Comment on FR Doc # N/A

Document ID: HHS-OS-2013-0003-0002
Document Type: Public Submission
Agency: Department Of Health And Human Services
Received Date: June 05 2013, at 12:11 PM Eastern Daylight Time
Date Posted: June 19 2013, at 12:00 AM Eastern Standard Time
Comment Start Date: June 3 2013, at 12:00 AM Eastern Standard Time
Comment Due Date: August 31 2013, at 11:59 PM Eastern Standard Time
Tracking Number: 1jx-85qg-b43i
View Document:  View as format xml

View Comment

In response to "What types of health IT should be addressed by the report developed by FDA, ONC, and FCC?": 1. All healthcare systems and devices which communicate over any communication channel (wired or wireless). 2. The methodologies used to evaluate vulnerabilities in the systems and devices from a functional and non-functional perspective. 3. The qualifications of the personnel the manufacturers, integrators, and end users of systems and devices use to determine the vulnerabilities found in the systems and devices. 4. The qualifications of the personnel the manufacturers, integrators, and end users of systems and devices use to determine the design criteria for securing the systems and devices. In response to "What are the risks to patient safety posed by health IT and what is the likelihood of these risks?": 1. Any device which communicates over a wired or wireless channel poses a risk (equivalent to 100%) that either a malicious actor or curious explorer will access and potentially cause harm to the patient it is being used on. In response to "What factors or approaches could be included in a risk-based regulatory approach for health IT to promote innovation and protect patient safety?": 1. A thorough vulnerability assessment which includes the following: a. Fuzz testing of all communication protocols b. Hardware security analysis c. Factory Acceptance Testing d. Interoperability Testing e. Sight Acceptance Testing f. Code signing of all binaries used in medical devices g. Failure mode effects of fuzz testing and fault injections It is extremely important to note that most design processes focus on testing of functional requirements. Most vulnerabilities discovered are the result of non-functional use (or negative testing) of devices. Most medical manufacturers and end users are not equipped with tools to perform these types of tests. Other industries perform such tests as a normal part of development, using COTS tools and software.

Related Comments

    View All
Total: 14
Comment on FR Doc # N/A
Public Submission    Posted: 06/19/2013     ID: HHS-OS-2013-0003-0002

Aug 31,2013 11:59 PM ET
Comment on FR Doc # 2013-12817
Public Submission    Posted: 06/30/2013     ID: HHS-OS-2013-0003-0009

Aug 31,2013 11:59 PM ET
Comment on FR Doc # 2013-12817
Public Submission    Posted: 06/30/2013     ID: HHS-OS-2013-0003-0004

Aug 31,2013 11:59 PM ET
Comment on FR Doc # 2013-12817
Public Submission    Posted: 06/30/2013     ID: HHS-OS-2013-0003-0006

Aug 31,2013 11:59 PM ET
Comment on FR Doc # 2013-12817
Public Submission    Posted: 06/30/2013     ID: HHS-OS-2013-0003-0008

Aug 31,2013 11:59 PM ET