• Topic ID: id_2022711
  • Version: 2.0
  • Date: Feb 23, 2020 9:43:46 PM

MR Security and Privacy Manual

These procedures outline the configuration of a secure environment for your MR system.

Prerequisites

Personnel requirements
Required persons Preliminary requirements Procedure Finalization
1 60 minutes - -
Tools and test equipment
Item Part number Manufacturer
BIOS Password - -
All EA3 Account Usernames, Roles, and Passwords - -
ePO Server Details for McAfee Antivirus:
  • Server name
  • IP address
  • Port number
  • Username and password
  • Certificate (not needed if using username and password
- -
Latest McAfee .dat file on a USB - -
McAfee Antivirus Software - -
IPv4/IPv6 Network Addresses
  • Device IPv6 Address
    note: Typically 2005::5/64 or can be a site custom address.
  • Transformer IPv6 Address
    note: Typically 2005::11/64 or can be a site custom address.
  • Device IPv4 Address
    note:

    Not applicable for IPv6-only networks.

    For mixed IPv6/IPv4 networks this is a site custom address.

  • Transformer IPv4 Address
    note:

    Not applicable for IPv6-only networks.

    For mixed IPv6/IPv4 networks this is a site custom address.

- -
DICOM Destinations and Information - -
VPN Software - -
Translated IPs - -
Safety

Before working in any GE Healthcare MR suite or performing any GE Healthcare service procedure, you must:

  • Have read and understood all hazard conditions and safety requirements in the latest revision of the GE Healthcare MR Service Safety Manual (5452735).
  • Have successfully completed all relevant GE Healthcare Environmental Health and Safety (EHS) courses (or for non-GE employees, equivalent workplace training courses).
  • Comply with all site-specific training and workplace safety requirements.

If you have any safety concerns at any time, do not begin work or immediately stop work and move to a safe location. Immediately contact your supervisor or site safety officer for instructions on how to proceed.

Procedure

  1. Setting the boot sequence
  2. Setting or changing the BIOS password
  3. Security levels
  4. Product Network Filter (PNF) firewall
  5. Enabling authorization (role-based access control)
  6. Installing antivirus software
  7. Enterprise Audit Trail (EAT)-audit logging
  8. Checking the SW Media integrity (Iso # Checksum)