Writing tips and writing guidelines for students,case study samples, admission essay examples, book reviews, paper writing tips, college essays, research proposal samples
Thursday, April 18, 2019
CLevel Concerns in IA Management Essay Example | Topics and Well Written Essays - 1000 words
CLevel Concerns in IA Management - Essay Example so for rampart, organizations employ strict trade rampart measures to create a barrier to stop these codes entering the system and if they enter, return a method to detect and destroy the code before it destroys the company.The first step of reading protection is developing a security insurance policy for the specific organization. Security policy often covers how the policy result be put ond inside the company, describes how the company would educate its employees about protecting the organizational assets such as its computer systems and education, terms and explanation of security enforcement, and also an evaluative feature in the policy so that it can be updated when required (Whatis, 2007). In our health care facility, there is not such an coarse security policy, rather a general one. This security policy tells about how the employees are supposed to use the system, which users are restricted from ingressing other high er levels of information, information regarding legal actions in case of breaching the code of confidentiality and policy updating mechanisms.Our security policy came into existence after several cases of breach of enduring information which was utilize by marketers to advertise their products using patient telephone numbers and email addresses. Since such information is intimately available elsewhere, we first rejected patients claims that such information leaking is coming from our side. However when such complains became common, an inquiry was conducted and it was embed that one of the receptionists computer systems was being hacked. At this point in time, our system administrator met with all information technology members in the organization and decided to implement a full-fledged policy to prevent such an incident from occurring again.Developing and Implementing the PolicyThe first step in developing the strategy was to take permission from the manager and gets the funds allotted. This is easily done specially after the incident as the managers wanted to line up the lost image of the organization due to breach in patient information which is a exigency in the medical profession. A security memorandum was issued in response to the incident detailing of how security will be managed in the organization from then onwards.Industry StandardsKeeping the enormous need of patient information confidential, this policy was created and the ISO 17799 standard was integrated. Doctors, nurses and other staff were given personal computers (where required) with personal passwords. Three levels of information was secured using these passwords, with senior doctors getting to the highest access level and the junior nurses/interns getting the least access level. In the policy, the guidelines for employee level updates are given and the permission of their access levels is clearly identified. (Shinder & Tittel, 2002)Password ProtectionThe password protection was applied throughout the intranet (internal network) of the organization. The network administrator is responsible for setting up the user accounts, giving them access codes and setting up their personal systems. Also these passwords are supposed to be changed regularly.Installation GuidelinesFor the matter of security, no user is allowed to install any software of their system without informing the network adminis
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment