Context/Background

We have a medical system containing sensitive patient health-related data.

Source

Establish comprehensive cybersecurity protocols to protect patient data from unauthorized access and cyber threats.

Metric/Acceptance Criteria

Conduct regular security audits and penetration tests, with no critical vulnerabilities found, and ensure compliance with relevant regulations (e.g., HIPAA, GDPR).