Cover Image for System Acquisition, Development and Maintenance
Cover Image for System Acquisition, Development and Maintenance
47 Going

System Acquisition, Development and Maintenance

Hosted by Ghana Health Service ICT Department
Virtual
Registration
Welcome! To join the event, please register below.
About Event

Information Security plays a critical role in the health sector due to the volume and sensitivity of data used in healthcare delivery. The Health Sector has been designated as a Critical Information Infrastructure (CII) by the Cyber Security Authority (CSA), meaning any disruption to its digital systems could significantly affect national security and public wellbeing.

As a public health institution, the Ghana Health Service (GHS) is responsible for safeguarding Protected Health Information (PHI) and ensuring the confidentiality, integrity, and availability of its digital systems and data. To support this responsibility, GHS has developed and is implementing an Information Security Policy, Strategy, and Standards to guide and protect its ICT ecosystem.

This session focuses on System Acquisition, Development and Maintenance (Section 4.20), which establishes security requirements for the procurement, development, deployment, and management of ICT systems within GHS.

Purpose of the Webinar

This webinar is part of the ongoing dissemination of the GHS Information Security Policies and focuses on System Acquisition, Development and Maintenance (Section 4.20).

It aims to improve staff understanding of the security and governance requirements guiding how ICT systems are procured, developed, implemented, and maintained within the Service.

Webinar Objective

The objective of this webinar is to strengthen staff capacity to implement the System Acquisition, Development and Maintenance Policy by ensuring that all ICT systems used within GHS comply with procurement regulations, security best practices, and approved ICT governance structures.

Presentation Highlights

Overview of System Acquisition, Development and Maintenance (Section 4.20) within the GHS Information Security Policy.

ICT System Procurement

  • Requirements for acquiring ICT systems within GHS.

  • Role of the Head of ICT in reviewing technology acquisitions.

  • Security review and acceptance testing for purchased or donated systems.

Software Licensing and Compliance

  • Proper use of open-source and licensed software.

  • Importance of valid software licensing agreements.

System Implementation

  • Safe transition from old systems to new systems through parallel implementation.

Outsourced and Cloud Services

  • Use of cloud services such as SaaS, IaaS, and PaaS.

  • Agreements and security requirements for third-party service providers.

In-House System Development

  • Ownership of systems developed by GHS staff.

  • Confidentiality and protection of system source code.

Secure Development and Testing

  • Separation of development, testing, and live environments to reduce risk.

Mobile Devices and BYOD Security

  • Security requirements for staff using mobile or personal devices for work.

  • Device protection, updates, anti-malware, and access restrictions.

Policy Compliance

  • Use of authorized devices only.

  • Adherence to procurement and ICT governance regulations.

Live Demonstration

  • A live practical demonstration will be conducted

For more inquiries, call Benjamin +233 24 124 6642

47 Going