FDA/DEA Regulatory Compliance: CSOS

Complying with Controlled Substance Ordering System (CSOS) Requirements

FDA/DEA Regulatory Compliance: CSOS

Thales e-Security’s Data Security Platforms can secure the data associated with CSOS applications and is available as a FIPS 140-2 Level 2 or Level 3 validated appliance.

FDA/DEA Regulatory Compliance: CSOS
The DEA's CSOS Regulation

The DEA's Controlled Substance Ordering System (CSOS) allows for secure electronic transmission of Schedule I-V controlled substance orders without the supporting paper Form 222.

The DEA requires that auditors validate that the cryptographic modules are FIPS 140-2 certified. Auditors must also validate all aspects of the software that are addressed in the regulations.

Encryption and Key Management

Make your data unreadable to others through strong, centrally managed, file, volume and application encryption combined with simple, centralized key management that is transparent to processes, applications and users.

Access Policies and Privileged User Controls

Restrict access to encrypted data through access policies and user controls that permit data to be decrypted only for authorized users and applications, while allowing privileged users to perform IT operations without the ability to see protected information.

Security Intelligence

Logs that capture access attempts to protected data provide high value security intelligence information that can be used with a Security Information and Event Management (SIEM) solution and for compliance reporting.

Case Studies : With Lives at Risk, the 5th Largest U.S. Company Trusts Thales e-Security for Reliability and Integrity

As America’s oldest and largest healthcare services company, McKesson Corporation provides a broad range of pharmaceuticals...

Download

Data Sheets : Vormetric Data Security Platform

The Vormetric Data Security Platform makes it efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, Vormetric Data Security Platform products can be deployed individually, while sharing efficient, centralized key management...

Download

Unsere interaktive Präsentation ansehen Mehr erfahren
Eine Live-Präsentation planen Zeitplan
Einen Spezialisten kontaktieren Uns kontaktieren