Building FDA Approved Wearable Medical Devices | Voler Systems
The U. S. Food and Drug Administration (FDA) has become more proactive and supportive of...
Cyber attacks on connected medical devices are increasing — and they are even more sobering than medical systems hacks. As Harvard Business Review (HBR) puts it, “medical systems hacks are scary, but medical device hacks could be even worse.” Wired, on the other hand, wrote that “medical devices are the next security nightmare.”
To fool-proof the security of your medical devices, you need to make them meet the requirements of the Food and Drug Administration (FDA) and other security standards, which is easier said than done when designing medical wearable devices and IoT devices.
Security challenges for endpoint devices in a fixed location are high. But security challenges for wearables are higher. Here are the top reasons why:
But security measures can be implemented to determine if the device is authorized to send data. Take the Apple watch for example. Aside from its fall detection capabilities, Apple watch’s API requires it to do the following:
Aside from knowing if the device is authorized to send data, you also need to determine if it has been spoofed, if there is a different device sending data, and if the device is sending the right data. You also need to check if it is sending data accurately and if data was taken at the right time.
Security Regulations for Medical Devices
The first step to meeting FDA and other security requirements is being aware of them. Here are the digital health requirements that you should meet to avoid embarrassing and expensive security breaches:
Tier 1 design also advises implementing resilience measures such as cryptographic verification and authentication, secure configuration, and cybersecurity BOM (CBOM).
Tier 2 has the same recommendations, but items may be ignored if a risk-based rational shows they are not appropriate.
HIPAA (Patient Data Privacy). The Health Insurance Portability and Accountability Act (HIPAA) is separate from security. But security must be in place to meet HIPAA. Here are its requirements:
CE Security Requirements. CE requirements are not as specific as FDA guidance, but are similar: devices must be safe, effective, and secure. There is a focus on data protection (see GDPR), which is stricter than U.S. patient data requirements.
Documents that apply include Annex I of the Medical Device Regulations (MDR), EN62304 on software, and EN14971 on hazard analysis. The required practices are the following:
It is the manufacturers’ responsibility to determine the minimum requirements for the operating environment concerning IT network characteristics and IT security measures that could not be implemented through the product design. This means the manufacturer is responsible for providing the information for a user to operate the device in a secure network, even if the manufacturer does not provide the network.
Medical device security standards are crucial for medical IoT and wearables design, but meeting the requirements is not an easy task. The only way to meet security requirements is through a security-by-design approach, which offers various benefits including the following:
How to implement security-by-design
First, be aware of regulatory requirements. Identify product requirements before starting a product design. Design security as part of the product design and test to ensure all requirements are met.
You should also consider the following elements when designing a medical device:
To successfully implement all these measures, hire in-house IoT engineers or a reliable third-party consultant. Voler, for example, was tapped to develop the XEEDA Wallet — the world’s first cryptocurrency hardware wallet for smartphones. Voler implemented security-by-design at every step of product development and designed the device with very high security (EAL Level 5), using multi-factor authentication, built-in biometric security features, and other critical security measures. Voler completed the challenging design on-time and on-budget.
As cybersecurity and privacy issues increase in healthcare, you should make security a top design priority. Meet FDA, CE, and other security requirements to ensure your devices are fool-proof and avoid the costly and embarrassing consequences of security breaches.
Voler can help select the right security design for your device. We offer expert guidance on designing and developing next-generation IoT and wearable devices. We help select the right technology for your device and determine the right combination of electronics for guaranteed security and reliability.
With so many wireless standards available for moving data from device to cloud, it can...
Voler announced today that it is expanding current medical device design capabilities...