Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
ISO/TR 28318 provides comprehensive guidance on the application of clinical risk management principles to health software systems. While ISO 14971 establishes the general framework for risk management of medical devices, ISO/TR 28318 extends and adapts these principles specifically for the health software domain, recognizing that software presents unique risk characteristics distinct from hardware. These include the potential for systematic faults affecting all instances, the difficulty of exhaustive testing, the complexity of software-mediated clinical workflows, and the challenges of maintaining safety across frequent update cycles.
The technical report establishes a clinical risk management process that integrates with existing quality management systems, software development lifecycles, and healthcare delivery operations. It emphasizes that clinical risk management is not a one-time assessment activity but an ongoing organizational commitment that requires dedicated resources, governance structures, and organizational culture supportive of safety reporting and continuous improvement.
The risk assessment methodology described in ISO/TR 28318 follows a systematic approach adapted from ISO 14971 but tailored to the specific characteristics of health software. The process begins with establishing the intended use and reasonably foreseeable misuse of the health software, documented in a formal intended purpose statement. This statement defines the medical indication, patient population, user profile, and clinical environment of use, all of which influence the risk assessment scope.
| Risk Assessment Step | Description | Health Software Specifics |
|---|---|---|
| Intended Purpose Definition | Document the clinical intended use, user profile, and use environment | Must account for variability in clinical workflows, user skill levels, IT infrastructure |
| Hazard Identification | Systematically identify all potential sources of harm | Include data integrity hazards, interoperability hazards, cybersecurity threats, algorithmic bias |
| Situation Analysis | Analyze hazardous situations and sequences of events | Consider multi-factor failures, cascading errors, latent conditions in clinical environment |
| Risk Estimation | Assign probability and severity to each hazardous situation | Use clinical evidence base, usability data, field experience, expert judgment |
| Risk Evaluation | Compare estimated risk against predefined acceptability criteria | Clinical significance thresholds, regulatory requirements, ethical considerations |
A distinctive feature of ISO/TR 28318 is its emphasis on clinical context in risk evaluation. The same software fault may have dramatically different risk implications depending on the clinical setting, patient acuity, availability of backup systems, and clinician training. For example, a decision support system that fails to provide a drug interaction alert carries higher risk in an emergency department than in a well-controlled outpatient clinic where pharmacists independently verify prescriptions.
ISO/TR 28318 defines a hierarchy of risk control measures, prioritizing inherent safety by design over protective measures and information for safety. Inherent safety measures eliminate hazards entirely through software architecture decisions, such as restricting allowable input ranges, using safety by default configurations, and eliminating single points of failure in critical clinical workflows. Protective measures reduce the probability or severity of harm without eliminating the underlying hazard, such as confirmation dialogs, redundant verification steps, and automated safety checks.
Information for safety constitutes the third line of defense, including warning labels, contraindication notices, clinical training materials, and safety-related documentation. The report notes that information for safety is the least reliable risk control measure and should only be relied upon when design-level controls are not feasible. Human factors engineering plays a critical role throughout the risk control process, ensuring that safety measures align with clinical workflow and cognitive ergonomics rather than creating additional burden or confusion for clinicians.
| Risk Control Category | Examples | Reliability |
|---|---|---|
| Inherent Safety by Design | Input validation, range checking, fail-safe defaults, architectural isolation | High — hazard eliminated regardless of user action |
| Protective Measures | Confirmation dialogs, alarms, interlocks, redundant checks | Medium — may be bypassed or ignored in practice |
| Information for Safety | Warnings, training materials, contraindication labels | Low — dependent on user attention and compliance |
The standard also addresses the challenge of residual risk communication between manufacturers and healthcare providers. ISO/TR 28318 recommends that manufacturers provide a clinical risk management file to deploying organizations, documenting identified hazards, implemented controls, and recommended clinical mitigations. This transparency enables healthcare providers to make informed procurement decisions and establish appropriate local safety protocols.
ISO/TR 28318 emphasizes that clinical risk management must be integrated with broader healthcare quality management systems, including incident reporting, root cause analysis, and continuous quality improvement processes. The technical report recommends establishing a clinical safety committee with cross-functional membership to oversee risk management activities, review safety incidents, and ensure organizational learning from adverse events and near misses.
The standard also addresses the importance of supply chain risk management in health software. As modern health IT systems increasingly depend on third-party components, cloud services, and interoperable interfaces, the clinical risk management process must extend beyond organizational boundaries. ISO/TR 28318 provides guidance on vendor assessment, service level agreement requirements for safety-critical functions, and contingency planning for third-party service disruptions.