StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

SLP- Information Sensitivity and Protection of Data - Essay Example

Cite this document
Summary
This means that a lot have been achieved since the half mark has been crossed but there still remains a lot to be done. Components that constitutes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
SLP- Information Sensitivity and Protection of Data
Read Text Preview

Extract of sample "SLP- Information Sensitivity and Protection of Data"

INFORMATION SENSITIVITY AND PROTECTION OF DATA Development level of organization’s information security policies On a scale from to 10, the development stage of the organization’s information security policy will be placed at 7 out of 10. This means that a lot have been achieved since the half mark has been crossed but there still remains a lot to be done. Components that constitutes for the present rating may be based on factors including the fact that the organization has already put in place an in-house learning system whereby all employees and other human resource personnel within the organization are getting themselves acquainted with the new information security policy that has been issued in the organization.

The reason why the present in-house learning system is that the hospital information system (HIS) has been described as one of the most complex, which if practitioners do not get very familiar with could lead to several health complications for service users (Miller and Sim, 2004). In addition to the in-house learning system, there has also been the acquisition of enough information system equipment and technology tools that caters for modern trends and changes in health service delivery.Confidentiality, availability and reliability policies The assurance of confidentiality of data and information constitutes an ethical consideration for the new hospital information system implemented within the organization (Devaraj and Kohli, 2000).

This is because it is important that the organization adheres to national and international provisions of health service delivery such as HIPAA regulations, which enshrines that patients receive maximum security and confidentiality on their data and information (Chaudhry et al, 2006). Presently, the organization uses a technology based policy that makes it impossible for data and information within the database of the organization to be accessed by people who are not directly involved in a given department of the organization to which the information belongs.

For example, regardless of the network provision on the system, those in the pharmacy section cannot access information from the laboratory department without prior approval from the laboratory department. Moreover, there is the use of a password system in the protection of data such that only a limited number of people are allowed access to the system. This policy also goes a long way to ensure reliability of data as the possibility that there will be doctoring of key information is almost an impossibility.

Finally, there is a special biometric identification and coding system that identifies patients and people whose information is stored on the system rather than the use of actual names of patients. This system ensures anonymity as well as confidentiality of participants. Protection of loss dataIn its quest to avoid possible cases of loss of vital data from its database, the organization employs on the use of a specialized backup system that ensures that every data entered into the system is given an automatic backup mechanism.

In case of major power cuts or breakdown in the system, it is still very much possible to retrieve data because the backup system uses an online system. What this means is that because there is a web storage system that is updated on a regular basis, even if an event like fire or natural disaster occurs, it will still be possible to retrieve data from the website that gives automatic online storage and backup to the data (Dennis, 2000). what is more interesting is that even in the process of entering data, there is an automated drafting and backing up of the data after every 5 seconds and so if a catastrophe occurs whiles entering data, only 5 seconds of data previously entered will be lost.

Enhancement of Information SecurityAssessment and evaluation of the level of quality of information security is very important. In this end, into the future, it is recommended that the organization continues to take pragmatic steps towards enhancing information security by including an external quality assurance mechanism. With the advancement of information technology by the day, it is important that the company seek knowledge from external sources by instituting an independent third party quality assurance team whose task will be to constantly monitor the information of the organization to ensure that its operations are within modern scope of information security practice.

It is hoped that the independence of this body will ensure a more enhanced and credible information security assessment system in terms of quality.REFERENCE LISTChaudhry B., Wang J., Wu S., M. Maglione, W. Mojica, E. Roth, S. C. Morton, and Shekelle P. G. (2006). “Systematic review: impact of health information technology on quality, efficiency, and costs of medical care,” Annals of internal medicine, vol. 144, no. 10, p. 742, Dennis J. C. (2000). Privacy and Confidentiality of Health Information.

Jossey-Bass Inc Pub, May Devaraj S.and Kohli R. (2000). Information technology payoff in the health-care industry: a longitudinal study. Journal of Management Information Systems, vol. 16, no. 4, pp. 41–67.Miller R. H. and Sim I.(2004). Physicians’ use of electronic medical records: barriers and solutions. Health Affairs, vol. 23, no. 2, p. 116

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“SLP- Information Sensitivity and Protection of Data Essay”, n.d.)
SLP- Information Sensitivity and Protection of Data Essay. Retrieved from https://studentshare.org/health-sciences-medicine/1617896-slp-information-sensitivity-and-protection-of-data
(SLP- Information Sensitivity and Protection of Data Essay)
SLP- Information Sensitivity and Protection of Data Essay. https://studentshare.org/health-sciences-medicine/1617896-slp-information-sensitivity-and-protection-of-data.
“SLP- Information Sensitivity and Protection of Data Essay”, n.d. https://studentshare.org/health-sciences-medicine/1617896-slp-information-sensitivity-and-protection-of-data.
  • Cited: 0 times

CHECK THESE SAMPLES OF SLP- Information Sensitivity and Protection of Data

Individual Strategic Business Planning Portfolio

Individual Strategic Business Planning portfolio Table of Contents Executive Summary 4 Business Description 4 Marketing 5 Research, Design, and Development 6 Manufacturing/Operations 7 Organization 8 Critical Risks 10 Milestone Schedule 10 Appendix 10 Estimated business income 12 Financial assumptions 13 Summarised financial results 14 Anticipated returns 15 Lapses 16 Reference 18 Bibliography 21 Item 1 Executive Summary The business plan clearly outlines the type of business it plans to establish....
16 Pages (4000 words) Essay

Financial Reporting Disclosures in the Australian Corporate Sector

hellip; The company needs to focus on adherence of disclosures of identifiable intangible assets, impairment testing on cash generating units, calculation of discount rates and growth rates, and sensitivity analysis to changes in key assumptions.... The company also needs to ensure that sensitivity analysis is done in case there are changes in key assumptions used during financial reporting.... The importance of carrying out a sensitivity analysis to changes in key assumptions is due to the need to evaluate variations and their effects on financial reporting....
8 Pages (2000 words) Essay

Information Sensitivity and Protection of Data (SLP)

information sensitivity and protection of data (SLP) Effectiveness of Information Security Policies of OSF Healthcare and its developed nature OSF Healthcare is one of the renowned healthcare organizations operating in the US for a considerable time period now.... The ways through which OSF could protect from the loss of its data and steps to make sure that data remains accessible in the event of a catastrophe protection of data Lost Losing any important information or data from the data base and other data storage system might significantly impact the operations of OSF, hindering its strategic goal to suffice the medical needs of the patients within due time and involving minimum costs....
3 Pages (750 words) Essay

Optimizing solar thermal resurce

Again, the system pricing data which was used in economic analysis cannot be considered as representative of formal quotes as it was based on estimates from contractors.... A sensitivity analysis test was used to assess the effects various fractions on the economic feasibility of each system.... he sizing of thermal loads of absorption chiller was based on information sourced from energy plus and this ensured that it had that same output as HVAC system....
2 Pages (500 words) Essay

Contemporary Supply Chain Management and Consultancy Management Techniques

For example, the Japanese manufacturers that are led by Toyota company, have displayed very close relationships with their suppliers, in a way that includes exchanging information extensive and directing assistance to the suppliers.... The underlying purpose of this discussion is to provide the reader with a more informed understanding of the marketing supply and the markets that suppliers are operating and how they shape the availability and nature of goods and services....
19 Pages (4750 words) Essay

Computed Tomography Dosimetry and Dose Risks

The X-ray Computed Tomography technology has become the method of choice for most diagnostic imaging procedures due to the remarkable advances over the past few decades, contributing to the improvement of diagnostic image quality and the reduction of examination time and cost (AAPM 23, 2008, the International Commission on Radiological protection Publication (ICRP) 103, 2007, Huda et al, 2008)....
10 Pages (2500 words) Research Paper

Individual Strategic Business Planning

The paper "Individual Strategic Business Planning" states that the projections of the business and important financial assumptions have been laid down in the body of the plan.... Charts have also been used to depict some technical aspects as well as for showing the chain of hierarchy.... nbsp;… The market size has been conservatively estimated at 350 million small fans....
16 Pages (4000 words) Research Paper

Financial Reporting Disclosures in the Australian Corporate Sector

The company also needs to ensure that sensitivity analysis is done in case there are changes in key assumptions used during financial reporting.... The importance of carrying out a sensitivity analysis to changes in key assumptions is due to the need to evaluate variations and their effects on financial reporting.... sensitivity analysis will also enable corrective actions to ensure compliance of financial reporting requirements.... Users of financial reporting and auditing information are able to make informed decisions about the reliability and relevance of financial reporting disclosures in the Australian Corporate Sector....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us