StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Department of Health and Human Services IT Security Program - Research Paper Example

Cite this document
Summary
The author examines a security strategy which has been developed by the Department of Health and Human Services Department of Health and Human Services, for strengthing health care delivery and access by encouraging innovation as well as efficiency and transparency of the programs and processes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Department of Health and Human Services IT Security Program
Read Text Preview

Extract of sample "Department of Health and Human Services IT Security Program"

Department of Health and Human Services IT Security Program Since the administration of President Barack Obama took charge of the government in 2008,one of the objectives that have been aggressively pursued was health care. It was inevitable, hence, for the US Department of Health and Human Services to have a prominent role and introduce a radical shift in policy focus. This development, which many see as wide ranging reform, is fundamentally articulated in the agency’s Strategic Plan and Priorities 2010-2015. This plan has at least five strategic priorities: health care; knowledge and innovation; health, safety and well being; transparency and accountability; and, development of the workforce and infrastructure. In order to achieve the goals in each of these areas, the agency relies on several mechanisms such as performance measures. Another mechanism, which this paper will explore, is the area of security. The overarching principle that guides the organizational ambitions is to strengthen health care delivery and access by encouraging innovation as well as efficiency and transparency of the programs and processes. The agency recognized that these could not be achieved if the initiatives, activities and information involved are not protected or secured. In order to address this, a security strategy has been developed by the Department of Health and Human Services Department of Health and Human Services. This strategy is articulated in several security policies, which are outlined below: HHS IRM Policy for IT Security for Remote Access This policy outlines the framework by which the department ensures that its IT resources are protected when accessed remotely. The resources mentioned include all levels of sensitivity all existing automated information and systems. The policy includes mandatory rules for all organizational units, employees and other stakeholders. The roles and responsibilities are also outlined for the managers, security and IT officers. Policy for the Prevention, Detection, Removal and Reporting of Malicious Malware Building on the fact that pro-active security measures are implemented and maintained effectively, this policy outlines the rules by which malwares or malicious computer applications and data are prevented from entering the system, detected and rooted out immediately. This policy is particularly directed at the employees who are tasked to gather, process and transmit HHS information and infrastructure resources such as the Chief Information Officer (CIO), the Deputy Assistant Secretary for Information Resources management and Senior Information Systems Security Officer. Policy for Responding to Breaches of Personally Identifiable Information (PII) Through this policy, the Department of Health and Human Services, effectively, created the PII Breach Response Team. Consequently, the policy outlined the responsibilities, tasks and mandate of the team such as the identification, management and response to suspected or confirmed security breaches. This policy also created the HHS Information Security and Privacy Program, which was developed to support the Breach Response Team. Policy for Privacy Impact Assessments (PIA) PIA is a critical policy introduced by the Department of Health and Human Services because it is concerned about performance. The policy articulated the manner by which evaluations for all of the organization’s information technology systems should be conducted. This aspect in the security system of the HHS is important because it established the framework by which security performances are evaluated according to organizational security objectives, governmental requirements. HHS-OCIO Policy for Machine-Readable Privacy Policies This is one of the several major policies that came from the office of the Chief Information Officer. It outlines the implementation for machine-readable policy for the agency’s websites. A core component of this policy is the satisfaction of best practices standards in terms of satisfying web privacy security, legal and regulatory requirements as well as the collection and protection of data. HHS-OCIO Policy for Information Systems Security and Privacy This is a detailed policy that identifies stakeholders and their responsibilities in the overall organizational initiative to the data gathered and stored by the agency within the parameters of the Federal Information Security Management Act of 2002. This is a new iteration of this policy that improved on the manner by which the agency develop and maintain a security framework according to the changes in technological and statutory standards. Policy for Information Technology (IT) Security and Privacy Incident Reporting and Response The latest policy introduced by the Chief Information Officer. It details the process by which IT security incidents are reported and created the HHS Computer Security Incident Response Center, a unit specifically tasked to maintaining Department-wide IT security situational awareness and the determination of IT security risk posture. The Implementation of the Office Management and Budget (OMB) M-10-22 and M-10-23 This is a policy response to the memoranda issued by the Office of Management and Budget, the M-10-22 (Guidance for Online Use of Web Measurement and Customization Technologies) and M-10-23 (Guidance for Agency Use of Third Party Websites and Application). The policy is directed towards all supervisory positions under the CIO and outlined procedures of adherence within the context of the organizational framework. The above policies constitute the overall security policy of the Department of Health and Human Services. There is no overarching framework that includes all of these into a coherent and systematic organizational standard or rules. The program is a loose mechanism consisted of a series of policy making that are independent of each other. It is up to the officers and employees subject to each of the policies to make sense of them in the context of the wider organizational security policy and organizational objectives. While the office of the CIO is prompt in its policy responses to existing and emergent IT security risks both on the environmental and statutory levels, there is need to establish a general policy integrating each of the above policies to provide coherence and efficiency. It is imperative that IT security policymaking are contextualized within one framework in order to: 1) avoid overlapping policies, responsibilities, tasks and strategies; 2) streamline processes and, 3) provide policy linkages. References DHSS. (2001). HHS IRM Policy for IT Security for Remote Access. DHSS. DHSS. (2010). U.S. Department of Health and Human Services Strategic Plan 2010-2015. DHSS. DHSS Office of Information Resource Management. (2001). Policy for the Prevention, Detection, Removal and Reporting of Malicious Malware. DHHS. DHSS-OCIO. (2008). Policy for Responding to Breaches of Personally Identifiable Information (PII). DHHS. DHSS-OCIO. (2009). Policy for Privacy Impact Assessments (PIA). DHSS. DHSS-OCIO. (2010). HHS-OCIO Policy for Machine-Readable Privacy Policies. DHSS. DHSS-OCIO. (2010). Policy for Information Technology (IT) Security and Privacy Incident Reporting and Response. DHSS. DHSS-OCIO. (2010). The Implementation of the Office Management and Budget (OMB) M-10-22 and M-10-23. DHHS. DHSS-OCIO. (2011). HHS-OCIO Policy for Information Systems Security and Privacy. DHSS. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Department of Health and Human Services IT Security Program Research Paper”, n.d.)
Department of Health and Human Services IT Security Program Research Paper. Retrieved from https://studentshare.org/information-technology/1781634-information-security-program-survey
(Department of Health and Human Services IT Security Program Research Paper)
Department of Health and Human Services IT Security Program Research Paper. https://studentshare.org/information-technology/1781634-information-security-program-survey.
“Department of Health and Human Services IT Security Program Research Paper”, n.d. https://studentshare.org/information-technology/1781634-information-security-program-survey.
  • Cited: 0 times

CHECK THESE SAMPLES OF Department of Health and Human Services IT Security Program

What are the rules that apply for collecting unemployment compensation in Rhode Island

In the US, the Department of Labor has laid down statutes and regulations that govern wages, benefits, safety, health and non discrimination policies.... In the US, the Department of Labor has laid down statutes and regulations that govern wages, benefits, safety, health and non discrimination policies.... The department of Labor strictly enforces the requirements of the Act and when violations are discovered, the employer is requested to pay back wages wherever applicable....
3 Pages (750 words) Research Paper

The United States Medicare Program

In order to prevent fraud, wastage and abuse in Medicare the department of Human and Health services has instituted the office of the Inspector general and another department that works jointly with the HHS called the Fraud Prevention and enforcement team (HEAT).... The United States Medicare program (Name) (University) (Course) (Tutor) Introduction Medicare is the United States federal health insurance program that covers people who are 65 years or older or those under 65 years of age with certain disabilities and people of any age with end stage Renal disease, a permanent kidney failure requiring dialysis or a kidney transplant....
7 Pages (1750 words) Research Paper

United States Department of Labor Case Study

The department of health and human services expresses the operational law coverage affecting public sectors health plans.... Employers with more than 20 employees, for more than a year in the program, have the benefit of extension of health coverage, designed for their employees and their families, in cases where the coverage plans deems ending.... hellip; United States department of Labor Case Study This effect for a certain timeframe, under unusual situations which includes resignations and unavoidable cases of unemployment abridged hours of work, shifts in jobs, death cases, divorce or separations, and other life occurrences....
5 Pages (1250 words) Assignment

BHS 499 (Senior Capstone Project) Module 3 SLP

REFERENCESThe department of health and human services and The Department of Justice (2000) Health care fraud and abuse control program.... Part of the operations include: development and execution of best practices in the assessment, risk identification, and response management (department of health, 2001)along with the operations of Medicare and Medicaid.... The funding further helped to support the nationwide infrastructure for educating beneficiaries and technical assistance for those who will serve as the Medicare system's "eyes and ears" (department of health, 2001)....
2 Pages (500 words) Essay

Home Care in the United States - Home and Community Based Medicaid Services

To enable states to provide more comprehensive long-term care services the Department of Medicaid Services (DMS), through the Secretary of the US department of health and human services (HHS), are allowed to grant waiver programs to provide Medicaid recipients with home and community based services through an array of home and community based programs.... hellip; These programs include services such as case management, homemakers, home health aides, personal care, adult day health rehabilitation, and respite care among others where Ohio and Kentucky are both participants in the program. To address home health care needs and decrease the state's expenditures with regard to institutional care, Ohio has applied for a number of waivers under Section 1915 (c) of the Social Security Act through its Home Care Waiver Services, PASSPORT Waiver, Transition Waiver, Individual Options Waiver, and Level One Waiver; administrated through the coordinated efforts of the Ohio department of Job and Family Services (ODJFS), the Ohio department of Mental Retardation an d Developmental Disabilities (ODMRDD), and the Ohio department of Aging (Ohio Legal Rights Service [OLRS] 2005, 'Medicaid Waiver Programs in Ohio')....
3 Pages (750 words) Essay

Weatherization Programs in the US

The program obtains financial support from the United States Energy plus health and human services Departments.... department of Energy).... department of Energy).... The United States department of Energy approximates that an excess of 5.... The department of energy allocated funds to all the American states under the 2009 Recovery Act.... department of Energy).... The United States Weatherization Assistance program (WAP) was launched in 1976 to assist modest-income households to trim down their energy use and the associated expenses....
4 Pages (1000 words) Essay

Staff Interview with Member of Lake Havasu Fire Department

An interview was conducted with a member of the firefighting staff at the Lake Havasu Fire Department who was acting in a temporary role as human resources director.... A recent personnel shift had left this position open and the interviewed participant, who will be called Steve,… The interview uncovered that the Lake Havasu Fire Department is quite innovative in its focus on human relations and has come up with some unique employee programs Over and above standards, the Lake Havasu Fire Department excels in most areas of testing for career advancement and in areas of personnel development....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us