Context/Background: We have a medical system containing sensitive patient health-related data.
Source: Establish comprehensive cybersecurity protocols to protect patient data from unauthorized access and cyber threats.
Metric/Acceptance Criteria: Conduct regular security audits and penetration tests, with no critical vulnerabilities found, and ensure compliance with relevant regulations (e.g., HIPAA, GDPR).