By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Cloud Security in the Medical Imaging Environment
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > Specialties > Radiology > Cloud Security in the Medical Imaging Environment
Radiology

Cloud Security in the Medical Imaging Environment

erica.carnevale
erica.carnevale
Share
4 Min Read
SHARE

A Diagnostic Imaging poll making the rounds on Twitter today took a quick pulse on cloud security and imaging sharing:

A Diagnostic Imaging poll making the rounds on Twitter today took a quick pulse on cloud security and imaging sharing:

52% of you are concerned about #security with cloud #imaging sharing bit.ly/xbCBoM Are you? Vote in our poll! #radiology

Using the cloud requires turning over responsibility for data security and privacy to a third party—and that can be a concern for healthcare providers. In reality, a cloud-based service can provide higher levels of security than most healthcare facilities because the supplier has a specialized team devoted to implementing the latest security technologies and provides 24/7/365 monitoring of data access and operations.

 

Cloud services protect the privacy of data through infrastructure design, access control, audit tracking, and a security team that oversees all operations and ensures the physical security of each data center.


  • Infrastructure Design: The communication between customer sites and data center is done within a virtual private network providing encryption of the communication at the network level. SSL-based encryption is used at the application level to transfer medical data while ensuring end-to-end confidentiality, regardless of the underlying network implementation between the Service Access Point and the data center. This encryption ensures that no one can access data while it is being carried over the network or the Internet, between the DMZ and the end user viewing software. Data is encrypted and also secured against the physical removal of devices, and databases are also encrypted to ensure data privacy.
  • Access Control: Authentication and access control restrict use. Site-level access control is confined to specific CSAPs. Access rights are limited to authorized users (with passwords and other requirements) and user access can be confined to specific patients and types of studies.
  • Audit tracking: An audit trail monitors all activity on each user’s server and each component of the data center. Metrics are collected from each device and an alert is triggered when a faulty condition or potential breech is detected.
  • Security team: Each cloud provider should have a security policy that governs all security procedures and is headed by a qualified security officer. The security team monitors all data access and ensures the physical security of the data centers. Badge controls are used to restrict access to specific areas of the data center. Security guards provide around-the-clock protection and a strict policy is enforced for document and laptop management.
Cloud-based computing in the radiology market has evolved from a service that provided cost-effective disaster recovery for archived data to a sophisticated technology that can deliver fully featured PACS and vendor-neutral archiving solutions to healthcare providers of all sizes. Its widespread appeal lies in its ability to deliver highly scalable, pay-for-use solutions that include technology upgrades and expert security measures—all available for substantially less than the cost of purchasing and maintaining an on-site infrastructure and management personnel.
Cristine Kao

Cristine Kao, Global Marketing Manager, Healthcare IT, Carestream

Healthcare facilities should ask for detailed documentation on security from every cloud services supplier they evaluate – what should you ask? Our cloud-based data security white paper offers guidance on how to evaluate the data security capabilities of cloud-based services for your healthcare facility.


Let’s keep the conversation going. What security concerns are keeping you from a move to the cloud?

      

TAGGED:cloud computingcloud security
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

a woman walking on the hallway
6 Easy Healthcare Ways to Sit Less and Move More Every Day
Health
September 9, 2025
Clinical Expertise
Healthcare at a Crossroads: Why Leadership Matters More Than Ever
Global Healthcare
September 9, 2025
travel nurse in north carolina
Balancing Speed and Scope: Choosing the Nursing Degree That Fits Your Goals
Nursing
September 1, 2025
intimacy
How to Keep Intimacy Comfortable as You Age
Relationship and Lifestyle Senior Care
September 1, 2025

You Might also Like

Healthcare Reform, Digital X-Ray and Continuing Education Opinion from Chile

May 4, 2012

Patients Going Mobile: The Consumerization of Radiology

October 25, 2013

Vue Cloud Serves as Architecture for E-Learning Programme

May 15, 2013

Radiation Dosing and Children

May 10, 2012
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?