Roche Diagnostics
User Manual · Version 4.7 17
cobas IT 1000 application
System safety information
Failure to observe the following safety information may result in incorrect results,
data corruption, and data losses.
CAUTION
Malicious software or unauthorized access can result in data loss or solution
unavailability.
To avoid infection by malicious software or the unauthorized access and misuse of the
solution, the following recommendations are essential:
r Do not install and/or execute unapproved software on the cobas IT 1000 server.
r It is the customer’s responsibility to ensure that other computers and services on the
network (for example, the LIS, archiving share, backup share, or service) are properly
secured and protected against malicious software and unauthorized access.
r Customers are responsible for the security of their local area network, especially in
protecting it against malicious software and attacks. This protection might include
measures, such as a firewall, to separate the server from uncontrolled networks as well
as measures that ensure that the connected network is free of malicious code.
r Make sure that access and queries to the database are properly secured and protected
against unauthorized access.
r Make sure that system backup and archive files are protected from any unauthorized
access and disaster, this includes: remote storage location; disaster recovery sites;
secure transfer of backup files.
r Prevent credential theft.
o Use strong passwords.
o Do not share passwords.
o Do not write passwords down.
o Do not use the same credentials on multiple instruments.
CAUTION
Unauthorized access to the system
Unauthorized physical access to the system and attached IT infrastructure can
compromise the integrity and confidentiality of private data stored on the cobas IT 1000
server or on related removable media.
r Restrict physical access to the system to authorized persons.
r Physically protect the server running the application.
r Store related removable media in a safe place.
r Make sure that all device components maintaining private data are physically secure
(i.e. require a physical key to be accessed or removed).
r Implement security and authentication measures for removable media (i.e. USB drives,
CD-Rom/DVD, tapes, etc.).
CAUTION
Unauthorized access to the system configuration
Unauthorized access to the system configuration (administration interface, configuration
store, query packages) can lead to system failure, corrupted data, and unauthorized
disclosure of protected health information.
r Make sure that the system configuration in properly secured and protected against
unauthorized access.