iTnews
  • Home
  • News
  • Technology
  • Security

ADHA drafts new security standards for My Health Record interconnection

By Ry Crozier
Dec 21 2022 9:15AM

Software vendors have up to 24 months to make changes.

Systems that interconnect with the government’s My Health Record will need to meet elevated security standards that align with the Essential Eight over the next two years.

ADHA drafts new security standards for My Health Record interconnection

The Australian Digital Health Agency (ADHA) said in a statement late Tuesday that it would introduce a new - mandatory - security requirements “conformance profile” for clinical software vendors.

“All clinical information systems that use one or more My Health Record B2B web services will need to conform to the new security profile,” the agency said in accompanying release notes.

"The agency is cognisant of the inherent cyber security risks posed by systems connected to and accessing the My Health Record system, as well as potentially vulnerable aspects of the national infrastructure and all services under its care.

"To address this risk, a set of security requirements for systems connecting to the My Health Record system have been identified, comprising controls related to application development and web development, with controls aligned to the Australian Cyber Security Centre’s (ACSC) Essential Eight maturity model.

"These controls are selected as the areas of the ACSC Information Security Manual (ISM) that are most relevant to the development of software for healthcare organisations."

The conformance profile is currently in draft, pending industry feedback. Full details are behind a login, accessible to industry participants only.

Although it becomes “effective from April 2023”, implementation will be phased across five tranches and two years, with most clinical software vendors having 18-to-24 months to complete the necessary rework and upgrades on their end.

Tranche one vendors - those making systems used in acute care, which covers hospitals, emergency and the like - have six-to-12 months to make changes.

“Software vendors with clinical software products will be supported to implement changes in their products in a phased approach, to balance the need to strengthen security for all systems connected to My Health Record with the capability of software vendors to make necessary adjustments in a timely manner,” ADHA said.

“The new security requirements profile contains an evidence-based list of security requirements that harden clinical information systems from cyber security attacks, uplift information security and provide better protection for consumer information. 

“Each vendor with software products connected to My Health Record will be required to submit an extensive file of evidence to demonstrate conformance to each requirement, as well as participate in an observation session conducted by the [ADHA] specialist team.”

ADHA’s acting chief digital officer, Dr. Holger Kaufmann said in a statement that “protecting sensitive information is essential in the provision of healthcare services".

"[It] is a fundamental capability that is required to enable connected healthcare systems and safe, seamless, secure, and confidential information sharing across all healthcare providers," Kaufmann said.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
adhahealthitsecuritysoftware

Related Articles

  • NAB retires its Tableau environment NAB retires its Tableau environment
  • Nine's web app protection blocked 96m bad requests in 2024 Olympics Nine's web app protection blocked 96m bad requests in 2024 Olympics
  • News Corp would lose US$9 million by ditching Google ads News Corp would lose US$9 million by ditching Google ads
  • James Cook University accelerates digital roadmap and cyber uplift James Cook University accelerates digital roadmap and cyber uplift

Partner Content

Kyocera hub
Kyocera hub
Dual Challenge: Securing Modern Enterprises While Enabling Remote Work
Partner Content Dual Challenge: Securing Modern Enterprises While Enabling Remote Work
Why maintaining older hardware is the smart economic decision
Partner Content Why maintaining older hardware is the smart economic decision
Securing Modern Enterprise: IT Leaders Address Third-Party Risk Management
Partner Content Securing Modern Enterprise: IT Leaders Address Third-Party Risk Management

Sponsored Whitepapers

Redefining Vulnerability Management
Redefining Vulnerability Management
How JLL gained visibility into nearly 100K endpoints with Tanium
How JLL gained visibility into nearly 100K endpoints with Tanium
Why a holistic approach to managing risk is key to solving complex IT problems
Why a holistic approach to managing risk is key to solving complex IT problems
High Availability: The Foundation of Digital Transformation
High Availability: The Foundation of Digital Transformation
Nine Ways To Prepare Your Database for a High-Traffic Event
Nine Ways To Prepare Your Database for a High-Traffic Event
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

BoM's seven-year technology transformation cost $866m

BoM's seven-year technology transformation cost $866m

Medibank allegedly missed EDR alerts before data breach

Medibank allegedly missed EDR alerts before data breach

James Cook University accelerates digital roadmap and cyber uplift

James Cook University accelerates digital roadmap and cyber uplift

ANZ joins NAB and CBA on ConnectID

ANZ joins NAB and CBA on ConnectID

Digital Nation

State of Security 2023
State of Security 2023
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.