<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>&#x898F;&#x683C;&#x30DE;&#x30B9;&#x30BF;&#x30FC;</provider_name><provider_url>https://kikakumaster.com/ja/</provider_url><author_name>KikakuAdmin000</author_name><author_url>https://kikakumaster.com/ja/author/kikakuadmin000/</author_url><title>IEC 81001-5-1 - Health software and health IT systems safety, effectiveness and security &#x2014; Part 5-1: Security &#x2014; Activities in the product life cycle - &#x898F;&#x683C;&#x30DE;&#x30B9;&#x30BF;&#x30FC;</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="BwT8iXlRtE"&gt;&lt;a href="https://kikakumaster.com/ja/iso/iec-81001-5-1/"&gt;IEC 81001-5-1 &#x2013; Health software and health IT systems safety, effectiveness and security &#x2014; Part 5-1: Security &#x2014; Activities in the product life cycle&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://kikakumaster.com/ja/iso/iec-81001-5-1/embed/#?secret=BwT8iXlRtE" width="600" height="338" title="&#x201C;IEC 81001-5-1 &#x2013; Health software and health IT systems safety, effectiveness and security &#x2014; Part 5-1: Security &#x2014; Activities in the product life cycle&#x201D; &#x2014; &#x898F;&#x683C;&#x30DE;&#x30B9;&#x30BF;&#x30FC;" data-secret="BwT8iXlRtE" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://kikakumaster.com/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>Health software and health IT systems safety, effectiveness and security &#x2014; Part 5-1: Security &#x2014; Activities in the product life cycle - This document defines the LIFE CYCLE requirements for development and maintenance of HEALTH SOFTWARE needed to support conformance to IEC 62443-4-1 &#x2013; taking the specific needs for HEALTH SOFTWARE into account. The set of PROCESSES, ACTIVITIES, and TASKS described in this document establishes a common framework for secure HEALTH SOFTWARE LIFE CYCLE PROCESSES._x000D_ The purpose is to increase the CYBERSECURITY of HEALTH SOFTWARE by establishing certain ACTIVITIES and TASKS in the HEALTH SOFTWARE LIFE CYCLE PROCESSES and also by increasing the SECURITY of SOFTWARE LIFE CYCLE PROCESSES themselves._x000D_ It is important to maintain an appropriate balance of the key properties SAFETY, effectiveness and SECURITY as discussed in ISO 81001-1._x000D_ This document excludes specification of ACCOMPANYING DOCUMENTATION contents.</description></oembed>
