Smart Assist Network Engineer Training Text
JA

Chapter 9 Medical Data and Regulations

HHS/HIPAA

HIPAA (US)

EU GDPR

GDPR (EU)

Japan

Three-Ministry Two-Guideline Framework (Japan)


9.1 Confidentiality of Medical Information

Why Medical Information Receives Special Treatment

Medical information is specially protected under the laws of each country as information that requires a higher level of confidentiality than general personal information.

RegionLegal ClassificationLegal Basis
JapanSensitive Personal Information (requires special care)Act on the Protection of Personal Information (APPI)
USProtected Health Information (PHI)HIPAA
EUSpecial Category DataGDPR Article 9
ClassificationExamplesRisk upon Leakage
General personal informationName, address, phone numberPrivacy violation
Medical information (specially protected)Medical history, diagnosis results, test dataCause of discrimination/prejudice, impact on insurance/employment

Unique Characteristics of Medical Information

  • Irreversibility: Once leaked, medical history cannot be retracted
  • Potential for discrimination: Leakage of information about specific diseases may lead to social discrimination
  • Lifelong impact: Medical history information has implications throughout an individual's lifetime
  • May be obtained without consent: Tests may be performed without the individual's consent, such as during emergency transport

Implications for Smart Assist Engineers

In operations in Japan and other regions, Smart Assist handles microscope images and anonymized specimen IDs, and does not contain directly identifiable personal information. However, as engineers working on a system that handles medical data, it is essential to be aware of the confidentiality of medical information.

Note (US version): In the US, to meet CLIA requirements, the transmitted data includes specimen IDs (barcode IDs), date of birth, and sex, which constitute PHI (Protected Health Information). Therefore, engineers working on the US version of Smart Assist must have an understanding of HIPAA regulations regarding the handling of PHI. (See Chapter 2, Section 2.2)


9.2 What Is PHI?

Definition of PHI

PHI (Protected Health Information) refers to individually identifiable medical information. While it is a concept defined by the US HIPAA law, it is widely used as a common international term in medical IT.

Examples of Information That Qualifies as PHI

CategoryExamples
Personal identifiersName, address, date of birth, phone number, email address
Medical record numbersPatient ID, chart number
Medical informationDiagnosis results, prescription information, test results
Biometric informationFingerprints, facial photographs, genetic information
Insurance informationInsurer number, insured person number

PHI Identifiers (18 Items)

HIPAA defines medical information containing any of the following 18 items as PHI.

  1. Name
  2. Address (geographic information more specific than state)
  3. Dates (date of birth, admission date, discharge date, etc.)
  4. Phone number
  5. Fax number
  6. Email address
  7. Social Security Number (SSN)
  8. Medical record number
  9. Health plan beneficiary number
  10. Account number
  11. Driver's license number
  12. Vehicle identification number
  13. Device identifier
  14. Web URL
  15. IP address
  16. Biometric identifiers (fingerprints, voiceprints, etc.)
  17. Facial photograph
  18. Any other unique identifying number

Relationship with Smart Assist

In operations in Japan and other regions, the first step in regulatory compliance is to confirm and explain that the transmitted data from Smart Assist does not contain any of the above 18 identifiers.

Note (US version): In the US version, due to CLIA requirements, specimen IDs (barcode IDs), date of birth (item 3: Dates), and sex are included in the transmitted data. Since these qualify as PHI, protective measures based on the HIPAA Security Rule are required.


9.3 HIPAA (US)

What Is HIPAA?

HIPAA (Health Insurance Portability and Accountability Act) is a US federal law enacted in 1996. It establishes security and privacy standards for the electronic handling of medical information.

Key HIPAA Rules

RuleDescription
Privacy RuleRegulations on the use and disclosure of PHI
Security RuleTechnical and administrative standards for protecting electronic PHI (ePHI)
Breach Notification RuleNotification obligations in the event of a PHI breach

Three Types of Safeguards under the Security Rule

SafeguardDescriptionExample in Smart Assist
Administrative safeguardsSecurity policies, risk analysis, trainingTraining through this textbook
Physical safeguardsData center access controlPhysical security of AWS data centers
Technical safeguardsAccess control, encryption, audit logsTLS encryption, authentication tokens

BAA (Business Associate Agreement)

Under HIPAA, it is mandatory to execute a BAA (Business Associate Agreement) with external entities (Business Associates) that handle PHI. AWS supports BAA execution, enabling the construction of HIPAA-compliant environments.


9.4 GDPR (EU)

What Is GDPR?

GDPR (General Data Protection Regulation) is a data protection law that came into effect in 2018 and applies across the entire EU. It is a comprehensive regulation on the handling of personal data, with medical data requiring even stricter protection as "Special Category Data."

Key GDPR Principles

PrincipleDescription
Lawfulness, fairness, and transparencyData processing requires a legal basis
Purpose limitationData is collected only for clearly defined purposes
Data minimizationOnly the minimum necessary data is processed
AccuracyData must be kept accurate and up to date
Storage limitationData is retained only for the period necessary for its purpose
Integrity and confidentialityData is protected with appropriate security measures

Key Requirements for Medical Data

RequirementDescriptionSmart Assist Response
DPIA (Data Protection Impact Assessment)Prior assessment is mandatory for high-risk processing (Article 35)Required because the system handles medical data
DPA (Data Processing Agreement)Contract between data controller and processor (Article 28)Executed between the hospital (controller) and the vendor (processor)
DPO (Data Protection Officer)Appointment is mandatory for large-scale processing of Special Category Data (Article 37)Confirmed with the hospital
Data transfer restrictionsLegal basis required for transfers outside the EEA (Articles 44-49)EU-based regions are used for EU deployments
Breach notificationSupervisory authority must be notified within 72 hours (Article 33)Incident response procedures are in place

Penalties for GDPR Violations

Type of ViolationPenalty
Inadequate technical measures, etc.Up to EUR 10 million or 2% of annual global turnover, whichever is higher
Violation of basic data processing principlesUp to EUR 20 million or 4% of annual global turnover, whichever is higher

Related EU Regulations

RegulationDescription
EU MDR (Medical Device Regulation 2017/745)Regulation on medical devices. Also applies to SaMD (Software as a Medical Device)
NIS2 DirectiveCybersecurity requirements for critical infrastructure including healthcare institutions

9.5 Three-Ministry Two-Guideline Framework (Japan)

What Is the Three-Ministry Two-Guideline Framework?

This is the common name for the guidelines governing the handling of medical information in Japan. It refers to the following two guidelines.

GuidelineGoverning MinistryTarget
Guidelines for the Secure Management of Medical Information SystemsMinistry of Health, Labour and Welfare (MHLW)Medical institutions, pharmacies
Guidelines for Secure Management by Providers of Information Systems and Services Handling Medical InformationMinistry of Economy, Trade and Industry (METI) / Ministry of Internal Affairs and Communications (MIC)Information system and service providers

Key Requirements

Requirement CategoryDescription
Organizational safeguardsDevelopment of security policies, appointment of responsible personnel
Physical safeguardsAccess control for server rooms, theft prevention for equipment
Technical safeguardsAccess control, encryption, log management
Personnel safeguardsEmployee training, enforcement of confidentiality obligations
External storageRequirements for storing medical information in the cloud, etc.

Requirements for Cloud Service Usage

The Three-Ministry Two-Guideline Framework specifies requirements for storing medical information in the cloud.

RequirementDescription
Data center locationPreferably within Japan
Communication encryptionUse of appropriate encryption methods
Access controlOnly authorized users may access the data
Audit logsRecording and retention of access histories
Responsibility demarcationClarification of the scope of responsibility between medical institutions and vendors
ContractsExecution of SLAs, procedures for data deletion

Smart Assist Compliance Status

Smart Assist engineers need to be able to explain the following points to hospitals depending on the deployment region.

Common items (all regions):

  • Communications are encrypted using TLS 1.2 or higher
  • Access control and audit logs are properly implemented
  • Responsibility demarcation is documented

Region-specific items:

RegionKey Points to Explain
JapanUses the Tokyo Region (ap-northeast-1), and data is stored within Japan
USBAA (Business Associate Agreement) has been executed with AWS. Operated in a HIPAA-compliant environment
EUUses an EU-based region, and data is stored within the EEA. DPA (Data Processing Agreement) has been executed

9.6 Regulatory Comparison Summary

The following is a comparison summary of regulations across countries.

ItemJapanUSEU
Primary legislationAct on the Protection of Personal Information (APPI), Three-Ministry Two-Guideline FrameworkHIPAA, HITECH ActGDPR, EU MDR
Legal classification of medical informationSensitive Personal Information (requires special care)PHI (Protected Health Information)Special Category Data
Supervisory authorityPersonal Information Protection Commission (PPC), MHLWHHS OCR (Office for Civil Rights), FDANational DPA (Data Protection Authority), EDPB
Breach notification obligationPromptly (to the PPC)Within 60 days (to HHS OCR, for 500+ records)Within 72 hours (to national DPA)
Data storage locationPreferably within JapanNo explicit requirement (BAA execution is mandatory)Within the EEA in principle (SCCs required for transfers outside EEA)
Contract for outsourcingDocumentation of SLA and responsibility demarcationBAA (Business Associate Agreement)DPA (Data Processing Agreement)
PenaltiesUp to JPY 100 million (corporate), recommendations/ordersUp to approx. USD 2 million per violation/yearUp to EUR 20 million or 4% of annual global turnover
Medical device regulationPMD Act (PMDA approval)FDA 510(k) / PMAEU MDR (CE marking)

9.7 Data Retention and Responsibility Demarcation

Data Lifecycle

Data handled by Smart Assist requires rules regarding retention periods and deletion.

Data Creation Transmit Process (Classify) Return Results Retain Delete How long should data be retained? Who is responsible for deletion?

Considerations for Data Retention

ConsiderationDescription
Retention periodHow many days data is retained in the cloud after classification is complete
Purpose of retentionQuality control, re-verification, statistical analysis
Deletion methodLogical deletion or physical deletion; issuance of deletion certificates
BackupsRetention period and deletion of backup data

Responsibility Demarcation Points

In the operation of Smart Assist, the scope of responsibilities between the hospital and the vendor must be clearly defined.

Hospital Responsibilities - Internal network management - Smart Assist PC management - FW/proxy configuration - Internal data management Demarcation Point (Internet Gateway) Vendor Responsibilities - Cloud environment management - Application maintenance/operation - Secure data storage - Incident response - Periodic data deletion

Key Points for Documenting Responsibility Demarcation

ItemDescription
Definition of demarcation pointsClearly specify physical and logical boundaries
Incident responseContact information, escalation flow
Liability for data breachesMethods for root cause investigation, criteria for determining liability
Periodic reviewReconfirm responsibility demarcation at contract renewal

Legal Frameworks for Responsibility Demarcation by Region

RegionFrameworkHospital RoleVendor Role
JapanThree-Ministry Two-Guideline Framework / SLAInformation management officerService provider
USHIPAA / BAACovered EntityBusiness Associate
EUGDPR / DPAData ControllerData Processor

9.6 How to Read the Document: HIPAA Risk Assessment Report

Document Overview

"ARKRAY 2025 HIPAA Risk Assessment Report" is a report in which an independent third-party audit firm (ecfirst) evaluated ARKRAY's HIPAA compliance status. It was conducted in April 2025 and comprehensively assessed all items under the HIPAA Security Rule, Privacy Rule, and Breach Notification Rule.

Corresponding file: ARKRAY 2025 HIPAA Risk Assessment Report

What Is a HIPAA Risk Assessment?

HIPAA Security Rule Section 164.308(a)(1)(ii)(A) requires Covered Entities and Business Associates to conduct periodic risk assessments. This risk assessment is "a process for identifying and evaluating potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI (electronic Protected Health Information)."

ARKRAY serves as a Business Associate in the operation of Smart Assist and conducts this risk assessment as a legal obligation.

Report Structure

SectionContentWhat Staff Should Understand
Executive SummaryAssessment overview, key findings, Compliance Report CardCritical Findings: None -- No critical non-compliance issues were detected
SWOT AnalysisAnalysis of strengths, weaknesses, opportunities, and threatsEvaluation of organizational security maturity
Security Rule Risk AnalysisFull item evaluation of administrative, physical, and technical safeguardsCompliance status and risk level for each control item
Privacy Rule Risk AnalysisCompliance status regarding rules on PHI use and disclosureAppropriateness of PHI handling policies
Breach NotificationEvaluation of breach notification proceduresPreparedness of incident response framework

Three Safeguards under the HIPAA Security Rule

The HIPAA Security Rule is divided into the following three categories. The risk assessment evaluates all of them.

CategoryDescriptionExamples of Evaluated Items
Administrative Safeguards (Section 164.308)Administrative security measuresSecurity management processes, workforce security, access management, security awareness training, incident response procedures, contingency planning
Physical Safeguards (Section 164.310)Physical security measuresFacility access control, workstation use/security, device and media controls
Technical Safeguards (Section 164.312)Technical security measuresAccess control (user ID/automatic logoff/encryption), audit logs, data integrity, transmission security (TLS encryption)

How to Explain to Hospital IT Staff

QuestionDirection of Response
"Is there evidence of HIPAA compliance?"We conduct an annual HIPAA Risk Assessment by an independent third party (ecfirst), and no Critical Findings have been detected
"Have all Security Rule items been assessed?"All Implementation Specifications across Administrative / Physical / Technical Safeguards are included in the assessment scope
"Can we review the report?"The report can be made available for review after executing an NDA. The report is treated as Confidential
"Are there Breach Notification procedures in place?"Breach Notification procedures based on HIPAA Sections 164.404 through 164.414 are in place and have been evaluated in the report

9.7 How to Read the Document: ISO/IEC 27001 Certificate

Document Overview

"MSA-IS-718 Certificate of Registration" is a certificate proving that UHW (Universal Healthware, Inc.), which develops and operates Smart Assist, has obtained ISO/IEC 27001:2022 certification.

Corresponding file: MSA-IS-718_Certificate of Registration (English)

What Is ISO/IEC 27001?

ISO/IEC 27001 is an international standard for Information Security Management Systems (ISMS). It defines requirements for organizations to systematically manage information security risks and continually improve.

Certification Details

ItemDetails
Certification numberMSA-IS-718
Certified organizationUniversal Healthware, Inc.
Location59 Kanuincho, Kamigyo-ku, Kyoto (within Yojuin Temple)
Applicable standardJIS Q 27001:2025 (ISO/IEC 27001:2022 Amd 1:2024)
Scope of certificationSoftware development and web service development/management for medical laboratory data management systems
Initial certification dateSeptember 26, 2024
Expiration dateSeptember 25, 2027
Certification bodyManagement System Assessment Center Co., Ltd. (MSA)

Why ISO 27001 Certification Is Important

PerspectiveExplanation
Smart Assist development and operations are coveredThe scope of certification explicitly includes Smart Assist software development and web service management
Complementary to SOC 2SOC 2 covers the AWS infrastructure layer; ISO 27001 covers the application development and operations layer. Combining both provides full-stack security assurance
Relationship with HIPAA Risk AssessmentHIPAA Risk Assessment evaluates regulatory compliance; ISO 27001 is an international standard certification for security management systems. They provide assurance from different perspectives

How to Explain to Hospital IT Staff

QuestionDirection of Response
"Do you hold ISO 27001 certification?"UHW, which develops and operates Smart Assist, has obtained ISO/IEC 27001:2022 certification (Certificate No.: MSA-IS-718, valid through September 2027)
"Does the certification scope include Smart Assist?"The scope of certification is "Software development and web service development/management for medical laboratory data management systems," which includes Smart Assist
"Can you provide a copy of the certificate?"An English-language certificate can be provided

Overall Picture of Security Certifications and Assessments

The following provides an overview of the certifications and assessments related to Smart Assist.

Certification/AssessmentTargetAssessorCoverage
ISO/IEC 27001UHW (development/operations)MSA (certification body)ISMS for application development and operations
SOC 2 Type IIAWS (infrastructure)Ernst & YoungControls for cloud infrastructure
HIPAA Risk AssessmentARKRAY (PHI handling)ecfirst (third-party audit)HIPAA regulatory compliance status
BAAARKRAY <-> HospitalContracting partiesResponsibility demarcation for PHI handling

This three-layer structure (infrastructure -> application -> regulatory compliance) ensures that Smart Assist's security is evaluated and assured from multiple angles.


In the next chapter, we will learn practical troubleshooting techniques for issues that arise during the deployment and operation of Smart Assist.