Health informatics - Audit trails for electronic health records (ISO 27789:2013)

ISO 27789:2013 specifies a common framework for audit trails for electronic health records (EHR), in terms of audit trigger events and audit data, to keep the complete set of personal health information auditable across information systems and domains.
It is applicable to systems processing personal health information which, complying with ISO 27799, create a secure audit record each time a user accesses, creates, updates or archives personal health information via the system.
ISO 27789:2013 covers only actions performed on the EHR, which are governed by the access policy for the domain where the electronic health record resides. It does not deal with any personal health information from the electronic health record, other than identifiers, the audit record only containing links to EHR segments as defined by the governing access policy.
It does not cover the specification and use of audit logs for system management and system security purposes, such as the detection of performance problems, application flaw, or support for a reconstruction of data, which are dealt with by general computer security standards such as ISO/IEC 15408-2.

Medizinische Informatik - Audit-Trails für elektronische Gesundheitsakten (ISO 27789:2013)

Diese Internationale Norm legt einen gemeinsamen Rahmen für Audit-Trails für elektronische Gesundheitsakten (eGA), für die auslösenden Ereignisse eines Audits und für Auditdaten fest, um die Auditierbarkeit des vollständigen Satzes der persönlichen Gesundheitsinformationen über Informations-systeme und Zuständigkeitsbereiche hinweg aufrechtzuerhalten.
Sie ist anwendbar für Systeme die persönliche Gesundheitsinformationen verarbeiten, entsprechend ISO 27799, und jedes Mal, wenn ein Benutzer über das System auf diese Informationen zugreift, sie erzeugt, aktualisiert oder archiviert, einen sicheren Auditeintrag erstellen.
ANMERKUNG Bei diesem Auditeintrag handelt es sich mindestens um eine eindeutige Identifizierung des Benutzers, eine eindeutige Identifizierung des Behandelten, eine Angabe der vom Benutzer ausgeführten Funktion (Erzeugung, Zugriff auf, Aktualisierung eines Eintrags usw.) und die Aufzeichnung des Datums und der Uhrzeit, zu dem die Funktion ausgeführt wurde.
Diese Internationale Norm beschränkt sich auf an elektronischen Gesundheitsakten ausgeführte Aktionen, welche durch die Zugriffsleitlinien für die Domäne bestimmt werden, in der die elektronische Gesundheitsakte liegt. Sie enthalten abgesehen von Bezeichnern keinerlei persönliche Gesundheitsinformationen aus der elektronischen Gesundheitsakte. Der Auditeintrag enthält lediglich entsprechend den jeweiligen Zugriffsleitlinien definierte Verknüpfungen zu eGA-Segmenten.
Die Spezifikation und Anwendung von Auditprotokollen für die Systemverwaltung und Systemsicherheit, zum Beispiel zur Erkennung von Leistungsproblemen und Anwendungsfehlern oder zur Unterstützung einer Datenrekonstruktion, liegen außerhalb des Anwendungsbereichs dieses Dokuments. Diese Aspekte sind bereits in allgemeinen Normen zur IT-Sicherheit, zum Beispiel in ISO/IEC 15408-2 [9], behandelt.
Anhang A enthält Beispiele für verschiedene Auditszenarien. Anhang B gibt einen Überblick über Dienste für eine Auditprotokollverwaltung.

Informatique de santé - Historique d'expertise des dossiers de santé informatisés (ISO 27789:2013)

L'ISO 27789:2013 spécifie une structure commune pour les historiques d'expertise des dossiers informatisés de santé (DIS), en termes d'événements déclencheurs d'expertise et de données d'expertise, afin de conserver l'ensemble des informations personnelles de santé pouvant être expertisées sur tous les systèmes et domaines d'information.
Elle s'applique aux systèmes de traitement des informations personnelles de santé qui, conformément à l'ISO 27799, créent un enregistrement d'expertise sûr chaque fois qu'un utilisateur crée des informations personnelles de santé, qu'il y accède, qu'il les met à jour ou qu'il les archive par le biais du système.
L'ISO 27789:2013 ne couvre que les actions effectuées sur le dossier informatisé de santé, qui sont régies par une politique d'accès propre au domaine dans lequel s'inscrit le dossier informatisé de santé. Elle ne traite pas des informations personnelles de santé issues de dossier informatisé de santé mais uniquement des identifiants, l'enregistrement d'expertise ne contenant que les liens menant aux segments du dossier informatisé de santé, tel qu'établi par la politique d'accès en vigueur.
Elle ne couvre pas non plus la spécification et l'utilisation des rapports d'expertise dans un but de gestion et de sécurité du système, par exemple pour la détection des problèmes de performance, des failles au niveau des applications, ou en tant que support pour la reconstruction des données, qui sont traitées par les normes de sécurité informatique générales telles que l'ISO/CEI 15408.

Zdravstvena informatika - Revizijske sledi za elektronske zdravstvene zapise (ISO 27789:2013)

Ta mednarodni standard določa splošen okvir za revizijske sledi za elektronske zapise v zdravstvenem varstvu (EHR) v zvezi z dogodki, ki sprožijo revizijo, in revizijskimi podatki, da se ohrani možnost revizije celotnega sklopa osebnih zdravstvenih podatkov v informacijskih sistemih in domenah. Uporablja se za sisteme, ki obdelujejo osebne zdravstvene podatke in v skladu s standardom ISO 27799 ustvarijo varen revizijski zapis vsakič, ko uporabnik dostopi do, ustvari, posodobi ali arhivira osebne zdravstvene podatke prek sistema. Ta mednarodni standard obravnava le ukrepe v zvezi z elektronskimi zapisi v zdravstvenem varstvu, ki jih ureja pravilnik dostopa za domeno, v kateri se nahaja elektronski zapis v zdravstvenem varstvu. Standard razen identifikatorjev ne obravnava osebnih zdravstvenih podatkov iz elektronskega zapisa v zdravstvenem varstvu, pri čemer revizijski zapis vsebuje le povezave do segmentov elektronskih zapisov v zdravstvenem varstvu, kot je opredeljeno v veljavnem pravilniku dostopa. Standard ne obravnava specifikacije in uporabe revizijskih dnevnikov za namene vodenja in varnosti sistema, kot je zaznavanje težav z delovanjem, napaka pri uporabi ali podpora za obnovo podatkov, ki so obravnavani v standardih s področja splošne računalniške varnosti, kot je ISO/IEC 15408. V dodatku A so navedeni primeri revizijskih scenarijev. Dodatek B zajema pregled storitev revizijskih dnevnikov.

General Information

Status
Withdrawn
Publication Date
05-Mar-2013
Withdrawal Date
20-Jan-2026
Current Stage
9960 - Withdrawal effective - Withdrawal
Start Date
20-Oct-2021
Completion Date
28-Jan-2026

Relations

Effective Date
08-Jun-2022
Effective Date
28-Jan-2026
Standard

EN ISO 27789:2013 - BARVE

English language
53 pages
Preview
Preview
e-Library read for
1 day
Standard

EN ISO 27789:2013

English language
53 pages
Preview
Preview
e-Library read for
1 day

Get Certified

Connect with accredited certification bodies for this standard

BSI Group

BSI (British Standards Institution) is the business standards company that helps organizations make excellence a habit.

UKAS United Kingdom Verified

Sponsored listings

Frequently Asked Questions

EN ISO 27789:2013 is a standard published by the European Committee for Standardization (CEN). Its full title is "Health informatics - Audit trails for electronic health records (ISO 27789:2013)". This standard covers: ISO 27789:2013 specifies a common framework for audit trails for electronic health records (EHR), in terms of audit trigger events and audit data, to keep the complete set of personal health information auditable across information systems and domains. It is applicable to systems processing personal health information which, complying with ISO 27799, create a secure audit record each time a user accesses, creates, updates or archives personal health information via the system. ISO 27789:2013 covers only actions performed on the EHR, which are governed by the access policy for the domain where the electronic health record resides. It does not deal with any personal health information from the electronic health record, other than identifiers, the audit record only containing links to EHR segments as defined by the governing access policy. It does not cover the specification and use of audit logs for system management and system security purposes, such as the detection of performance problems, application flaw, or support for a reconstruction of data, which are dealt with by general computer security standards such as ISO/IEC 15408-2.

ISO 27789:2013 specifies a common framework for audit trails for electronic health records (EHR), in terms of audit trigger events and audit data, to keep the complete set of personal health information auditable across information systems and domains. It is applicable to systems processing personal health information which, complying with ISO 27799, create a secure audit record each time a user accesses, creates, updates or archives personal health information via the system. ISO 27789:2013 covers only actions performed on the EHR, which are governed by the access policy for the domain where the electronic health record resides. It does not deal with any personal health information from the electronic health record, other than identifiers, the audit record only containing links to EHR segments as defined by the governing access policy. It does not cover the specification and use of audit logs for system management and system security purposes, such as the detection of performance problems, application flaw, or support for a reconstruction of data, which are dealt with by general computer security standards such as ISO/IEC 15408-2.

EN ISO 27789:2013 is classified under the following ICS (International Classification for Standards) categories: 35.240.80 - IT applications in health care technology. The ICS classification helps identify the subject area and facilitates finding related standards.

EN ISO 27789:2013 has the following relationships with other standards: It is inter standard links to EN ISO 27789:2021, EN 1090-5:2017. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

EN ISO 27789:2013 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.

Standards Content (Sample)


SLOVENSKI STANDARD
01-maj-2013
Zdravstvena informatika - Revizijske sledi za elektronske zdravstvene zapise (ISO
27789:2013)
Health informatics - Audit trails for electronic health records (ISO 27789:2013)
Medizinische Informatik - Audit Trails für elektronische Gesundheitsakten (ISO
27789:2013)
Informatique de santé - Historique d'expertise des dossiers de santé informatisés (ISO
27789:2013)
Ta slovenski standard je istoveten z: EN ISO 27789:2013
ICS:
35.240.80 Uporabniške rešitve IT v IT applications in health care
zdravstveni tehniki technology
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD
EN ISO 27789
NORME EUROPÉENNE
EUROPÄISCHE NORM
March 2013
ICS 35.240.80
English Version
Health informatics - Audit trails for electronic health records (ISO
27789:2013)
Informatique de santé - Historique d'expertise des dossiers Medizinische Informatik - Audit-Trails für elektronische
de santé informatisés (ISO 27789:2013) Gesundheitsakten (ISO 27789:2013)
This European Standard was approved by CEN on 16 February 2013.

CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European
Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical references concerning such national
standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CEN member into its own language and notified to the CEN-CENELEC Management Centre has the same
status as the official versions.

CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United
Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION

EUROPÄISCHES KOMITEE FÜR NORMUNG

Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2013 CEN All rights of exploitation in any form and by any means reserved Ref. No. EN ISO 27789:2013: E
worldwide for CEN national Members.

Contents Page
Foreword . 3

Foreword
This document (EN ISO 27789:2013) has been prepared by Technical Committee ISO/TC 215 "Health
informatics" in collaboration with Technical Committee CEN/TC 251 “Health informatics” the secretariat of
which is held by NEN.
This European Standard shall be given the status of a national standard, either by publication of an identical
text or by endorsement, at the latest by September 2013, and conflicting national standards shall be
withdrawn at the latest by September 2013.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent rights.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the following
countries are bound to implement this European Standard: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech
Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece,
Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal,
Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom.
Endorsement notice
The text of ISO 27789:2013 has been approved by CEN as EN ISO 27789:2013 without any modification.

INTERNATIONAL ISO
STANDARD 27789
First edition
2013-03-01
Health informatics — Audit trails for
electronic health records
Informatique de santé — Historique d’expertise des dossiers de
santé informatisés
Reference number
ISO 27789:2013(E)
©
ISO 2013
ISO 27789:2013(E)
© ISO 2013
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO 2013 – All rights reserved

ISO 27789:2013(E)
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms . 4
5 Requirements and uses of audit data . 5
5.1 Ethical and formal requirements . 5
5.2 Uses of audit data . 6
6 Trigger events . 7
6.1 General . 7
6.2 Details of the event types and their contents . 7
7 Audit record details . 8
7.1 The general record format . 8
7.2 Trigger event identification . 9
7.3 User identification . .11
7.4 Access point identification .14
7.5 Audit source identification .15
7.6 Participant object identification .17
8 Audit records for individual events .23
8.1 Access events .23
8.2 Query events .24
9 Secure management of audit data .26
9.1 Security considerations .26
9.2 Securing the availability of the audit system .27
9.3 Retention requirements .27
9.4 Securing the confidentiality and integrity of audit trails .27
9.5 Access to audit data .27
Annex A (informative) Audit scenarios .28
Annex B (informative) Audit log services .35
Bibliography .44
ISO 27789:2013(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International
Standards adopted by the technical committees are circulated to the member bodies for voting.
Publication as an International Standard requires approval by at least 75 % of the member bodies
casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO 27789 was prepared by Technical Committee ISO/TC 215, Health informatics.
iv © ISO 2013 – All rights reserved

ISO 27789:2013(E)
Introduction
0.1 General
Personal health information is regarded by many as among the most confidential of all types of personal
information and protecting its confidentiality is essential if the privacy of subjects of care is to be
maintained. In order to protect the consistency of health information, it is also important that its entire
life cycle be fully auditable. Health records should be created, processed and managed in ways that
guarantee the integrity and confidentiality of their contents and that support legitimate control by
subjects of care in how the records are created, used and maintained.
Trust in electronic health records requires physical and technical security elements along with data
integrity elements. Among the most important of all security requirements to protect personal health
information and the integrity of records are those relating to audit and logging. These help to ensure
accountability for subjects of care who entrust their information to electronic health record (EHR)
systems. They also help to protect record integrity, as they provide a strong incentive to users of such
systems to conform to organizational policies on the use of these systems.
Effective audit and logging can help to uncover misuse of EHR systems or EHR data and can help
organizations and subjects of care obtain redress against users abusing their access privileges. For
auditing to be effective, it is necessary that audit trails contain sufficient information to address a wide
variety of circumstances (see Annex A).
Audit logs are complementary to access controls. The audit logs provide a means to assess compliance
with organizational access policy and can contribute to improving and refining the policy itself. But as
such a policy has to anticipate the occurrence of unforeseen or emergency cases, analysis of the audit
logs becomes the primary means of ensuring access control for those cases.
This International Standard is strictly limited in scope to logging of events. Changes to data values in
fields of an EHR are presumed to be recorded in the EHR database system itself and not in the audit
log. It is presumed that the EHR system itself contains both the previous and updated values of every
field. This is consistent with contemporary point-in-time database architectures.The audit log itself is
presumed to contain no personal health information other than identifiers and links to the record.
Electronic health records on an individual person may reside in many different information systems
within and across organizational or even jurisdictional boundaries. To keep track of all actions that
involve records on a particular subject of care, a common framework is a prerequisite. This International
Standard provides such a framework. To support audit trails across distinct domains it is essential to
include references in this framework to the policies that specify the requirements within the domain,
such as access control rules and retention periods. Domain policies may be referenced implicitly by
identification of the audit log source.
0.2 Benefits of using this International Standard
Standardization of audit trails on access to electronic health records aims at two goals:
— ensuring that information captured in an audit log is sufficient to clearly reconstruct a detailed
chronology of the events that have shaped the content of an electronic health record, and
— ensuring that an audit trail of actions relating to a subject of care’s record can be reliably followed,
even across organizational domains.
This International Standard is intended for those responsible for overseeing health information security
or privacy and for healthcare organizations and other custodians of health information seeking guidance
on audit trails, together with their security advisors, consultants, auditors, vendors and third-party
service providers.
0.3 Comparision with related standards on electronic health record audit trails
ISO 27789:2013(E)
This International Standard conforms to the requirements of ISO 27799:2008, insofar as they relate to
auditing and audit trails.
Some readers may be familiar with Internet Engineering Task Force (IETF) Request for Comment
[13]
(RFC) 3881. (Readers not already familiar with IETF RFC 3881 need not refer to that document, as
familiarity with it is not required to understand this International Standard.) Informational RFC 3881,
dated 2004-09 and no longer listed as active in the IETF database, was an early and useful attempt at
specifying the content of audit logs for healthcare. To the extent possible, this International Standard
builds upon, and is consistent with, the work begun in RFC 3881 with respect to access to the EHR.
0.4 A note on terminology
Several closely related terms are defined in Clause 3. An audit log is a chronological sequence of audit
records; each audit record contains evidence of directly pertaining to and resulting from the execution of a
process or system function. As EHR systems can be complex aggregations of systems and databases, there
may be more than one audit log containing information on system events that have altered a subject of
care’s EHR. Although the terms audit trail and audit log are often used interchangeably, in this International
Standard the term audit trail refers to the collection of all audit records from one or more audit logs that
refer to a specific subject of care or specific electronic health record or specific user. An audit system
provides all the information processing functions necessary to maintain one or more audit logs.
vi © ISO 2013 – All rights reserved

INTERNATIONAL STANDARD ISO 27789:2013(E)
Health informatics — Audit trails for electronic health
records
1 Scope
This International Standard specifies a common framework for audit trails for electronic health records
(EHR), in terms of audit trigger events and audit data, to keep the complete set of personal health
information auditable across information systems and domains.
It is applicable to systems processing personal health information which, complying with ISO 27799,
create a secure audit record each time a user accesses, creates, updates or archives personal health
information via the system.
NOTE Such audit records, at a minimum, uniquely identify the user, uniquely identify the subject of care,
identify the function performed by the user (record creation, access, update, etc.), and record the date and time at
which the function was performed.
This International Standard covers only actions performed on the EHR, which are governed by the
access policy for the domain where the electronic health record resides. It does not deal with any
personal health information from the electronic health record, other than identifiers, the audit record
only containing links to EHR segments as defined by the governing access policy.
It does not cover the specification and use of audit logs for system management and system security
purposes, such as the detection of performance problems, application flaw, or support for a reconstruction
[9]
of data, which are dealt with by general computer security standards such as ISO/IEC 15408-2.
Annex A gives examples of audit scenarios. Annex B gives an overview of audit log services.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
ISO 8601:2004, Data elements and interchange formats — Information interchange — Representation of
dates and times
ISO 27799:2008, Health informatics — Information security management in health using ISO/IEC 27002
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
access control
means to ensure that access to assets is authorized and restricted based on business and security
requirements
[ISO/IEC 27000:2012, definition 2.1]
3.2
access policy
definition of the obligations for authorizing access to a resource
ISO 27789:2013(E)
3.3
accountability
principle that individuals, organizations and the community are responsible for their actions and may
be required to explain them to others
[ISO 15489-1:2001, definition 3.2]
3.4
audit
systematic and independent examination of accesses, additions or alterations to electronic health
records to determine whether the activities were conducted, and the data were collected, used, retained
or disclosed according to organizational standard operating procedures, policies, good clinical practice,
and applicable regulatory requirement(s)
3.5
audit archive
archival collection of one or more audit logs
3.6
audit data
data obtained from one or more audit records
3.7
audit log
chronological sequence of audit records, each of which contains data about a specific event
3.8
audit record
record of a single specific event in the life cycle of an electronic health record
3.9
audit system
information processing system that maintains one or more audit logs
3.10
audit trail
collection of audit records from one or more audit logs relating to a specific subject of care or a specific
electronic health record
3.11
authentication
provision of assurance that a claimed characteristic of an entity is correct
[ISO/IEC 27000:2012, definition 2.8]
3.12
authorization
granting of privileges, which includes the granting of privileges to access data and functions
Note 1 to entry: Derived from ISO 7498-2: the granting of rights, which includes the granting of access based on
access rights.
3.13
authority
entity responsible for issuing certificates
3.14
availability
property of being accessible and useable upon demand by an authorized entity
[ISO/IEC 27000:2012, definition 2.10]
2 © ISO 2013 – All rights reserved

ISO 27789:2013(E)
3.15
confidentiality
property that information is not made available or disclosed to unauthorized individuals, entities or processes
[ISO/IEC 27000:2012, definition 2.13]
3.16
Coordinated Universal Time
UTC
time scale which forms the basis of a coordinated radio dissemination of standard frequencies and time
signals; it corresponds exactly in rate with international atomic time, but differs from it by an integral
number of seconds
[IEC 60050-713:1998]
3.17
data integrity
property that data have not been altered or destroyed in an unauthorized manner
[ISO 7498-2:1989, definition 3.3.21]
3.18
electronic health record
EHR
comprehensive, structured set of clinical, demographic, environmental, social and financial data in
electronic form, documenting the health care given to a single individual
[ASTM E1769:1995]
3.19
EHR segment
part of an EHR that constitutes a distinct resource for the access policy
3.20
identification
performance of tests to enable a data processing system to recognize entities
[ISO/IEC 2382-8:1998, definition 08.04.12 (as identitiy authentication, identity validation)]
3.21
identifier
piece of information used to claim an identity, before a potential corroboration by a corresponding
authenticator
3.22
information security
preservation of confidentiality, integrity and availability of information
[ISO/IEC 27000:2012, definition 2.30]
3.23
integrity
property of protecting the accuracy and completeness of assets
[ISO/IEC 27000:2012, definition 2.36]
ISO 27789:2013(E)
3.24
object identifier
OID
globally unique identifier for an information object
Note 1 to entry: The object identifiers used in this International Standard refer to code systems. These code
systems may be defined in a standard or locally defined per implementation. The object identifier is specified
using the Abstract Syntax Notation One (ASN.1) defined in ISO/IEC 8824-1 and ISO/IEC 8824-2.
3.25
policy
set of legal, political, organizational, functional and technical obligations for communication and cooperation
[ISO/TS 22600]
3.26
privilege
capacity assigned to an entity by an authority
3.27
records management
field of management responsible for the efficient and systematic control of the creation, receipt,
maintenance, use and disposition of records, including processes for capturing and maintaining evidence
of and information about business activities and transactions in the form of records
[ISO 15489-1, definition 3.16]
3.28
role
set of competences and/or performances associated with a task
3.29
sensitivity
measure of the potential or perceived potential to create harm to a data subject, or to be abused, or misused
3.30
security policy
plan or course of action adopted for providing computer security
[ISO/IEC 2382-8:1998, definition 08.01.06]
3.31
subject of care
person scheduled to receive, receiving or having received a health service
[ISO 18308:2011, definition 3.47]
3.32
user
person, device or program that uses an EHR system for data processing or health information exchange
4 Symbols and abbreviated terms
EHR Electronic Health Record
HL7 Health Level Seven International
OID Object Identifier
UTC Coordinated Universal Time
4 © ISO 2013 – All rights reserved

ISO 27789:2013(E)
5 Requirements and uses of audit data
5.1 Ethical and formal requirements
5.1.1 General
Healthcare providers have their professional ethical responsibilities to meet. Among these are protecting
the privacy of subjects of care and documenting the findings and activities of care. Restricting access to
health records and ensuring their appropriate use are both essential requirements in health care and in
many jurisdictions these requirements are set down in law.
Secure audit trails of access to electronic health records may support compliance with professional
ethics, organizational policies and legislation, but they are not sufficient in themselves to assess
completeness of an electronic health record.
5.1.2 Access policy
An organization responsible for maintaining an audit log shall identify the access policy governing all
accesses logged.
The access policy shall be in accordance with ISO 27799:2008, 7.8.1.2, Access control policy.
NOTE 1 The access policy is presumed to define an EHR segment structure.
NOTE 2 In the audit record the access policy is identified by the audit log source.
[6]
Guidance on specifying and implementing access policies can be found in ISO/TS 22600. A field
“Participant object Permission PolicySet” is defined in 7.6.6 to support referencing the actual policies in
the audit record.
5.1.3 Unambiguous identification of information system users
The audit trails shall provide sufficient data to unambiguously identify all authorized health information
system users. Users of the information system can be persons, but also other entities.
The audit trails shall provide sufficient data to determine which authorized users and external systems
have accessed or been sent health record data from the system.
5.1.4 User roles
The audit trail shall show the role of the user, while performing the recorded action on personal
health information.
Information systems processing personal health information should support role-based access control
capable of mapping each user to one or more roles, and each role to one or more system functions, as
recommended in ISO 27799:2008, 7.8.2.2, Privilege management.
[4]
Functional and structural roles are documented in ISO/TS 21298. Additional guidance on privilege
[6]
management in health is given by ISO/TS 22600, (all parts).
5.1.5 Secure audit records
Secure audit records shall be created each time personal health information is accessed, created,
updated or archived, in accordance with ISO 27799:2008, 7.7.10.2, Audit logging. The audit records shall
be maintained by secure records management.
ISO 27789:2013(E)
5.2 Uses of audit data
5.2.1 Governance and supervision
The audit trails shall provide data to enable responsible authorities to assess compliance with the
organization’s policy and to evaluate its effectiveness.
This implies
— detecting unauthorized access to health records,
— evaluating emergency access,
— detecting abuse of privileges,
and support for:
— documenting access across domains, and
— evaluation of access policies.
NOTE Full assessment of compliance with the organization’s policy can require additional data which are not
contained in the audit record, such as user information, permission tables or records on physical entry to secured
rooms. See Annex B for audit log services.
The audit trails shall provide sufficient data to determine all access within a defined time period to the
records of subjects of care, by a specified user.
The audit trails shall provide sufficient data to determine all access within a defined time period to the
records of subects of care, that are marked to be at elevated risk of privacy breaches.
5.2.2 Subjects of care exercising their rights
The audit trails shall provide sufficient data to subjects of care to enable:
— assessing which authorized user(s) have accessed his/her health record and when,
— assessing accountability for the content of the record,
— determination of compliance with the subject of care’s consent directives on access to or disclosure
of the subject of care’s data, and
— determination of emergency access (if any) granted by a user to the subject of care’s record, including
the identification of the user, time of access and location where accessed from.
5.2.3 Healthcare provider’s ethical or legal proof of action
The audit trails shall provide data to provide to care providers documented evidence of what information
was viewed and which actions were taken (create, look-up, read, correct, update, extract, output, archive,
etc.) in relation to the information when and by whom.
Retention of the audit records should be aligned with the legal terms of accountability within the
jurisdiction.
Refer to HL7 EHR Records Management and Evidentiary Support (RM-ES).
6 © ISO 2013 – All rights reserved

ISO 27789:2013(E)
6 Trigger events
6.1 General
The audit events (trigger events) that cause the audit system to generate audit records are defined
according to each health information system’s scale, purpose, and the contents of privacy and security
policies. The scope of this International Standard being limited to access to personal health information,
only trigger events relating to accesss are specified here.
In order to generate the audit records which satisfy the requirement derived from Clause 5 (Requirements
and uses of audit data), i.e. “when”, “who”, “whose”, the following two events are mandatory:
a) Access events to personal health information,
b) Query events about personal health information.
Examples of out-of-scope events are:
— start-and-stop events of the application program;
— authentication events involving authentication of users;
— input and output events from/to the external environment;
— access events to information other than personal health information;
— security alert events related to the application programs;
— access events to the audit log preserved in the application programs;
— events generated by the operating system, middleware and so on;
— access events generated by using system utilities;
— physical connection/disconnection events of equipments to the network;
— start/stop events of the protection systems such as anti-virus protection systems;
— software update events involving software modification or patch programs.
6.2 Details of the event types and their contents
6.2.1 Access events to the personal health information
In this International Standard, the access to the personal health information is regarded as the audit event.
Here “Access” means the creation, reading, update, deletion of data. The contents of the audit log provide
the information about the access “when”, “who” and “access to whose” data to be protected. See Table 1.
Table 1 — Access events
Event Contents
When,
Access events to the personal health
Who,
information
Access to whose
6.2.2 Query events to the personal health information
Querying an EHR database in order to obtain personal health information is regarded as an auditable
event. The query event is the query action itself, the reference to the personal health information
ISO 27789:2013(E)
resulting from the query is regarded as the access event. The contents of the audit record provide the
information about the query “when”, “who” and “what condition for querying”. See Table 2.
Table 2 — Query events
Event Contents
When,
Query events to the personal
Who,
health information
What condition for querying
7 Audit record details
7.1 The general record format
Table 3 describes the general format of the audit records. Regarding to the record contents of each event,
[13] [11]
see Clause 8. The record format is defined after RFC 3881 and DICOM, with addition of the optional
fields PurposeOfUse and ParticipantObjectPolicySet.
Table 3 — General format of the audit records
Type Field name Option Description Additional info.
Event related EventID M ID for the audited event
(1)
Type of action performed during
EventActionCode M
the audited event
Date/time of the audited event Refer to 7.2
EventDateTime M
occurrence
EventOutcomeIndicator U Success or failure of the event
EventTypeCode U The category of the event
User related UserID M ID for the person or process
(1.2)
AlternateUserID U Alternative ID for user or process
UserName U Name of user or process
Indicator that the user is or is not
UserIsRequestor U
Refer to 7.3
the requestor
Specification of the role the user
RoleIDCode U
plays when performing the event
Code for the purpose of use of the
PurposeOfUse U
data accessed
NetworkAccessPointTypeCode U Type of network access point
Refer to 7.4
NetworkAccessPointID U ID for network access point
Audit system AuditEnterpriseSiteID U Site ID of audit enterprise
related
AuditSourceID M Unique ID of audit source Refer to 7.5
(1)
AuditSourceTypeCode U Type code of audit source
8 © ISO 2013 – All rights reserved

ISO 27789:2013(E)
Table 3 (continued)
Type Field name Option Description Additional info.
Participant Code for the participant object
ParticipantObjectTypeCode M
object related type
(0.N) ParticipantObjectTypeCodeRole M Object type code of role
Identifier for the data life-cycle
ParticipantObjectDataLifeCycle U
stage for the participant object
ParticipantObjectIDTypeCode M Type code of Participant Object ID
Permission PolicySet for Partici-
ParticipantObjectPolicySet U
pantObjectID
Refer to 7.6
Sensitivity defined by the policy
ParticipantObjectSensitivity U
for ParticipantObjectID
Identifies a specific instance of the
ParticipantObjectID M
participant object
Object name of participant, such
ParticipantObjectName U
as a person’s name
Contents of query for the partici-
ParticipantObjectQuery M/U
pant object
ParticipantObjectDetail U Detail of participant object
Multiplicity: Optionality:
(1) M Mandatory
(0.1) 0 or 1 exists, MC Conditional Mandatory
(1.2) 1 or 2 exist(s) U Optional
(0.N) 0 to N exist(s) M/U Mandatory or Optional related to events
7.2 Trigger event identification
7.2.1 Event ID
Description: Unique identifier for a specific audited event, e.g. a menu item, program, rule, policy,
function code, application name or URL. It identifies the performed function.
Optionality: Mandatory
Format/Values: Coded value, either defined by the system implementers or as a reference to a standard
vocabulary. The “code” attribute shall be unambiguous and unique, at least within Audit Source ID (see
7.5). Examples of Event IDs are program name, method name or function name.
[12] [1] [11]
NOTE The coding is modelled after IHE ITI TF-1 and TF-2 and ISO 12052, DICOM supplement 95 .
For implementation-defined coded values or references to standards, the XML schema in RFC 3881
defines the optional attributes as shown in Table 4.
Table 4 — Event ID reference attributes
Attribute Value
CodeSystem OID reference
CodeSystemName Name of the coding system; strongly recommended to be valued for locally-defined
code-sets.
CodeValue The specific code within the coding system
DisplayName The value to be used in displays and reports
OriginalText Input value that was translated to the code
ISO 27789:2013(E)
To support the requirement for unambiguous event identification, multiple values may not be specified.
Rationale: This identifies the audited function. For “Execute” Event Action Code audit records, this
identifies the application function performed.
At least one of CodeSystem (OID) or CodeSystemName is mandatory.
7.2.2 Event action code
Description: Indicator for type of action performed in the audit event.
Optionality: Mandatory
Format/Values: Enumeration as shown in Table 5.
Table 5 — Event action codes
Value Meaning Examples
C Create Create a new database object, such as Placing an Order
R Read/View/Print/Query Display or print data, such as a diagnosis
U Update Update data, such as Revise Personal Health Information
D Delete Make items unaccessible
E Execute Perform a system or application function such as search,
extract, or use of an object’s method
Rationale: This broadly indicates what kind of action was done on the Participant Object.
NOTE 1 Actions that are not enumerated above are considered an Execute of a specific function or object
interface method or treated two or more distinct events. An application action, such as an authorization or digital
signing, is a function Execute, and the Event ID would identify the function.
NOTE 2 For some applications, such as radiological imaging, a Query action can only determine the presence of
data, but not access the data themselves. Auditing need not always make as fine a distinction.
NOTE 3 Compound actions, such as “Move,” “Archive” or “Copy”, would be audited by creating audit data for
each operation - read, create, delete - or as an Execute of a function or method.
7.2.3 Event date and time
Description: A date/time specification that is unambiguous as to local time zones.
Optionality: Mandatory
Format/Values: A date/time representation that is unambiguous in conveying universal coordinated
time (UTC). The time shall be in a UTC format, as in ISO 8601:2004 and shall be within a tolerance of no
more than 250 ms of UTC.
Rationale: This ties an event to a specific date and time. Security audits typically require a consistent
time base to eliminate time-zone issues arising from geographical distribution.
NOTE In a distributed system, some sort of common time base, e.g. an NTP [RFC1305] server, is a good
implementation tactic.
7.2.4 Event outcome indicator
Description: Indicates whether the event succeeded or failed
Optionality: Optional
10 © ISO 2013 – All rights reserved

ISO 27789:2013(E)
Format/Values: Coded value. A code zero (0) indicates success. Values for failure of an event are not
meaningful within the scope of this International Standard.
[13]
Rationale: This field is specified to conserve compatibility with audit trails as defined in IETF RFC 3881.
7.2.5 Event type code
Description: Identifier for the category of event.
Optionality: Optional
Format/Values: Coded value enumeration, either defined by the system implementers or as a reference
to a standard vocabulary. For implementation-defined codes or references to standards, the XML schema
in RFC3881 defines the optional attributes as shown in Table 6.
Table 6 — Event type code reference attributes
Attribute Value
CodeSystem OID reference
CodeSystemName Name of the coding system; strongly recommended to be valued for locally-defined
code-sets
DisplayName The value to be used in displays and reports
OriginalText Input value that was translated to the code
Since events may be categorized in more than one way, there may be multiple values specified.
Rationale: This field enables queries of audit records by implementation-defined event categories.
7.3 User identification
7.3.1 User ID
Description: Unique identifier for the user actively participating in the event
Optionality: Mandatory
Format/Values: User identifier text string from the authentication system. It is a unique value within
the Audit Source ID (see 7.4).
Rationale: This field ties an audit event to a specific user. In this context, a user may be a person, group,
team, server, process, or task thread.
NOTE 1 For cross-system audits, especially with long retention, this user identifier is meant to permanently
tie an audit event to a specific user via a unique key that retains its uniqueness over the entire lifetime of the
archiving of the audit trail.
NOTE 2 For node-based authentication – where only the system hardware or process, but not a human user, is
identified – User ID would be the node name.
NOTE 3 If the audit trail is to be used for clinical audit, or to provide evidence, where needed, of misuse, the audit
trail might need to record sufficient information to unambiguously associate a unique identifier with an actual user.
7.3.2 Alternative user ID
Description: Alternative unique identifier for the user
Optionality: Optional
ISO 27789:2013(E)
Format/Values: User identifier text string from authentication system. This identifier would be one
known to a common authentication system, if available.
Rationale: In some situations a user may authenticate with one identity but, to access a specific
application system, may use a synonymous identify. The alternative identifier would then be the original
identify used for authentication, and the User ID is the one known to and used by the application.
7.3.3 User name
Description: The human-meaningful name for the user
Optionality: Optional
Format/Values: Text string
Rationale: The User ID and Alternative User ID may be internal or otherwise obscure values. This field
assists the auditor in identifying the actual user.
7.3.4 User is requestor
Description: Indicator that the user is or is not the requestor or initiator, for the event being audited.
Optionality: Optional
Format/Values: Boolean, default/assumed value is “true”
Rationale: This value is used to distinguish between requestor-users and recipient-users. For examp
...


SLOVENSKI STANDARD
01-maj-2013
Zdravstvena informatika - Revizijske sledi za elektronske zapise v zdravstvenem
varstvu (ISO 27789:2013)
Health informatics - Audit trails for electronic health records (ISO 27789:2013)
Medizinische Informatik - Audit Trails für elektronische Gesundheitsakten (ISO
27789:2013)
Informatique de santé - Historique d'expertise des dossiers de santé informatisés (ISO
27789:2013)
Ta slovenski standard je istoveten z: EN ISO 27789:2013
ICS:
35.240.80 Uporabniške rešitve IT v IT applications in health care
zdravstveni tehniki technology
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD
EN ISO 27789
NORME EUROPÉENNE
EUROPÄISCHE NORM
March 2013
ICS 35.240.80
English Version
Health informatics - Audit trails for electronic health records (ISO
27789:2013)
Informatique de santé - Historique d'expertise des dossiers Medizinische Informatik - Audit-Trails für elektronische
de santé informatisés (ISO 27789:2013) Gesundheitsakten (ISO 27789:2013)
This European Standard was approved by CEN on 16 February 2013.

CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European
Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical references concerning such national
standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CEN member into its own language and notified to the CEN-CENELEC Management Centre has the same
status as the official versions.

CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United
Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION

EUROPÄISCHES KOMITEE FÜR NORMUNG

Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2013 CEN All rights of exploitation in any form and by any means reserved Ref. No. EN ISO 27789:2013: E
worldwide for CEN national Members.

Contents Page
Foreword . 3

Foreword
This document (EN ISO 27789:2013) has been prepared by Technical Committee ISO/TC 215 "Health
informatics" in collaboration with Technical Committee CEN/TC 251 “Health informatics” the secretariat of
which is held by NEN.
This European Standard shall be given the status of a national standard, either by publication of an identical
text or by endorsement, at the latest by September 2013, and conflicting national standards shall be
withdrawn at the latest by September 2013.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent rights.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the following
countries are bound to implement this European Standard: Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech
Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece,
Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal,
Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom.
Endorsement notice
The text of ISO 27789:2013 has been approved by CEN as EN ISO 27789:2013 without any modification.

INTERNATIONAL ISO
STANDARD 27789
First edition
2013-03-01
Health informatics — Audit trails for
electronic health records
Informatique de santé — Historique d’expertise des dossiers de
santé informatisés
Reference number
ISO 27789:2013(E)
©
ISO 2013
ISO 27789:2013(E)
© ISO 2013
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO 2013 – All rights reserved

ISO 27789:2013(E)
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Symbols and abbreviated terms . 4
5 Requirements and uses of audit data . 5
5.1 Ethical and formal requirements . 5
5.2 Uses of audit data . 6
6 Trigger events . 7
6.1 General . 7
6.2 Details of the event types and their contents . 7
7 Audit record details . 8
7.1 The general record format . 8
7.2 Trigger event identification . 9
7.3 User identification . .11
7.4 Access point identification .14
7.5 Audit source identification .15
7.6 Participant object identification .17
8 Audit records for individual events .23
8.1 Access events .23
8.2 Query events .24
9 Secure management of audit data .26
9.1 Security considerations .26
9.2 Securing the availability of the audit system .27
9.3 Retention requirements .27
9.4 Securing the confidentiality and integrity of audit trails .27
9.5 Access to audit data .27
Annex A (informative) Audit scenarios .28
Annex B (informative) Audit log services .35
Bibliography .44
ISO 27789:2013(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International
Standards adopted by the technical committees are circulated to the member bodies for voting.
Publication as an International Standard requires approval by at least 75 % of the member bodies
casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO 27789 was prepared by Technical Committee ISO/TC 215, Health informatics.
iv © ISO 2013 – All rights reserved

ISO 27789:2013(E)
Introduction
0.1 General
Personal health information is regarded by many as among the most confidential of all types of personal
information and protecting its confidentiality is essential if the privacy of subjects of care is to be
maintained. In order to protect the consistency of health information, it is also important that its entire
life cycle be fully auditable. Health records should be created, processed and managed in ways that
guarantee the integrity and confidentiality of their contents and that support legitimate control by
subjects of care in how the records are created, used and maintained.
Trust in electronic health records requires physical and technical security elements along with data
integrity elements. Among the most important of all security requirements to protect personal health
information and the integrity of records are those relating to audit and logging. These help to ensure
accountability for subjects of care who entrust their information to electronic health record (EHR)
systems. They also help to protect record integrity, as they provide a strong incentive to users of such
systems to conform to organizational policies on the use of these systems.
Effective audit and logging can help to uncover misuse of EHR systems or EHR data and can help
organizations and subjects of care obtain redress against users abusing their access privileges. For
auditing to be effective, it is necessary that audit trails contain sufficient information to address a wide
variety of circumstances (see Annex A).
Audit logs are complementary to access controls. The audit logs provide a means to assess compliance
with organizational access policy and can contribute to improving and refining the policy itself. But as
such a policy has to anticipate the occurrence of unforeseen or emergency cases, analysis of the audit
logs becomes the primary means of ensuring access control for those cases.
This International Standard is strictly limited in scope to logging of events. Changes to data values in
fields of an EHR are presumed to be recorded in the EHR database system itself and not in the audit
log. It is presumed that the EHR system itself contains both the previous and updated values of every
field. This is consistent with contemporary point-in-time database architectures.The audit log itself is
presumed to contain no personal health information other than identifiers and links to the record.
Electronic health records on an individual person may reside in many different information systems
within and across organizational or even jurisdictional boundaries. To keep track of all actions that
involve records on a particular subject of care, a common framework is a prerequisite. This International
Standard provides such a framework. To support audit trails across distinct domains it is essential to
include references in this framework to the policies that specify the requirements within the domain,
such as access control rules and retention periods. Domain policies may be referenced implicitly by
identification of the audit log source.
0.2 Benefits of using this International Standard
Standardization of audit trails on access to electronic health records aims at two goals:
— ensuring that information captured in an audit log is sufficient to clearly reconstruct a detailed
chronology of the events that have shaped the content of an electronic health record, and
— ensuring that an audit trail of actions relating to a subject of care’s record can be reliably followed,
even across organizational domains.
This International Standard is intended for those responsible for overseeing health information security
or privacy and for healthcare organizations and other custodians of health information seeking guidance
on audit trails, together with their security advisors, consultants, auditors, vendors and third-party
service providers.
0.3 Comparision with related standards on electronic health record audit trails
ISO 27789:2013(E)
This International Standard conforms to the requirements of ISO 27799:2008, insofar as they relate to
auditing and audit trails.
Some readers may be familiar with Internet Engineering Task Force (IETF) Request for Comment
[13]
(RFC) 3881. (Readers not already familiar with IETF RFC 3881 need not refer to that document, as
familiarity with it is not required to understand this International Standard.) Informational RFC 3881,
dated 2004-09 and no longer listed as active in the IETF database, was an early and useful attempt at
specifying the content of audit logs for healthcare. To the extent possible, this International Standard
builds upon, and is consistent with, the work begun in RFC 3881 with respect to access to the EHR.
0.4 A note on terminology
Several closely related terms are defined in Clause 3. An audit log is a chronological sequence of audit
records; each audit record contains evidence of directly pertaining to and resulting from the execution of a
process or system function. As EHR systems can be complex aggregations of systems and databases, there
may be more than one audit log containing information on system events that have altered a subject of
care’s EHR. Although the terms audit trail and audit log are often used interchangeably, in this International
Standard the term audit trail refers to the collection of all audit records from one or more audit logs that
refer to a specific subject of care or specific electronic health record or specific user. An audit system
provides all the information processing functions necessary to maintain one or more audit logs.
vi © ISO 2013 – All rights reserved

INTERNATIONAL STANDARD ISO 27789:2013(E)
Health informatics — Audit trails for electronic health
records
1 Scope
This International Standard specifies a common framework for audit trails for electronic health records
(EHR), in terms of audit trigger events and audit data, to keep the complete set of personal health
information auditable across information systems and domains.
It is applicable to systems processing personal health information which, complying with ISO 27799,
create a secure audit record each time a user accesses, creates, updates or archives personal health
information via the system.
NOTE Such audit records, at a minimum, uniquely identify the user, uniquely identify the subject of care,
identify the function performed by the user (record creation, access, update, etc.), and record the date and time at
which the function was performed.
This International Standard covers only actions performed on the EHR, which are governed by the
access policy for the domain where the electronic health record resides. It does not deal with any
personal health information from the electronic health record, other than identifiers, the audit record
only containing links to EHR segments as defined by the governing access policy.
It does not cover the specification and use of audit logs for system management and system security
purposes, such as the detection of performance problems, application flaw, or support for a reconstruction
[9]
of data, which are dealt with by general computer security standards such as ISO/IEC 15408-2.
Annex A gives examples of audit scenarios. Annex B gives an overview of audit log services.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
ISO 8601:2004, Data elements and interchange formats — Information interchange — Representation of
dates and times
ISO 27799:2008, Health informatics — Information security management in health using ISO/IEC 27002
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1
access control
means to ensure that access to assets is authorized and restricted based on business and security
requirements
[ISO/IEC 27000:2012, definition 2.1]
3.2
access policy
definition of the obligations for authorizing access to a resource
ISO 27789:2013(E)
3.3
accountability
principle that individuals, organizations and the community are responsible for their actions and may
be required to explain them to others
[ISO 15489-1:2001, definition 3.2]
3.4
audit
systematic and independent examination of accesses, additions or alterations to electronic health
records to determine whether the activities were conducted, and the data were collected, used, retained
or disclosed according to organizational standard operating procedures, policies, good clinical practice,
and applicable regulatory requirement(s)
3.5
audit archive
archival collection of one or more audit logs
3.6
audit data
data obtained from one or more audit records
3.7
audit log
chronological sequence of audit records, each of which contains data about a specific event
3.8
audit record
record of a single specific event in the life cycle of an electronic health record
3.9
audit system
information processing system that maintains one or more audit logs
3.10
audit trail
collection of audit records from one or more audit logs relating to a specific subject of care or a specific
electronic health record
3.11
authentication
provision of assurance that a claimed characteristic of an entity is correct
[ISO/IEC 27000:2012, definition 2.8]
3.12
authorization
granting of privileges, which includes the granting of privileges to access data and functions
Note 1 to entry: Derived from ISO 7498-2: the granting of rights, which includes the granting of access based on
access rights.
3.13
authority
entity responsible for issuing certificates
3.14
availability
property of being accessible and useable upon demand by an authorized entity
[ISO/IEC 27000:2012, definition 2.10]
2 © ISO 2013 – All rights reserved

ISO 27789:2013(E)
3.15
confidentiality
property that information is not made available or disclosed to unauthorized individuals, entities or processes
[ISO/IEC 27000:2012, definition 2.13]
3.16
Coordinated Universal Time
UTC
time scale which forms the basis of a coordinated radio dissemination of standard frequencies and time
signals; it corresponds exactly in rate with international atomic time, but differs from it by an integral
number of seconds
[IEC 60050-713:1998]
3.17
data integrity
property that data have not been altered or destroyed in an unauthorized manner
[ISO 7498-2:1989, definition 3.3.21]
3.18
electronic health record
EHR
comprehensive, structured set of clinical, demographic, environmental, social and financial data in
electronic form, documenting the health care given to a single individual
[ASTM E1769:1995]
3.19
EHR segment
part of an EHR that constitutes a distinct resource for the access policy
3.20
identification
performance of tests to enable a data processing system to recognize entities
[ISO/IEC 2382-8:1998, definition 08.04.12 (as identitiy authentication, identity validation)]
3.21
identifier
piece of information used to claim an identity, before a potential corroboration by a corresponding
authenticator
3.22
information security
preservation of confidentiality, integrity and availability of information
[ISO/IEC 27000:2012, definition 2.30]
3.23
integrity
property of protecting the accuracy and completeness of assets
[ISO/IEC 27000:2012, definition 2.36]
ISO 27789:2013(E)
3.24
object identifier
OID
globally unique identifier for an information object
Note 1 to entry: The object identifiers used in this International Standard refer to code systems. These code
systems may be defined in a standard or locally defined per implementation. The object identifier is specified
using the Abstract Syntax Notation One (ASN.1) defined in ISO/IEC 8824-1 and ISO/IEC 8824-2.
3.25
policy
set of legal, political, organizational, functional and technical obligations for communication and cooperation
[ISO/TS 22600]
3.26
privilege
capacity assigned to an entity by an authority
3.27
records management
field of management responsible for the efficient and systematic control of the creation, receipt,
maintenance, use and disposition of records, including processes for capturing and maintaining evidence
of and information about business activities and transactions in the form of records
[ISO 15489-1, definition 3.16]
3.28
role
set of competences and/or performances associated with a task
3.29
sensitivity
measure of the potential or perceived potential to create harm to a data subject, or to be abused, or misused
3.30
security policy
plan or course of action adopted for providing computer security
[ISO/IEC 2382-8:1998, definition 08.01.06]
3.31
subject of care
person scheduled to receive, receiving or having received a health service
[ISO 18308:2011, definition 3.47]
3.32
user
person, device or program that uses an EHR system for data processing or health information exchange
4 Symbols and abbreviated terms
EHR Electronic Health Record
HL7 Health Level Seven International
OID Object Identifier
UTC Coordinated Universal Time
4 © ISO 2013 – All rights reserved

ISO 27789:2013(E)
5 Requirements and uses of audit data
5.1 Ethical and formal requirements
5.1.1 General
Healthcare providers have their professional ethical responsibilities to meet. Among these are protecting
the privacy of subjects of care and documenting the findings and activities of care. Restricting access to
health records and ensuring their appropriate use are both essential requirements in health care and in
many jurisdictions these requirements are set down in law.
Secure audit trails of access to electronic health records may support compliance with professional
ethics, organizational policies and legislation, but they are not sufficient in themselves to assess
completeness of an electronic health record.
5.1.2 Access policy
An organization responsible for maintaining an audit log shall identify the access policy governing all
accesses logged.
The access policy shall be in accordance with ISO 27799:2008, 7.8.1.2, Access control policy.
NOTE 1 The access policy is presumed to define an EHR segment structure.
NOTE 2 In the audit record the access policy is identified by the audit log source.
[6]
Guidance on specifying and implementing access policies can be found in ISO/TS 22600. A field
“Participant object Permission PolicySet” is defined in 7.6.6 to support referencing the actual policies in
the audit record.
5.1.3 Unambiguous identification of information system users
The audit trails shall provide sufficient data to unambiguously identify all authorized health information
system users. Users of the information system can be persons, but also other entities.
The audit trails shall provide sufficient data to determine which authorized users and external systems
have accessed or been sent health record data from the system.
5.1.4 User roles
The audit trail shall show the role of the user, while performing the recorded action on personal
health information.
Information systems processing personal health information should support role-based access control
capable of mapping each user to one or more roles, and each role to one or more system functions, as
recommended in ISO 27799:2008, 7.8.2.2, Privilege management.
[4]
Functional and structural roles are documented in ISO/TS 21298. Additional guidance on privilege
[6]
management in health is given by ISO/TS 22600, (all parts).
5.1.5 Secure audit records
Secure audit records shall be created each time personal health information is accessed, created,
updated or archived, in accordance with ISO 27799:2008, 7.7.10.2, Audit logging. The audit records shall
be maintained by secure records management.
ISO 27789:2013(E)
5.2 Uses of audit data
5.2.1 Governance and supervision
The audit trails shall provide data to enable responsible authorities to assess compliance with the
organization’s policy and to evaluate its effectiveness.
This implies
— detecting unauthorized access to health records,
— evaluating emergency access,
— detecting abuse of privileges,
and support for:
— documenting access across domains, and
— evaluation of access policies.
NOTE Full assessment of compliance with the organization’s policy can require additional data which are not
contained in the audit record, such as user information, permission tables or records on physical entry to secured
rooms. See Annex B for audit log services.
The audit trails shall provide sufficient data to determine all access within a defined time period to the
records of subjects of care, by a specified user.
The audit trails shall provide sufficient data to determine all access within a defined time period to the
records of subects of care, that are marked to be at elevated risk of privacy breaches.
5.2.2 Subjects of care exercising their rights
The audit trails shall provide sufficient data to subjects of care to enable:
— assessing which authorized user(s) have accessed his/her health record and when,
— assessing accountability for the content of the record,
— determination of compliance with the subject of care’s consent directives on access to or disclosure
of the subject of care’s data, and
— determination of emergency access (if any) granted by a user to the subject of care’s record, including
the identification of the user, time of access and location where accessed from.
5.2.3 Healthcare provider’s ethical or legal proof of action
The audit trails shall provide data to provide to care providers documented evidence of what information
was viewed and which actions were taken (create, look-up, read, correct, update, extract, output, archive,
etc.) in relation to the information when and by whom.
Retention of the audit records should be aligned with the legal terms of accountability within the
jurisdiction.
Refer to HL7 EHR Records Management and Evidentiary Support (RM-ES).
6 © ISO 2013 – All rights reserved

ISO 27789:2013(E)
6 Trigger events
6.1 General
The audit events (trigger events) that cause the audit system to generate audit records are defined
according to each health information system’s scale, purpose, and the contents of privacy and security
policies. The scope of this International Standard being limited to access to personal health information,
only trigger events relating to accesss are specified here.
In order to generate the audit records which satisfy the requirement derived from Clause 5 (Requirements
and uses of audit data), i.e. “when”, “who”, “whose”, the following two events are mandatory:
a) Access events to personal health information,
b) Query events about personal health information.
Examples of out-of-scope events are:
— start-and-stop events of the application program;
— authentication events involving authentication of users;
— input and output events from/to the external environment;
— access events to information other than personal health information;
— security alert events related to the application programs;
— access events to the audit log preserved in the application programs;
— events generated by the operating system, middleware and so on;
— access events generated by using system utilities;
— physical connection/disconnection events of equipments to the network;
— start/stop events of the protection systems such as anti-virus protection systems;
— software update events involving software modification or patch programs.
6.2 Details of the event types and their contents
6.2.1 Access events to the personal health information
In this International Standard, the access to the personal health information is regarded as the audit event.
Here “Access” means the creation, reading, update, deletion of data. The contents of the audit log provide
the information about the access “when”, “who” and “access to whose” data to be protected. See Table 1.
Table 1 — Access events
Event Contents
When,
Access events to the personal health
Who,
information
Access to whose
6.2.2 Query events to the personal health information
Querying an EHR database in order to obtain personal health information is regarded as an auditable
event. The query event is the query action itself, the reference to the personal health information
ISO 27789:2013(E)
resulting from the query is regarded as the access event. The contents of the audit record provide the
information about the query “when”, “who” and “what condition for querying”. See Table 2.
Table 2 — Query events
Event Contents
When,
Query events to the personal
Who,
health information
What condition for querying
7 Audit record details
7.1 The general record format
Table 3 describes the general format of the audit records. Regarding to the record contents of each event,
[13] [11]
see Clause 8. The record format is defined after RFC 3881 and DICOM, with addition of the optional
fields PurposeOfUse and ParticipantObjectPolicySet.
Table 3 — General format of the audit records
Type Field name Option Description Additional info.
Event related EventID M ID for the audited event
(1)
Type of action performed during
EventActionCode M
the audited event
Date/time of the audited event Refer to 7.2
EventDateTime M
occurrence
EventOutcomeIndicator U Success or failure of the event
EventTypeCode U The category of the event
User related UserID M ID for the person or process
(1.2)
AlternateUserID U Alternative ID for user or process
UserName U Name of user or process
Indicator that the user is or is not
UserIsRequestor U
Refer to 7.3
the requestor
Specification of the role the user
RoleIDCode U
plays when performing the event
Code for the purpose of use of the
PurposeOfUse U
data accessed
NetworkAccessPointTypeCode U Type of network access point
Refer to 7.4
NetworkAccessPointID U ID for network access point
Audit system AuditEnterpriseSiteID U Site ID of audit enterprise
related
AuditSourceID M Unique ID of audit source Refer to 7.5
(1)
AuditSourceTypeCode U Type code of audit source
8 © ISO 2013 – All rights reserved

ISO 27789:2013(E)
Table 3 (continued)
Type Field name Option Description Additional info.
Participant Code for the participant object
ParticipantObjectTypeCode M
object related type
(0.N) ParticipantObjectTypeCodeRole M Object type code of role
Identifier for the data life-cycle
ParticipantObjectDataLifeCycle U
stage for the participant object
ParticipantObjectIDTypeCode M Type code of Participant Object ID
Permission PolicySet for Partici-
ParticipantObjectPolicySet U
pantObjectID
Refer to 7.6
Sensitivity defined by the policy
ParticipantObjectSensitivity U
for ParticipantObjectID
Identifies a specific instance of the
ParticipantObjectID M
participant object
Object name of participant, such
ParticipantObjectName U
as a person’s name
Contents of query for the partici-
ParticipantObjectQuery M/U
pant object
ParticipantObjectDetail U Detail of participant object
Multiplicity: Optionality:
(1) M Mandatory
(0.1) 0 or 1 exists, MC Conditional Mandatory
(1.2) 1 or 2 exist(s) U Optional
(0.N) 0 to N exist(s) M/U Mandatory or Optional related to events
7.2 Trigger event identification
7.2.1 Event ID
Description: Unique identifier for a specific audited event, e.g. a menu item, program, rule, policy,
function code, application name or URL. It identifies the performed function.
Optionality: Mandatory
Format/Values: Coded value, either defined by the system implementers or as a reference to a standard
vocabulary. The “code” attribute shall be unambiguous and unique, at least within Audit Source ID (see
7.5). Examples of Event IDs are program name, method name or function name.
[12] [1] [11]
NOTE The coding is modelled after IHE ITI TF-1 and TF-2 and ISO 12052, DICOM supplement 95 .
For implementation-defined coded values or references to standards, the XML schema in RFC 3881
defines the optional attributes as shown in Table 4.
Table 4 — Event ID reference attributes
Attribute Value
CodeSystem OID reference
CodeSystemName Name of the coding system; strongly recommended to be valued for locally-defined
code-sets.
CodeValue The specific code within the coding system
DisplayName The value to be used in displays and reports
OriginalText Input value that was translated to the code
ISO 27789:2013(E)
To support the requirement for unambiguous event identification, multiple values may not be specified.
Rationale: This identifies the audited function. For “Execute” Event Action Code audit records, this
identifies the application function performed.
At least one of CodeSystem (OID) or CodeSystemName is mandatory.
7.2.2 Event action code
Description: Indicator for type of action performed in the audit event.
Optionality: Mandatory
Format/Values: Enumeration as shown in Table 5.
Table 5 — Event action codes
Value Meaning Examples
C Create Create a new database object, such as Placing an Order
R Read/View/Print/Query Display or print data, such as a diagnosis
U Update Update data, such as Revise Personal Health Information
D Delete Make items unaccessible
E Execute Perform a system or application function such as search,
extract, or use of an object’s method
Rationale: This broadly indicates what kind of action was done on the Participant Object.
NOTE 1 Actions that are not enumerated above are considered an Execute of a specific function or object
interface method or treated two or more distinct events. An application action, such as an authorization or digital
signing, is a function Execute, and the Event ID would identify the function.
NOTE 2 For some applications, such as radiological imaging, a Query action can only determine the presence of
data, but not access the data themselves. Auditing need not always make as fine a distinction.
NOTE 3 Compound actions, such as “Move,” “Archive” or “Copy”, would be audited by creating audit data for
each operation - read, create, delete - or as an Execute of a function or method.
7.2.3 Event date and time
Description: A date/time specification that is unambiguous as to local time zones.
Optionality: Mandatory
Format/Values: A date/time representation that is unambiguous in conveying universal coordinated
time (UTC). The time shall be in a UTC format, as in ISO 8601:2004 and shall be within a tolerance of no
more than 250 ms of UTC.
Rationale: This ties an event to a specific date and time. Security audits typically require a consistent
time base to eliminate time-zone issues arising from geographical distribution.
NOTE In a distributed system, some sort of common time base, e.g. an NTP [RFC1305] server, is a good
implementation tactic.
7.2.4 Event outcome indicator
Description: Indicates whether the event succeeded or failed
Optionality: Optional
10 © ISO 2013 – All rights reserved

ISO 27789:2013(E)
Format/Values: Coded value. A code zero (0) indicates success. Values for failure of an event are not
meaningful within the scope of this International Standard.
[13]
Rationale: This field is specified to conserve compatibility with audit trails as defined in IETF RFC 3881.
7.2.5 Event type code
Description: Identifier for the category of event.
Optionality: Optional
Format/Values: Coded value enumeration, either defined by the system implementers or as a reference
to a standard vocabulary. For implementation-defined codes or references to standards, the XML schema
in RFC3881 defines the optional attributes as shown in Table 6.
Table 6 — Event type code reference attributes
Attribute Value
CodeSystem OID reference
CodeSystemName Name of the coding system; strongly recommended to be valued for locally-defined
code-sets
DisplayName The value to be used in displays and reports
OriginalText Input value that was translated to the code
Since events may be categorized in more than one way, there may be multiple values specified.
Rationale: This field enables queries of audit records by implementation-defined event categories.
7.3 User identification
7.3.1 User ID
Description: Unique identifier for the user actively participating in the event
Optionality: Mandatory
Format/Values: User identifier text string from the authentication system. It is a unique value within
the Audit Source ID (see 7.4).
Rationale: This field ties an audit event to a specific user. In this context, a user may be a person, group,
team, server, process, or task thread.
NOTE 1 For cross-system audits, especially with long retention, this user identifier is meant to permanently
tie an audit event to a specific user via a unique key that retains its uniqueness over the entire lifetime of the
archiving of the audit trail.
NOTE 2 For node-based authentication – where only the system hardware or process, but not a human user, is
identified – User ID would be the node name.
NOTE 3 If the audit trail is to be used for clinical audit, or to provide evidence, where needed, of misuse, the audit
trail might need to record sufficient information to unambiguously associate a unique identifier with an actual user.
7.3.2 Alternative user ID
Description: Alternative unique identifier for the user
Optionality: Optional
ISO 27789:2013(E)
Format/Values: User identifier text string from authentication system. This identifier would be one
known to a common authentication system, if available.
Rationale: In some situations a user may authenticate with one identity but, to access a specific
application system, may use a synonymous identify. The alternative identifier would then be the original
identify used for authentication, and the User ID is the one known to and used by the application.
7.3.3 User name
Description: The human-meaningful name for the user
Optionality: Optional
Format/Values: Text string
Rationale: The User ID and Alternative User ID may be internal or otherwise obscure values. This field
assists the auditor in identifying the actual user.
7.3.4 User is requestor
Description: Indicator that the user is or is not the requestor or initiator, for the event being audited.
Optionality: Optional
Format/Values: Boolean, default/assumed value is “true”
Rationale: This value is used to distinguis
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...