{"id":348818,"date":"2024-10-20T00:33:15","date_gmt":"2024-10-20T00:33:15","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-277892013\/"},"modified":"2024-10-26T00:10:16","modified_gmt":"2024-10-26T00:10:16","slug":"bs-en-iso-277892013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-277892013\/","title":{"rendered":"BS EN ISO 27789:2013"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Section sec_1 Section sec_2 Section sec_3 1\tScope 2\tNormative references 3\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Section sec_4 4\tSymbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Section sec_5 Section sec_5.1 Section sec_5.1.1 Section sec_5.1.2 Section sec_5.1.3 Section sec_5.1.4 Section sec_5.1.5 5\tRequirements and uses of audit data 5.1\tEthical and formal requirements <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | Section sec_5.2 Section sec_5.2.1 Section sec_5.2.2 Section sec_5.2.3 5.2\tUses of audit data <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Section sec_6 Section sec_6.1 Section sec_6.2 Section sec_6.2.1 Table tab_1 Section sec_6.2.2 6\tTrigger events 6.1\tGeneral 6.2\tDetails of the event types and their contents <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Table tab_2 Section sec_7 Section sec_7.1 Table tab_3 7\tAudit record details 7.1\tThe general record format <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Section sec_7.2 Section sec_7.2.1 Table tab_4 7.2\tTrigger event identification <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Section sec_7.2.2 Table tab_5 Section sec_7.2.3 Section sec_7.2.4 <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Section sec_7.2.5 Table tab_6 Section sec_7.3 Section sec_7.3.1 Section sec_7.3.2 7.3\tUser identification <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | Section sec_7.3.3 Section sec_7.3.4 Section sec_7.3.5 <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Table tab_7 Table tab_8 Section sec_7.3.6 <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Table tab_9 Section sec_7.4 Section sec_7.4.1 7.4\tAccess point identification <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Table tab_10 Section sec_7.4.2 Section sec_7.5 Section sec_7.5.1 7.5\tAudit source identification <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Section sec_7.5.2 Section sec_7.5.3 Section sec_7.5.4 <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Table tab_11 Table tab_12 Section sec_7.6 Section sec_7.6.1 7.6\tParticipant object identification <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Section sec_7.6.2 Table tab_13 Section sec_7.6.3 <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Table tab_14 Section sec_7.6.4 <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Table tab_15 Section sec_7.6.5 <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Table tab_16 Table tab_17 Section sec_7.6.6 <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | Section sec_7.6.7 Section sec_7.6.8 Section sec_7.6.9 Section sec_7.6.10 Section sec_7.6.11 <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Section sec_8 Section sec_8.1 Table tab_18 8\tAudit records for individual events 8.1\tAccess events <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Section sec_8.2 8.2\tQuery events <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Table tab_19 <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Section sec_9 Section sec_9.1 9\tSecure management of audit data 9.1\tSecurity considerations <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Section sec_9.2 Section sec_9.3 Section sec_9.4 Section sec_9.5 9.2\tSecuring the availability of the audit system 9.3\tRetention requirements 9.4\tSecuring the confidentiality and integrity of audit trails 9.5\tAccess to audit data <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Annex sec_A Annex sec_A.1 Annex sec_A.2 Annex\u00a0A \n(informative)<\/p>\n Audit scenarios <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex sec_A.3 Annex sec_A.4 <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Annex sec_A.5 Annex sec_A.6 <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Annex sec_A.7 Annex sec_A.8 <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex sec_A.9 Annex sec_A.10 Annex sec_A.11 <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Annex sec_A.12 <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Annex sec_B Annex sec_B.1 Figure fig_B.1 Annex\u00a0B \n(informative)<\/p>\n Audit log services <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Annex sec_B.2 Annex sec_B.3 <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Annex sec_B.4 <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Annex sec_B.5 <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | Annex sec_B.6 <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | Annex sec_B.7 <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Annex sec_B.8 <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | Reference ref_1 Reference ref_2 Reference ref_3 Reference ref_4 Reference ref_5 Reference ref_6 Reference ref_7 Reference ref_8 Reference ref_9 Reference ref_10 Reference ref_11 Reference ref_12 Reference ref_13 Reference ref_14 Reference ref_15 Reference ref_16 Reference ref_17 Reference ref_18 Reference ref_19 Reference ref_20 Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Health informatics. Audit trails for electronic health records<\/b><\/p>\n |