Preview

Security Policy Framework

Powerful Essays
Open Document
Open Document
2433 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Policy Framework
Information Security Policy Framework

Information Security Policy Framework

Information Security Policy Framework
For the healthcare industry it is important to have an Information Security Policy Framework within the organization to protect information that is accessed across the network by staff personnel and patients. In accordance with ISO/IEC 27799:2008, we begin to define the guidelines to support the interpretation and implementation of healthcare information protection. ISO/IEC 27799:2008 references the basic controls and guidelines of ISO/IEC27002:2005 will provide the minimum protection necessary to meet organizational needs. Healthcare organizations that implement the security controls of the ISO will be able to provide the minimum security level necessary to maintain confidentiality, integrity, and availability of personal health care information. Different organizations are required to be compliant with applicable local laws and federal regulations. For example, the healthcare industry is required to comply with requirements of HIPPA and the financial industry is responsible for FISMA and Sarbanes-Oxley Act. In order for you to show compliance you must be following all of the requirements of each regulation. The best method for doing that is to develop your policy and procedures to each of those requirements. If you are operating to the standards of each regulation and hold people accountable to that then you will not have issues trying to prove it during inspections or audits. With each of the 7 domains in an organization, they all pose business challenges that IT management should concentrate on or be aware of when developing IT policy. First is the User Domain. The first challenge here is employee awareness. If you want someone to follow policy they need to know that it exists. If it does exist then employees need to understand its contents and how it aligns



References: BIS|Department for Business Innovation and Skills. (2010, April 30). The National Archives. Retrieved October 31, 2012, from webarchive.nationalarchives.gov.uk/+/http://www.berr.gov.uk/whatwedo/sectors/infosec/infosecadvice/legislationpolicystandards/securitystandards/isoiec27002/section1/page33371.html For Consumers. (n.d.). United States Department of Health and Human Services. Retrieved November 2, 2012, from http://www.hhs.gov/ocr/privacy/hipaa/understanding/consumers/index.html ISO 27799 ISMS for healthcare. (n.d.) ISO27k infosec management standards. Retrieved October 30, 2012, from http://www.iso27001security.com/html/27799.html

You May Also Find These Documents Helpful

  • Good Essays

    The medical group could face significant penalties due to security breaches of medical information. Physical safeguards should have been implemented to assure that equipment with electronic information systems that contained patient data are safe from unauthorized intrusion. Technical safeguards cover the electronic protected health information and control access to it. Advocate Medical Group has failed to ensure proper HIPAA policies and procedures were implemented in the…

    • 808 Words
    • 4 Pages
    Good Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week3 Quiz

    • 347 Words
    • 2 Pages

    2. Using the user domain, define risks associated with users and explain what can be done to mitigate them.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In this week’s assignment, you are asked to research HIPAA and how it has provided…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are several roles within the health information management (HIM) profession. A HIM professional gathers, preserves, evaluates and guard’s personal health information within many different health care settings. One of the most important duties in regards to a HIM professional is ensuring compliance and upholding the current regulations in the health care industry. This paper will take a closer look at the specifics of what a HIM professional does to ensure compliance as well as the importance of education and certifications that many employers are now requiring for potential candidates in the HIM field.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    Patient privacy and security is one of the most important aspects of the St. Johns Hospital code of conduct, they take pride in the sound policies and procedures set to maintain customer confidentiality. Each employee is held to a high standard of maintaining the highest level of privacy and confidentiality when it comes to patient health information (PHI). This paper will outline the plan that St. John’s hospital has created in case of a security breach or security threat in the facility. The primary cause of a security breach is usually related to the people or business side of and organization (Rhoades, MBA, RHIA, CHPS, CPHIMS, FHIMA, 2009).…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Good Essays

    MIS565 You Decide abc

    • 648 Words
    • 2 Pages

    References: US Department of Health and Human Services (2007). Security standards: Organizational policies and procedures and documentation requirements. Retrieved from: http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/pprequirements.pdf…

    • 648 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Administrators at the University of Colorado found a way to comply HIPAA to protect the integrity of electronic patient records. In addition to meeting the Privacy requirement of HIPAA, they needed a system to deal with their staff of medical professionals who move from computer to computer throughout their shifts. To be better equipped to achieve compliance, the hospital chose to use technology via a…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Hsm310 Hipaa Assignment

    • 893 Words
    • 4 Pages

    | From the Chief Compliance Officer (CCO) perspective on HIPAA, contemplate the three basic areas which HIT professionals must be most concerned with are: (1) Privacy Rules…

    • 893 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    How do HIPAA Privacy and Security Rules apply to Health IT and EHRs? ... December 12, 2011, 10:24 am / Leon Rodriguez / Former Director, HHS, Health IT Buzz > Privacy and Security of EHRs > Privacy, Security, and Electronic Health…

    • 391 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Over the years since the inception of HIPAA, it is hard not to notice the influence it brought on to the patients, the healthcare industry, the health information management and technology, and other entities in securing the confidentiality, security, and privacy of PHI. In addition, the HITECH Act and its HIPAA modification released in January 2013 greatly invigorated the HIPAA of 1996 (Solove, 2013). Definitely, the most important health care changes over the past couple of decades is the growing interest in health information privacy and security (Solove, 2013).…

    • 90 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    U.S. Department of Health and Human Services(HHS). (N.D.) Understanding Health Information Privacy. Retrieved from: http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html…

    • 1702 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    “Health Information Privacy” United States Department of Health & Human Services. 13 Nov. 2010 <http://hhs.gov/ocr/privacy/hipaa/understanding/consumers/index.htlm>.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Organisation Title Author Filename Owner Subject Protective Marking Review date Wokingham Borough Council Human Resources Information Security Standards Steve Adamek, Head of Business Systems G\Government Connect\WBC Policies Head of Business Systems IT Policy Internal Public April 2010…

    • 2757 Words
    • 12 Pages
    Good Essays