Electronic functionalities

Information Security Management and Accreditations

Information Security Promotion Organization

Kaohsiung Chang Gung Memorial Hospital was approved by the Executive Yuan on January 30, 2020, and its information security responsibility level is a Class A specific non-public agency.

The Information and Communications Security Committee is affiliated to the Academic Affairs Committee and has a strategic performance management group, which is mainly implemented by the Management Department in policy formulation, promotion and education and training; the Information Security Control and Protection Group includes computer classes, instrumentation, management offices, public works offices, etc. IOT risk assessment and inventory, abnormal response and other operations

Information Security Policy

In order to ensure the smooth operation of the hospital's business, prevent information or communication systems from unauthorized access, use, control, leakage, destruction, tampering, destruction or other infringements, and ensure their Confidentiality, Integrity and Availability for all colleagues to follow:

  1. Establish an information security risk management mechanism to regularly review the effectiveness of information security risk management in response to changes in internal and external information security situations.
  2. Protect the confidentiality and integrity of smart information systems and information from unauthorized access and tampering.
  3. Strengthen the resilience of the IT system to ensure business continuity.
  4. Each department should cooperate with the hospital's information security policy to conduct asset inventory, risk assessment and information security protection response.
  5. In response to changes in the information security threat situation, handle Information security education and training, in order to improve the information security awareness of our colleagues, colleagues should also participate in the training.
  6. Rewards should be given to those who have made meritorious service in handling information security business.
  7. Do not open emails from unknown sources or from which the sender cannot be clearly identified.
  8. It is prohibited for multiple people to share a single information system account.

The information security policy ensures the confidentiality, integrity, and availability of information to avoid infringement. Last year, three information security courses were held to increase information security awareness.

Information security goals

Quantitative goals

  1. Maintain information system Continue to operate stably.
  2. Confidentiality: information omission, tampering and data leakage incidents, The number of times per month is zero.
  3. Integrity: Cases of unauthorized alteration or destruction of data, The number of pieces per month is zero.
  4. Confirm that 100% notification of information security incidents will be completed within 1 hour, and 100% completion of the case will be completed in accordance with the time limit specified by the classification of information security incidents.
  5. The attachment opening rate and link click rate of the email social engineering exercise were less than 9.4% and 3.8% respectively.

Qualitative goals

  1. Timely adjust the content of information security maintenance in response to changes in laws and technology to prevent information systems or information from unauthorized access, use, control, leakage, damage, tampering, destruction or other infringements, and to ensure its confidentiality performance, completeness and availability.
  2. Achieve the requirements of information security responsibility level classification and reduce the threat of information security risks.
  3. Improve personnel’s awareness of, effectively detect and prevent external attacks, etc.

Quantitative targets were met to report security incidents within one hour, and social engineering drill email opening rates and attachment click rates were lower than 10% and 6%.

Qualitative goals can keep pace with the times, meet hierarchical requirements, and improve information security awareness to detect and prevent external attacks.

Implementation status of information communication system protection benchmarks

Core information system protection mechanism:

■ Establish appropriate backup plans for public services in important areas of the computer room and set up:

■ Adopted by our hospital Dual backup (HA),At within tolerable time Services are provided by backup equipment.

■ Collection of important configuration settings files of the information communication system Entity isolation backup, adopting AIX dedicated computer operating environment in the HIS system.

Daily Execute core system Data backup:

In view of the protection mechanism of the core information and communication system, the computer room is equipped with fire extinguishing equipment, dual air-conditioning hosts, and dual-circuit uninterruptible power supply UPS to ensure the safety of the physical environment of the computer room.

Access control and video surveillance are implemented in the computer room area and office area to strictly control the entry and exit of personnel.

The core systems all adopt high-availability backup, and the backup equipment can take over and provide services within 30 minutes.

Core system data backups are performed daily, one copy is for remote backup, and the other tape backup is stored at Yongqing Advanced Cancer Medical Center.

Implementation status of information security matters to be handled

Our hospital is a Grade A critical infrastructure hospital, and all listed tasks have been implemented and met the requirements.

Information security protection system

Guided by patient privacy, a multi-channel information security protection system is constructed to prevent virus intrusions, illegal connections, phishing or malicious website control (social drills), as well as virus and Trojan protection, regular vulnerability scanning, etc. The detailed structure is as follows:

Information security control

◎ Obtained the ISO information security management system certification for the first time on April 15, 2009, and officially obtained the TAF (domestic CNS 27001:2006) and UKAS (foreign ISO 27001:2005) licenses on May 19

◎ Obtained the fifth 3-year follow-up certification update (ISO 27001:2013) on May 24, 2021, and conducted ISO 27001:2022 transition update verification on April 10, 2024.

Information security education and training

As for information security education and training, the four dedicated information security personnel have completed more than 12 hours of professional or functional training every year in compliance with regulations; the remaining staff have received more than 3 hours of general education training every year. The table on the right shows the three information security general education sessions conducted last year. Course completion rate has reached 99%.

If you have any questions, please contact us.

886-7-7317123