2025-12-16 10.1.14.108
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/YY/T 1843-2022
YY/T 1843-2022   Basic requirements of cybersecurity for medical electrical equipment (English Version)
Standard No.: YY/T 1843-2022 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 12500 words Translation Price(USD):375.0 remind me the price change

Email:

Implemented on:2023-6-1 Delivery: via email in 1 business day

→ → →

,,2023-6-1,1F97E3427BDE1FF01654517500939
Standard No.: YY/T 1843-2022
English Name: Basic requirements of cybersecurity for medical electrical equipment
Chinese Name: 医用电气设备网络安全基本要求
Professional Classification: YY    Professional Standard - Pharmaceutics
Source Content Issued by: National Medical Products Adminstration
Issued on: 2022-05-18
Implemented on: 2023-6-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 12500 words
Translation Price(USD): 375.0
Delivery: via email in 1 business day
YY/T 1843-2022 Basic requirements of cybersecurity for medical electrical equipment 1 *Scope This document specifies the basic security requirements for medical electrical equipment, medical electrical systems and medical device software. This document is applicable to medical electrical equipment, medical electrical systems and medical device software with user access, electronic data exchange or remote control functions. 2 Normative references N/A. 3 Terms and definitions For the purposes of this document, the following terms and definitions apply. 3.1 safety no unacceptable risk to people, property or environment [Source: ISO/IEC GUIDE 51:2014, 3.14, modified] 3.2 confidentiality property that information is not made available or disclosed to unauthorized individuals, entities, or processes [Source: GB/T 29246-2017, 2.12] 3.3 malware software designed to maliciously disrupt normal functions, collect sensitive data and/or access other connected systems 3.4 firewall security product that analyzes the passing data flow and realizes the functions of access control and security protection 3.5 risk combination of the probability of occurrence of harm and the severity of that harm [Source: YY/T 0316-2016, 2.16] 3.6 risk analysis systematic use of available information to identify hazards and to estimate the risk [Source: YY/T 0316-2016, 2.17] 3.7 risk control process in which decisions are made and measures are implemented, and risks are reduced to, or maintained within, specified levels [Source: YY/T 0316-2016, 2.19] 3.8 risk management systematic application of management policies, procedures and practices to the tasks of analyzing, evaluating, controlling and monitoring risk [Source: YY/T 0316-2016, 2.22] 3.9 personal sensitive data personal information which, once disclosed, illegally provided or abused, will possibly endanger the personal and property safety and easily result in damages to personal reputation and physical and mental health or result in discriminatory treatment Note 1: Personal sensitive data may include ID number, personal biometric identifying information, bank account, communication record and content, property information, credit information, whereabouts, accommodation information, health and physiology information, transaction information and personal information of children less than or equal to 14 years old. Note 2: In GB/T 35273-2020, it is called personal sensitive information. Since this document mainly standardizes data, it is rewritten as data in this document. Note 3: For the judgment method and type of personal sensitive data, please refer to Annex B of GB/T 35273-2020. [Source: GB/T 35273-2020, 3.2, modified] 3.10 emergency access access to health data by clinical users without the use of personal identification or without authorization in case of emergence (e.g., rescue, first aid) 3.11 health data personal sensitive data that indicates physical or mental health Note 1: Health data is generally defined in this document as a subset of personal sensitive data. Note 2: Different privacy compliance laws and regulations are currently stipulated globally. Therefore, for example, in Europe, the requirements might be taken and references changed to “personal data” and “sensitive data”; in the USA, health data might be changed to “protected health information (PHI)”, which requires manufacturers in different countries or regions to further consider the laws or regulations in China. [Source: IEC/TR 80001-2-2: 2012, 3.7, modified] 3.12 non-repudiation ability to demonstrate the occurrence of the claimed event or activity and its source [Source: GB/T 29246-2017, 2.54, modified]
Foreword i Introduction ii 1 *Scope 2 Normative references 3 Terms and definitions 4 General requirements 5 Test methods Annex A (Normative) Requirements for security capability test process Annex B (Informative) Relevance between this document and other documents Annex C (Informative) Guidelines and rationale for specific clause(s)/subclauses Annex D (Informative) Considerations regarding personal sensitive data in this document Bibliography
Code of China
Standard
YY/T 1843-2022  Basic requirements of cybersecurity for medical electrical equipment (English Version)
Standard No.YY/T 1843-2022
Statusvalid
LanguageEnglish
File FormatPDF
Word Count12500 words
Price(USD)375.0
Implemented on2023-6-1
Deliveryvia email in 1 business day
Detail of YY/T 1843-2022
Standard No.
YY/T 1843-2022
English Name
Basic requirements of cybersecurity for medical electrical equipment
Chinese Name
医用电气设备网络安全基本要求
Chinese Classification
Professional Classification
YY
ICS Classification
Issued by
National Medical Products Adminstration
Issued on
2022-05-18
Implemented on
2023-6-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
12500 words
Price(USD)
375.0
Keywords
YY/T 1843-2022, YY 1843-2022, YYT 1843-2022, YY/T1843-2022, YY/T 1843, YY/T1843, YY1843-2022, YY 1843, YY1843, YYT1843-2022, YYT 1843, YYT1843
Introduction of YY/T 1843-2022
YY/T 1843-2022 Basic requirements of cybersecurity for medical electrical equipment 1 *Scope This document specifies the basic security requirements for medical electrical equipment, medical electrical systems and medical device software. This document is applicable to medical electrical equipment, medical electrical systems and medical device software with user access, electronic data exchange or remote control functions. 2 Normative references N/A. 3 Terms and definitions For the purposes of this document, the following terms and definitions apply. 3.1 safety no unacceptable risk to people, property or environment [Source: ISO/IEC GUIDE 51:2014, 3.14, modified] 3.2 confidentiality property that information is not made available or disclosed to unauthorized individuals, entities, or processes [Source: GB/T 29246-2017, 2.12] 3.3 malware software designed to maliciously disrupt normal functions, collect sensitive data and/or access other connected systems 3.4 firewall security product that analyzes the passing data flow and realizes the functions of access control and security protection 3.5 risk combination of the probability of occurrence of harm and the severity of that harm [Source: YY/T 0316-2016, 2.16] 3.6 risk analysis systematic use of available information to identify hazards and to estimate the risk [Source: YY/T 0316-2016, 2.17] 3.7 risk control process in which decisions are made and measures are implemented, and risks are reduced to, or maintained within, specified levels [Source: YY/T 0316-2016, 2.19] 3.8 risk management systematic application of management policies, procedures and practices to the tasks of analyzing, evaluating, controlling and monitoring risk [Source: YY/T 0316-2016, 2.22] 3.9 personal sensitive data personal information which, once disclosed, illegally provided or abused, will possibly endanger the personal and property safety and easily result in damages to personal reputation and physical and mental health or result in discriminatory treatment Note 1: Personal sensitive data may include ID number, personal biometric identifying information, bank account, communication record and content, property information, credit information, whereabouts, accommodation information, health and physiology information, transaction information and personal information of children less than or equal to 14 years old. Note 2: In GB/T 35273-2020, it is called personal sensitive information. Since this document mainly standardizes data, it is rewritten as data in this document. Note 3: For the judgment method and type of personal sensitive data, please refer to Annex B of GB/T 35273-2020. [Source: GB/T 35273-2020, 3.2, modified] 3.10 emergency access access to health data by clinical users without the use of personal identification or without authorization in case of emergence (e.g., rescue, first aid) 3.11 health data personal sensitive data that indicates physical or mental health Note 1: Health data is generally defined in this document as a subset of personal sensitive data. Note 2: Different privacy compliance laws and regulations are currently stipulated globally. Therefore, for example, in Europe, the requirements might be taken and references changed to “personal data” and “sensitive data”; in the USA, health data might be changed to “protected health information (PHI)”, which requires manufacturers in different countries or regions to further consider the laws or regulations in China. [Source: IEC/TR 80001-2-2: 2012, 3.7, modified] 3.12 non-repudiation ability to demonstrate the occurrence of the claimed event or activity and its source [Source: GB/T 29246-2017, 2.54, modified]
Contents of YY/T 1843-2022
Foreword i Introduction ii 1 *Scope 2 Normative references 3 Terms and definitions 4 General requirements 5 Test methods Annex A (Normative) Requirements for security capability test process Annex B (Informative) Relevance between this document and other documents Annex C (Informative) Guidelines and rationale for specific clause(s)/subclauses Annex D (Informative) Considerations regarding personal sensitive data in this document Bibliography
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
YY/T 1843-2022, YY 1843-2022, YYT 1843-2022, YY/T1843-2022, YY/T 1843, YY/T1843, YY1843-2022, YY 1843, YY1843, YYT1843-2022, YYT 1843, YYT1843