Table of Contents
Separation of Rights and Roles
As part of the secure usage of our systems, we have implemented a granular roles and rights concept. Our customers can use these to define which users are granted which rights.
To achieve this we have established user groups, which can granularly restrict administration, editing, and viewing rights in our systems.
Roles and Rights Concept
With the help of role concepts, special rights can be assigned or withdrawn from individual team members within the our systems. The roles are divided into: Users, referrers, and administrators, who have extended rights to change settings and configurations. When assigning rights, we recommend the principle of minimum rights: as few rights as possible, only as many as are absolutely necessary.
Users
Users include all hospital employees who require access to the patient portal and its functions. In addition to doctors and carers, this can also include study personnel or administrative staff. It may also be necessary to grant temporary rights to external employees. The access devices and applications also play a role in the definition of rights.
Referrers
Referrers must be explicitly specified in the system so that they are allowed to enter appointments in the calendar (so-called referrer function) and exchange information (e.g. messages) with the hospital. Patient data transmitted in this way cannot be viewed by third parties under any circumstances.
Administrators
Administrators are users who have undergone special training on administrator rights and are therefore able to change the following settings and permissions:
No rights (neither create, read nor change)
Display resources and categories
Create, edit and delete templates (resource status, forms, appointment reminders)
Read (read data only)
Create (enter data)
Change (enter, edit and delete data)
All rights (full access to data)
These rights can be assigned differently for each area in the portal or for each module. Different roles can also be created so that users with the same tasks can be assigned the same rights quickly and easily.
Recommendations
For the secure usage of our system, we strongly recommend abiding by the following principles.
Strong Passwords
Passwords should be chosen in a way that they are difficult to compromise. We recommend following the advice from the BSI on choosing secure passwords. Our system enforces some of these rules. Nonetheless we recommend our customers choose secure passwords to match their own security requirements.
See the article from BSI: Sichere Passwörter erstellen (English here)
Multi-factor Authentication
Our systems support multi-factor authentication. We strongly recommend that it is enable and used for all accounts. As an administrator, it is possible to force all users to use multi-factor authentication.
Session Timeouts
Inactive users are automatically logged out after a specific period of time. This period can be specified by the administrator. We recommend to configure this value based on our customers’s own security requirements.
Use of Admin Account
We strongly recommend to not use the administrative account for daily tasks. It should only be used to administer the system. That is, for user and permission management.