BS ISO 22857:2013:2014 Edition
$198.66
Health informatics. Guidelines on data protection to facilitate transborder flows of personal health data
Published By | Publication Date | Number of Pages |
BSI | 2014 | 70 |
This International Standard provides guidance on data protection requirements to facilitate the transfer of personal health data across national or jurisdictional borders.
It does not require the harmonization of existing national or jurisdictional standards, legislation or regulations. It is normative only in respect of international or trans-jurisdictional exchange of personal health data. However it can be informative with respect to the protection of health information within national/jurisdictional boundaries and provide assistance to national or jurisdictional bodies involved in the development and implementation of data protection principles.
This International Standard covers both the data protection principles that apply to international or trans-jurisdictional transfers and the security policy which an organization adopts to ensure compliance with those principles.
Where a multilateral treaty between a number of countries has been agreed (e.g. the EU Data Protection Directive), the terms of that treaty will take precedence.
This International Standard aims to facilitate international and trans-jurisdictional health-related applications involving the transfer of personal health data. It seeks to provide the means by which health data relating to data subjects, such as patients, will be adequately protected when sent to, and processed in, another country/jurisdiction.
This International Standard does not provide definitive legal advice but comprises guidance. When applying the guidance to a particular application, legal advice appropriate to that application can be sought.
National privacy and data protection requirements vary substantially and can change relatively quickly. Whereas this International Standard in general encompasses the more stringent of international and national requirements it nevertheless comprises a minimum. Some countries/jurisdictions may have some more stringent and particular requirements.
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | Foreword |
8 | Introduction |
11 | Section sec_1 Section sec_2 Section sec_3 Section sec_3.1 Section sec_3.2 1 Scope 2 Normative references 3 Terms and definitions |
12 | Section sec_3.3 Section sec_3.4 Section sec_3.5 Section sec_3.6 Section sec_3.7 Section sec_3.8 Section sec_3.9 Section sec_3.10 Section sec_3.11 Section sec_3.12 Section sec_3.13 Section sec_3.14 Section sec_3.15 |
13 | Section sec_3.16 Section sec_4 Section sec_5 Section sec_6 Section sec_6.1 4 Abbreviated terms 5 Structure of this International Standard 6 General principles and roles 6.1 General principles |
14 | Section sec_6.2 Section sec_6.2.1 Section sec_6.2.2 Section sec_7 Section sec_7.1 6.2 Roles 7 Legitimising data transfer 7.1 The concept of “adequate” data protection |
15 | Section sec_7.2 Section sec_7.2.1 Section sec_7.2.2 7.2 Conditions for legitimate transfer |
16 | Section sec_8 Section sec_8.1 Section sec_8.2 Section sec_8.2.1 Section sec_8.2.2 8 Criteria for ensuring adequate data protection with respect to the transfer of personal health data 8.1 The requirement for adequate data protection 8.2 Content principles |
17 | Section sec_8.2.3 Section sec_8.2.4 Section sec_8.2.5 |
18 | Section sec_8.2.6 Section sec_8.2.7 Section sec_8.2.8 |
19 | Section sec_8.3 Section sec_8.3.1 Section sec_8.3.2 8.3 Procedural/enforcement mechanisms |
20 | Section sec_8.3.3 Section sec_8.3.4 Section sec_8.4 8.4 Contracts |
21 | Section sec_8.5 Section sec_8.6 Section sec_8.6.1 Section sec_8.6.2 8.5 Overriding laws 8.6 Anonymisation |
22 | Section sec_8.7 Section sec_9 Section sec_9.1 Section sec_9.2 8.7 Legitimacy of consent 9 Security policy 9.1 General 9.2 The purpose of the security policy |
23 | Section sec_9.3 Section sec_9.4 Section sec_9.4.1 Figure fig_1 Section sec_9.4.2 9.3 The “level” of security policy 9.4 High Level Security Policy: general aspects |
24 | Section sec_9.4.3 Section sec_9.4.4 Section sec_9.4.5 Section sec_9.4.6 Section sec_10 Section sec_10.1 Section sec_10.1.1 Section sec_10.1.2 10 High Level Security Policy: the content 10.1 Principle One: overriding generic principle |
25 | Section sec_10.1.3 Section sec_10.1.4 Section sec_10.1.5 Section sec_10.2 Section sec_10.2.1 Section sec_10.2.2 Section sec_10.2.3 Section sec_10.2.4 Section sec_10.2.5 Section sec_10.2.6 10.2 Principle Two: chief executive support |
26 | Section sec_10.3 Section sec_10.3.1 Section sec_10.3.2 Section sec_10.3.3 Section sec_10.3.4 Section sec_10.4 Section sec_10.4.1 Section sec_10.4.2 Section sec_10.4.3 Section sec_10.4.4 Section sec_10.4.5 10.3 Principle Three: documentation of measures and review 10.4 Principle Four: Data protection security officer |
27 | Section sec_10.4.6 Section sec_10.5 Section sec_10.5.1 Section sec_10.5.2 Section sec_10.5.3 Section sec_10.5.4 Section sec_10.5.5 Section sec_10.5.6 10.5 Principle Five: permission to process |
28 | Section sec_10.5.7 Section sec_10.6 Section sec_10.6.1 Section sec_10.6.2 Section sec_10.6.3 Section sec_10.6.4 Section sec_10.6.5 Section sec_10.6.6 Section sec_10.6.7 Section sec_10.6.8 10.6 Principle Six: information about processing |
29 | Section sec_10.6.9 Section sec_10.6.10 Section sec_10.6.11 Section sec_10.6.12 Section sec_10.6.13 |
30 | Section sec_10.6.14 Section sec_10.7 Section sec_10.7.1 Section sec_10.7.2 Section sec_10.7.3 Section sec_10.8 Section sec_10.8.1 Section sec_10.8.2 Section sec_10.8.3 Section sec_10.8.4 10.7 Principle Seven: information for the data subject 10.8 Principle Eight: prohibition of onward data transfer without consent |
31 | Section sec_10.8.5 Section sec_10.8.6 Section sec_10.9 Section sec_10.9.1 Section sec_10.9.2 Section sec_10.9.3 Section sec_10.9.4 Section sec_10.9.5 10.9 Principle Nine: remedies and compensation |
32 | Section sec_10.10 Section sec_10.10.1 Section sec_10.10.2 Section sec_10.10.3 Section sec_10.10.4 Section sec_10.10.5 Section sec_10.10.6 Section sec_10.10.7 Section sec_10.10.8 Section sec_10.10.9 Section sec_10.10.10 10.10 Principle Ten: security of processing |
33 | Section sec_10.10.11 Section sec_10.10.12 Section sec_10.10.13 Section sec_10.10.14 Section sec_10.11 Section sec_10.11.1 Section sec_10.11.2 Section sec_10.11.3 Section sec_10.11.4 Section sec_10.11.5 Section sec_10.11.6 10.11 Principle Eleven: responsibilities of staff and other contractors |
34 | Section sec_11 Section sec_11.1 Section sec_11.2 Section sec_11.3 11 Rationale and observations on measures to support Principle Ten concerning security of processing 11.1 General 11.2 Encryption and digital signatures for transmission to the data importer 11.3 Access controls and user authentication |
35 | Section sec_11.4 Section sec_11.5 Section sec_11.6 Section sec_11.7 Section sec_11.8 Section sec_11.9 11.4 Audit trails 11.5 Physical and environmental security 11.6 Application management and network management 11.7 Malicious software 11.8 Breaches of security 11.9 Business continuity plan |
36 | Section sec_11.10 Section sec_11.11 Section sec_12 11.10 Handling very sensitive data 11.11 Standards 12 Personal health data in non-electronic form |
37 | Annex sec_A Annex sec_A.1 Annex sec_A.1.1 Annex sec_A.1.2 Annex sec_A.1.3 Annex sec_A.1.4 Annex A (informative) Key primary international documents on data protection |
38 | Annex sec_A.1.5 Annex sec_A.1.6 |
39 | Annex sec_A.1.7 Annex sec_A.1.8 Annex sec_A.1.9 Annex sec_A.2 |
40 | Annex sec_A.3 |
41 | Annex sec_A.4 Annex sec_A.4.1 Annex sec_A.4.2 Annex sec_A.4.3 |
42 | Annex sec_B Annex sec_B.1 Annex sec_B.2 Annex B (informative) National documented requirements and legal provisions in a range of countries |
44 | Annex sec_B.3 |
45 | Annex sec_B.4 Annex sec_B.5 Annex sec_B.6 |
46 | Annex sec_B.7 |
47 | Annex sec_C Annex sec_C.1 Annex sec_C.2 Annex sec_C.3 Annex sec_C.4 Annex C (informative) Exemplar contract clauses: Controller to controller |
54 | Annex sec_D Annex sec_D.1 Annex sec_D.2 Annex sec_D.3 Annex D (informative) Exemplar contract clauses: Controller to processor |
55 | Annex sec_D.4 |
63 | Annex sec_E Annex sec_E.1 Annex sec_E.2 Annex sec_E.3 Annex E (informative) Handling very sensitive personal health data |
64 | Annex sec_E.4 Annex sec_E.5 Annex sec_E.6 Annex sec_E.7 |
65 | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Reference ref_5 Reference ref_6 Reference ref_7 Reference ref_8 Reference ref_9 Reference ref_10 Reference ref_11 Reference ref_12 Reference ref_13 Reference ref_14 Reference ref_15 Reference ref_16 Reference ref_17 Reference ref_18 Bibliography |
66 | Reference ref_19 Reference ref_20 Reference ref_21 Reference ref_22 Reference ref_23 Reference ref_24 Reference ref_25 |