News | Cybersecurity | December 29, 2016| Dave Fornell

FDA Seeks Management of Cybersecurity in Medical Devices

Postmarket management of cybersecurity in medical devices guidance for industry and FDA now available

The FDA wants to regulate cybersecurity of ICDs and other medical devices.

The FDA has concerns about the cybersecurity of implantable medical devices with wireless connections for patient monitoring or adjustments to how the device functions. Changing the function of an implantable cardioverter defibrillator (ICD) using wireless access to the device could present a major patient safety issue.

As wearable and implantable patient monitoring or therapy devices become more sophisticated with advanced wireless connectivity to extract patient information and change the device functionality, there are growing concerns these technologies will be targets of hackers. The U.S. Food and Drug Administration (FDA) believes this poses a threat to patient safety. The agency announced in December 2016, the availability of the guidance document entitled  "Post-market Management of Cybersecurity in Medical Devices,” (Part 806 (21 CFR part 806))."

The FDA is issuing this guidance to inform industry and FDA staff of the agency's recommendations for managing postmarket cybersecurity vulnerabilities for marketed medical devices. The guidance clarifies FDA's postmarket recommendations with regards to addressing cybersecurity vulnerabilities and emphasizes that manufacturers should monitor, identify, and address cybersecurity vulnerabilities and exploits as part of the postmarket management of their medical devices.

The issue of cybersecurity of cardiac implantable devices raised concerns with the Secret Service for former vice president Dick Cheney, who had one of these devices. The issue was also raised in 2016 by a medical device market research firm that published a report alleging these vulnerabilities exist in St. Jude Medical's implantable electrophysiology (EP) devices. Read the article "Market Report Calls Into Question St. Jude Medical EP Device Safety, Cybersecurity."

Background on the FDA Cybersecurity Guidance 
On Feb. 19, 2013, the President issued Executive Order 13636 - Improving Critical Infrastructure Cybersecurity, which recognized that resilient infrastructure is essential to preserving national security, economic stability, and public health and safety in the United States. Executive Order 13636 states that cyber threats to national security are among the most serious and that stakeholders must enhance the cybersecurity and resilience of critical infrastructure. This includes 

the healthcare and public health critical infrastructure sector.

The FDA also said Presidential Policy Directive 21 - Critical Infrastructure Security and Resilience (PPD-21), issued on Feb. 13, 2013, tasks federal agencies to strengthen the security and resilience of critical infrastructure against physical and cyber threats such that these efforts reduce vulnerabilities, minimize consequences, and identify and disrupt threats. PPD-21 encourages all public and private stakeholders to share responsibility in achieving these outcomes.

In recognition of the shared responsibility for cybersecurity, the security industry has established resources including standards, guidelines, best practices and frameworks for stakeholders to adopt a culture of cybersecurity risk management. Best practices include collaboratively assessing cybersecurity intelligence information for risks to device functionality and clinical risk. FDA believes that, in alignment with Executive Order 13636 and PPD-21, public and private stakeholders should collaborate to leverage available resources and tools to establish a common understanding that assesses risks for identified vulnerabilities in medical devices among the information technology community, healthcare delivery organizations, the clinical user community, and the medical device community. These collaborations can lead to the consistent assessment and mitigation of cybersecurity threats, and their impact on medical device safety and effectiveness, ultimately reducing potential risk of patient harm.

Guidance Document Details
Part 806 (21 CFR part 806) requires device manufacturers or importers to report promptly to FDA certain actions concerning device corrections and removals. However, the majority of actions taken by manufacturers to address cybersecurity vulnerabilities and exploits, referred to as "cybersecurity routine updates and patches," are generally considered to be a type of device enhancement for which the FDA does not require advance notification or reporting under part 806. 

For a small subset of actions taken by manufacturers to correct device cybersecurity vulnerabilities and exploits that may pose a risk to health, the FDA would require medical device manufacturers to notify the agency.

This guidance clarifies changes to devices to be considered cybersecurity routine updates and patches (e.g., certain actions to maintain a controlled risk to health). In addition, the guidance outlines circumstances in which FDA does not intend to enforce reporting requirements under part 806 for specific vulnerabilities with uncontrolled risk. Specifically, FDA does not intend to enforce the reporting requirements when circumstances outlined in the guidance are met within the predefined periods of time (e.g., communicate vulnerability to customers and user community and propose a timeline for remediation within 30 days after learning of the vulnerability; fix the vulnerability and validate the change within 60 days after learning of the vulnerability; actively participate in an Information Sharing Analysis Organization (ISAO)). The agency considers voluntary participation in an Information ISAO a critical component of a medical device manufacturer's comprehensive proactive approach to management of postmarket cybersecurity threats and vulnerabilities and a significant step towards assuring the ongoing safety and effectiveness of marketed medical devices.

Public Comments on the Guidance Document
The public can submit comments via the Federal eRulemaking Portal at www.regulations.gov. All comments will be made public.

 

Related Healthcare Cybersecurity Content:

Raising the Bar for Medical Device Cyber Security

Healthcare Industry Lacking in Basic Cybersecurity Awareness Among Staff

Market Report Calls Into Question St. Jude Medical EP Device Safety, Cybersecurity

FDA Harshly Criticizes Abbott, St. Jude For Failure to Address EP Device Safety

Healthcare 2015 Data Breaches - Why the Cloud Is Not Responsible

HIMSS: Two-Thirds of Healthcare Organizations Experienced a Recent, Significant Security Incident

How You Should – and Should Not – Be Sharing Medical Information With Patients

How Can Doctors Practice Better Security?

U.S. Department of Health and Human Services, Office for Civil Rights, Breach Portal: Notice to the Secretary of HHS Breach of Unsecured Protected Health Information

 

Related Content

CorInnova Awarded 2017 InnoSTARS Prize for EpicHeart Soft Robotic Heart Assist Device
News | Artificial Heart| December 11, 2017
CorInnova Inc. recently announced it was awarded second prize in the “2017 InnoSTARS” life science competition for its...
New Siemens Healthineers Dashboard Application Provides Insights into Cardiology Operations
Technology | Analytics Software| December 11, 2017
Siemens Healthineers has launched teamplay Cardio, a new cardiology dashboard application within the Siemens...
Stereotaxis Receives Regulatory Approval of e-Contact Module in Canada
Technology | Ablation Systems| December 08, 2017
December 7, 2017 — Stereotaxis Inc.
ECG Study of NBA Players Shows Need for Sport-Specific Normative Data and Guidelines
News | ECG| December 08, 2017
Cardiologists at NewYork-Presbyterian/Columbia University Irving Medical Center compared electrocardiographic findings...
New Study Suggests Protein Could Protect Against Coronary Artery Disease

Patients with no obstructed blood flow in the coronary arteries had higher levels of CXCL5 (blue) compared to patients with moderate levels (green) or lower levels (yellow) of CXCL5, who had increased severity of coronary obstructions (indicated by the arrows). Credit: Schisler lab

News | Cardiac Diagnostics| December 07, 2017
December 7, 2017 — The buildup of plaque in the heart’s arteries is an unfortunate part of aging.
Edwards Acquires Harpoon Medical
News | Heart Valve Technology| December 07, 2017
December 7, 2017 — Edwards Lifesciences Corp.
Robocath Receives $1.5 Million in Capital for Advancement of R-One Robotic System
News | Robotic Systems| December 06, 2017
December 6, 2017 — French company Robocath, which designs and develops...
New data on the Corvia intra-atrial shunt to treat diastolic heart failure were presented at the recent 2017 American Heart Association (AHA) Scientific Sessions. It was the most popular story in November.

New data on the Corvia intra-atrial shunt to treat diastolic heart failure were presented at the recent 2017 American Heart Association (AHA) Scientific Sessions. It was the most popular story in November.

Feature | December 06, 2017 | Dave Fornell
Here is the list of the most popular articles and videos on the Diagnostic and Interventional Cardiology (DAIC) magaz
E-cigarettes Most Likely to be Used by Alcohol Drinkers and Former Cigarette Smokers, at American Heart Association (AHA), #AHA2017.
News | Cardiac Diagnostics| December 06, 2017
December 6, 2017 — Electronic cigarettes are more frequently used by people who recently quit smoking and alcohol dri
Women who develop high blood pressure during pregnancy are more likely to experience heart failure and heart attack. American Heart Association (AHA), #AHA2017
News | Womens Healthcare| December 06, 2017
December 6, 2017 — Women who develop high blood pressure during pregnancy are more likely to experience heart problem
Overlay Init