Preview

IS3340-Unit 2-Assignment 2

Powerful Essays
Open Document
Open Document
1549 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3340-Unit 2-Assignment 2
Unit 2 Assignment 2: Procedure Guide on Access Control
I. Access Control Procedure
a. If a system does not support the minimum structure and complexity as detailed in the aforementioned guidelines, one of the following procedures must be implemented:
i. The password assigned must be adequately complex to insure that it is not easily guessed and the complexity of the chosen alternative must be defined and documented. ii. The legacy system must be upgraded to support the requirements of this paragraph as soon as administratively possible. iii. All EPHI must be removed and relocated to a system that supports the foregoing security password structure. iv. Users or workforce members must not allow another user or workforce member to use their unique user identification or password.
v. Users or workforce members must ensure that their user identification is not documented, written, or otherwise exposed in an insecure manner. vi. Each user and workforce member must ensure that their assigned User Identification is appropriately protected and only used for legitimate access to networks, systems, or applications. If a user or workforce members believes their user identification has been comprised, they must report that security incident to the appropriate Security Officer

b. Emergency Access
i. WU HIPAA Security Policy requires procedures to ensure that access to a system that contains EPHI and is used to provide patient treatment is made available to any caregiver in the case of an emergency if the denial or strict access to that EPHI could inhibit or negatively affect patient care. During extreme emergency conditions, RO would rely upon BJH electronic access to the IMPAC electronic medical record as well as BJH Health Informations Management (HIM) for access to the physical medical record.
c. Automatic Logoff
i. Servers, workstations, or other computer systems containing EPHI repositories that have been classified as high risk (See HIPAA

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    3220 final review

    • 655 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of what? 9…

    • 655 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week3 Quiz

    • 347 Words
    • 2 Pages

    2. Using the user domain, define risks associated with users and explain what can be done to mitigate them.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    -Subpart B. Unauthorized use. Users must abide by the security restrictions on all systems and information to which access is authorized.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    1. ADI Employee passwords are to be kept strictly confidential. Each user is solely responsible for the activity taking place under their I.D…

    • 1402 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Ljb Annual Report Sample

    • 1189 Words
    • 5 Pages

    Employees being hired should go through a background check and drug testing to verify that any issues have been addressed and resolved. While this will ensure a higher quality of individuals, an internal control to password protect each individual user will hold accountability for computing activities.…

    • 1189 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Administrators at the University of Colorado found a way to comply HIPAA to protect the integrity of electronic patient records. In addition to meeting the Privacy requirement of HIPAA, they needed a system to deal with their staff of medical professionals who move from computer to computer throughout their shifts. To be better equipped to achieve compliance, the hospital chose to use technology via a…

    • 783 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hippa Regulations

    • 339 Words
    • 2 Pages

    HIPPA (Health Insurance Portability and Accountability Act), was passed in 1996. HIPPA has five purposes: to improve portability and continuity of health insurance coverage in the group and individual markets; to combat waste, fraud, and abuse in health insurance and health care delivery; to promote the use of medical savings accounts; to improve access to long-term care services and coverage; and to simplify the administration of health insurance and for other purposes. HIPPA accomplish these purposes by including a series of “administrative simplification” (AS) provisions that required the DHHS (Department of Health and Human Services) to adopt national standards for electronic health care transactions. The provisions called for an establishment of standards related to EDI (electronic data interchange) of specific administrative and financial transactions, while still protecting the security and privacy of transmitted information. AS, also, includes standards for transactions and code sets, unique identifies, security and electronic signature, and privacy and confidentiality (Healthcare Informatics: An Interdisciplinary Approach (2002)).…

    • 339 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Health Information

    • 678 Words
    • 3 Pages

    | HIPAA Rules (1) A major goal of the Privacy Rule is to assure that individuals’ health information is properly protected while allowing the flow of health information needed to provide and promote high quality health care and to protect the public 's health and well-being. (2) The HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information. (3) The HIPAA transactions and code set standards are rules to standardize the electronic exchange of patient-identifiable, health-related information. They are based on electronic data interchange (EDI) standards, which allow the electronic exchange of information from computer to computer without human involvement.…

    • 678 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Every health care employee needs to know the basic sets of rules contained within this very important piece of legislation, because violating these rules can negatively affect his or her continued employment as well as the security and dignity of the patients. The first and most important set of rules to know are those pertaining to the use and disclosure of Protected Health Information (PHI). PHI includes any information concerning health status, provision of health care, or payment for health care that can be linked to an individual. Any part of a patient’s medical record or payment history falls under the protection of the Privacy Rule and requires a patient-signed disclosure form in order to release any form of PHI to a provider, health insurance plan, or employer. As of January 2013, HIPAA was updated to include the Omnibus Rule; this rule changed the protection of PHI from “indefinite” to “50 years after death” and made penalties for violation of PHI privacy more…

    • 667 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Electronic Health Records

    • 1996 Words
    • 8 Pages

    The computer based records were defined as "an electronic patient record that resides in a system specifically designed to support users by providing accessibility to complete and accurate data, alerts, reminders, clinical decision support systems, links to medical knowledge and other aids (IOM, 1991, p. 11). Five years after the IOM 's paper the Health Insurance Portability and Accountability Act (HIPAA) was signed into law. HIPAA was designed to lessen the costs of insurance, as well as make it more accessible, it also included provisions to protect the confidentiality of patient 's records (Wagner, Lee and Glaser). In order to protect patient 's records HIPAA requires healthcare entities to: install safeguards to protect personal information, limit access to who can view personal information and limit usages and access to records to the minimum to accomplish the treatment (HIPAA). Prior to HIPAA there were no federal regulations on health care privacy and patient -specific information. This lack of restriction enabled employers to view medical records of their employees; this led to several employees being terminated for health conditions such as seeking treatment for drug or alcohol addiction (Wagner, Lee and Glaser). In today 's healthcare setting if these privacy rules are broken an agency can be fined. The…

    • 1996 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The security rule’s goal is to protect the privacy of the individual’s health information while allowing covered entities to explore new technologies that will improve health care. Individuals covered by the security rule are the same as the privacy rule, but the security rule also covers healthcare providers who send health information electronically. The security rule protects the same information as the privacy rule, but it also covers all identifiable information a covered entity receives, maintains, creates, or transmits electronically. The security rules require covered entities protect the e-PHI, which is Electronic Protected Health Information with appropriate technical, administrative, and physical safeguards. Security rules means all files are confidential and are not to be given out to unauthorized individuals. Covered entities are required to maintain security policies and procedures and written records of assessments, activities, and required actions for six years from the date of their creation. It must also keep its documentation up-to-date with the changes that may affect e-PHI. If an individual is not in compliance with the security rules, the Department of Health and Human Services (HHS) and the Office for Civil Rights (OCR) are to enforce these rules and have the right to conduct compliance…

    • 769 Words
    • 4 Pages
    Good Essays