Already a subscriber? ![](/assets/images/login.png)
![](/assets/images/x.png)
MADCAD.com Free Trial
Sign up for a 3 day free trial to explore the MADCAD.com interface, PLUS access the
2009 International Building Code to see how it all works.
If you like to setup a quick demo, let us know at support@madcad.com
or +1 800.798.9296 and we will be happy to schedule a webinar for you.
Security check![](/assets/images/x.png)
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?
![](/assets/images/159.gif)
IEEE/UL Standard for Clinical Internet of Things (IoT) Data and Device Interoperability with TIPPSS--Trust, Identity, Privacy, Protection, Safety, and Security (Approved Draft), 2024
- IEEE Std 2933/UL 2933:2024 Front Cover
- Titlepage
- Important Notices and Disclaimers
- Participants
- Introduction
- Contents
- 1. Overview [Go to Page]
- 1.1 Scope
- 1.2 Purpose
- 1.3 Word usage
- 2. Normative references
- 3. Definitions, acronyms, and abbreviations [Go to Page]
- 3.1 Definitions [Go to Page]
- 3.1.1 IoT definitions
- 3.1.2 Clinical-related definitions
- 3.1.3 Clinical IoT (CIoT) related definitions
- 3.1.4 General definitions
- 3.2 Acronyms and abbreviations
- 4. Trust and identity [Go to Page]
- 4.1 Introduction
- 4.2 Overview
- 4.3 Micro view [Go to Page]
- 4.3.1 Discrete components [Go to Page]
- 4.3.1.1 Practices and processes [Go to Page]
- 4.3.1.1.1 Component inspection
- 4.3.1.1.2 Component testing
- 4.3.1.1.3 Component certification
- 4.3.1.1.4 Component traceability
- 4.3.2 Subassembly [Go to Page]
- 4.3.2.1 Practices and processes [Go to Page]
- 4.3.2.1.1 Component traceability
- 4.3.2.1.2 Component identifiers
- 4.3.2.1.3 Process traceability
- 4.3.3 Device software [Go to Page]
- 4.3.3.1 Practices and processes [Go to Page]
- 4.3.3.1.1 Designing for security
- 4.3.3.1.2 Ability to update device software
- 4.3.3.1.3 Software Bill of Materials (SBOM)
- 4.3.4 Final product
- 4.3.5 Manufacturer device registry [Go to Page]
- 4.3.5.1 Practices and processes [Go to Page]
- 4.3.5.1.1 Device identifiers (device ID)
- 4.3.5.1.2 Properties of the device
- 4.3.5.1.3 Generalized requirements for a medical device registry
- 4.3.5.1.4 Functions of the device ID
- 4.3.5.1.5 Functions not suitable for device ID
- 4.3.6 Decommissioning [Go to Page]
- 4.3.6.1 Practices and processes [Go to Page]
- 4.3.6.1.1 Recycling/repurposing
- 4.4 Macro view—Inter-device and systems [Go to Page]
- 4.4.1 User-managed software [Go to Page]
- 4.4.1.1 Practices and processes [Go to Page]
- 4.4.1.1.1 Software updates
- 4.4.1.1.2 Software as a Medical Device (SaMD)
- 4.4.2 Authentication
- 4.4.3 Identity
- 4.4.4 Context
- 4.4.5 Authorization
- 4.4.6 Accounting/Audit
- 4.4.7 Device onboarding [Go to Page]
- 4.4.7.1 Practices and processes
- 4.4.7.2 Device identities
- 4.4.7.3 Secret material protection [Go to Page]
- 4.4.7.3.1 Provisioning
- 4.4.7.3.2 Protecting secure material on the device
- 4.4.7.3.3 Confidentiality/Privacy
- 4.4.7.4 System management [Go to Page]
- 4.4.7.4.1 Code signing
- 4.4.7.4.2 Secure boot
- 4.4.7.4.3 Trust anchors
- 4.4.7.5 Tokens
- 4.4.8 Provisioning [Go to Page]
- 4.4.8.1 Practices and processes [Go to Page]
- 4.4.8.1.1 Device usage
- 4.4.8.2 Practices and processes
- 4.4.9 Deprovisioning
- 5. Privacy [Go to Page]
- 5.1 Overview
- 5.2 Privacy requirements identification [Go to Page]
- 5.2.1 Privacy requirements
- 5.2.2 Privacy requirements for Clinical IoT data and device interoperability
- 5.3 Privacy Impact Assessment
- 5.4 Premarket and postmarket privacy requirements [Go to Page]
- 5.4.1 Premarket privacy requirements
- 5.4.2 Postmarket privacy requirements
- 5.5 Summary
- 6. Protection [Go to Page]
- 6.1 Protection overview
- 6.2 Device pairing
- 6.3 Authentication
- 6.4 Access control
- 6.5 Communication between components [Go to Page]
- 6.5.1 Communications between device and sensor
- 6.5.2 Communications between device and aggregator/gateway
- 6.5.3 Communications between aggregator/gateway and backend
- 6.5.4 End-to-end encryption
- 6.6 Updates [Go to Page]
- 6.6.1 Third-party and open-source components
- 6.6.2 Sensor
- 6.6.3 Smart device application
- 6.6.4 Backend/Gateway
- 6.6.5 Requirement for update independence
- 6.7 Backup
- 6.8 Requirements for replacements
- 6.9 Tamper-proofing and integrity
- 6.10 Resilience and fail-safe mode [Go to Page]
- 6.10.1 Updates and alerts to trouble
- 6.10.2 Signal jamming and interference [Go to Page]
- 6.10.2.1 Signal jamming
- 6.10.2.2 Signal interference
- 6.10.3 Backup and restore capabilities
- 6.10.4 Data integrity and quality
- 6.11 Documentation and labeling
- 6.12 Decommissioning [Go to Page]
- 6.12.1 Decommissioning legal and regulatory background
- 6.12.2 Decommissioning processes and practices
- 7. Safety [Go to Page]
- 7.1 Safety overview
- 7.2 Mitigating safety risks
- 7.3 Quality assurance processes
- 7.4 Other safety risk considerations
- 8. Security [Go to Page]
- 8.1 Security overview
- 8.2 Organizational cybersecurity foundation [Go to Page]
- 8.2.1 Cybersecurity governance
- 8.2.2 Security as part of the quality management system
- 8.2.3 Secure Software Development Lifecycle
- 8.2.4 Risk-based approach
- 8.2.5 Establishing security requirements
- 8.2.6 Identified security requirements
- 8.3 Basic security principles [Go to Page]
- 8.3.1 Developing a security baseline
- 8.3.2 Meeting a security baseline [Go to Page]
- 8.3.2.1 People
- 8.3.2.2 Process
- 8.3.2.3 Technology
- 8.3.3 Maintaining a security baseline
- 8.3.4 Software Bill of Materials (SBOM)
- 8.4 Communication security [Go to Page]
- 8.4.1 Interoperability and security
- 8.4.2 Communicate securely
- 8.4.3 Communicate about security
- 8.4.4 Communication as a security risk
- 8.5 Processes, practices, principles, and controls [Go to Page]
- 8.5.1 CIA triad
- 8.5.2 Confidentiality
- 8.5.3 Integrity
- 8.5.4 Availability
- 8.5.5 Preservation of authenticity
- 8.6 Security assurance
- 8.7 Risk management and security [Go to Page]
- 8.7.1 Risk management overview
- 8.7.2 Asset classification
- 8.7.3 Data classification
- 8.7.4 Vulnerabilities
- 8.7.5 Threats
- 8.7.6 Risk management cycle
- 9. Human factors and usability [Go to Page]
- 9.1 Overview
- 9.2 Summary process for Usability Engineering [Go to Page]
- 9.2.1 Prepare the technical use specification
- 9.2.2 Prepare hazard analysis related to technical user interface use cases and scenarios
- 9.2.3 Establish a technical user interface specification
- 9.2.4 Establish a technical user interface verification plan
- 9.2.5 Establish a technical user interface validation plan
- 9.2.6 Perform a technical user interface design, implementation, verification, and formative validation
- 9.2.7 Perform technical user interface summative evaluation/validation
- 9.3 Requirements for the technical aspects of the Clinical IoT device user interface [Go to Page]
- 9.3.1 9.3.1 General—Human factors requirements
- 9.3.2 Accompanying documentation—Human factors requirements
- 9.3.3 Trust—Human factors requirements
- 9.3.4 Identity—Human factors requirements
- 9.3.5 Privacy—Human factors requirements
- 9.3.6 Safety—Human factors requirements [Go to Page]
- 9.3.6.1 General safety requirements
- 9.3.6.2 Technical log safety requirements
- 9.3.7 Security—Human factors requirements
- 9.3.8 Interoperability—Human factors requirements
- 9.3.9 Verification and validation—Human factors requirements
- 10. Integrated systems design (ISD) [Go to Page]
- 10.1 ISD attributes and characteristics requirements
- 10.2 Documentation requirements
- 10.3 Research and development (R&D) and pre-production requirements
- 10.4 Postmarket requirements
- 11. CIoT reference architecture (RA) [Go to Page]
- 11.1 Context Layer requirements
- 11.2 Technology Layer requirements [Go to Page]
- 11.2.1 System software requirements
- 11.2.2 Technology Layer general requirements
- 11.2.3 Requirements associated with CIoT system hardware and firmware [Go to Page]
- 11.2.3.1 Default password requirements
- 11.2.3.2 Medical device marking and labeling requirements
- 11.2.3.3 Personal data requirements
- 11.2.3.4 Remote server requirements
- 11.3 Application Services Layer requirements
- 11.4 Healthcare Workflow Services (HWS) Layer requirements
- 11.5 End-User Services (EUS) Layer requirements [Go to Page]
- 11.5.1 Patient
- 11.5.2 Home healthcare team
- 11.5.3 Healthcare provider
- 11.5.4 End User Services (EUS) Manager [Go to Page]
- 11.5.4.1 End-User Services (EUS) Manager requirements
- 11.5.4.2 End-User Services requirements
- 11.6 Services quality and integration/reconciliation of TIPPSS (SQIRT) Layer requirements [Go to Page]
- 11.6.1 SQIRT Manager requirements
- 11.6.2 Availability Manager requirements
- 11.6.3 TIPPSS Managers [Go to Page]
- 11.6.3.1 Trust Manager requirements
- 11.6.3.2 Identity Manager requirements
- 11.6.4 Privacy Manager requirements
- 11.6.5 Protection and Safety Manager requirements
- 11.6.6 Security Manager requirements
- 11.7 Information Architecture Layer requirements
- 11.8 Governance & Policies (G & P) Layer requirements [Go to Page]
- 11.8.1 Requirements associated with interoperability and integration plans
- 11.8.2 Requirements associated with TIPPSS policies and plans
- 11.8.3 Requirements associated with system logs
- 11.9 Lifecycle design and management [Go to Page]
- 11.9.1 CIoT device manufacturer lifecycle
- 11.9.2 CIoT device supply chain management
- 11.9.3 CIoT device maintenance lifecycle
- 11.9.4 CIoT device deployment organization lifecycle
- Annex A (informative) Bibliography
- Annex B (informative) Detailed sample use cases and derived functional needs [Go to Page]
- B.1 Introduction
- B.2 Overview of the sample use cases [Go to Page]
- B.2.1 Connected monitoring device—Use Case 1
- B.2.2 Connected therapy device—Use Case 2
- B.2.3 Hospital @Home use case—Use Case 3
- B.2.4 Home-to-Hospital use case—Use Case 4
- B.3 Use case process
- B.4 TIPPSS stakeholder roles
- B.5 Use Case 1—Connected monitoring device [Go to Page]
- B.5.1 Use case description
- B.5.2 Use case narrative
- B.5.3 Use case actions
- B.5.4 Actors and stakeholders
- B.5.5 Use Case 1—Details [Go to Page]
- B.5.5.1 Use Case 1—Action #1
- B.5.5.2 Use Case 1—Action #2
- B.5.5.3 Use Case 1—Action #3
- B.5.5.4 Use Case 1—Action #4
- B.5.5.5 Use Case 1—Action #5
- B.6 Use Case 2—Connected therapy device [Go to Page]
- B.6.1 Use Case 2a—Connected automated implanted cardioverter defibrillator (AICD) [Go to Page]
- B.6.1.1 Use Case 2a description
- B.6.1.2 Use Case 2a narrative
- B.6.2 Use Case 2b—Connected automated insulin delivery (AID) system [Go to Page]
- B.6.2.1 Use Case 2b description
- B.6.2.2 Use Case 2b narrative
- B.6.3 Use case actions
- B.6.4 Actors and stakeholders
- B.6.5 Use Case 2—Details [Go to Page]
- B.6.5.1 Use Case 2—Action #1
- B.6.5.2 Use Case 2—Action #2
- B.6.5.3 Use Case 2—Action #3
- B.6.5.4 Use Case 2—Action #4
- B.6.5.5 Use Case 2—Action #5
- B.6.5.6 Use Case 2—Action #6
- B.6.5.7 Use Case 2—Action #7
- B.6.5.8 Use Case 2—Action #8
- B.7 Use Case 3—Hospital @Home [Go to Page]
- B.7.1 Use case description
- B.7.2 Use case narrative
- B.7.3 Pre-conditions
- B.7.4 Use case actions
- B.7.5 Actors and stakeholders
- B.7.6 Use Case 3—Details [Go to Page]
- B.7.6.1 Use Case 3—Action #1
- B.7.6.2 Use Case 3—Action #2
- B.7.6.3 Use Case 3—Action #3
- B.7.6.4 Use Case 3—Action #4
- B.7.6.5 Use Case 3—Action #5
- B.7.6.6 Use Case 3—Action #6
- B.7.6.7 Use Case 3—Action #7
- B.8 Use Case 4—Home-to-Hospital [Go to Page]
- B.8.1 Use case description
- B.8.2 Use case narrative
- B.8.3 Pre-conditions
- B.8.4 Use case actions
- B.8.5 Actors and stakeholders
- B.8.6 Use Case 4—Details [Go to Page]
- B.8.6.1 Use Case 4—Action #1
- B.8.6.2 Use Case 4—Action #2
- B.8.6.3 Use Case 4—Action #3
- B.8.6.4 Use Case 4—Action #4
- B.8.6.5 Use Case 4—Action #5
- B.8.6.6 Use Case 4—Action #6
- B.9 Other CIoT use cases [Go to Page]
- B.9.1 Use cases from AAMI 2700-1:2019 ICE (Integrated Clinical Environment)
- B.9.2 Use cases from NITRD
- B.9.3 Use cases from ONC/AHIC common device connectivity
- B.9.4 Remote surveillance (minutes to treat)
- B.9.5 Remote monitoring (seconds to treat)
- B.9.6 Automated documentation of CIoT data
- B.9.7 Other use cases
- Annex C (informative) Lead/Support/Consult (L/S/C) table
- Annex D (informative) Integrated systems design and the conceptual reference architecture [Go to Page]
- D.1 Introduction
- D.2 Context for integrated systems design for Clinical IoT with TIPPSS
- D.3 Purpose and goal of integrated systems design
- D.4 Extensible and inclusive integrated systems design
- D.5 Overview of the reference architecture (RA)
- D.6 Application of the RA to the Hospital@Home example use case
- Annex E (informative) Overview of privacy frameworks [Go to Page]
- E.1 OECD—Fair Information Practices (FIPs)
- E.2 EU—General Data Protection Regulation (GDPR) Privacy Principles
- E.3 U.S. NIST—Privacy Framework
- E.4 U.S. HIPAA—Privacy Rule
- E.5 U.S. California—Consumer Privacy Act (CCPA) privacy principles
- E.6 Australia—Privacy Principles (APP)
- E.7 Canada—Personal Information Protection and Electronic Documents Act (PIPEDA)
- E.8 International—ISO/IEC 29100 Privacy Principles
- E.9 OECD—Council of Europe Convention, EU Data Protection Directive, and the Asia-Pacific Economic Cooperation (APEC)
- Annex F (informative) Comparison of privacy regulations/guidance
- Annex G (informative) Direct and indirect patient safety impact [Go to Page]
- G.1 Direct safety impact [Go to Page]
- G.1.1 Disruption of the clinical data flow
- G.1.2 Disruption of patient engagement
- G.1.3 Inability to use the clinical devices [Go to Page]
- G.1.3.1 Hospital-based CIoT with TIPPSS devices
- G.1.3.2 Wearable devices and sensors (portable, attachable, implantable/embedded, ingestible)
- G.1.3.3 Types of wearable devices as defined by the National Library of Medicine
- G.1.3.4 Inability to receive data from the CIoT with TIPPSS devices and sensors
- G.1.3.5 Integrity of the patient identification
- G.1.3.6 Preventable severe adverse events
- G.1.4 Regulated devices
- G.2 Indirect safety impact [Go to Page]
- G.2.1 Device monitoring systems (environmental)
- G.2.2 Device monitoring systems (clinical)
- G.2.3 DICOM data flows and interpretation
- G.2.4 Clinical orders and e-prescribing
- G.2.5 Device lifecycle management
- G.3 Operational and business impact [Go to Page]
- G.3.1 Environmental monitoring
- G.3.2 Disruption to workflow automation [Go to Page]
- G.3.2.1 Business disruption
- G.3.2.2 Loss of intellectual property
- G.3.2.3 Loss of sensitive data
- G.3.2.4 Compromise of user or network credentials
- Annex H (informative) Examples and rationale for ISD-derived requirements [Go to Page]
- H.1 Overview
- H.2 Documentation requirements
- H.3 Research and development (R&D) and pre-production requirements
- H.4 Postmarket requirements
- H.5 Context Layer requirements
- H.6 Technology Layer requirements [Go to Page]
- H.6.1 System software requirements
- H.6.2 Technology Layer general requirements
- H.6.3 Requirements associated with CIoT system hardware and firmware [Go to Page]
- H.6.3.1 Default password requirements
- H.6.3.2 Medical device marking and labeling requirements
- H.6.3.3 Personal data requirements
- H.6.3.4 Remote server requirements
- H.7 Application Services Layer requirements
- H.8 Healthcare Workflow Services (HWS) Layer requirements
- H.9 End-User Services (EUS) Layer requirements [Go to Page]
- H.9.1 End-User Services (EUS) Manager requirements
- H.9.2 End-User Services requirements
- H.10 Services Quality and Integration/Reconciliation of TIPPSS (SQIRT) Layer requirements [Go to Page]
- H.10.1 SQIRT Manager requirements
- H.10.2 Availability Manager requirements
- H.10.3 TIPPSS Managers [Go to Page]
- H.10.3.1 Trust Manager requirements
- H.10.3.2 Identity Manager requirements
- H.10.4 Privacy Manager requirements
- H.10.5 Protection and Safety Manager requirements
- H.10.6 Security Manager requirements
- H.11 Information Architecture Layer requirements
- H.12 Governance & Policies (G & P) Layer requirements [Go to Page]
- H.12.1 Requirements associated with interoperability and integration plans
- H.12.2 Requirements associated with TIPPSS policies and plans
- H.12.3 Requirements associated with system logs
- Back Cover [Go to Page]