StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

CLevel Concerns in IA Management - Essay Example

Cite this document
Summary
Data security and information protection have become today's goals for some organizations who are involved in storing even small amounts of strategic information on their computers. Nonetheless, the risks posed by upcoming viruses, spywares, malwares, Trojans etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
CLevel Concerns in IA Management
Read Text Preview

Extract of sample "CLevel Concerns in IA Management"

Download file to see previous pages

Thus for protection, organizations employ strict security measures to create a barrier to stop these codes entering the system and if they enter, provide a method to detect and destroy the code before it destroys the company. The first step of information protection is developing a security policy for the specific organization. Security policy often covers how the policy will be used inside the company, describes how the company would educate its employees about protecting the organizational assets such as its computer systems and information, terms and explanation of security enforcement, and also an evaluative feature in the policy so that it can be updated when required (Whatis, 2007).

In our health care facility, there is not such an extensive security policy, rather a general one. This security policy tells about how the employees are supposed to use the system, which users are restricted from accessing other higher levels of information, information regarding legal actions in case of breaching the code of confidentiality and policy updating mechanisms. Our security policy came into existence after several cases of breach of patient information which was used by marketers to advertise their products using patient telephone numbers and email addresses.

Since such information is easily available elsewhere, we first rejected patient's claims that such information leaking is coming from our side. However when such complains became common, an inquiry was conducted and it was found that one of the receptionist's computer systems was being hacked. At this point in time, our system administrator met with all information technology members in the organization and decided to implement a full-fledged policy to prevent such an incident from occurring again.

Developing and Implementing the PolicyThe first step in developing the strategy was to take permission from the manager and gets the funds allotted. This is easily done specially after the incident as the managers wanted to regain the lost image of the organization due to breach in patient information which is a requirement in the medical profession. A security memorandum was issued in response to the incident detailing of how security will be managed in the organization from then onwards.Industry StandardsKeeping the enormous need of patient information confidential, this policy was created and the ISO 17799 standard was integrated.

Doctors, nurses and other staff were given personal computers (where required) with personal passwords. Three levels of information was secured using these passwords, with senior doctors getting to the highest access level and the junior nurses/interns getting the least access level. In the policy, the guidelines for employee level updates are given and the permission of their access levels is clearly identified. (Shinder & Tittel, 2002)Password ProtectionThe password protection was applied throughout the intranet (internal network) of the organization.

The network administrator is responsible for setting up the user accounts, giving them access codes and setting up their personal systems. Also these passwords are supposed to be changed regularly.Installation GuidelinesFor the matter of security, no user is allowed to install any software of their system without informing the network adminis

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CLevel Concerns in IA Management Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
CLevel Concerns in IA Management Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/miscellaneous/1524027-clevel-concerns-in-ia-management
(CLevel Concerns in IA Management Essay Example | Topics and Well Written Essays - 1000 Words)
CLevel Concerns in IA Management Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/miscellaneous/1524027-clevel-concerns-in-ia-management.
“CLevel Concerns in IA Management Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1524027-clevel-concerns-in-ia-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF CLevel Concerns in IA Management

Restoration and Recovery of Information Systems and Data

nbsp;… Restoration and recovery of information system operations have become one of the most important concerns in information systems management.... Restoration and recovery fall under risk management of information systems and entails identifying managing minimizing risks and assessment and evaluation.... The primary factors considered are cost, management, reliability and security Effective back up strategies limit the need to reinstall programs and regenerate data in the events of data loss....
6 Pages (1500 words) Case Study

The Changing Climatic Condition in Nigeria: Environmental Concern

This report provides an innovative approach to meet the various challenges faced by the Nigerian Transportation System through the help of Strategic Environmental Assessment.... The transportation system of the nation has been found to be in a very poor state.... hellip; The report has been prepared with an attempt to understand the relationship between the major transportation issues....
12 Pages (3000 words) Research Paper

How Stress can be Damaging to an Individual Employee

As commonly observed, the common stressors that are found in the workplace that can affect a person physically and mentally include but not limited to the number of workloads given to them, the seclusion, excessive hours given to work, a stressful environments because of pressures, the inability of a person to engage in self-rule, problematic relationships with colleagues and management, presence of intimidation among members in the organisation, pestering, and the lack of either provocation or openings for career-pathing advancement via improvement of skills, abilities, knowledge, position and accountability....
7 Pages (1750 words) Essay

Information Assurance Perspective on Cloud ERP Solution Implementation for Lesley Stowe Fine Foods (LSFF)

This paper evaluates the comprehensive concept of IA offered by the cloud ERP solution to ensure that IS serves LSFF's transactional needs like operational capability and transformational needs like rapid adaptation, innovation and knowledge management.... hellip; In LSFF, it is clear that the management is carefully considering monitoring mechanisms appropriate to the enterprise's prevailing conditions.... The paper evaluates the comprehensive concept of IA offered by the cloud ERP solution to ensure that IS serves LSFF's transactional needs like operational capability and transformational needs like rapid adaptation, innovation and knowledge management....
20 Pages (5000 words) Term Paper

Strategic Management Plan for Middle-East Television Network

The writer of this report "Strategic management Plan for Middle-East Television Network" would provide a particular business management plan, describing its intention, goals, and way of implementation.... Provide quality television network in the Middle Eastern market Strategic management Plan for Middle-East Television Network Mission To provide the only credible source of news and popular source entertainment television for viewers in the Middle East, while promoting American Values such as freedom and democracy....
2 Pages (500 words) Essay

Health Impact Assessment

The efficiency with which state legislation and public institutions in developing countries deliver and apply environmental management highly depends on their level and pace of socio-economic advancement.... The case study under the title"Health Impact Assessment" demonstrates the idea that Health Impact Assessment (HIA) is now a major trend in the realm of impact assessments, which overlaps and integrates with Environmental Impact Assessment (EIA) processes....
9 Pages (2250 words) Case Study

System Identification and Security Categorization

hese controls have been categorized to technical, management and operational controls.... ctions regarding risk management can be executed when planning, assessment of the significance of the risk and identification are carried out in a proper way.... Though risk management will not absolutely eliminate risk, it possibly reduces the risk actualization, provides significant remedy and penitential risks in the future.... The main goal of the VA is to protect information and information system through risk management program to achieve strategic and operational goals....
6 Pages (1500 words) Essay

Environmental Challenges on the Projects Construction Link Road

This case study "Environmental Challenges on the Projects Construction Link Road" presents a 5.... km link road, a two-lane single carriageway, between Hastings and Bexhill in the United Kingdom.... This development is expressed in terms of facilitating the wider regeneration of Hastings and Bexhill....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us