Free

Analysis of Security Plan - Case Study Example

Comments (0) Cite this document
Summary
This essay discusses some beneficial security measures for the facility concerning the transition to an Electronic Health Record (EHR) system. It is essential to maintain confidentiality, data integrity and prevent loss of data in the implementation of EHR system…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Analysis of Security Plan
Read TextPreview

Extract of sample "Analysis of Security Plan"

Analysis of Security Plan
Executive Summary
Concerning the upcoming transition to Electronic Health Record (EHR) system, it is necessary to implement security measures to ensure that all processes flow seamlessly. This is necessary to maintain confidentiality, data integrity and prevent loss of data. The proposed security measures discussed include physical security of hardware, data security, confidentiality, access, disaster recovery, backups, business continuity planning, appointment of chief security officer, employee training methods, and institution of penalties for violating policies.

Proposed Security Measures
1. Physical security of hardware
Hardware includes the equipment used in the facility such as computers, printers, and other systems. It is necessary to guarantee the safety of hardware especially because most of the equipment is expensive. Physical security measures are essential to ensure that physical circumstances do not trigger severe losses or damage to the faculty.
2. Data Security
Data security involves back up of software to avoid threats such as hacking. It is essential to ensure that data is used for only its intended purpose, and by authorized personnel. The implementation of this proposal must be in line with existing data security laws and policies.
3. Confidentiality
Confidentiality is essential to ensure that client data is secure and safe from the public. Security officers must place boundaries and limit admission on certain types of information. Loss of confidentiality may result in patient discomfort or even serious consequences such as lawsuits.
4. Access
Access to information involving company operations should be restricted to a few security officers. Access of information and facilities must be in line with the logical expectations of the faculty.
5. Disaster Recovery
There must be measures to ensure that data recovery is done in a timely manner. The process involves a set of procedures that enable the continuation of service provision and transition to Electronic Health Record (EHR) system.
6. Backups
Backups of data are an essential security measure that ensures that there are backups of all company and client information. Loss of financial records or disappearance of clients’ private information may have disastrous consequences on the credibility of an organization. Cloud computing methods are useful in contemporary backup services (Khameesy 1).
7. Business Continuity Planning
Business continuity ensures that the operations and plans of an organization continue in the shortest time possible despite the integration of the new EHR system. The transition to the new HER system is a localized short term procedure, but necessary security measures are necessary to ensure business continuity.
8. Penalties for Violating Policies
It is essential to institute stringent rules to enforce the security policies set. The chief security officers must outline penalties clearly to ensure confidence in operations and company objectives.
9. Appointment of Chief Security Officer
A Chief Security Officer will ensure the enforcement of the proposed measures. In addition, the person oversees all security departments and ensures proper enforcement of faculty laws and regulations.
10. Employee Training Methods
Employees must receive proper training to ensure that there are no misunderstandings in implementation of the proposed security measures. Technology-based training enables employees to understand the functioning of the new system.


Works Cited
Khameesy, Nashaat and Rahman, Hossan. A Proposed Model for Enhancing Data Storage
Security in Cloud Computing Systems. Journal of Emerging Trends in Computing and Information Sciences, VOL. 3, NO. 6, June 2012. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Analysis of Security Plan Case Study Example | Topics and Well Written Essays - 500 words - 105”, n.d.)
Analysis of Security Plan Case Study Example | Topics and Well Written Essays - 500 words - 105. Retrieved from https://studentshare.org/technology/1870822-case-study
(Analysis of Security Plan Case Study Example | Topics and Well Written Essays - 500 Words - 105)
Analysis of Security Plan Case Study Example | Topics and Well Written Essays - 500 Words - 105. https://studentshare.org/technology/1870822-case-study.
“Analysis of Security Plan Case Study Example | Topics and Well Written Essays - 500 Words - 105”, n.d. https://studentshare.org/technology/1870822-case-study.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Analysis of Security Plan

Security Plan

...? Security Plan Table of Contents Security Plan Table of Contents 2 Introduction 3 Objectives 3 Scope 4 Physical Threat To Organization’s Information Holdings 4 Theft 4 Sabotage 5 Human Mistakes 5 Environmental Distraction 5 Human Threats To Organization’s Information Holdings 6 Computer Fraud 6 Hacking 6 Human Errors 7 Unauthorized Access 7 Information Destruction By Dissatisfied Employees 7 Electronic Threats To Organization’s Information Holdings 8 Organization’s Actual Threat For Information Holdings 9 Security Plan 9 Physical Countermeasures 10 Electronic Countermeasures 12 Human Countermeasures 15 Information...
17 Pages(4250 words)Essay

Information Security Plan

...? Information Security Plan October 9, Information Security Plan INTRODUCTION: Computer audit entails safeguarding the company’s holdings. The research delves on the information security risks. The research delves on the on implementing programmes that will reduce or eliminate information security threats in an Australian company setting. Information Security Plan’s safeguarding of company assets policy ensures the Australian company’s business continuity. BODY: a) Identification and description of the organisation’s physical holdings (property) that may be at risk As recently appointed head of a...
12 Pages(3000 words)Essay

Security Plan

...? SECURITY PLAN Introduction A security plan is process through which an individual or organization formulates policies that can be used to ensure availability security. Before coming up with a security plan a risk has to be identified, for instance a school can decide to come up with a security plan in order to protect property like computers. This report focuses on the security plan that North Carolina agricultural and state university came up with to protect the university resources especially computers in order to promote quality in computer systems...
8 Pages(2000 words)Essay

Security Risk Management Plan

...ongoing process throughout the project life, and it includes process of planning, identification, analysis and finally monitoring and control. With new risk identified with time these processes are updated. With the Rural Internet Kiosk, quite a number of risks are assessed to happens along the setting up of the whole organization and is mainly divided into four; the general management, personnel policies, insurance and general protection against fraud, terrorism and many other potential threats. The potential risk focused at the main four areas need senior management consideration because they will end up affecting the final project production, because for a organization to be secure...
6 Pages(1500 words)Essay

Analysis of Growth Area Authoritys Aurora Precinct Structure Plan in Light of Food Security, Climate Change and Population Growth Issues

...? Analysis of Growth Area ity’s Aurora Precinct Structure Plan in Light of Food Security, Climate Change and Population Growth Issues Name University Introduction Growth and prosperity of a country is directly proportional to its policies, effective implementation of these policies and achievement of the desired results. Being the sixth largest country in the world in total area, Australia is more susceptible to the changing environment, increasing population, food insecurity and housing needs due to its climate, topography, soils, culture and distinct behavior of its inhabitants (PMSEIC, 2010). The country is located in the Southern Hemisphere and is surrounded by Pacific and Indian...
6 Pages(1500 words)Assignment

Security plan

...data. This data belongs to different departments and management areas. In case of effective business data security management we initially need to classify it into an appropriate way. This classification will offer a better overview to the business security management and its handling will be effective. After the analysis of the Batteries+ business I have classified the business data into following categories: Employees record Resource and development records Marketing data Management decision reports Customer records Sales records Corporate plans Operational projects data 9.2- Security initiatives For the better management of the above given...
15 Pages(3750 words)Essay

World Cup Security Plan

...World Cup Security Plan Brazil will host the FIFA World Cup in 12 cities in June and the tour nt is expected to attract both local and foreign fans as well as security threats. To this end, the government will invest $855 million and 57,000 troops towards security for the duration of the tournament (Trevisani 1). In total, the security plan will include 100,000 police officers and buying new non-lethal weaponry. Traditionally, urban policing is known to be complicated by the competing of police forces in Brazil and, unavoidably, this will compromise the quality of the security offered and potentially keep ticket-paying...
2 Pages(500 words)Essay

Security analysis

...SECURITY ANALYSIS SECURITY ANALYSIS Ratio Analysis To have a clear understanding of theratios of the companies and how they influence what the companies are worth, the average P/E ratio and EPS growth rates are used. In this regard, it is seen that the average P/E ratio of Carnival Corp is 19.90 whiles that of Capital First is 10.27. Meanwhile, higher average P/E ratio gives shareholders confidence about their earnings per the current share price of the company. This means that as far as shareholder confidence is concerned, Carnival is worth higher than Capital First. With regards to the EPS growth rate, Carnival Corp has as high as 15.79 when Capital...
2 Pages(500 words)Admission/Application Essay

Industrial Security Plan

...Industrial Security Plan al Affiliation) Introduction An industrial safety plan is a set of procedures set forth to protect workers in an industrial setting. Security officers carry out industrial safety plan implementation. In addition, they have responsibilities and roles pertaining to safety inspections, safety training, policy development, and compliance with OSHA, which stands for Federal Occupational Safety & Health Administration. Implementing and developing safety policies aids employers reduce accident-related expenses and avert losses due to a decrease in productivity. The safety officer determines what policies and procedures needed and...
7 Pages(1750 words)Assignment

Organization of Security Plan

...to manipulate. In order to ensure the risk of having information shared or compromised is well mitigated, the security control to employ includes limited access. It was noted in organizations where information play an important role in every-day life, the “need-to-access-“ control ought to be employed. That is to say, only individuals whose need for the information is important will access it. Since some threats tend to be unpredictable, there is a need to have incident response plan to avoid confusion in such cases. In this case, the DHS shall conduct an analysis of the incident as the first step with an aim to analyze its source and magnitude. Secondly, the appropriate steps, which...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Analysis of Security Plan for FREE!

Contact Us