StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security Guidelines for ABC Hospital - Research Paper Example

Cite this document
Summary
The paper "Information Security Guidelines for ABC Hospital" states that a generic methodology classifies security breaches and their associated disciplines into different levels. Levels define the severity of breaches from Level I, Level II, and Level III along with their disciplinary actions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Information Security Guidelines for ABC Hospital
Read Text Preview

Extract of sample "Information Security Guidelines for ABC Hospital"

In the context of protecting information security, three fundamental factors must be considered to make use of digitized information effectively i.e. Confidentiality, Integrity, and Availability. As there is a requirement of protecting this digital information internally and externally, the policy is a control that provides necessary steps, procedures, and processes to protect information. These are also considered high-level statements derived from the board of the organization. The policy is considered to be an essential tool for any organization, as it leverages management intent and defines high-level objectives. However, information security policy is customized from company to company and department to department. Different factor that may influence tailoring the policy includes organization size, dependence on information systems, regulatory compliance, and information classification scheme. Addressing all issues related to information security via a single policy is not possible, however, to cover all aspects related to information security, a set of information security policy documents focusing on different groups of employees within the organization is more suitable. This paper will discuss different factors that must be taken into account when constructing and maintaining an information security policy. However, there are many methods available for constructing an information security policy, the initial step before adopting any one of the methods is to identify the current maturity level of the policy construction process within the organization. The outputs will be either no information security policy development process in place or there is an extensive policy development process exists.
Information security training and awareness are initially evaluated, as the determination of training requirements for the organization is required on an initial basis. Likewise, the training and awareness program is initiated by conducting interviews with key stakeholders and business owners. These training and awareness sessions are focused on identifying security and training requirements. Moreover, types of awareness and training are also identified, as requirements for a hospital will differ as compared to a health insurance company. Furthermore, there is a requirement of measuring the current maturity among employees of the hospital for making the training and awareness session more precise and focused. If the current awareness and training maturity are measured, considerations for further improvement are carried out. For instance, NIST awareness and training models can be implemented that are meant for dividing groups of savvy and non-savvy users.
Procedures and responsibilities for evaluating awareness and training programs in the hospital are carried out by a chief information security officer or information security manager. HIPAA (Health Insurance Portability and Accountability Act) focuses on Health care access, portability and renewability, and prevention of healthcare fraud and abuse. It is one of the primary responsibilities of the information security manager to incorporate HIPAA complaint procedures within each department of the hospital. However, procedures vary from organization to organization, as the IT infrastructure is not the same. Moreover, the incorporation of user access logs, audit trails, and defined responsibilities also fall under the responsibilities of a security manager. Security metrics can be defined to monitor and measure policy violations for each control objective that is put in place. As the data classification is already in place, it is the responsibility of the information security manager to decide the methodology for providing access to systems, applications, and data.
Security Policy
Security policies are considered administrative controls that are acknowledged and enforced in an organization. Apart from employees of the organization, trade partners, and third parties such as contractors must sign a non-disclosure or confidentiality agreement and understand the security practices. Policy enforcement is critical, as it delivers a strong message to the organizational staff to follow the security policy or else policy violation will lead to disciplinary actions and maybe terminations of employment. For maintaining policy for each department of the hospital, the following processes are carried out:
1. What to do if a security breach of confidentiality has taken place?
2. To whom the confidentiality breach is reportable?
3. What is the process of investigating and reviewing the confidentiality breach?
4. The process of sharing and discussing the breach with the victim i.e. the patient, the staff who identified the breach, the staff who carried out this breach, and the staff’s supervisor
5. What is the procedure for punishing the breach
6. Procedure for monitoring and reporting overall activity of the breach
It is necessary to enforce compliance with the policy. However, the level of strictness must not be too high otherwise it may subject to a higher cost of ownership i.e. more resources may be required to enforce a policy (Isaca, 3).

Punishment for this level incorporates verbal warnings, training and awareness, and termination of employment if the employee repeats mistakes.
Level II
Level II is associated with an intentional breach where patient records are accessed for no legitimate or business reason. Likewise, this may lead to accessing friends' or relatives’ records and illegitimately exposing patient information. This security breach incorporates a written warning for the first time and termination of employment for the same repeated offense.
Level III
Level III is associated with a planned security breach and on purpose. This may include accessing a patient’s record and using it for personal objectives. Level III violations incorporate immediate termination of employment. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information security guidelines for ABC Hospital Research Paper - 1”, n.d.)
Information security guidelines for ABC Hospital Research Paper - 1. Retrieved from https://studentshare.org/information-technology/1610785-information-security-guidelines-for-abc-hospital
(Information Security Guidelines for ABC Hospital Research Paper - 1)
Information Security Guidelines for ABC Hospital Research Paper - 1. https://studentshare.org/information-technology/1610785-information-security-guidelines-for-abc-hospital.
“Information Security Guidelines for ABC Hospital Research Paper - 1”, n.d. https://studentshare.org/information-technology/1610785-information-security-guidelines-for-abc-hospital.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security Guidelines for ABC Hospital

The Role of Nurses in the Prevention, Care, and Management of Suicide

The sixth part gives the conclusion and summarises all the important points in the prevention, care and management of suicide cases in the hospital setting.... he role of the nurse in the prevention, care, and management of suicide among hospital patients is very significant.... In the hospital level, nurses can help to address the problem by assessing and reporting the behaviour of patients....
22 Pages (5500 words) Essay

Health Insurance Concentration and Its Consequences - Medicaid

They also cover experienced nursing facility care for about 100 days each time one gets ill after staying in the hospital for 3 days.... Part B covers medical doctor services, medical facilities, diagnostic services, outpatient hospital services, some rehabilitation, and blood transfusion.... Medicare part serves everyone, is mandatory, and automatic once the American citizens reach the age of 65 especially if they had been paying for the Social security taxes for about 10 years while employed....
8 Pages (2000 words) Research Paper

Corporate Social and Environmental Responsibility

The paper "Corporate Social and Environmental Responsibility" identifies the main reasons why companies might undertake corporate social and environmental reporting and evaluate against those reasons the ABF plc 'Corporate Responsibility Report 2013'.... ... ... ... Corporate Social and Environmental Responsibility (CSER) for any business organization irrespective of the industry in which they are operating, is referred to demonstrate the act and gesture of corporate citizenship, environmental care, and completely acknowledgment by the organization for its responsibility and duty towards the society and environment, at large....
6 Pages (1500 words) Assignment

Weapons of Mass Destruction

Cleaning and disinfection of medical equipment will be considered and coordinated using the Principles of Standard Precautions guidelines.... Coordination with the Department of Homeland security will ensure that air traffic is properly re-routed and all waterway transport re-directed to other non-affected ports of call....
15 Pages (3750 words) Research Paper

Management of Sexual Harassment in the Health Care Setting

The legislation has formed stringent regulations under the guidelines of Title VII of the Civil Rights Law, 1964 to curb all cases of sexual harassment at work.... he objective is to identify the role of the manager along with the guidelines to be followed in case of a complaint received.... Again, the legislation and guidelines along with the knowledge of the code of conduct for a health care manager and supervisors would be studied....
13 Pages (3250 words) Research Paper

The Context of Consent

Moreover, it supports the idea of patient-centred care and hence is reinforced by professional guidelines and law.... Various guidelines have been provided for this purpose to assist health professionals.... The paper "The Context of Consent" states that the practitioner is considered negligent if he/she fails to provide complete information to the patient, especially the risk involved before receiving consent.... So, it becomes mandatory for the practitioner to provide complete information to the patient related to the treatment, which includes procedures, medication, benefits, risks involved and alternatives, if available....
8 Pages (2000 words) Coursework

The HIPAA Privacy Standarts

rivacy Standards broadcasted under the HIPAA, 1996, entails that a health-concern contributor consider a number of factors like whether the patient has approved the revelation of the demanded health facts; the kind of information required by the subpoena (like, medical proofs that contain confident responsive information); the kind of body that accepts the subpoena (such as, a hospital or health center that is certified by the Department of Public Health (DPH).... Major requirements of these new guidelines incorporate access to medicinal records....
21 Pages (5250 words) Research Paper

Criteria Facility Planning for a Family Clinic

This is a diversity that is always reflected in the extensiveness of the distinctive nature of rules, regulations and codes of conduct and the overseeing of the hospital construction and management.... The paper "Criteria Facility Planning for a Family Clinic" states that the only regret in this planning process is perhaps the realization that there Is a lack of application of proper and diverse research methodologies and which are very crucial in the process....
10 Pages (2500 words) Business Plan
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us