StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Sensitivity and Protection of Data - Essay Example

Cite this document
Summary
Information Sensitivity and Protection of Data 1. Since it is important for healthcare organizations to protect their crucial information regarding the organization, employees and the patients, thus Beth Israel Deaconess Medical Center (BIDMC), Mayo Foundation, and Georgetown University Medical Centers have put forward their detailed privacy and security policies that all users of the system have to comply with in order to ensure data protection…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Information Sensitivity and Protection of Data
Read Text Preview

Extract of sample "Information Sensitivity and Protection of Data"

Information Sensitivity and Protection of Data Since it is important for healthcare organizations to protect their crucial information regarding the organization, employees and the patients, thus Beth Israel Deaconess Medical Center (BIDMC), Mayo Foundation, and Georgetown University Medical Centers have put forward their detailed privacy and security policies that all users of the system have to comply with in order to ensure data protection. All the three policies discuss the security measures that should be taken to protect information that has been stored on technological devices, that is computer systems and networks, and ensures that the employees use proper passwords, softwares and firewalls to authorize data access.

Each organization significantly talks about the scanning of emails and other information that is being exchanged on internet to ensure that no illegal activity or transaction is being conducted. The use of email for the exchange of confidential information is discouraged by each organization. Authorization controls have been stressed upon so that the persons utilizing the information systems are authenticated to make sure that data does not get disclosed to wrong persons. 2. Each organization has a different form of information that it has to protect.

BIDMC stores all sorts of information regarding BIDMC that includes general information and medical records which the employees can make use of for academic and research purposes. Thus, its policy talks about the protection of this specific kind of information that can help its employees in the development of projects and professionalism. Mayo Foundation stores not only general information but also regarding patients that can be useful during transactions for health benefits of the patients. Georgetown, on the contrary, has to store only the medical information of the patients that register themselves with the organization for treatment purpose or as part of research projects (Georgetown University Medical Centers, 2007).

Since BIDMC has to store all information on computerized system, it specifically talks about data protection methods online and talks about no privacy for employees as information is easily accessible to everybody (Beth Israel Deaconess Medical Technology Resources Policy, 2007). Mayo has a different approach as it has divided the access control into three categories: individual-based access control, role-based access control, and context-based access control (Mayo Foundation, 2002). The scanning of information through email and visited websites is even stricter in Mayo policy than other organizations because every bit of visited or shared information is being checked by the information security office. 3. I feel that one of the most important principles is the use of passwords and the responsibility for safeguarding the passwords because once the password is broken, the unauthorized person will have easy and direct access to all crucial information regarding the organization, its research projects and the medical records of the patients.

The length, content and duration of passwords should matter the most. Another important element of these security policies is the internet access control that is, proper check is being kept upon the internet usage by the employees so that they cannot use or share any illicit information regarding the organization or any other information that is against ethics. Thus, password protection and internet monitoring are some of the most important elements I have found in these security policies. References Beth Israel Deaconess Medical Technology Resources Policy (2007). HIMSS. Retrieved April 26, 2011, from http://www.himss.org/content/files/CPRIToolkit/version6/v6%20pdf/D39a_Beth_Israel_Deaconess_Medical_Center_Technology_Resources_Policies.

pdf Georgetown University Medical Centers (2007). HIMSS. Retrieved April 26, 2011, from http://www.himss.org/ASP/privacySecurityTree.asp?faid=78&tid=4 Mayo Foundation (2002). HIMSS. Retrieved April 26, 2011, from http://www.himss.org/content/files/CPRIToolkit/version6/v6%20pdf/D39e_Mayo_Foundation_Information_Security_Policies.pdf 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Sensitivity and Protection of Data Essay”, n.d.)
Retrieved from https://studentshare.org/other/1418982-information-sensitivity-and-protection-of-data
(Information Sensitivity and Protection of Data Essay)
https://studentshare.org/other/1418982-information-sensitivity-and-protection-of-data.
“Information Sensitivity and Protection of Data Essay”, n.d. https://studentshare.org/other/1418982-information-sensitivity-and-protection-of-data.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Sensitivity and Protection of Data

Information Sensitivity and Protection of Data (SLP)

Information Sensitivity and Protection of Data (SLP) Effectiveness of Information Security Policies of OSF Healthcare and its developed nature OSF Healthcare is one of the renowned healthcare organizations operating in the US for a considerable time period now.... The ways through which OSF could protect from the loss of its data and steps to make sure that data remains accessible in the event of a catastrophe protection of data Lost Losing any important information or data from the data base and other data storage system might significantly impact the operations of OSF, hindering its strategic goal to suffice the medical needs of the patients within due time and involving minimum costs....
3 Pages (750 words) Essay

Protecting Operating Systems, Security Vulnerabilities

Authentication This is the act of verification of a user's identity before they can log into a system and be able to execute any programs or do any changes to data in it.... Authorization is important in that it keeps away malicious or illiterate users from accessing otherwise vital resources in a computer system therefore preventing potential damage to the computer systems or the data stored inside.... Identification is crucial in safeguarding the integrity, privacy, and availability of any information technology infrastructure or system (Lakshmana, 2007)....
8 Pages (2000 words) Essay

Role of State in Data Protection

This interpretation is widely spread in continental Europe whereby privacy may be taken in terms of property which includes the protection of an individual's financial records, health records, ex-directory telephone numbers, criminal records, etc.... The UK legislature's stance on their privacy policy brought about the Data protection Act in 1998 which supersedes the earlier Act of 1984, which aimed to implement Council Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data....
13 Pages (3250 words) Essay

SLP- Information Sensitivity and Protection of Data

Components that constitutes… r the present rating may be based on factors including the fact that the organization has already put in place an in-house learning system whereby all employees and other human resource personnel within the organization are getting themselves acquainted with the new information Information Sensitivity and Protection of Data Development level of organization's information security policies On a scale from to 10, the development stage of the organization's information security policy will be placed at 7 out of 10....
2 Pages (500 words) Essay

Risk Management in Practice (an air-monitoring programme is planned)

Using direct reading instruments is however limited to the fact that only the qualitative data of specific classes of chemicals is detected and measured.... This implies that this approach is not appropriate in providing qualitative data when there are multiple classes of contaminants in the...
4 Pages (1000 words) Essay

Information Sensitivity and Protection of Data (CASE) module 5

However, with the implementation of the HIPAA Act, various problems have been witnessed as Information Sensitivity and Protection of Data: HIPAA Affiliation: Summary According to Jarrell, Welker, Silsbee, and Tucker (2012) in their article entry in the journal of American business review on effects of unintended consequences, the effecting of HIPAA Act to regulate information security has a couple of ripples that were not intended in the initial plan.... iscuss what the authors uncovered about the follow of information between staff before and after HIPAA The authors of the article “Unintended Effects of…” uncovered that the flow of data before the introduction of the HIPAA was reliable as information would travel from different personnel within limited time....
2 Pages (500 words) Essay

Information Security Policy for ABCD University

 This policy outlines the protection of information and data in relation to the security of third party access, asset classification and control, data or information classification, user training, response to security incidents and malfunctions, physical and environmental security, access control, cryptographic controls, compliance, and system audit controls.... The information security policy is thus instrumental in ensuring the university protects and makes confidential its information, data and IT assets....
7 Pages (1750 words) Coursework

Information Classification Scheme 3D Media Comm. Ltd

must use for the appropriate classification of data, this will protect its sensitive information from access by the third party.... must use for the appropriate classification of data, this will protect its sensitive information from access by the third party.... Data classification is a very vital part of data management which involves planning and implementing complete and responsible information security practices.... These conditions will undoubtedly help communicate and begin to classify data types; this creates an opportunity to identify the risk by the type of data in question....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us