Security

Safeguarding Innovation in Medical Imaging with Advanced Cybersecurity

At Perimeter Medical Imaging AI, we understand that cutting-edge medical imaging solutions require robust protection. Our cybersecurity services are designed to protect your patients, your data, and your operations from evolving cyber threats, ensuring the safe and seamless delivery of critical care.

Why Cybersecurity Matters in Medical Imaging

The healthcare industry is a prime target for cyberattacks, with sensitive patient data and critical systems at risk. At Perimeter, we are committed to safeguarding our devices against these threats, ensuring compliance with regulatory standards and maintaining operational integrity.

  • Patient Safety: Prevent unauthorized access that could disrupt critical imaging services.
  • Data Integrity: Protect sensitive patient information and imaging data.
  • Regulatory Compliance: Stay aligned with The Health Insurance Portability and Accountability Act (HIPAA), Section 524B of the Food, Drug & Cosmetic (FD&C) Act, and other regulatory frameworks.

Our Cybersecurity Solutions

1. Device Security Assessments

We conduct comprehensive vulnerability and risk assessments of our devices and backend systems to identify and mitigate potential threats before they can impact your operations.

  • Penetration/vulnerability testing for imaging devices.
  • Risk analysis tailored to healthcare environments.
  • Proactive threat detection and prevention of software components.

2. Secure Deployment and Configuration

Our experts ensure your Perimeter imaging devices are deployed and configured securely to minimize attack vectors while maximizing performance.

  • Hardened system configurations against unauthorized access.
  • Customized security settings based on your controlled environment.

3. Regulatory and Compliance Support

Our solutions are designed to help you meet the highest standards of cybersecurity compliance, ensuring adherence to industry regulations and certifications.

  • HIPAA and FD&C compliance frameworks.
  • TUV certification
  • Documentation for audits and reporting.

Committed to Your Security

At Perimeter Medical Imaging AI, we see cybersecurity as a cornerstone of innovation, and is committed to empowering our customers with robust tools and resources to maintain the security and reliability of our advanced medical imaging solutions. 

Please contact Perimeter customer service by email at support@perimetermed.com or by phone (Toll-Free) at 1-888-988-7465 (PINK) for information on the following:

  • Real-Time Security Updates: Stay informed about the latest security updates and recommendations for your Perimeter imaging devices.
  • Vulnerability Status and Action Guidance: Quickly access information on potential vulnerabilities, their impact on Perimeter products, and recommended actions to mitigate risks.
  • Patch Management Insights: View historical and current patches, including details on non-critical updates, ensuring your systems remain up-to-date and secure.

Perimeter Medical Imaging AI aims to enhance transparency, streamline security management, and empower you to focus on delivering exceptional patient care with confidence.

Perimeter Medical Coordinated Vulnerability Disclosure (CVD) Process

At Perimeter Medical Imaging, the security and privacy of our patients, healthcare providers, and partners are of the utmost importance. We are committed to identifying, addressing, and mitigating potential security risks in our products. Our Coordinated Vulnerability Disclosure (CVD) process enables security researchers, customers, and other stakeholders to responsibly report vulnerabilities, so that we can promptly address them and continually strengthen the safety and effectiveness of our products.

We ask that security researchers follow a responsible disclosure process to protect patient safety and data integrity. Perimeter Medical’s CVD process is as follows:

  1. Initial Report: Researchers submit a report
  2. Validation and Reproduction: Our security team validates the report by reproducing the vulnerability and assessing its impact on our devices.
  3. Remediation: We develop and implement a fix or mitigation, prioritizing vulnerabilities according to severity.
  4. Notification and Update: Perimeter Medical Imaging will notify affected stakeholders and coordinate a public disclosure timeline.
  5. Public Disclosure: Once a fix is confirmed, Perimeter Medical will publish a security advisory for transparency and to our stakeholders.

Reporting Guidelines

To protect our systems and stakeholders, we request that researchers:

  • Avoid exploiting the vulnerability beyond what is necessary to prove its existence.
  • Refrain from publicly disclosing the vulnerability until Perimeter Medical Imaging has had an opportunity to address it.
  • Use the information only within the context of testing the vulnerability.
  • This CVD reporting mechanism is not to be used for inquiries related to already disclosed vulnerabilities or vulnerabilities in third-party components (not within Perimeter Medical product software). Information related to previously disclosed vulnerabilities can be requested through PMI personnel.

Reporting a Security Vulnerability

If you believe you have identified a security vulnerability in a Perimeter Medical Imaging system, please report it to us through our CVD Program. We ask that vulnerability reports include as much detail as possible to aid our investigation.

To report a vulnerability, please provide:

  • Contact Information: Name, email, or phone number, so we can follow up with you.
  • Description of the Vulnerability: A concise summary of the issue and its potential impact.
  • Product/System Information: Affected product name, serial number, version number, and any relevant configuration details.
  • Detailed Steps to Reproduce: If applicable, provide instructions or exploit code to help us verify and understand the vulnerability.
  • CVSS Score: If possible, provide a CVSS score to help us assess the severity of the issue.

Reports, with the above information, can be submitted via this form.

Upon receiving a CVD submission, we shall:

  • Acknowledge Your Submission: We will confirm receipt of your vulnerability report via email within five business days.
  • Assess and Prioritize: We will investigate and prioritize vulnerability based on severity, impact, and other relevant factors.
  • Timely Response: If your report is valid, we will work to remediate the issue as quickly as possible and communicate significant updates on the investigation.