By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Cloud Security in the Medical Imaging Environment
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > Specialties > Radiology > Cloud Security in the Medical Imaging Environment
Radiology

Cloud Security in the Medical Imaging Environment

erica.carnevale
erica.carnevale
Share
4 Min Read
SHARE

A Diagnostic Imaging poll making the rounds on Twitter today took a quick pulse on cloud security and imaging sharing:

A Diagnostic Imaging poll making the rounds on Twitter today took a quick pulse on cloud security and imaging sharing:

52% of you are concerned about #security with cloud #imaging sharing bit.ly/xbCBoM Are you? Vote in our poll! #radiology

Using the cloud requires turning over responsibility for data security and privacy to a third party—and that can be a concern for healthcare providers. In reality, a cloud-based service can provide higher levels of security than most healthcare facilities because the supplier has a specialized team devoted to implementing the latest security technologies and provides 24/7/365 monitoring of data access and operations.

 

Cloud services protect the privacy of data through infrastructure design, access control, audit tracking, and a security team that oversees all operations and ensures the physical security of each data center.


  • Infrastructure Design: The communication between customer sites and data center is done within a virtual private network providing encryption of the communication at the network level. SSL-based encryption is used at the application level to transfer medical data while ensuring end-to-end confidentiality, regardless of the underlying network implementation between the Service Access Point and the data center. This encryption ensures that no one can access data while it is being carried over the network or the Internet, between the DMZ and the end user viewing software. Data is encrypted and also secured against the physical removal of devices, and databases are also encrypted to ensure data privacy.
  • Access Control: Authentication and access control restrict use. Site-level access control is confined to specific CSAPs. Access rights are limited to authorized users (with passwords and other requirements) and user access can be confined to specific patients and types of studies.
  • Audit tracking: An audit trail monitors all activity on each user’s server and each component of the data center. Metrics are collected from each device and an alert is triggered when a faulty condition or potential breech is detected.
  • Security team: Each cloud provider should have a security policy that governs all security procedures and is headed by a qualified security officer. The security team monitors all data access and ensures the physical security of the data centers. Badge controls are used to restrict access to specific areas of the data center. Security guards provide around-the-clock protection and a strict policy is enforced for document and laptop management.
Cloud-based computing in the radiology market has evolved from a service that provided cost-effective disaster recovery for archived data to a sophisticated technology that can deliver fully featured PACS and vendor-neutral archiving solutions to healthcare providers of all sizes. Its widespread appeal lies in its ability to deliver highly scalable, pay-for-use solutions that include technology upgrades and expert security measures—all available for substantially less than the cost of purchasing and maintaining an on-site infrastructure and management personnel.
Cristine Kao

Cristine Kao, Global Marketing Manager, Healthcare IT, Carestream

Healthcare facilities should ask for detailed documentation on security from every cloud services supplier they evaluate – what should you ask? Our cloud-based data security white paper offers guidance on how to evaluate the data security capabilities of cloud-based services for your healthcare facility.


Let’s keep the conversation going. What security concerns are keeping you from a move to the cloud?

      

TAGGED:cloud computingcloud security
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

dental care
Importance of Good Dental Care for Health and Confidence
Dental health Specialties
October 2, 2025
AI in Healthcare
AI in Healthcare: Technology is Transforming the Global Landscape
Global Healthcare Policy & Law Technology
October 1, 2025
Choosing the Right Swimwear for Health and Safety
News
September 30, 2025
sports concussions
Concussion In Sports: How Common They Are And What You Need To Know
Infographics
September 28, 2025

You Might also Like

Image
NewsRadiologySpecialtiesTechnology

Minimum Dose, Maximum Speed

June 20, 2012
Image
Radiology

Fox Guarding Henhouse? Radiologists Want to “Control” Radiation Debate

June 20, 2013

How the Final Omnibus Rule Affects HIPAA Cloud Computing Providers

January 19, 2013

RSNA 12 Keynote Inspires – Challenge Radiology’s Status Quo

November 27, 2012
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?