StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Management Plan in the Case of a Security Breach - Essay Example

Cite this document
Summary
From the paper "Management Plan in the Case of a Security Breach", information security and confidentiality are important in the protection of the client information. In the health sector, it is significant to note that the protection of confidential client information is of paramount importance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Management Plan in the Case of a Security Breach
Read Text Preview

Extract of sample "Management Plan in the Case of a Security Breach"

Management Plan in the Case of a Security Breach al Affiliation Management Plan in the Case of a Security Breach It is of crucial significance to acknowledge the fact that confidentiality and privacy is one of the most important things in all sectors of the society. It is significant to note that confidentiality of information is important in several aspects of life since it maintains trust as well as confidentiality within different organizations (Haux, 2010). In addition, information security and confidentiality is important in the protection of the client information. In the health sector, it is of crucial significance to note that the protection of confidential client information is of paramount importance. The information of such clients should be accorded due protection and security deserved. There should be several policies, rules and regulations put in place to govern the information (Einbinder, 2010). These rules, policies and regulations should ensure maximum security and confidentiality of the information of such clients. Moreover, the websites and databases where such information is contained should be protected with secure passwords to prevent cases of hacking. This is important in ensuring that the information of each client in kept free from access by unwanted or unauthorized parties (Clarkson et al, 2012). However, in cases involving breach of security of such information, it is highly likely that unauthorized persons may get access into the client’s information. This is very dangerous since the people may use the information of the clients in several bad ways (Blyth, 2008). As such, the right to privacy of such clients will be compromised. This may lower their trust with such organizations. The leakage of the privacy of such clients may destabilize them psychologically, mentally and socially. This should always be discouraged at all costs by putting in place several restrictions, policies and rules governing the safety, security and confidentiality of such information. It is important to note that the scenario experienced in the administration at St. John’s Hospital depicts a breach of security of information of the clients. The fact that the cleaners could get access to the information of the clients when tidying up the place was vivid evidence that the people responsible did not take proper care in keeping the client’s information. This was negligence in the part of the people involved in the security section of the information. The discarded printouts should always be kept safe or assigned specific individuals within the organization to always access and dispose of them professionally. However, it is important to note that whether the printouts are discarded or not, they contain the information of the clients. Therefore, confidentiality of such information contained in such printouts should be accorded the security, confidentiality and safety deserved (Winter and Haux, 2011). It is of crucial significance to note that the personnel working late should have taken the duty of warning the cleaning staff against reading the documents within the office. This follows that some of such documents always contain confidential information. In addition, the personnel staff should warn the cleaning staff against sharing the information already illegally acquired. Again the personnel should state to the cleaning staff some of the consequences that may follow any disclosure of such confidential information. This is geared towards ensuring that the information is not disclosed by the cleaning staff. There are several actions that IS administration should take in such a scenario. The IS administration should ensuring that such documents are kept safe and secure where no other third party may have access to them. The department should also warn the cleaning staff against leaking the information contained in such documents read (Haux, 2010). The IS administration should come up with rules, regulations and restrictions governing the practices within the facility. The IS administration should define punitive measures to be taken against any employee who breaches the facility’s code of conduct. This is critical in ensuring that all the employees take active roles in protecting and securing the information within the facility. As such, the issues regarding breach of security will be minimized. Moreover, the IS administration should retake the potential risk analysis in order to identify the threats and vulnerabilities facing their security plan (Wolper, 2011). This should aim at coming up with combative measures to address such risks and vulnerabilities. St. Johns Hospital Patient Data Privacy and Security Plan It is critical to note that the protection of the patients’ health information is very important in the health sector. One of the aims of St. John’s Hospital is to ensure that the patients’ health data are protected in all ways possible. This involves the electronic health information as well as the physical health information. The facility’s patient data privacy and security plan provides detailed information on the security requirements relevant to patients’ data. St. John’s Hospital is a “Covered Entity”. Thus, it has the responsibility of ensuring proper regulations of identifiable health information (Einbinder, 2010). The facility also provides leadership on the significance of ensuring that the patient health information is put safe, secure and protected at all costs. In reinforcing the above, the facility has designated security and privacy officer to ensure that the data is secure. Relevant to security measures, the facility always documents its processes, findings as well as actions. This is important in highlighting the areas where security measures exist, the procedure of coming up with them as well as the ways of monitoring them (Blyth, 2008). St. John’s Hospital always carries out Security Risk Analysis. This is important in comparing the current security measures to the legally and conventionally required security measures for managing its patients’ data. This involves identification of threats and vulnerabilities that may face the patient information data (Clarkson et al, 2012). This is always followed by designing action plans for dealing with such threats. The action plan is then implemented upon successful establishment. The implementation of the plan involves establishing credible policies as well as procedures for protecting the patient health information (Winter and Haux, 2011). In order to reinforce risk management, the facility also trains as well as educates its workforce. This involves training and education on policy implementation procedures as well as security audits. In addition, the workforce also gets training and education relevant to breach notifications. The facility also emphasizes communication with the patients through the use of educational materials as well as open and free consultations. Alongside updating business agreements, St. John’s Hospital also attests Meaningful Use Objective. This is a legal statement that proves that the facility meets the requisite standards of operation relevant to protection of patients’ health data (Einbinder, 2010). References Blyth, M. (2008). Risk and security management: Protecting people and sites worldwide. Hoboken, N.J: John Wiley & Sons. Clarkson, K. W., Miller, R. L. R., Cross, F. B., & Clarkson, K. W. (2012). Business law: Text and cases : legal, ethical, global, and corporate environment. Mason, OH: South- Western Cengage Learning. Einbinder, L. (2010). Transforming health care through information: Case studies. New York: Springer. Haux, R. (2010). Strategic information management in hospitals: An introduction to hospital information systems. New York: Springer. Winter, A., & Haux, R. (2011). Health information systems: Architectures and strategies. London: Springer. Wolper, L. F. (2011). Health care administration: Managing organized delivery systems. Sudbury, Mass: Jones and Bartlett Publishers. APPENDIX 1 St. John’s Hospital Code of Conduct St. John’s Hospital is committed to provide sound policies as well as procedures to ensure maximum protection as well as ascertain highly levels of confidentiality relevant to client information. This code of conduct sets the guideline for the entire workforce within the facility to adhere to the facility’s mission, targets and commitment. The standards set herein are important and are binding to all the employees regardless of rank or position. Thus, any behavior leading to breach of any standard within will attract punitive measures as stated within the Corporate Compliance Program. The Corporate Compliance Program This is responsible for managing the workforce behavior, recommend as well as implement changes. This is an essential and proactive tool in avoiding any incidence of violations of the standards wet within the code of conduct. Questioning and Reporting Violations The workforce has the right to get answers to their queries regarding their operations within the facility. The workforce is also expected to report any instances involving breach of standards set within the code. This should be done procedurally by discussing the matter with the supervisor first. In case the employee feels uncomfortable discussing the issue with the supervisor, he should directly present the case to the Corporate Compliance Officer. St. John’s Hospital Commitment to Compliance St. John’s Hospital aims to achieve the following. 1. Comply with the law. St. John’s Hospital operates within several laws and regulations. As such, all employees are expected to abide by such laws as defined by the facility. 2. Ensure provision of world-class patient care. St. John’s Hospital’s workforce is expected to treat the patients with the care and hospitality required. This involves respect, kindness, patience as well as understanding. Any discriminatory elements against patients are strongly shunned by St. John’s Hospital. The patients are attended to by competent and qualified personnel in St. John’s Hospital. 3. Ensure proper protection to confidential information. St. John’s Hospital is committed to ensure that the patients’ health records, data and information is kept safe, secure and protected. 4. Keep accurate records. St. John’s Hospital is committed to keep accurate as well as complete records of all its patients. Such records must be kept safe and secure. 5. Protect the environment. St. John’s Hospital is committed to ensuring environmental conservation and protection through engaging in environmentally friendly operations. The wastes should be disposed of in accordance to the laws as well as regulations defined by the facility. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Management plan in the case of a security Essay”, n.d.)
Management plan in the case of a security Essay. Retrieved from https://studentshare.org/management/1677722-management-plan-in-the-case-of-a-security
(Management Plan in the Case of a Security Essay)
Management Plan in the Case of a Security Essay. https://studentshare.org/management/1677722-management-plan-in-the-case-of-a-security.
“Management Plan in the Case of a Security Essay”, n.d. https://studentshare.org/management/1677722-management-plan-in-the-case-of-a-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Management Plan in the Case of a Security Breach

Corporate Security Management

The purpose of this security plan is to offer some guidelines and policies that could be adopted by ACME IT in case of a disaster.... This paper outlines the process of developing a security plan to addresses the security requirements identified by ACME IT Manager and control gaps (security requirements) identified previously by Well-Health Inc.... This research paper "Corporate security Management" presents the basic security needs for Well-Health Inc....
7 Pages (1750 words) Research Paper

IPad's Security Breach

The author of the paper "iPad's security breach" touches upon the idea of security of "iProducts".... The security breach that occurred in Apple iPad's was first disclosed by Gawker Media, an online media, and blog network company.... Goatse Security released the itineraries of the security breach to Gawker Media who subsequently made the information public through their blog.... As the text has it, controversy hit Apple's iPad or more specifically the iPad's cellular network, AT&T as a security research company, Goatse Security pointed out a flaw in the security system....
5 Pages (1250 words) Research Paper

The Disaster Management Cycle

There is a possibility that a minor disaster may lead to the hospitalization of some people (sportsters/spectators/organizers) and a major disaster can be planned to be executed in the hospital because it provides a good vantage point to the perpetrators of the security breach.... The steps taken to prevent any risk are stringent security checks, surveillance, detection and raids.... security checks at all the entries are a must.... hellip; According to the discussion security checks of the entire premises are also very important throughout the course of the games....
8 Pages (2000 words) Essay

Business Plan Project for a Security Guard Company SecureIT

It will also involve the development of a security research center in which major threats will be studied and results employed in the improvement of services provided by the company.... The author of the paper "Business Plan Project for a security Guard Company SecureIT" will begin with the statement that the company SecureIT is a company formed as a partnership between two friends Mr.... Luther Graves holding experience in the policing field having worked with a security firm for over twenty years....
9 Pages (2250 words) Case Study

Historical Analysis of the Security Breach

a cracker while in the case of an accident, it may result from acts that are beyond human control such as malfunctioning or “act of God” e.... in the case of the University of California, vulnerability within the university system resulted in the loss of eight hundred thousand records from the institutional database.... This report "Historical Analysis of the security breach" discusses a threat that can be defined as the danger in which vulnerability can be exploited to breach security resulting in possible harm....
11 Pages (2750 words) Report

Security of Information in Business Organisations

That aside, the concept of information security is interpreted according to the specific purpose(s) for which protecting information by a particular businessman becomes a primary concern (Gupta, 2009).... But loopholes for leaking of business information into unintended audience constitutes complex intertwined counterparts including the technology itself (Dhillon 2003), mismanagement of data and distrust between the management and the workers from a major viewpoint among others (Ardichvili & Page, 2003)....
14 Pages (3500 words) Essay

Knowledge and Information Security Plan

15 Pages (3750 words) Essay

Issues Related to Security Interoperability and Operations

This case study "Issues Related to security Interoperability and Operations" focuses on the issues faced by Banking Solutions Inc, a number of them are related to security, interoperability, and operations.... More importantly, the best IT security controls would be the one giving way to the promotion of objectives as well as measurable progress indicators in aspect like information security, item progress, and operations among others....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us