The purpose of this document is to provide a concise description of the major security philisophy of the .decimal p.d software and related systems. This document should provide an understanding of the risk profile to end users of the software, which will help establish the mindset necessary to answer many of the commonly asked questions regarding the safety and security of the application.
The first question to consider when assessing the safety or security of a system is typically, what is the risk of a breach. To answer this question regarding the p.d software (and the entire process of ordering patient-specific medical devices from our company) we need to first understand the following:
Based on these high level system features, it should be evident that the Information Security risk to our customers due to a breach of p.d or .decimal company systems is very low, as:
Our goal at .decimal is to make it easy for customers to do business with us. This is precisely why we have implemented processes that use the minimal data necessary to place orders and why we provide standalone software that is compatible with most workstation configurations. By framing the review of the p.d software and the .decimal device ordering process in the context of a “Low Risk” service, we hope that customers are better able to streamline the IT/IS review process and help facilitate the quick adoption of our outsourced manufacturing services into their clinic to improve patient care.