Information Security Policy
🛡️ Information Security Policy
Our hospital implements the following security protocols in order to ensure the sustainability of diagnostic and treatment processes, to protect the integrity of patient data and to base confidentiality within the framework of legal legislation.
🔒 Our Safety Principles
The information security approach of our hospital is based on three basic principles:
- Confidentiality: Protection of data against unauthorized access.
- Integrity: Ensuring the accuracy and preservation of data intact.
- Accessibility: Information can only be accessed when it is needed by authorized persons.
⚙️ Technical and Administrative Measures
The following steps are followed to ensure that your data is archived in accordance with legal regulations and to prevent it from being shared with unauthorized third parties:
- Software and Hardware: The necessary technical infrastructure for security has been identified and the resources necessary for the uninterrupted operation of these systems have been allocated.
- Access Restriction: All operations in the hospital information system, such as reading, changing, deleting and adding, are limited within the scope of the authority.
- Backup: The necessary infrastructure has been created for the safe backup of all data and the relevant responsible persons have been identified.
- Personnel Responsibility: Our employees have been given data security trainings and their responsibilities have been assured in writing by work flows.
📂 Information Sharing and Privacy
Patient files and personal health information are only available to the following individuals and institutions:
- The patient himself.
- Relatives to whom the patient gave written consent.
- Relevant public institutions and organizations within the framework of health legislation.
- Judicial authorities competent in judicial cases.
Take a Step Today for Your Health
With our expert doctors and advanced healthcare solutions, let us create your own treatment plan together.
