ISO 27799 Updated

ISO 27799, “Health informatics – Information security management in health using ISO/IEC 27002,” has just been updated.  The new 2nd Edition is a technical revision of the 1st Edition, so your copy of the older standard is now out-of-date (withdrawn and replaced by the 2nd Edition).  This important standard shows you how to protect the confidentiality, integrity and availability of personal health care information.  It should be used by those of you who are responsible for overseeing such information, especially with regards to security of this data.  This can include those of you in the roles of security advisors, consultants, auditors, vendors and other third part providers as well.

The ISO 27766 has been built upon the foundation provided by ISO/IEC 27002 (“Information technology – Security techniques – Code of practice for information security controls”).  But the 27766 particularly addresses those aspects of data security found in the health care environment.  Since healthcare records have the conflicting requirements for both patient confidentiality and for accessibility by a number of organizations, particular care needs to be taken.  And of course, record integrity is essential as well.

The ISO 27766 is a flexible standard, intended to be use in a variety of contexts.  The authors considered that many EHR (Electronic health record) implementations are made in situations where the health professional works as a solo health care provider or in a small clinic.  So the range of preferred security measures has been made scalable in order to give guidance in the many situations where this type of data is both generated and used.

It is a lengthy publication (112 pages in total).  It provides guidance on 14 security control clauses, 35 main security categories and 114 controls as specified in ISO/IEC 27002.  Attention is given to health-specific control, implementation guidance and other information.  These include information security policies, human resource security, access control, physical and environmental security and operations security.  Compliance and incident management are also addressed.  Three informative annexes are part of the document.  They cover threats to health information security, practical action plan for implementing security in healthcare, and a checklist for conformance to ISO 27799.  A 39-item bibliography completes the standard.

Now to get your copy of the new 2nd Edition.  You’ll use an authorized ISO distributor like Document Center Inc.  Head to our webstore www.document-center.com to search for and order one of the over 1 million standards in our database.  Here’s a link to the order page for ISO 27799 for your convenience.

You may have additional questions or want to work with one of our staff members in order to place your order.  Feel free to contact us by phone (650-591-7600) or email (info@document-center.com) with any standards issues you may have.  We’ve been working with standards since 1982.  So make us your Standards Experts!

New ISO/IEC 27000 2012 Edition covers Information Technology – Security Techniques – Information Security Management Systems – Overview And Vocabulary

ISO/IEC 27000 2nd Edition, “Information Technology – Security Techniques – Information Security Management Systems – Overview And Vocabulary,” has just been released and is available in paper and pdf format from Document Center Inc.  The standard provides an overview of information security management systems and defines related terms.  It is applicable to all kinds of organizations (for example: commercial enterprises, government agencies, and not-for-profit associations).

This 32-page second edition cancels and replaces the first edition (ISO/IEC 27000:2009).  The standard has been adopted directly by some European countries (see: BS ISO/IEC 27000 for the British edition), but not by the European Union (EN) as a whole at this time.

The standard is the first in the the Information Security Management System (ISMS) family of standards.  The series is intended to help organizations manage the security of their information assets including financial information, intellectual property, employee details, and customer information.

Here’s a list of the set:

  • ISO/IEC 27000:2012, Information security management systems — Overview and vocabulary
  • ISO/IEC 27001:2005, Information security management systems — Requirements
  • ISO/IEC 27002:2005, Code of practice for information security management
  • ISO/IEC 27003:2010, Information security management system implementation guidance
  • ISO/IEC 27004:2009, Information security management — Measurement
  • ISO/IEC 27005:2011, Information security risk management
  • ISO/IEC 27006:2011, Requirements for bodies providing audit and certification of information security management systems
  • ISO/IEC 27007:2011, Guidelines for information security management systems auditing
  • ISO/IEC TR 27008:2011, Guidelines for auditors on information security management systems controls
  • ISO/IEC 27010:2012, Information security management guidelines for inter-sector and inter-organisational communications
  • ISO/IEC 27011:2008, Information security management guidelines for telecommunications organisations based on ISO/IEC 27002
  • ISO/IEC TR 27015:2012, Information security management guidelines for financial services
  • ISO 27799:2008, Health informatics — Information security management in health using ISO/IEC 27002

FYI:  ISO/IEC 27000, Figure 1, ISMS Family of Standards Relationships, provides an overview of the hierarchy for this series.  Additional standards are under development as well.

All current ISO, ISO/IEC and IEC standards (as well as many obsolete editions) are available at our webstore, www.document-center.com.  Or contact us by phone (650-591-7600), fax (650-591-7617) or email (info@document-center.com).  Territorial restrictions apply to these standards due to the national member revenue requirements of these international organizations.