FDA Publishes Cyber Guidance for Medical Devices
Client Alert | 4 min read | 10.07.14
On October 2, 2014, the FDA released a set of guidelines designed to improve the cybersecurity of medical devices and to combat increasing vulnerability to cyber-attacks. Compliance with the guidelines, although not mandatory, is strongly recommended to protect not only patients, but also manufacturers, facilities, and providers. In drafting the guidelines, the FDA was careful to consider the particular sensitivities involved in the regulation of instruments designed for health care. Overly strict regulations may run the risk of inhibiting a device's functional capabilities – a distinct concern in the case of devices intended for emergency response. Conversely, if regulations are not strict enough, there is an increased risk of potential cyber incidents that could result in patient harm such as illness, injury, or even death.
The FDA suggests that manufacturers address cybersecurity issues during the design and development of medical devices. The general guidelines propose that manufacturers identify any assets, threats, and vulnerabilities of a new medical device; assess the likelihood of a security incident and its potential impact on device functionality and end users; determine the level of risk and mitigation strategies; and assess residual risk and risk acceptance. Notably, however, there is no requirement that manufacturers revisit existing devices to ensure adequate security measures are in place. Also notable is that application of the guidelines is not limited to devices that have the ability to connect to another device or to portable media (though the guidelines call for additional cybersecurity measures with respect to such connected devices).
The recommendations next focus on cybersecurity functions, which mirror those laid out in the NIST Cybersecurity Framework - i.e., the process to Identify, Protect, Detect, Respond, and Recover. Here, the identification and protection steps require a case-by-case analysis of the specific threats and vulnerabilities of each device. For example, devices that carry higher risk – such as those that contain sensitive information or that could significantly harm a patient if tampering occurred – will likely require increased security controls. There is, however, a practical need to balance security controls with the ability to have complete access to a fully functioning medical device when necessary.
The FDA also provides some real-world examples of appropriate protection measures. These include, but are not limited to, stricter user authentication; stronger passwords; physical locks when available; automated timing systems for logging users out of inactive sessions; and secure data transfer using encryption when possible. Manufacturers are also instructed to implement features within devices that will detect a security breach while maintaining functionality in the event of device compromise, and to have methods in place for retention and recovery of compromised information.
Finally, the FDA provides guidelines for documenting the manufacturers' efforts in premarket submissions. Identification of risks should be outlined in detail, and protection mechanisms justified. The FDA would also like to see the link between each cybersecurity control and the corresponding risk it is intended to combat. Submissions should further document the device's update schedule and include specific instructions for the use and implementation of the cybersecurity controls identified.
The FDA's cybersecurity guidelines for medical devices reflect growing scrutiny by government agencies regarding collection and storage of sensitive information. The unique challenges in sufficiently safeguarding hypersensitive medical information connected to medical devices require balancing adequate security controls and the need for medical instruments to operate as intended despite any incident that may arise during operation of the device. The guidelines provide a framework for enabling manufacturers to conduct their own risk assessments and weigh security risks against other considerations in the development of medical devices.
Contacts
Insights
Client Alert | 4 min read | 04.14.25
Foreign Corrupt Practices Act (“FCPA”) enforcement has been fairly predictable for many years as the Fraud Section of the Department of Justice (“DOJ”) has maintained exclusive authority over investigating claims and bringing enforcement actions in federal courts across the country. President Trump’s recent pause on FCPA enforcement, the first of its kind since the statute was passed in 1977, has created significant uncertainty for individuals and businesses operating internationally regarding the future of FCPA enforcement. While DOJ is in the process of assessing what the future of FCPA enforcement, state attorneys general are stepping in. On April 2, California Attorney General Rob Bonta issued a Legal Advisory (the “Advisory) to California businesses explaining that violations of the FCPA are actionable under California’s Unfair Competition Law (UCL). The announcement signals a shift in FCPA enforcement where states may take the lead and pursue FCPA enforcement through their state unfair competition laws.
Client Alert | 4 min read | 04.10.25
Hikma and Amici Curiae Ask Supreme Court to Revisit Induced Infringement by Generic “Skinny Labels”
Client Alert | 1 min read | 04.09.25
Client Alert | 12 min read | 04.09.25