Context/Background
We have a medical system containing sensitive patient health-related data.
Source
Establish comprehensive cybersecurity protocols to protect patient data from unauthorized access and cyber threats.
Metric/Acceptance Criteria
Conduct regular security audits and penetration tests, with no critical vulnerabilities found, and ensure compliance with relevant regulations (e.g., HIPAA, GDPR).