justice This document is scheduled to be published in the Federal Register on 10/13/2016 and available online at https://federalregister.gov/d/2016-24659, and on FDsys.gov Billing Code 4410-09-P DEPARTMENT OF

More information

Emerging Challenges in mhealth: Keeping Information Safe & Secure HCCA CI Web Hull Privacy, Data Protection, & Compliance Advisor

Emerging Challenges in mhealth: Keeping Information Safe & Secure HCCA CI Web Hull Privacy, Data Protection, & Compliance Advisor Emerging Challenges in mhealth: Keeping Information Safe & Secure HCCA CI 2016 Web Hull Privacy, Data Protection, & Compliance Advisor Web.Hull@icloud.com 1 Topics 1. mhealth Challenges & Landscape 2.

More information

Topics 4/11/2016. Emerging Challenges in mhealth: Keeping Information Safe & Secure. Here s the challenge It s just the beginning of mhealth

Topics 4/11/2016. Emerging Challenges in mhealth: Keeping Information Safe & Secure. Here s the challenge It s just the beginning of mhealth Emerging Challenges in mhealth: Keeping Information Safe & Secure HCCA CI 2016 Web Hull Privacy, Data Protection, & Compliance Advisor Web.Hull@icloud.com 1 Topics 1. mhealth Challenges & Landscape 2.

More information

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:

HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By: HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Created By: Overview The purpose of this presentation is to emphasize the importance of security when using HMIS. Client information

More information

Leading Innovation in Health Care Delivery

Leading Innovation in Health Care Delivery Leading Innovation in Health Care Delivery Presented by: Chris Trimble Adjunct Professor Dartmouth College 2015: Chris Trimble. These slides may be freely distributed, with this copyright notice, so long

More information

Medical Device Cybersecurity A Marriage of Safety and Security

Medical Device Cybersecurity A Marriage of Safety and Security Medical Device Cybersecurity A Marriage of Safety and Security 121 st AFDO Annual Education Conference Medical Devices Track June 20 th, 2017 By: Armin Torres, Principal Consultant 1 Cyber Security Overview

More information

Apr. 10, Vulnerability disclosure and handling processes strengthen security programs

Apr. 10, Vulnerability disclosure and handling processes strengthen security programs Joint Comments on "Framework for Improving Critical Infrastructure Cybersecurity" version 1.1 Before the National Institute of Standards and Technology Apr. 10, 2017 We the undersigned companies, civil

More information

Niccolo Machiavelli (1523)

Niccolo Machiavelli (1523) Nothing is more difficult to undertake, more perilous to conduct or more uncertain in its outcome, than to take the lead in introducing a new order of things. For the innovator has for enemies all those

More information

Computer-aided Pre-clinical Trials for Implantable Medical Devices: Test Automation Platform

Computer-aided Pre-clinical Trials for Implantable Medical Devices: Test Automation Platform Computer-aided Pre-clinical Trials for Implantable Medical Devices: Test Automation Platform NSF Summer Undergraduate Fellowship in Sensor Technologies Kevin Volkel, Sunfest Fellow (Electrical Engineering)

More information

My Heart Skips a Beat Increased Cybersecurity and Issues with Implanted Medical Devices

My Heart Skips a Beat Increased Cybersecurity and Issues with Implanted Medical Devices My Heart Skips a Beat Increased Cybersecurity and Issues with Implanted Medical Devices Mary R. Topfer Jacqueline Cavallaro Harris Beach PLLC 100 Wall Street New York, NY 10005 MTopfer@harrisbeach.com

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

E-santé mentale: définitions, enjeux, expériences Paris, 13 Juin 2017

E-santé mentale: définitions, enjeux, expériences Paris, 13 Juin 2017 E-santé mentale: définitions, enjeux, expériences Paris, 13 Juin 2017 Questions éthiques en e-santé mentale Kyriaki G. Giota, Chercheuse en psychologie Université de Thessaly, Grèce Dr. Kyriaki Giota,

More information

3/3/2017. Medical device security The transition from patient privacy to patient safety. Scott Erven. Who i am. What we ll be covering today

3/3/2017. Medical device security The transition from patient privacy to patient safety. Scott Erven. Who i am. What we ll be covering today www.pwc.com Medical device security The transition from patient privacy to patient safety Scott Erven Who i am Scott Erven - Managing Director Healthcare Industries Advisory Cybersecurity & Privacy Medical

More information

Use by permission DAN LOHRMANN, CHIEF STRATEGIST & CSO SECURITY MENTOR, INC. SEPTEMBER 6, 2017

Use by permission DAN LOHRMANN, CHIEF STRATEGIST & CSO SECURITY MENTOR, INC. SEPTEMBER 6, 2017 DAN LOHRMANN, CHIEF STRATEGIST & CSO SECURITY MENTOR, INC. SEPTEMBER 6, 2017 WHAT S ON THE AGENDA... INTRO ON CULTURE CYBER THREAT TRENDS GLOBAL CHALLENGE IOT + OTHER REGULATIONS COMING THREE STORIES HOW

More information

Cybersecurity for Medical Device Manufacturers: Ensuring Safety and Functionality

Cybersecurity for Medical Device Manufacturers: Ensuring Safety and Functionality Cybersecurity for Medical Device Manufacturers: Ensuring Safety and Functionality Fubin Wu and Sherman Eagles The need for effective cybersecurity to ensure safety and functionality of networks used for

More information

Medical device security The transition from patient privacy to patient safety

Medical device security The transition from patient privacy to patient safety www.pwc.com Medical device security The transition from patient privacy to patient safety Scott Erven Who i am Scott Erven - Managing Director Healthcare Industries Advisory Cybersecurity & Privacy Medical

More information

Certification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption

Certification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption Certification Commission for Healthcare Information Technology CCHIT A Catalyst for EHR Adoption Alisa Ray, Executive Director, CCHIT Sarah Corley, MD, Chief Medical Officer, NextGen Healthcare Systems;

More information

Off-label unsolicited requests How to respond?

Off-label unsolicited requests How to respond? Off-label unsolicited requests How to Due to the rapid growth of the internet and social media tools, it is easier for both consumers and healthcare professionals to quickly seek information about medical

More information

WIRELESS MOBILE MEDICAL DEVICES

WIRELESS MOBILE MEDICAL DEVICES Abstract WIRELESS MOBILE MEDICAL DEVICES Rapid developments in wireless technologies have ushered in a new era of medical devices that are improving patient quality-of-life and lowering costs for both

More information

Clinical and ICT Cybersecurity Overview and Cases A242-3

Clinical and ICT Cybersecurity Overview and Cases A242-3 Clinical and ICT Cybersecurity Overview and Cases A242-3 Elliot B. Sloane, PhD, CCE - Elected Fellow of ACCE, AIMBE, and HIMSS President and Founder Center for Healthcare Information Research and Policy,

More information

Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats

Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats May 20, 2015 Georgetown University Law Center Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats Robert S. Metzger Rogers Joseph

More information

WITS 2017 Panel Discussion: Government Academia Collaboration

WITS 2017 Panel Discussion: Government Academia Collaboration WITS 2017 Panel Discussion: Government Academia Collaboration Panelists: Sudip Bhattacharjee, University of Connecticut Paul Pavlou, Temple University Sudha Ram, University of Arizona Ritu Agrawal, University

More information

Embedded Systems. Cristian Rotariu

Embedded Systems. Cristian Rotariu Embedded Systems Cristian Rotariu Dept. of of Biomedical Sciences Grigore T Popa University of Medicine and Pharmacy of Iasi, Romania cristian.rotariu@bioinginerie.ro May 2016 Introduction An embedded

More information

Continuity of Care Document Redesign

Continuity of Care Document Redesign Continuity of Care Document Redesign Submitted to the Office of the National Coordinator for Health Information Technology via healthdesign.challenge.gov Created by Jeff Flahaven, Senior UX Designer 12/1/2012

More information

HIPAA Highlights and Impact to your Telehealth Program. Wednesday, Sept 27, 2017

HIPAA Highlights and Impact to your Telehealth Program. Wednesday, Sept 27, 2017 HIPAA Highlights and Impact to your Telehealth Program Wednesday, Sept 27, 2017 Susan Clarke, HCISPP (ISC) 2 certified Healthcare Information Security and Privacy Practitioner. 15+ years of Healthcare

More information

Privacy and Security in the Age of Meaningful Use

Privacy and Security in the Age of Meaningful Use Privacy and Security in the Age of Meaningful Use David S. Finn Health IT Officer Lewis Etheridge Principal Systems Engineer, Symantec Healthcare Privacy & Security in the Age of Meaningful Use SYMANTEC

More information

Modeling Factors Associated with Healthcare Data Breaches. Session #155, March 3, 2018 Dr. Alex McLeod, Dr. Diane Dolezel, Texas State University

Modeling Factors Associated with Healthcare Data Breaches. Session #155, March 3, 2018 Dr. Alex McLeod, Dr. Diane Dolezel, Texas State University Modeling Factors Associated with Healthcare Data Breaches Session #155, March 3, 2018 Dr. Alex McLeod, Dr. Diane Dolezel, Texas State University 1 Conflict of Interest Alex McLeod, PhD Diane, Dolezel,

More information

The Shape of Things to Come Medical Devices and The Internet of Things (IoT)

The Shape of Things to Come Medical Devices and The Internet of Things (IoT) The Shape of Things to Come Medical Devices and The Internet of Things (IoT) SLA Pharmaceutical & Health Technology Division Annual Spring Meeting 2017 Susan Z Keckler Senior Manager Medical Communications

More information

POSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS

POSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS POSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, 2017 14TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS 1 Fact vs. Myth Let s Play: Fact vs. Myth The FDA is the federal entity

More information

Important Medical Device Advisory

Important Medical Device Advisory Important Medical Device Advisory Battery Performance Alert and Cybersecurity Firmware Updates for Certain ICD & CRT-D Devices April 16, 2018 Dear Doctor, As part of a planned series of system updates

More information

Designated Cyber Security Protection Solution for Medical Devices

Designated Cyber Security Protection Solution for Medical Devices Designated Cyber Security Protection Solution for Medical s The Challenge Types of Cyber Attacks Against In recent years, cyber threats have become Medical s increasingly sophisticated in terms of attack

More information

Configuring LATITUDE NXT Wave Communicators. Bottom View

Configuring LATITUDE NXT Wave Communicators. Bottom View A Closer Look SUMMARY Boston Scientific s LATITUDE NXT Patient Management System enables a clinician to periodically monitor patient and device information remotely via a LATITUDE NXT Wave Communicator

More information

A Brief Chronology of Medical Device Security

A Brief Chronology of Medical Device Security A Brief Chronology of Medical Device Security DOI:10.1145/2890488 With the implantation of software-driven devices comes unique privacy and security threats to the human body. BY A.J. BURNS, M. ERIC JOHNSON,

More information

HIPAA Risk Assessment: Been There... Should ve Done It the First Time

HIPAA Risk Assessment: Been There... Should ve Done It the First Time HIPAA Risk Assessment: Been There... Should ve Done It the First Time April 20 & 21, 2012 David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec 1 Agenda 1 2 3 4 5 A little background... Well, a

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

HITRUST Common Security Framework - Are you prepared?

HITRUST Common Security Framework - Are you prepared? ALLINIAL HITRUST Common Security Framework - Are you prepared? Michael Kanarellis, HITRUST CCSFP May 17, 2017 MEMBER OF PKF ALLINIAL NORTH GLOBAL, AMERICA, AN ASSOCIATION AN OF LEGALLY OF LEGALLY INDEPENDENT

More information

Escalated Threats to PHI Require a New Approach to Privacy and Security Wednesday, March 2, 2016

Escalated Threats to PHI Require a New Approach to Privacy and Security Wednesday, March 2, 2016 Escalated Threats to PHI Require a New Approach to Privacy and Security Wednesday, March 2, 2016 Kurt J. Long, CEO & Founder, FairWarning, Inc. Robert Rost, IT Operations Director of Defensive Services,

More information

Internet of Things. Reply. Sept 2015

Internet of Things. Reply. Sept 2015 Internet of Things Reply Sept 2015 2 IoT Definition A network of networks of uniquely identifiable end points (or things) that communicate without human interaction (by either wired or wireless access)

More information

Information Governance, the Next Evolution of Privacy and Security

Information Governance, the Next Evolution of Privacy and Security Information Governance, the Next Evolution of Privacy and Security Katherine Downing, MA, RHIA, CHPS, PMP Sr. Director AHIMA IG Advisors Follow me @HIPAAQueen 2017 2017 Objectives Part Part I IG Topic

More information

Running head: Personal Medical Devices 1. Personal Medical Devices. Ann Funk. East Carolina University

Running head: Personal Medical Devices 1. Personal Medical Devices. Ann Funk. East Carolina University Running head: Personal Medical Devices 1 Personal Medical Devices Ann Funk East Carolina University Personal Medical Devices 2 ABSTRACT Technology in any field has been growing at a rapid pace, but one

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

EuroRec Functional Statements Repository. EHR-QTN Workshop Vilnius, January 26, 2011 Dr. Jos Devlies, Belgium

EuroRec Functional Statements Repository. EHR-QTN Workshop Vilnius, January 26, 2011 Dr. Jos Devlies, Belgium EuroRec Functional Statements Repository EHR-QTN Workshop Vilnius, January 26, 2011 Dr. Jos Devlies, Belgium Health IT has a great potential To increase efficiency of care by Reducing useless and duplicated

More information

Research Report. Radio Frequency Identification Devices (RFIDs) Effect of RFIDs on lifesaving equipment

Research Report. Radio Frequency Identification Devices (RFIDs) Effect of RFIDs on lifesaving equipment Research Report Radio Frequency Identification Devices (RFIDs) Effect of RFIDs on lifesaving equipment Background It has been suggested in the Journal of the Medical Association that lifesaving equipment

More information

Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014

Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014 Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014 Welcome! Thank you for joining us today. In today s call we ll cover the Security Assessment and next steps. If you want

More information

ICT Supply Chain Risk Management Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist

ICT Supply Chain Risk Management Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist ICT Supply Chain Risk Management Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist What is ICT Supply Chain Risk Management? Information and Communication Technology (ICT) products are assembled,

More information

Mobile Health and Remote Monitoring in the Pharmacy

Mobile Health and Remote Monitoring in the Pharmacy Mobile Health and Remote Monitoring in the Pharmacy JOEY MAT TINGLY, PHARMD, MBA Speaker Contact and Disclosure Joey Mattingly, PharmD, MBA Assistant Professor Department of Pharmacy Practice & Science

More information

Is Your Compliance Strategy Putting Your Business at Risk?

Is Your Compliance Strategy Putting Your Business at Risk? Is Your Compliance Strategy Putting Your Business at Risk? January 20, 2015 2015 NASDAQ-LISTED: EGHT Today s Speakers Michael McAlpen Exec. Dir. of Security & Compliance, 8x8, Inc. David Leach Business

More information

SpectraPulse Ultra Wideband Wireless Microphone System

SpectraPulse Ultra Wideband Wireless Microphone System SpectraPulse Ultra Wideband Wireless Microphone System Wireless XLR Desk Stand Set-up and Operation 2 3 This device complies with Part 15 of the FCC rules. Operation is subject to the following conditions:

More information

Security of Safety-Critical Devices

Security of Safety-Critical Devices 1 Security of Safety-Critical Devices Frankie Catota and Adam Durity April 8, 2014 Outline Introduction Medical devices Risks Defense Approaches Perception Vehicle safety Other safety-critical areas Economics

More information

Implementing and Enforcing the HIPAA Security Rule

Implementing and Enforcing the HIPAA Security Rule Implementing and Enforcing the HIPAA Security Rule John Parmigiani National Practice Director Regulatory and Compliance Services CTG HealthCare Solutions, Inc. Introductions Final Security Rule How we

More information