{"id":39718,"date":"2025-08-27T16:53:03","date_gmt":"2025-08-27T21:53:03","guid":{"rendered":"https:\/\/www.accuray.com\/cybersecurity\/"},"modified":"2025-08-28T21:43:09","modified_gmt":"2025-08-29T02:43:09","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.accuray.com\/ja\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"39718\" class=\"elementor elementor-39718 elementor-24558\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-64c292d5 elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"64c292d5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7cf31de7\" data-id=\"7cf31de7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-286cd352 elementor-widget elementor-widget-heading\" data-id=\"286cd352\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Accuray Product Cybersecurity <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e37d84e elementor-section-height-min-height elementor-section-content-middle elementor-reverse-tablet elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"e37d84e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-74de7ed\" data-id=\"74de7ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61a577e elementor-widget elementor-widget-heading\" data-id=\"61a577e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Accuray is Dedicated to Cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e71831 elementor-widget elementor-widget-text-editor\" data-id=\"9e71831\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is a comprehensive and ongoing lifecycle process that is of the utmost importance and priority for Accuray.<\/p><br><br><p>Accuray is dedicated to ensuring the safety and security of our products so that you can confidently deliver the best possible care to patients. Our products employ a multi-modal approach to security that includes People, Process and Technology to address the ever-increasing risk of cyber threats. To that end, we have created a Security Advisory archive to keep you informed of cyber-security risks and the actions being taken by Accuray.<\/p><br><br><p>Our commitment to this full cybersecurity lifecycle process ensures that our customers can trust us, and that we remain resilient against evolving threats.<\/p><br><br><p>Accuray also encourages customers and other interested parties to report Accuray security concerns to their respective Technical Support Representative, or via:\u00a0<a title=\"https:\/\/www.accuray.com\/contact-us\/\" contenteditable=\"false\" href=\"https:\/\/www.accuray.com\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"0\">https:\/\/www.accuray.com\/contact-us.<\/a><\/p><br><br>To view all vulnerability disclosures please click\u00a0<a title=\"https:\/\/accurayexchange.com\/accuray_security_information\" contenteditable=\"false\" href=\"https:\/\/accurayexchange.com\/accuray_security_information\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"1\">here<\/a>. If you are not an Accuray Exchange member and are an Accuray System user,\u00a0<a title=\"https:\/\/accurayexchange.com\/user\/register\" contenteditable=\"false\" href=\"https:\/\/accurayexchange.com\/user\/register\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"2\">join now<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3e6f03 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"e3e6f03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.accuray.com\/wp-content\/uploads\/1086598-Product-Cybersecurity-Policy.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Our Cybersecurity Policy<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f0709f1\" data-id=\"f0709f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc4929d elementor-widget elementor-widget-image\" data-id=\"fc4929d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2630\" height=\"1485\" src=\"https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen.png\" class=\"attachment-full size-full wp-image-24568\" alt=\"\" srcset=\"https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen.png 2630w, https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen-400x226.png 400w, https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen-1024x578.png 1024w, https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen-768x434.png 768w, https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen-1536x867.png 1536w, https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen-2048x1156.png 2048w\" sizes=\"(max-width: 2630px) 100vw, 2630px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6578e7b elementor-section-height-min-height elementor-section-content-middle elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"6578e7b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-02adc89\" data-id=\"02adc89\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-217ca48 elementor-widget elementor-widget-image\" data-id=\"217ca48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/www.accuray.com\/wp-content\/uploads\/CORP-Cybersecurity-Diagram_1b.jpg\" class=\"attachment-full size-full wp-image-29734\" alt=\"\" srcset=\"https:\/\/www.accuray.com\/wp-content\/uploads\/CORP-Cybersecurity-Diagram_1b.jpg 1920w, https:\/\/www.accuray.com\/wp-content\/uploads\/CORP-Cybersecurity-Diagram_1b-400x225.jpg 400w, https:\/\/www.accuray.com\/wp-content\/uploads\/CORP-Cybersecurity-Diagram_1b-1024x576.jpg 1024w, https:\/\/www.accuray.com\/wp-content\/uploads\/CORP-Cybersecurity-Diagram_1b-768x432.jpg 768w, https:\/\/www.accuray.com\/wp-content\/uploads\/CORP-Cybersecurity-Diagram_1b-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-765fe0a elementor-widget elementor-widget-text-editor\" data-id=\"765fe0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>From inception and implementation, to maintenance, we prioritize security at every stage of our process. Our approach begins with administrative controls such as policies and procedures, followed by robust design and assessment, and continuous monitoring to identify vulnerabilities. We apply security patches and updates, conduct routine penetration testing, and offer regular training to foster a security-conscious culture. Our incident response plan is designed to address any security breaches or incidents and integrate with cross-functional teams for timely support. Our process continues to be updated and improved through the change control process.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-594a165 elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"594a165\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9a8ef35\" data-id=\"9a8ef35\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-99d15ab elementor-widget elementor-widget-premium-addon-image-hotspots\" data-id=\"99d15ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-image-hotspots.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t<div id=\"premium-image-hotspots-99d15ab\" class=\"premium-image-hotspots-container\" data-settings=\"{&quot;anim&quot;:&quot;fade&quot;,&quot;animDur&quot;:350,&quot;delay&quot;:10,&quot;arrow&quot;:false,&quot;distance&quot;:16,&quot;minWidth&quot;:100,&quot;maxWidth&quot;:355,&quot;side&quot;:[&quot;bottom&quot;],&quot;hideMobiles&quot;:false,&quot;active&quot;:true,&quot;trigger&quot;:&quot;hover&quot;,&quot;id&quot;:&quot;99d15ab&quot;,&quot;iconHover&quot;:&quot;&quot;,&quot;glass&quot;:&quot;none&quot;}\">\r\n\t\t<div class=\"premium-image-hotspots-img-wrap\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.accuray.com\/wp-content\/uploads\/CORP-Cybersecurity-Diagram_2b.png\" title=\"CORP-Cybersecurity-Diagram_2b\" alt=\"CORP-Cybersecurity-Diagram_2b\" loading=\"lazy\" \/>\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-c400251 premium-image-hotspots-main-icons-c400251\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Software-based firewall deployed in Windows device sets security rules on device\u2019s inbound and outbound communications.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-8d42377 premium-image-hotspots-main-icons-8d42377\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>The Accuray Firewall by default blocks all inbound and outbound communications. Only approved communications via Access Control Lists (ACLs) are allowed to traverse from Accuray to Hospital network and vice versa. Accuray-provided and managed firewall device provides a single exit and entrance point between the hospital network and the Accuray private LAN.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-984a22c premium-image-hotspots-main-icons-984a22c\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>The iDMS employs a built-in role-based authentication system to grant or deny access to certain features and functions based on user role.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-aa8172f premium-image-hotspots-main-icons-aa8172f\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Each user is assigned a login account and password. Each login account is associated with a role or profile that defines what the user can do. Customer administrator can manage accounts, make changes to the user profiles and set policies to meet their security requirements.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-c991c0d premium-image-hotspots-main-icons-c991c0d\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>User activities are audit-trailed at application, OS and firewall levels.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-11c8ec1 premium-image-hotspots-main-icons-11c8ec1\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Application whitelisting tool is deployed on all Windows-based machines to protect against and prevent unknown executables, scripts, and batch files from running.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-71347cc premium-image-hotspots-main-icons-71347cc\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data is backed up every 2 hours and disaster recovery option is provided for critical devices.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-ffd8752 premium-image-hotspots-main-icons-ffd8752\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data is backed up every 2 hours and disaster recovery option is provided for critical devices.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-39206e2 premium-image-hotspots-main-icons-39206e2\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data at Rest &#8211; Microsoft BitLocker technology using Advanced Encryption Standard (AES) with a key length of 256 bits to protect the contents of hard drives that contain PHI data at rest.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-77f40c3 premium-image-hotspots-main-icons-77f40c3\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data in Transit &#8211; Data communication with PHI data is encrypted using TLS 1.2 encryption.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0adfbb4 elementor-hidden-desktop elementor-hidden-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0adfbb4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ca20744\" data-id=\"ca20744\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ace6bad elementor-widget elementor-widget-premium-addon-image-hotspots\" data-id=\"ace6bad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-image-hotspots.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t<div id=\"premium-image-hotspots-ace6bad\" class=\"premium-image-hotspots-container\" data-settings=\"{&quot;anim&quot;:&quot;fade&quot;,&quot;animDur&quot;:350,&quot;delay&quot;:10,&quot;arrow&quot;:false,&quot;distance&quot;:25,&quot;minWidth&quot;:100,&quot;maxWidth&quot;:355,&quot;side&quot;:[&quot;bottom&quot;],&quot;hideMobiles&quot;:false,&quot;active&quot;:true,&quot;trigger&quot;:&quot;hover&quot;,&quot;id&quot;:&quot;ace6bad&quot;,&quot;iconHover&quot;:&quot;&quot;,&quot;glass&quot;:&quot;none&quot;}\">\r\n\t\t<div class=\"premium-image-hotspots-img-wrap\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.accuray.com\/wp-content\/uploads\/CORP-Cybersecurity-Diagram_2b_2.png\" title=\"CORP-Cybersecurity-Diagram_2b_2\" alt=\"CORP-Cybersecurity-Diagram_2b_2\" loading=\"lazy\" \/>\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-c400251 premium-image-hotspots-main-icons-c400251\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Software-based firewall deployed in Windows device sets security rules on device\u2019s inbound and outbound communications.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-8d42377 premium-image-hotspots-main-icons-8d42377\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>The Accuray Firewall by default blocks all inbound and outbound communications. Only approved communications via Access Control Lists (ACLs) are allowed to traverse from Accuray to Hospital network and vice versa. Accuray-provided and managed firewall device provides a single exit and entrance point between the hospital network and the Accuray private LAN<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-984a22c premium-image-hotspots-main-icons-984a22c\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>The iDMS employs a built-in role-based authentication system to grant or deny access to certain features and functions based on user role.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-aa8172f premium-image-hotspots-main-icons-aa8172f\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Each user is assigned a login account and password. Each login account is associated with a role or profile that defines what the user can do. Customer administrator can manage accounts, make changes to the user profiles and set policies to meet their security requirements.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-c991c0d premium-image-hotspots-main-icons-c991c0d\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>User activities are audit-trailed at application, OS and firewall levels.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-11c8ec1 premium-image-hotspots-main-icons-11c8ec1\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Application whitelisting tool is deployed on all Windows-based machines to protect against and prevent unknown executables, scripts, and batch files from running.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-71347cc premium-image-hotspots-main-icons-71347cc\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data is backed up every 2 hours and disaster recovery option is provided for critical devices.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-ffd8752 premium-image-hotspots-main-icons-ffd8752\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data is backed up every 2 hours and disaster recovery option is provided for critical devices.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-39206e2 premium-image-hotspots-main-icons-39206e2\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data at Rest &#8211; Microsoft BitLocker technology using Advanced Encryption Standard (AES) with a key length of 256 bits to protect the contents of hard drives that contain PHI data at rest.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-77f40c3 premium-image-hotspots-main-icons-77f40c3\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data in Transit &#8211; Data communication with PHI data is encrypted using TLS 1.2 encryption.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c21421d elementor-hidden-desktop elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c21421d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-05988da\" data-id=\"05988da\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b8113d elementor-widget elementor-widget-premium-addon-image-hotspots\" data-id=\"2b8113d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-image-hotspots.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t<div id=\"premium-image-hotspots-2b8113d\" class=\"premium-image-hotspots-container\" data-settings=\"{&quot;anim&quot;:&quot;fade&quot;,&quot;animDur&quot;:350,&quot;delay&quot;:10,&quot;arrow&quot;:false,&quot;distance&quot;:25,&quot;minWidth&quot;:100,&quot;maxWidth&quot;:355,&quot;side&quot;:[&quot;bottom&quot;],&quot;hideMobiles&quot;:false,&quot;active&quot;:true,&quot;trigger&quot;:&quot;hover&quot;,&quot;id&quot;:&quot;2b8113d&quot;,&quot;iconHover&quot;:&quot;&quot;,&quot;glass&quot;:&quot;none&quot;}\">\r\n\t\t<div class=\"premium-image-hotspots-img-wrap\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.accuray.com\/wp-content\/uploads\/CORP-Cybersecurity-Diagram_2b.png\" title=\"CORP-Cybersecurity-Diagram_2b\" alt=\"CORP-Cybersecurity-Diagram_2b\" loading=\"lazy\" \/>\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-c400251 premium-image-hotspots-main-icons-c400251\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Software-based firewall deployed in Windows device sets security rules on device\u2019s inbound and outbound communications.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-8d42377 premium-image-hotspots-main-icons-8d42377\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>The Accuray Firewall by default blocks all inbound and outbound communications. Only approved communications via Access Control Lists (ACLs) are allowed to traverse from Accuray to Hospital network and vice versa. Accuray-provided and managed firewall device provides a single exit and entrance point between the hospital network and the Accuray private LAN<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-984a22c premium-image-hotspots-main-icons-984a22c\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>The iDMS employs a built-in role-based authentication system to grant or deny access to certain features and functions based on user role.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-aa8172f premium-image-hotspots-main-icons-aa8172f\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Each user is assigned a login account and password. Each login account is associated with a role or profile that defines what the user can do. Customer administrator can manage accounts, make changes to the user profiles and set policies to meet their security requirements.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-c991c0d premium-image-hotspots-main-icons-c991c0d\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>User activities are audit-trailed at application, OS and firewall levels.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-11c8ec1 premium-image-hotspots-main-icons-11c8ec1\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Application whitelisting tool is deployed on all Windows-based machines to protect against and prevent unknown executables, scripts, and batch files from running.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-71347cc premium-image-hotspots-main-icons-71347cc\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data is backed up every 2 hours and disaster recovery option is provided for critical devices.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-ffd8752 premium-image-hotspots-main-icons-ffd8752\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data is backed up every 2 hours and disaster recovery option is provided for critical devices.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-39206e2 premium-image-hotspots-main-icons-39206e2\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data at Rest &#8211; Microsoft BitLocker technology using Advanced Encryption Standard (AES) with a key length of 256 bits to protect the contents of hard drives that contain PHI data at rest.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"premium-image-hotspots-main-icons tooltip-wrapper premium-image-hotspots-anim  elementor-repeater-item-77f40c3 premium-image-hotspots-main-icons-77f40c3\" data-tooltip-content=\"#tooltip_content\">\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-hotsot-icon-wrap\">\r\n\t\t\t\t\t\t<i class=\"premium-image-hotspots-icon far fa-circle\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"premium-image-hotspots-tooltips-wrapper\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"tooltip_content\" class=\"premium-image-hotspots-tooltips-text pa-tooltip-text-inherit\">\r\n\t\t\t\t\t\t\t<p>Data in Transit &#8211; Data communication with PHI data is encrypted using TLS 1.2 encryption.<\/p>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cce4703 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cce4703\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1988722\" data-id=\"1988722\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ce465c3 elementor-widget elementor-widget-heading\" data-id=\"ce465c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Coordinated Vulnerability Disclosure Process<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bed8a51 elementor-widget elementor-widget-heading\" data-id=\"bed8a51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Policy Statement<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-175e975 elementor-widget elementor-widget-text-editor\" data-id=\"175e975\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At Accuray, we are committed to ensuring the security and integrity of our products. Our Coordinated Vulnerability Disclosure (CVD) process is designed to facilitate the responsible reporting and handling of security vulnerabilities. This process ensures timely and effective communication with all stakeholders, including customers, regulatory bodies, and security researchers.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-37bc2e6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"37bc2e6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2967681\" data-id=\"2967681\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fffb0dc elementor-widget elementor-widget-heading\" data-id=\"fffb0dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability Report In-Take<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db559c1 elementor-widget elementor-widget-text-editor\" data-id=\"db559c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom:2px;\">We encourage security researchers and other stakeholders to report any vulnerabilities they discover in our products. To ensure a thorough investigation, please provide as much information as possible. The following details are encouraged:<\/p><br><ul style=\"margin-bottom:15px;\">\r\n \t<li>Full name and contact information (email address) of the finder and\/or reporter<\/li>\r\n \t<li>Name and version of the affected product(s)<\/li>\r\n \t<li>Technical description of the vulnerability, including actions performed and results<\/li>\r\n \t<li>Associated Common Weakness Enumeration (CWE), if applicable<\/li>\r\n \t<li>Steps to reproduce the vulnerability or exploitation steps<\/li>\r\n<\/ul><br><p style=\"margin-bottom:2px;\">Upon receiving a vulnerability report, we will acknowledge receipt and may request additional information if necessary. We will then evaluate the reported vulnerability to determine its validity and potential impact.<\/p><br><br><p style=\"margin-bottom:2px;\">Please email your vulnerability report to <a href=\"mailto:productsecurity@accuray.com\">productsecurity@accuray.com<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-938d3f3 elementor-section-height-min-height elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"938d3f3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-dc77597\" data-id=\"dc77597\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0b07788 elementor-hidden-phone elementor-widget elementor-widget-image\" data-id=\"0b07788\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"75\" height=\"339\" src=\"https:\/\/www.accuray.com\/wp-content\/uploads\/cta-bowie-2.svg\" class=\"attachment-full size-full wp-image-10470\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e83a607\" data-id=\"e83a607\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-acca229 elementor-widget elementor-widget-heading\" data-id=\"acca229\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Have questions or concerns?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8377698 elementor-widget elementor-widget-text-editor\" data-id=\"8377698\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To ask questions or raise a concern about company activities and business, contact Accuray <span style=\"text-decoration: underline;\"><span style=\"color: #ffffff; text-decoration: underline;\"><a style=\"color: #ffffff; text-decoration: underline;\" href=\"https:\/\/www.accuray.com\/contact-us\/\">here<\/a><\/span><\/span>.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-6ac7488\" data-id=\"6ac7488\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c206505 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"c206505\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.accuray.com\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Accuray Product Cybersecurity Accuray is Dedicated to Cybersecurity Cybersecurity is a comprehensive and ongoi [&hellip;]<\/p>\n","protected":false},"author":59,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-39718","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity - Accuray<\/title>\n<meta name=\"description\" content=\"Accuray is dedicated to ensuring the safety &amp; security of our products so that you can confidently deliver the best possible care to patients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.accuray.com\/ja\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Accuray is dedicated to ensuring the safety &amp; security of our products so that you can confidently deliver the best possible care to patients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.accuray.com\/ja\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Accuray\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AccurayIncorporated\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T02:43:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen-1024x578.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Accuray\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.accuray.com\\\/ja\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.accuray.com\\\/ja\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity - Accuray\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.accuray.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.accuray.com\\\/ja\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuray.com\\\/ja\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.accuray.com\\\/wp-content\\\/uploads\\\/CyberSecurity_Laptop_LoginScreen.png\",\"datePublished\":\"2025-08-27T21:53:03+00:00\",\"dateModified\":\"2025-08-29T02:43:09+00:00\",\"description\":\"Accuray is dedicated to ensuring the safety & security of our products so that you can confidently deliver the best possible care to patients.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.accuray.com\\\/ja\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.accuray.com\\\/ja\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/www.accuray.com\\\/ja\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.accuray.com\\\/wp-content\\\/uploads\\\/CyberSecurity_Laptop_LoginScreen.png\",\"contentUrl\":\"https:\\\/\\\/www.accuray.com\\\/wp-content\\\/uploads\\\/CyberSecurity_Laptop_LoginScreen.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.accuray.com\\\/ja\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.accuray.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.accuray.com\\\/#website\",\"url\":\"https:\\\/\\\/www.accuray.com\\\/\",\"name\":\"Accuray\",\"description\":\"Deliver More. Better. Faster\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.accuray.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.accuray.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.accuray.com\\\/#organization\",\"name\":\"Accuray Incorporated\",\"url\":\"https:\\\/\\\/www.accuray.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/www.accuray.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.accuray.com\\\/wp-content\\\/uploads\\\/accuray-logo200.jpg\",\"contentUrl\":\"https:\\\/\\\/www.accuray.com\\\/wp-content\\\/uploads\\\/accuray-logo200.jpg\",\"width\":200,\"height\":24,\"caption\":\"Accuray Incorporated\"},\"image\":{\"@id\":\"https:\\\/\\\/www.accuray.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/AccurayIncorporated\",\"https:\\\/\\\/x.com\\\/Accuray\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/accuray\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity - Accuray","description":"Accuray is dedicated to ensuring the safety & security of our products so that you can confidently deliver the best possible care to patients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.accuray.com\/ja\/cybersecurity\/","og_locale":"ja_JP","og_type":"article","og_title":"Cybersecurity","og_description":"Accuray is dedicated to ensuring the safety & security of our products so that you can confidently deliver the best possible care to patients.","og_url":"https:\/\/www.accuray.com\/ja\/cybersecurity\/","og_site_name":"Accuray","article_publisher":"https:\/\/www.facebook.com\/AccurayIncorporated","article_modified_time":"2025-08-29T02:43:09+00:00","og_image":[{"width":1024,"height":578,"url":"https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen-1024x578.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Accuray","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"6\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.accuray.com\/ja\/cybersecurity\/","url":"https:\/\/www.accuray.com\/ja\/cybersecurity\/","name":"Cybersecurity - Accuray","isPartOf":{"@id":"https:\/\/www.accuray.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.accuray.com\/ja\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.accuray.com\/ja\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen.png","datePublished":"2025-08-27T21:53:03+00:00","dateModified":"2025-08-29T02:43:09+00:00","description":"Accuray is dedicated to ensuring the safety & security of our products so that you can confidently deliver the best possible care to patients.","breadcrumb":{"@id":"https:\/\/www.accuray.com\/ja\/cybersecurity\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.accuray.com\/ja\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.accuray.com\/ja\/cybersecurity\/#primaryimage","url":"https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen.png","contentUrl":"https:\/\/www.accuray.com\/wp-content\/uploads\/CyberSecurity_Laptop_LoginScreen.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.accuray.com\/ja\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.accuray.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.accuray.com\/#website","url":"https:\/\/www.accuray.com\/","name":"Accuray","description":"Deliver More. Better. Faster","publisher":{"@id":"https:\/\/www.accuray.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.accuray.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.accuray.com\/#organization","name":"Accuray Incorporated","url":"https:\/\/www.accuray.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.accuray.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.accuray.com\/wp-content\/uploads\/accuray-logo200.jpg","contentUrl":"https:\/\/www.accuray.com\/wp-content\/uploads\/accuray-logo200.jpg","width":200,"height":24,"caption":"Accuray Incorporated"},"image":{"@id":"https:\/\/www.accuray.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AccurayIncorporated","https:\/\/x.com\/Accuray","https:\/\/www.linkedin.com\/company\/accuray\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.accuray.com\/ja\/wp-json\/wp\/v2\/pages\/39718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.accuray.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.accuray.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.accuray.com\/ja\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/www.accuray.com\/ja\/wp-json\/wp\/v2\/comments?post=39718"}],"version-history":[{"count":0,"href":"https:\/\/www.accuray.com\/ja\/wp-json\/wp\/v2\/pages\/39718\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.accuray.com\/ja\/wp-json\/wp\/v2\/media?parent=39718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}