Premium Essay

Practical Applications of an Information Privacy Plan

In:

Submitted By thehottestmisfit
Words 781
Pages 4
Assignment 1
Alexander Winkka
HRM320
Instructor Diane Moffat
9-27-2014

Abstract
In this paper I will address the three questions for each of the three scenarios required by the Case Study: Practical Applications of an Information Privacy Plan which can be found in Chapter 16 of the text Human Resource Information Systems: Basics, Applications, and Future Directions, Second Edition.

Keywords: case study

Assignment 1
Scenario 1: Roger, a photocopier technician, has been asked to repair an office photocopier that just broke down while someone was copying a grievance matter against an employee of the agency. The officer who was copying the file takes the opportunity to grab a cup of coffee and leaves Roger in the photocopy room while the photocopier cools down. While waiting, Roger flips through the file and realizes that the person against whom the grievance was made lives on the same street as he does. 1. What information privacy principles (IPPs) have been breached?
Answer: Roger breached IPP 4 (Security) and IPP 11 (Disclosure) is the privacy principles that have been breached. IPP 4 has requirements of securing and protecting files against loss, unauthorized access, use, modification, disclosure and any other misuse. IPP 11 is has the requirements of disclosing personal information. 2. How?
Answer: An IPP 4 could have been breached by leaving files in areas where others could access them. IPP 11 was breached because Roger read the file and seen that the person in the grievance lives on the same street that he does. 3. What you would do to address the situation?
Answer: For the IPP 4 privacy principle the files should never be left unsupervised. This would require minimum security along with making sure that those files are stored securely. Having a couple people who will need to access those files with a log in name for an I.D. for

Similar Documents

Free Essay

Instructor, Medical Office Assistant and Unit Clerk Program School of Health and Public Safety Competition

...Office Assistant and/or Unit Clerk who is interested in a rewarding career in education. If you have outstanding job skills and instructional expertise, and are enthusiastic about the theoretical and practical training of medical office assistant students, apply today and help prepare the next generation. The School of Health and Public Safety has a need for an energetic, resourceful individual with great organizational skills to provide instruction in theory, and practical settings in the Medical Office Assistant and Unit Clerk Program. The ideal candidate have at least 5 years experience working as a medical office assistant and/or unit clerk, including office billing, accounting, use of medical/dental electronic records, and have a strong desire to train professional graduates. This part-time contract position is available starting January 6, 2014. RESPONSIBILITIES: • Provide a high quality of education for students • Support students and preceptors in the clinical setting • Evaluate student progress through assignments, exams and lab competencies, and practicum competencies • Prepare and deliver lectures and practical demonstrations to students enrolled in the program • Facilitate student achievement through mentorship • Update course outlines and modules for theory and practical classes • Contribute in a positive way to maintain a "team environment" • Promote professionalism and coach students • Provide feedback for continuous program involvement • Participate in program and...

Words: 703 - Pages: 3

Premium Essay

Cyber Security Plan

...CIB Project Intro/Definition 1. Cyber security is a type of technology where it takes preparatory measure to ensure user protection and information privacy. (http://www.idigitaltimes.com/cybersecurity-information-sharing-act-advances-senate-heres-why-apple-twitter-485485) Cyber security growing challenges (2 prominent topics) Complexity of the joined environment * The technique with movement of the web is represent by a huge measure of data. * The advanced economy dynamically depends on upon boundless measures of computerised data that are made through money related trades, diversion, communications, travel, web filtering, shopping and a few other routine activities. * Threats in the cyber world will continue concentrating on the weakest joins in any puzzling web of business associations or government methodology, which means partners in cyber security, tries having a shared part in guaranteeing the structure and the information that course through. Threats are moving to the mobile sphere * Mobile phones contain a considerable measure of individual information. * In this new advanced time, there is variety of components and applications that is highly important and valuable, however near to these utilities for user is the probability for new vulnerabilities or open entryways for breaches. * As cyber threats continuously target mobile phones especially smartphones, which is a booming trend for the past few years, data security...

Words: 567 - Pages: 3

Premium Essay

Use of Data Mining by Government Agencies and Practical Applications

...Project Title Use of Data mining by government agencies and practical applications (Describe the Data Mining technologies, how these are being used in government agencies. Provide practical applications and examples) Compiled By:- Sneha Gang (Student # - 84114) Karan Sawhney (Student # - 85471) Raghunath Cherancheri Balan (Student # - 86088) Sravan Yella (Student # - 87041) Mrinalini Shah (Student # - 86701) Use of Data mining by government agencies and practical applications * Abstract (Sneha Garg) With an enormous amount of data stored in databases and data warehouses, it is increasingly important to develop powerful tools for analysis of such data and mining interesting knowledge from it. Data mining is a process of inferring knowledge from such huge data. It is a modern and powerful tool, automatizing the process of discovering relationships and combinations in raw data and using the results in an automatic decision support. This project provides an overview of data mining, how government uses it quoting some practical examples. Data mining can help in extracting predictive information from large quantities of data. It uses mathematical and statistical calculations to uncover trends and correlations among the large quantities of data stored in a database. It is a blend of artificial intelligence technology, statistics, data warehousing, and machine learning. These patterns...

Words: 4505 - Pages: 19

Premium Essay

Diploma

... Diploma in Information Technology Principles of Information Technology (IT105N) Credit Hours : 4 Class Contact : 5 Hours (3 Hours Lecture + 2 Hour Tutorial/Practical) Independent Self-Learning : 160 Hours Prerequisite : Not Available Consultation Hours : Every Wednesday (02:00pm-5:00pm) (Subject to pre-arrangement only) COURSE OBJECTIVE This course is a comprehensive introduction to the realm of Principles of Information Technology. This is an introductory module to the current and evolving technologies in today’s computer systems. It introduces information technology concepts and principles. This module explains major components of information systems and demonstrates applications of information systems in business. Students are provided with sophisticated knowledge and necessary skills of information technology. Principles of Information Technology is a course that will provide students with computer skills necessary to be successful in “real world” personal and business situations. Students will use Microsoft Office to learn word processing, desktop publishing, presentation software, spreadsheets, and databases. COURSE OUTCOMES On completion of the course, students will be able to: 1. Demonstrate an understanding of basic information technology concepts and principles 2. Describe major components of information systems 3. Discuss business applications of information systems 4. Use Office application software and...

Words: 1347 - Pages: 6

Premium Essay

Facebook Dilemma

...(Introduction to Computer Information System) course and in this course we are learning how the basics of computer information system works. Till now we have learnt a lot about computer information system through the book and by listening to our sir’s lectures and examples. After we have learnt most of the basics and gained some knowledge about computer information system, sir asked us to go through the case given in our MIS205 book and solve the questions. It is very important for us to know how all the theories written on the pages of the books are being applied practically in the real world. All six of us went through the case and discussed a lot. We got to now how the e-commerce is related with the Facebook, one of the most popular social networking sites. Question 1: What concepts in this chapter are illustrated in this case? Answer: The concepts of e-commerce and social networking are illustrated in this case. E-commerce refers to the use of the Internet and the Web to transact business. In this case, Facebook setup a website for users to create a profile and join various types of self-contained networks without paying any money. But base on its huge number of users, it offers opportunity for companies to do advertisement on the site. And Facebook also uses its resource of user information to make profit. The sellers can reach their target customers when they pay for the information and Facebook increase revenues by providing information of its users. That’s e-commerce...

Words: 1893 - Pages: 8

Premium Essay

Data Sysytems

...Habijan, Maryrose DeFino, Stasia Bowling HCI 520 Data Management and Design January 16, 2012 Steven Fowler Introduction This paper will address data systems; a database is an organized group of files that are related and considered the supporting constructs of a database management system. It is maintained and considered an integral part of most organizations worldwide. The database management system houses a program that enables storage, modification, and extraction of information from a database. In this paper team A will address database the phases of the database life cycle, and provide a conceptual representation for a database system. Team A focused on relational data model utilizing the Oracle database management system. Implementation of a Database System The purpose of the implementation phase is to make the new system available to a prepared set of users. In this phase the construction and installation of the new database system is initiated according to the plan and design that represents all aspects of the organization, including its interactions with the external environment, this requires matching the design requirements with the best available implementing tools and then using those tools for the implementation. There are several basic steps to implementation of a database system. Determine the need, for developing a new system; identifying user needs; developing the contextual and external and internal level schemas; translation of the internal...

Words: 2836 - Pages: 12

Premium Essay

Data Systems Learning Team Paper

...University of Phoenix Data Systems Learning Team Paper Team A: HCI 520 Data Management and Design January 16, 2012 Introduction This paper will address data systems; a database is an organized group of files that are related. It is maintained and considered an integral part of most organizations worldwide. In Data Base Management, programs enable you to store, modify, and extract information from a database. In this paper team A will address database types, demonstrate a conceptual representation for a database system. We focused on relational data model to explain how DBMS organizes information in different formats and design models. Implementation of a Database System The purpose of the implementation phase is to make the new system available to a prepared set of users. In this phase the construction and installation of the new database system is initiated according to the plan and design that represents all aspects of the organization, including its interactions with the external environment, this requires matching the design requirements with the best available implementing tools and then using those tools for the implementation. There are several basic steps to implementation of a database system. Determine the need, for developing a new system; identifying user needs; developing the contextual and external and internal level schemas; translation of the internal level schema into the actual databases...

Words: 3000 - Pages: 12

Premium Essay

Data Governance Planning

...Introduction Organizations collect process and store enormous amount of data, a growing number of applications/systems, which support various lines of businesses, have been collecting more and more data through various channels. Mergers and acquisitions have made the situation even more complex and confusing when it comes to the management of data and business processes.  Data governance is about management of the availability, usability, integrity and security of the data. Some of the key focus areas are data quality, data integration, policies around privacy, compliance and security, the data warehouse and BI, architecture integration and analysis and data access, in terms of archival, retrieval and storage (http://www.information-management.com). In our industry, banking and finance, it has become more and more import to ensure that we are effective in meeting these key areas and keep abreast of the government regulations that have been enacted that directly affect the industry. Financial institutions must adhere to the strictest regulations for the protection of sensitive and valuable information. We must closely monitor and proactively mitigate risk because data breaches not only compromise customer and corporate confidentiality, but can also be extremely damaging to the business and the brand (http://www.varonis.com). Information Assets The main purpose of information security governance implementation is to protect the most valuable assets of the organization. In...

Words: 1298 - Pages: 6

Premium Essay

Health Care Information Systems Terms Hcs 483

...University of Phoenix Material Health Care Information Systems Terms Define the following terms. Your definitions must be in your own words; do not copy them from the textbook. After you define each term, describe in 40 to 60 words the health care setting in which each term would be applied. Include at least two research sources to support your position—one from the University Library and the other from the textbook. Cite your sources in the References section consistent with APA guidelines. |Term |Definition |How It Is Used in Health Care | |Health Insurance Portability and |The HIPAA Act was established in 1996 to |The Health Insurance Portability and | |Accountability Act |protect personal, identifiable information |Accountability Act is used in health care | | |of patient’s from third parties not |by patients having to sign a HIPAA form | | |involved in the treatment of the patient. |that makes patients aware of their rights | | | |and the protection of their individual | | | |protected health information. | |Electronic medical record |Electronic...

Words: 1044 - Pages: 5

Premium Essay

Nursing Practice Act

...performance that requires specialized education, knowledge, and judgment of a trained person. This trained individual can be a licensed practical nurse, a registered nurse, a bachelor’s degree nurse, a master’s degree nurse, or a nurse practitioner. But all nurses must be able to observe, assess, and act on what your findings are. The goal of a nurse is to take care of patients to the best of their training and ability. Their ability will be defined in the term scope of practice. Scope of practice is defined as the extent and limits of the medical intervention that a health care provider may perform. (Farlex) Or in other words, staying within the professional nursing knowledge and not practicing above or below your scope of practice. A registered nurse, like everybody else, have responsibilities that come with the job. But they do differ in precise qualifications. A nurse must be able to assess, formulate, plan, implement, initiate, and evaluate nursing actions that are necessary in the field of nursing. They must be able to accept responsibility for their own actions and work well with others in a team setting. Communication is a key factor in nursing. Coworkers, patients, patient’s families, doctors, therapists, and emergency response teams are all the people that should be communicating with. Respect and maintaining the patient’s right to privacy is of a very big importance. Every patient has rights. It is the nurses and staff members’ responsibility to follow it. The nurse can...

Words: 896 - Pages: 4

Premium Essay

Administrative Ethics

... how the article uses current facts about healthcare and the issue addressed, the managerial responsibilities related to administrative ethical issues, and any proposed solutions. The article “Staff Nurse Faces Jail Time for HIPAA Violations” took place in 2008 years after the HIPAA law was enacted. “What had begun as routine file maintenance ended in arrest and possible jail time for a licensed practical nurse who shared medical information with her spouse.” (Latner p.1) Mrs. A had been employed at this physician’s office for over 4 years when the incident occurred. Her husband Mr. A was pending a lawsuit from a current auto accident which would put a strain on their family financially. Mrs. A (RN) decides to take measures in her own hands. One day while straightening up the files she came across the plaintiff’s name; she then began to pry and came across some information which she thought could benefit her husband. She began to jot down some things which she felt would be helpful; later on that evening when she arrived home she proceeded to give him the medical information. Mr. A kindly gave the plaintiff a...

Words: 1106 - Pages: 5

Premium Essay

Cloud Computing

...Introduction Cloud computing has the potential to change the face of the Information Technology (IT) industry. Industry experts maintain that the cloud will eventually become a primary component of computing activities conducted over the Internet. Presently, major corporations like Google, Amazon, Microsoft, and IBM have embraced this trend and are using the technology to enhance IT supported services. As the number of benefits and potential uses of the technology grows, the funding earmarked for assessments and implementation of cloud services will likely multiply. Cloud computing consists of immense benefits that allows end users to utilize services that include infrastructure, applications, data storage capacity. Last year, the Brookings Institution released a study that endorses the benefits of cloud computing to the government. The writer of the study, Darrell West, who is the vice president and director of government studies at Brookings, stated in the paper, “that agencies that have moved to the cloud generally enjoyed 25percent to 50 percent savings on their IT cost. For the federal government as a whole, this translates into billions in cost savings, depending on the scope of the transition” (West, 2011). Cloud computing consist of a network of servers that run services that are operated as shared platforms. The characteristics of cloud computing include on-demand services, pay-per-use services, broadband network access, multi-tenancy, rapid elasticity and scalability...

Words: 2173 - Pages: 9

Premium Essay

Computing

...Capabilities of computing: The continuous of computing technology development and evolving will always enable new capabilities; let us discuss some of these capabilities. Data Access: Computing technology gives the ability to access a huge amount of data by various types of people. Each company today has a big database that has the necessary records for the employees or customers. For example, any hospital has the information of the patients with their medical historical health and medicines taken and so on and even their personal information, this helps the employees to access the patients data easily and from anywhere. Data capture: computing made it very easy to see and utilize information and data that was very difficult to obtain before. As example banking systems enables people to check their bank statements and status such as what amount of money was withdrawal, when and where, being able to retrieve such data will help the customer to be aware of how he is spending his money. Processing speed: Computing forced the activities to be done very quickly in order to success. As example transaction of confirming a room booking in hotel should be done very fast, because many transactions to reserve rooms in this hotel can be done in parallel so if confirming the room does not done quickly others may take the room. Performance of storing a huge amount of data: computing made it possible to store a big amount of data in acceptable time, because all this available data that...

Words: 1712 - Pages: 7

Premium Essay

Health Care

...Security and Privacy Funmi Fashakin HCS/533 June 10, 2013 Aimee Kirkendol Security and Privacy Patient security and privacy is one of health care organization fundament responsibility in meeting the organization objectives and providing services to the community the organization serves. Patients’ health care information are expected to be kept confidential and protected, there is a legal and ethical responsibility binding health care organization to protect and to develop a plan within the organization to protect patients’ medical records. There is always a privacy concern when patients’ medical data information are not protected and secured during a natural disaster. In this paper natural disaster scenario case of a small town on Gulf Coast that was struck by a hurricane will be discuss, also management detailed plan for patients’ medical record privacy and security will be discussed. The implementation of management plan for staff training and code of conduct will be discussed. A disaster is an adverse event as a result of natural processes of the Earth. It can cause losses of life, property damage, and electronic damage. Examples of natural disaster are flood, volcanic eruption, earthquakes, tsunamis, and other geologic processes. Actions to take when patients ask for their records Patients health care records serves many purposes to patients, it provides patients with accurate summary of patient’s health, patients have legal right to...

Words: 2088 - Pages: 9

Premium Essay

Hsa 520

...using the following: a. patient care applications b. management and enterprise systems c .e-Health applications d .strategic decision-support applications Patient applications are very useful in health care organizations a good example would be the development of ITaas of EMC and VMware technologies the mission of VMware is to enhance availability of critical applications that would deliver enhanced patient care distribution and cut cost. The Munson Healthcare has chain of eight hospitals and located in Hopkin, Mass chutes and five clinical in northern Michigan has implemented EMC to transform the IT infrastructure to create innovative IT service. Their own creation of health exchange enables the possibility m for healthcare providers to achieve great levels of patient care through a safe information exchange. The IT organization of Munson felt a need to upsurge reliability and agility, while enlarging its role as a provider of IT –as-a-Service that are capable of providing HIE and EMR capabilities to numerous developing hospitals and physician practices testing centers such as laboratories that are either inside or outside the network (PR,2012) Functions and Capabilities Munson Healthcare use virtual storage to accomplish high availability and shared access of resources within all their facilities. ITaas provides” MediTech EMR applications and e-Clinical Works electronic practice management , and McKennon Hospital information system (HIS) The healthcare providers...

Words: 2128 - Pages: 9