GEHC strongly recommends that medical information systems are operated in a secure network environment that is protected from unauthorized intrusion. There are many effective techniques for isolating and protecting medical information systems, including implementing firewall protection, demilitarized zones (DMZs), Virtual Local Area Networks (VLANs) and network enclaves.
Due to the broadcast nature of wireless communication, wireless devices require special security considerations. There are effective techniques and tools for improving the security of wireless communication devices. For example, Vscan Air should not be connected to an unsecured wireless network.
Wireless security protocols
The following security protocols are supported on the wireless interface:
- WPA/WPA2 PSK
- 802.1x EAP - (HTTPS, PEAP, TLS, TTLS, PWD, SIM, AKA)
Data at Rest Security
Images/videos are unencrypted at rest.
The Vscan Air supports sharing images, videos or exams via the share function on the Vscan Air app. The security of data shared by the Vscan Air has to be taken care of on the system where data is stored.
Disclaimer: The information herein is not intended to replace the product’s User Manual. Please consult the User Manual for comprehensive information and cautionary guidance about the product’s operation and use.