2025-12-5 10.1.6.65
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB/T 39725-2020
GB/T 39725-2020   Information security technology—Guide for health data security (English Version)
Standard No.: GB/T 39725-2020 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 31000 words Translation Price(USD):930.0 remind me the price change

Email:

Implemented on:2021-7-1 Delivery: via email in 1 business day

→ → →

,,2021-7-1,217E84F7A55AA90A1611472773167
Standard No.: GB/T 39725-2020
English Name: Information security technology—Guide for health data security
Chinese Name: 信息安全技术 健康医疗数据安全指南
Chinese Classification: L80    Data encryption
Professional Classification: GB    National Standard
Source Content Issued by: SAMR; SAC
Issued on: 2020-12-14
Implemented on: 2021-7-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 31000 words
Translation Price(USD): 930.0
Delivery: via email in 1 business day
1 Scope This standard specifies the security measures that health data controllers can take to protect the health data. This standard is applicable to guiding health data controllers in the security protection of health data, and can also be referred to by health care- and cybersecurity-related competent departments and third-party assessment agencies and other organizations when carrying out security supervision, management and assessment of health data. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 22080-2016 Information technology - Security techniques - Information security management systems - Requirements GB/T 22081-2016 Information technology - Security techniques - Code of practice for information security controls GB/T 22239-2019 Information security technology - Baseline for classified protection of cybersecurity GB/T 25069 Information security technology - Terminology GB/T 31168 Information security technology - Security capability requirements of cloud computing services GB/T 35273 Information security technology - Personal information security specification GB/T 35274-2017 Information security technology - Security capability requirements for big data services GB/T 37964-2019 Information security technology - Guide for de-identifying personal information ISO 80001 Application of risk management for IT-networks incorporating medical devices 3 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069 and the following apply. 3.1 personal health data electronic data that, alone or in combination with other information, can identify a specific natural person or reflect the physical or mental health status of a specific natural person Note: Personal health data relate to an individual's past, present or future physical or mental health status, health care services received and health care service fees paid for, etc., see Annex A. 3.2 health data personal health data and health related electronic data obtained from processing of personal health data Example: Overall analysis results, trend prediction, disease prevention and control statistics of a group obtained from processing of group health data. 3.3 health service professional persons authorized by the government or industry organization to be qualified to perform specific health care duties Example: Doctor. 3.4 health service service provided by a health service professional or paraprofessional that has an impact on health status 3.5 health data controller organizations or individuals who can determine the purpose, manner, scope, etc. of health data processing Example: Organizations, medical insurance institutions, government agencies, healthcare scientific research institutions, individual clinics, etc. that provide health services. 3.6 health information system system that collects, stores, processes, transmits, accesses, and destroys health data in a computer-processable form   3.7 limited data set personal health data set that has been partially de-identified but still identifies the corresponding individual and therefore needs to be protected Example: Health data from which identifications directly related to individuals and their families, family members, and employers are removed. Note: Limited data set may be used for the purposes of scientific research, medical/health education and public health without the authorization of the individual concerned. 3.8 notes of treatment observations, reflections, program discussions and conclusions recorded by health service professionals in the course of providing health services Note: Notes of treatment have the attribute of intellectual property rights and their intellectual property rights belong to health service professionals and/or their units. 3.9 disclosure act of transferring and sharing health data to specific individuals or organizations, as well as publicly releasing health data to unspecified individuals, organizations or society 3.10 clinical research scientific research activities aimed at exploring the causes, prevention, diagnosis, treatment, and prognosis of diseases, initiated by medical institutions, academic research institutions, and/or healthcare-related enterprises, with patients or healthy individuals as research subjects Note: Clinical research is a branch of medical research. 3.11 completely public sharing release of data, usually release of data directly to the public via the Internet, with data being difficult to recall once after being released [GB/T 37964-2019, Definition 3.12] 3.12 controlled public sharing constraining the use of data through data use agreement [GB/T 37964-2019, Definition 3.13] 3.13 enclave public sharing sharing of data within a physical or virtual enclave, out of which data cannot flow [GB/T 37964-2019, Definition 3.14] 4 Abbreviations For the purposes of this document, the following abbreviations apply. ACL: Access Control Lists API: Application Programming Interface APP: Application DNA: DeoxyriboNucleic Acid EDC: Electronic Data Capture GCP: Good Clinical Practice HIS: Hospital Information Systems HIV: Human Immunodeficiency Virus HL7: Healthcare Level 7 ID: Identity IP: Internet Protocol IPSEC: Internet Protocol Security LDS: Limited Data Set Files PIN: Personal Identity Number PUF: Public Use Files RIF: Research Identifiable Files RNA: RiboNucleic Acid SQL: Structured Query Language TLS: Transport Layer Security USB: Universal Serial Bus VPN: Virtual Private Network XSS: cross-site scripting
Foreword III Introduction IV 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Security objectives 6 Classification system 6.1 Data categories 6.2 Data classification 6.3 Classification of related roles 6.4 Flow and usage scenarios 6.5 Data opening forms 7 Principles for use and disclosure 8 Key points of security measures 8.1 Key points of classification security measures 8.2 Key points of scenario-specific security measures 8.3 Key points of data opening-specific security measures 9 Security management guide 9.1 General 9.2 Organization 9.3 Process 9.4 Emergency disposal 10 Security technology guide 10.1 General security technology 10.2 De-identification 11 Data security in typical scenarios 11.1 Data security in doctors' access 11.2 Data security in patient query 11.3 Clinical research data security 11.4 Data security in secondary use 11.5 Health sensing data security 11.6 Mobile application data security 11.7 Commercial insurance matching security 11.8 Data security for medical devices Annex A (Informative) Personal health data scope Annex B (Informative) Standards related to health information Annex C (Informative) Example of a data use management method Annex D (Informative) Examples of data application approval Annex E (Informative) Templates of data processing and use agreements Annex F (Informative) Health data security checklist Annex G (Informative) Examples of health data element de-identification Bibliography
Referred in GB/T 39725-2020:
*GB/T 22080-2016 Information technology―Security techniques―Information security management systems―Requirements
*GB/T 22081-2016 Information technology - Security techniques - Guidelines for the practice of information security control
*GB/T 22239-2019 Information security technology—Baseline for classified protection of cybersecurity
*GB/T 25069-2022 Information security techniques—Terminology
*GB/T 31168-2014 Information Security Technology - Security Capability Requirements of Cloud Computing Services
*GB/T 35273-2020 Information security technology—Personal information security specification
*GB/T 35274-2017 Information security technology—Security capability requirements for big data services
*GB/T 37964-2019 Information security technology—Guide for de-identifying personal information
Code of China
Standard
GB/T 39725-2020  Information security technology—Guide for health data security (English Version)
Standard No.GB/T 39725-2020
Statusvalid
LanguageEnglish
File FormatPDF
Word Count31000 words
Price(USD)930.0
Implemented on2021-7-1
Deliveryvia email in 1 business day
Detail of GB/T 39725-2020
Standard No.
GB/T 39725-2020
English Name
Information security technology—Guide for health data security
Chinese Name
信息安全技术 健康医疗数据安全指南
Chinese Classification
L80
Professional Classification
GB
ICS Classification
Issued by
SAMR; SAC
Issued on
2020-12-14
Implemented on
2021-7-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
31000 words
Price(USD)
930.0
Keywords
GB/T 39725-2020, GB 39725-2020, GBT 39725-2020, GB/T39725-2020, GB/T 39725, GB/T39725, GB39725-2020, GB 39725, GB39725, GBT39725-2020, GBT 39725, GBT39725
Introduction of GB/T 39725-2020
1 Scope This standard specifies the security measures that health data controllers can take to protect the health data. This standard is applicable to guiding health data controllers in the security protection of health data, and can also be referred to by health care- and cybersecurity-related competent departments and third-party assessment agencies and other organizations when carrying out security supervision, management and assessment of health data. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. GB/T 22080-2016 Information technology - Security techniques - Information security management systems - Requirements GB/T 22081-2016 Information technology - Security techniques - Code of practice for information security controls GB/T 22239-2019 Information security technology - Baseline for classified protection of cybersecurity GB/T 25069 Information security technology - Terminology GB/T 31168 Information security technology - Security capability requirements of cloud computing services GB/T 35273 Information security technology - Personal information security specification GB/T 35274-2017 Information security technology - Security capability requirements for big data services GB/T 37964-2019 Information security technology - Guide for de-identifying personal information ISO 80001 Application of risk management for IT-networks incorporating medical devices 3 Terms and definitions For the purposes of this document, the terms and definitions given in GB/T 25069 and the following apply. 3.1 personal health data electronic data that, alone or in combination with other information, can identify a specific natural person or reflect the physical or mental health status of a specific natural person Note: Personal health data relate to an individual's past, present or future physical or mental health status, health care services received and health care service fees paid for, etc., see Annex A. 3.2 health data personal health data and health related electronic data obtained from processing of personal health data Example: Overall analysis results, trend prediction, disease prevention and control statistics of a group obtained from processing of group health data. 3.3 health service professional persons authorized by the government or industry organization to be qualified to perform specific health care duties Example: Doctor. 3.4 health service service provided by a health service professional or paraprofessional that has an impact on health status 3.5 health data controller organizations or individuals who can determine the purpose, manner, scope, etc. of health data processing Example: Organizations, medical insurance institutions, government agencies, healthcare scientific research institutions, individual clinics, etc. that provide health services. 3.6 health information system system that collects, stores, processes, transmits, accesses, and destroys health data in a computer-processable form   3.7 limited data set personal health data set that has been partially de-identified but still identifies the corresponding individual and therefore needs to be protected Example: Health data from which identifications directly related to individuals and their families, family members, and employers are removed. Note: Limited data set may be used for the purposes of scientific research, medical/health education and public health without the authorization of the individual concerned. 3.8 notes of treatment observations, reflections, program discussions and conclusions recorded by health service professionals in the course of providing health services Note: Notes of treatment have the attribute of intellectual property rights and their intellectual property rights belong to health service professionals and/or their units. 3.9 disclosure act of transferring and sharing health data to specific individuals or organizations, as well as publicly releasing health data to unspecified individuals, organizations or society 3.10 clinical research scientific research activities aimed at exploring the causes, prevention, diagnosis, treatment, and prognosis of diseases, initiated by medical institutions, academic research institutions, and/or healthcare-related enterprises, with patients or healthy individuals as research subjects Note: Clinical research is a branch of medical research. 3.11 completely public sharing release of data, usually release of data directly to the public via the Internet, with data being difficult to recall once after being released [GB/T 37964-2019, Definition 3.12] 3.12 controlled public sharing constraining the use of data through data use agreement [GB/T 37964-2019, Definition 3.13] 3.13 enclave public sharing sharing of data within a physical or virtual enclave, out of which data cannot flow [GB/T 37964-2019, Definition 3.14] 4 Abbreviations For the purposes of this document, the following abbreviations apply. ACL: Access Control Lists API: Application Programming Interface APP: Application DNA: DeoxyriboNucleic Acid EDC: Electronic Data Capture GCP: Good Clinical Practice HIS: Hospital Information Systems HIV: Human Immunodeficiency Virus HL7: Healthcare Level 7 ID: Identity IP: Internet Protocol IPSEC: Internet Protocol Security LDS: Limited Data Set Files PIN: Personal Identity Number PUF: Public Use Files RIF: Research Identifiable Files RNA: RiboNucleic Acid SQL: Structured Query Language TLS: Transport Layer Security USB: Universal Serial Bus VPN: Virtual Private Network XSS: cross-site scripting
Contents of GB/T 39725-2020
Foreword III Introduction IV 1 Scope 2 Normative references 3 Terms and definitions 4 Abbreviations 5 Security objectives 6 Classification system 6.1 Data categories 6.2 Data classification 6.3 Classification of related roles 6.4 Flow and usage scenarios 6.5 Data opening forms 7 Principles for use and disclosure 8 Key points of security measures 8.1 Key points of classification security measures 8.2 Key points of scenario-specific security measures 8.3 Key points of data opening-specific security measures 9 Security management guide 9.1 General 9.2 Organization 9.3 Process 9.4 Emergency disposal 10 Security technology guide 10.1 General security technology 10.2 De-identification 11 Data security in typical scenarios 11.1 Data security in doctors' access 11.2 Data security in patient query 11.3 Clinical research data security 11.4 Data security in secondary use 11.5 Health sensing data security 11.6 Mobile application data security 11.7 Commercial insurance matching security 11.8 Data security for medical devices Annex A (Informative) Personal health data scope Annex B (Informative) Standards related to health information Annex C (Informative) Example of a data use management method Annex D (Informative) Examples of data application approval Annex E (Informative) Templates of data processing and use agreements Annex F (Informative) Health data security checklist Annex G (Informative) Examples of health data element de-identification Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB/T 39725-2020, GB 39725-2020, GBT 39725-2020, GB/T39725-2020, GB/T 39725, GB/T39725, GB39725-2020, GB 39725, GB39725, GBT39725-2020, GBT 39725, GBT39725