Bibliografie

Notitie toevoegen
Annuleren
Document toevoegen

Toegestaan: documenten (PDF, Word en Excel) en afbeeldingen (.png, .gif en .jpg). De maximale grootte per bestand is 5 MB.

Annuleren
[1] NEN-ISO/IEC 27000:2009 Information technology – Security techniques – Information security management systems – Overview and vocabulary
[2] NEN-ISO/IEC 27001:2005, Information technology – Security techniques – Information Security Management Systems – Requirements
[3] NEN-ISO/IEC 27002:2007, Information technology – Security techniques – Code of practice for information security management
[4] NEN-ISO/IEC 27003:2010 Information technology – Security techniques – Information security management system implementation guidance
[5] NEN-ISO/IEC 27004:2010 Information technology – Security techniques – Information security management – Measurement
[6] NEN-ISO/IEC 27005:2011 Information technology – Security techniques – Information security risk management
[7] NEN-ISO/IEC 27006:2007 Information technology – Security techniques – Requirements for bodies providing audit and certification of information security
[8] ISO/IEC CD 27007 Information technology – Security techniques – Guidelines for information security management systems auditing
[9] ISO/IEC DTR 27008 Information technology – Security techniques – Guidance for auditors on ISMS controls
[10] NEN-EN-ISO/IEC 17021:2006 Conformity assessment – Requirements for bodies providing audit and certification of management systems
[11] NEN-EN-ISO 9000:2005 Kwaliteitsmanagementsystemen – Grondbeginselen en verklarende woordenlijst
[12] NEN-EN-ISO 9001:2008 Kwaliteitsmanagementsystemen – Eisen
[13] NPR-CEN/TS 15224:2005 Gezondheidszorg – Kwaliteitsmanagementsystemen – Richtlijn voor het gebruik van EN ISO 9001:2000
[14] NEN-EN-ISO 19011Richtlijnen voor het uitvoeren van audits van managementsystemen
[15] NTA 8009:2007 Veiligheidsmanagementsysteem voor ziekenhuizen en instellingen die ziekenhuiszorg verlenen
[16] NPR-ISO Guide 73:2009 Risicomanagement – Verklarende woordenlijst
[17] NEN-ISO 31000:2009 Risk management – Principles and guidelines
[18] NPR-ISO/IECTR 18044:2004 IT security techniques – Information security incident management
[19] NEN-ISO/IEC 15408-1:2010 Information Technology – Security techniques – Evaluation Criteria for IT Security – Part 1: Introduction and general model
[20] NEN-ISO/IEC 15408-2:2008 Information Technology – Security techniques – Evaluation Criteria for IT Security – Part 2: Security functional components
[21] NEN-ISO/IEC 15408-3:2008 Information Technology – Security techniques – Evaluation Criteria for IT Security – Part 3: Security assurance components
[22] NEN-ISO/IEC 18028-4:2005 Information Technology – Security techniques – IT network security – Part 4: Securing remote access
[23] GAMP (Good Automated Manufacturing Practice): http://www.ispe.org
[24] Information Technology Infrastructure Library (ITIL): www.itil-officialsite.com
[25] NEN-EN-ISO 27799:2008 Health informatics – Information security management in health using ISO/IEC 27002
[26] ISO 17090-1:2008 Health Informatics – Public Key Infrastructure – Part 1: Framework and overview
[27] ISO 17090-2:2008 Health Informatics – Public Key Infrastructure – Part 2: Certificate profile
[28] ISO 17090-3:2008 Health Informatics – Public Key Infrastructure – Part 3: Policy management of certification authority
[29] ISO 21091 Health informatics – Directory services for security, communications, and identification of professionals and patients
[30] NPR-ISO/TS 25237 Health informatics – Pseudonymisation
[31] NPR-ISO/TS 21298:2009 Health informatics – Functional and structural roles
[32] NPR-ISO/TS 22600-1:2006 Health informatics – Privilege management and access control – Part 1: Overview and policy management
[33] NPR-ISO/TS 22600-2:2006 Health informatics – Privilege management and access control – Part 2: Formal models
[34] NPR-ISO/TS 22600-3:2009 Health informatics – Privilege management and access control – Part 3: Implementations
[35] NEN 7512:2005 Medische informatica – Informatiebeveiliging in de zorg – Vertrouwensbasis voor gegevensuitwisseling
[36] NEN 7513:2010 Medische informatica – Logging – Vastleggen van acties op elektronische patiëntdossiers
[37] NEN-ISO 22857:2004 Health Informatics – Guidelines on data protection to facilitate trans-border flows of personal health information
[38] NEN-EN 14484:2004 Health informatics – International transfer of personal health data covered by the EU data protection directive – High level security policy
[39] NEN-EN 14485:2004 Health informatics – Guidance for handling personal health data in international applications in the context of the EU data protection directive
[40] NPR 2083:2010 Geïntegreerde toepassing van ISO- en ISO/IEC-normen in de informatiehuishouding
[41] NEN-EN-ISO/IEC 27033 Information technology – Security techiques – Network security