Context/Background: We have a medical system containing sensitive patient health-related data.

Source: Establish comprehensive cybersecurity protocols to protect patient data from unauthorized access and cyber threats.

Metric/Acceptance Criteria: Conduct regular security audits and penetration tests, with no critical vulnerabilities found, and ensure compliance with relevant regulations (e.g., HIPAA, GDPR).