StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Analysis of Security Plan - Case Study Example

Cite this document
Summary
This essay discusses some beneficial security measures for the facility concerning the transition to an Electronic Health Record (EHR) system. It is essential to maintain confidentiality, data integrity and prevent loss of data in the implementation of EHR system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Analysis of Security Plan
Read Text Preview

Extract of sample "Analysis of Security Plan"

Analysis of Security PlanExecutive SummaryConcerning the upcoming transition to Electronic Health Record (EHR) system, it is necessary to implement security measures to ensure that all processes flow seamlessly. This is necessary to maintain confidentiality, data integrity and prevent loss of data. The proposed security measures discussed include physical security of hardware, data security, confidentiality, access, disaster recovery, backups, business continuity planning, appointment of chief security officer, employee training methods, and institution of penalties for violating policies.

Proposed Security Measures1. Physical security of hardwareHardware includes the equipment used in the facility such as computers, printers, and other systems. It is necessary to guarantee the safety of hardware especially because most of the equipment is expensive. Physical security measures are essential to ensure that physical circumstances do not trigger severe losses or damage to the faculty. 2. Data SecurityData security involves back up of software to avoid threats such as hacking. It is essential to ensure that data is used for only its intended purpose, and by authorized personnel.

The implementation of this proposal must be in line with existing data security laws and policies. 3. ConfidentialityConfidentiality is essential to ensure that client data is secure and safe from the public. Security officers must place boundaries and limit admission on certain types of information. Loss of confidentiality may result in patient discomfort or even serious consequences such as lawsuits. 4. AccessAccess to information involving company operations should be restricted to a few security officers.

Access of information and facilities must be in line with the logical expectations of the faculty. 5. Disaster RecoveryThere must be measures to ensure that data recovery is done in a timely manner. The process involves a set of procedures that enable the continuation of service provision and transition to Electronic Health Record (EHR) system. 6. BackupsBackups of data are an essential security measure that ensures that there are backups of all company and client information. Loss of financial records or disappearance of clients’ private information may have disastrous consequences on the credibility of an organization.

Cloud computing methods are useful in contemporary backup services (Khameesy 1).7. Business Continuity PlanningBusiness continuity ensures that the operations and plans of an organization continue in the shortest time possible despite the integration of the new EHR system. The transition to the new HER system is a localized short term procedure, but necessary security measures are necessary to ensure business continuity. 8. Penalties for Violating PoliciesIt is essential to institute stringent rules to enforce the security policies set.

The chief security officers must outline penalties clearly to ensure confidence in operations and company objectives. 9. Appointment of Chief Security OfficerA Chief Security Officer will ensure the enforcement of the proposed measures. In addition, the person oversees all security departments and ensures proper enforcement of faculty laws and regulations. 10. Employee Training Methods Employees must receive proper training to ensure that there are no misunderstandings in implementation of the proposed security measures.

Technology-based training enables employees to understand the functioning of the new system. Works CitedKhameesy, Nashaat and Rahman, Hossan. A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems. Journal of Emerging Trends in Computing and Information Sciences, VOL. 3, NO. 6, June 2012.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Analysis of Security Plan Case Study Example | Topics and Well Written Essays - 500 words - 105”, n.d.)
Analysis of Security Plan Case Study Example | Topics and Well Written Essays - 500 words - 105. Retrieved from https://studentshare.org/technology/1870822-case-study
(Analysis of Security Plan Case Study Example | Topics and Well Written Essays - 500 Words - 105)
Analysis of Security Plan Case Study Example | Topics and Well Written Essays - 500 Words - 105. https://studentshare.org/technology/1870822-case-study.
“Analysis of Security Plan Case Study Example | Topics and Well Written Essays - 500 Words - 105”, n.d. https://studentshare.org/technology/1870822-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Analysis of Security Plan

A Security Plan of the University

security plan Introduction A security plan is process through which an individual or organization formulates policies that can be used to ensure availability security.... Before coming up with a security plan a risk has to be identified, for instance a school can decide to come up with a security plan in order to protect property like computers.... hellip; This report focuses on the security plan that North Carolina agricultural and state university came up with to protect the university resources especially computers in order to promote quality in computer systems and attain the universities goals....
8 Pages (2000 words) Essay

Food Security, Climate Change, and Population Growth Issues

Aim This paper aims to critically analyze the strategic plan titled Aurora Precinct Structure Plan in regard to its ability to approach the issue of climate change, food insecurity and population growth and to its adequacy to an analysis of future directions in planning.... For instance, in 2001 and 2002, Victorian Government plan, known as VicUrban, decided to develop this land and got control of a massive piece of land which is now known as Aurora (Aurora Precinct Structure plan, 2001)....
6 Pages (1500 words) Assignment

Information Security Program Survey

hellip; As per 2011 NASA strategic plan, NASA's mission is to “drive advances in science, technology, and exploration to enhance knowledge, education, innovation, economic vitality, and stewardship of Earth”.... Information security Program Survey (Name) (University) (Date) Information security Program Survey Introduction The National Aeronautics and Space Administration (NASA) is the United States' agency to manage the nation's aerospace research, aeronautics, and other civilian space programs....
4 Pages (1000 words) Essay

Social Security Dilemma

Prior to the passage of the original Social Security Act in 1935, thirty states had adopted some form of old-age pension plan.... The elderly faced restrictive plan entry rules.... The author examines the ideas as to how to fix the Social security funding dilemma.... nbsp;… Throughout the world, there is the idea that governments should provide economic security to the people under their jurisdiction.... nbsp; One of the first Americans to propose a system of economic security for U....
22 Pages (5500 words) Term Paper

Business Plan Project for a Security Guard Company SecureIT

The company SecureIT deals with the provision of security guards to different business premises with the aim of boosting security in the wake of terrorist threats.... The company is a startup made up of a partnership between two partners that hold experience in the field of security with one Mr.... The study describes the business plan project for a security guard company SecureIT.... hellip; The company aimed at providing quality security services that will cover the provision of guards to different premises, conducting private investigations and the provision of consultancy services to the customers....
9 Pages (2250 words) Case Study

Compilation of Security Data Issues

The paper 'Compilation of security Data Issues' focuses on data security issues.... Most organizations and businesses implement numerous forms of security by enforcing hardware remedies such as firewalls and routers.... The paper is a compilation of ten security data issues.... Data security means safeguarding data, like a database, from disparaging forces, and from the undesired actions of unauthorized personnel.... hellip; The author states that unauthorized access to data is one of the data security issues affecting businesses....
12 Pages (3000 words) Report

Systems Theory and Physical Security

 The focus of this paper "Systems Theory and Physical security" is to discuss the systems approach to physical security and why it is necessary for the protection of assets.... System theory plays a significant role in that they offer security and can, therefore, be used to offer both safety and security (Schultz et al, 2001).... Modern and high-tech safety analysis techniques that are based on system theory have found their way....
13 Pages (3250 words) Term Paper

Issues Related to Security Interoperability and Operations

Other included processes and requirements within the DRBCP include critical business process including process owners, alternative processing facility addresses as well as directions, notification listing, critical plan participant roles, responsibilities, vendor contact listing, core business forms, recovery procedures for core systems, as well as procedures initiated to manage public relations and communication.... e) Not all the plan participants have been issued with the process plan as seen in the review of DRBCP distribution lists....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us