Premium Essay

Security Paper

In: Business and Management

Submitted By marissapookita
Words 285
Pages 2
HCS 533 WEEK 4 Security and Privacy Paper
Security and Privacy Paper

As an information systems manager, you will need to consider a very important aspect of your operation—patient information, privacy, and security. Review the following case scenarios and select one to use for your management plan for security and privacy.

Case Scenario 1 (Security Breach)

The administration at St. John’s Hospital takes pride in its sound policies and procedures for the protection of confidential client information. In fact, it serves as a model for other institutions in the area, however, printouts discarded in the restricted-access IS department are not shredded. On numerous occasions, personnel working late have observed the cleaning staff reading discarded printouts. What actions, if any, should these personnel take toward the actions of the cleaning staff? What actions, if any, should be taken by IS administration?

Case Scenario 2 (Natural Disaster):

Living on the Gulf Coast is a benefit that many residents of this small Southern town enjoy, however, natural disasters are a concern. The town has just been struck by a hurricane and the entire basement of your operation is flooded by the storm surge. Patient files were destroyed or washed away with the receding water. What actions do you take when patients ask for their health records? What processes did you have in place to protect your records in anticipation of such an event?

Choose one of the scenarios above and develop a process for maintaining patient privacy and security.

Include a detailed management plan in the case of a security breach (Case Scenario 1) or a natural disaster (Case Scenario 2). In your plan, address the following questions:

• How can you respond to these...

Similar Documents

Premium Essay

Term Paper -Mercy Securities Corp -Survey Report

...Term paper -Mercy Securities Corp -Survey Report Click Link Below To Buy: Each student will prepare both a 5 -7 page written report. Outline Background: You have recently been hired as part of annual class of trainees at a major brokerage firm, Mercy Securities Corp. After a few days of orientation, you begin its trainee “rotation” through several departments across the firm. The first unit you are assigned to is the ___________________ Department where, as an initial project, you are asked to research and study the processes and controls of that department. Your job is to fully explain how that department works and what controls are or should be in place. Your manager wants you to prepare a written report analyzing the chosen department. In addition, he asks you to give him an oral presentation of your findings and conclusions once you have completed your analysis. Selection of the Department: Each student will choose a department of interest from within a brokerage firm. Research will show dozens of potential departments. The students may choose any department that interests them. Format for Written Report: The written report should be organized in the following order: Section I: Executive Summary (1 page) Section II: Detailed Analysis (4 to 6 pages) Section III: Attached Addenda (bibliography, copy of financial statements, comparisons, charts,......

Words: 303 - Pages: 2

Premium Essay

Physical Security Paper

...recognizes errors most commonly made by university students in academic essays. The system embeds comments into your paper and suggests possible changes in grammar and style. Please evaluate each comment carefully to ensure that the suggested change is appropriate for your paper, but remember that your instructor's preferences for style and format prevail. You will also need to review your own citations and references since WritePoint capability in this area is limited. NOTE: WritePoint comments are computer-generated writing and grammar suggestions inviting the consideration and analysis of the writer; they are not infallible statements of right/wrong, and they should not be used as grading elements. Also, at present, WritePoint cannot detect quotations or block-quotes, so comments in those areas should be ignored. For additional assistance, please visit our WritePoint Lab to speak with a tutor. During the lab, the tutor addresses common WritePoint grammar and style errors, offers editing advice for students who use WritePoint, and takes student questions. A link to the lab is located on the Live Labs homepage, which is accessible by logging into eCampus and pasting the following URL ( into the address bar. Physical Security Paper [This title could be more inspiring. Labeling it a "paper" or an "essay" is redundant (what else could it be?), and only a few words as a title are not very explanatory......

Words: 2103 - Pages: 9

Premium Essay

National Security Research Paper

...National Security and the U.S. ` Our western security Policy is the established goal of the United State of America to employ a rules-based international order which backs global economic and national security while fostering prosperity. In addition, American Security Policy is crucial to instill new dignity within the U.S. populous, while we set the stage of unified human rights standards across the globe. As discussed by Snow, the geographic location of the United States relative to other states is a key aspect impacting America's perspective on security matters and the development of the US military strategy. National security has been on the priority list of the United States since before WWI, and even could be claimed responsible for sparking our declaration of independence amongst many other nations. within is assignment ill be touching on key threats...

Words: 1227 - Pages: 5

Premium Essay

Common Information Security Threats Paper

...Common Information Security Threats Paper Courtney Gardner CMGT/400 2-25, 2013 Terry Green Common Information Security Threats Paper The growing number of security treats an organization faces from day to day grows substantially as each day passes. Even the failed attempts to access secure data bear fruit of some kind in the form of another vulnerability being discovered or a different tactic is used that the company wasn’t prepared for. One organization that can’t afford not to be prepared is the Chase Bank organization. This financial institution is very accustomed to fending off skilled cyber thieves. It gets hit every day by thousands if not tens of thousands of attacks on their infrastructure and networks I will discuss three major threats that Chase faces DDoS attacks, Mobile Banking and Phishing. Transferring funds out of users' accounts is a major security treat they face. This can be achieved many ways which makes it an active job for the security admins of banks. Online banking has opened the banks to a wide variety of vulnerabilies that much be patched or mitigated to the lowest degree possible. Being the victim of a DDoS attack is always a possibility for Chase as they contact a large amount of online tractions and overseas money handling. Attackers can employee DDoS attacks, or distributed denial of service attacks, named for denial of customer service by aiming large capacities of network traffic to a website until it forced to or collapse. To help......

Words: 1188 - Pages: 5

Premium Essay

Security Risk Management Course Paper

...developed to safeguard the data that is stored and used by information systems, as well as the protection of the hardware that runs the information system. Therefore, a proper understanding of risk management and all that it entails is of the utmost importance for every IT professional, regardless of specialization. The purpose of this paper is to identify what risk management is and give an overview of the three phases or undertakings that make up the risk management process and then conclude with a discussion and explanation of the six-step Risk Management Framework (RMF) developed by the Department of Defense and the National Institute of Standards and Technology (NIST) (National Institute of Standards and Technology, 2010). “Risk management is the process of Identifying risks, as represented by vulnerabilities, to an organization’s information assets and infrastructure, and taking steps to reduce this risk to an acceptable level” (Michael E. Whitman, Herbert J. Mattord, 2012, p. 119.). Thus, risk management is merely the ability of a person or organization to implement due diligence and identify any potential issue and develop policies and security measures to combat these risks. Risk management is comprised of three phases: risk identification, risk assessment, and risk control (Michael E. Whitman, Herbert J. Mattord, 2012, p. 119.). Risk Identification Risk identification is simply the identification and documentation of the assets and the threats to those......

Words: 2778 - Pages: 12

Premium Essay

Information Security White Paper

...Information Security White Paper UMUC In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical and information technology assets, and to ensure that all information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as: Threats |Confidentiality |Integrity |Availability | |Denial of Service Attack |Low |Medium |High | |Power Supply Failure |Low |Low |High | |Malicious Code Infection |High |High |High | |Theft and Fraud |High |Medium |High | |Website Intrusion |High |High |High |......

Words: 697 - Pages: 3

Free Essay

Social Security Paper

...10/08/12 Social Security Paper A brief introduction to the topic of United States Social Security program tells us that it came from the “Old-Age, Survivors, & Disability Insurance” federal program and is meant to provide welfare. There were actually a few similar precursors to what we know as social security, one example being a pension program following the American Civil War. After the Civil War there were hundreds of thousands of widows, orphans, and disabled vets. Even before this, an article informed me that the first national pension program began in early 1776; prior to the signing of our declaration. Not long after the Civil War had ended, America began to rapidly change. This had a lot to do with the Industrial Revolution and the urbanization of the population. This led us to stray from an extensive agrarian family unit that could support their elders to a more condensed American family living in cities. Combining demographic and social changes (including the increase of life expectancy by roughly 10 years), America had fewer and fewer people living on the land, and more of its population in the cities. Unfortunately, this led to a “fragile” provision of economic security. Social Security itself was created on August 14, 1935, when President Roosevelt signed the Social Security Act. Not only did this new legislature help with the general welfare of the public, but it also provided a way for retirees over 65 years of age to receive a continued form of......

Words: 666 - Pages: 3

Premium Essay

Security Breaches Research Paper

...Security Breaches Technology is at everyone's fingertips now in the 21st century. This means not only is it easier for every individual to have access to almost anything, but this also means that in an instance you can be hacked. Birthdates, social security numbers, addresses, and even credit cards can all be taken in an instance. This can not only happen to you, but it can happen to large companies as well. Summary of Major Hacks in 2015 There were several major hacks in the year 2015 that caught attention in the United States. One of the big ones was in our own government. Numerous breaches at the U.S. government’s Office of Personnel Management led to theft of data on 22 million current and former federal employees that included the fingerprints of about 5 million (Green, 2015). The IRS was also hacked and over 300,000 taxpayers records were compromised....

Words: 482 - Pages: 2

Premium Essay

Container Security Initiative Paper

...Every company need to have a plan to ensure security for their company. Having a security and keeping it up to date will keep you away from most risks you might face. Threats are not only caused by criminals and terrorist, but also many threats are from natural disasters like hurricane, earthquakes and volcanic eruptions. We need to seek out every possible threats and strengthen our protection system in order to safely move goods from place to place safely. “ International trade has been and continues to be a powerful engine of United States and global economic growth. In recent years, communications technology advances and trade barrier and production cost reductions have contributed to global capital market expansion and new economic opportunity....

Words: 880 - Pages: 4

Premium Essay

Paper on Private Security Against Government Personnel

...Paper on private security against government personnel University of Phoenix The paper of private security against government personnel The various roles of the government versus, the private security personnel compare, as they are both. Trying to protect employees and keep them safe, from harm’s way within a work environment and policy and guidelines done correctly. The contrast with private security personnel and various roles, of government is that some of them do not follow their policy and make their rules and regulations that are different from the government. In this paper, it will be discussed A comparison of the legal, ethical, managerial, and economic issues of public and private agencies, An evaluation of public and private company daily also practices A discussion of the future merging of government and private security firms also the conclusion on both of them as well. It helps to understand comparison and contrasts the differing roles of government versus private security employees within this paper. Compare parts and goals of government workers versus private security The public and private agencies have the same functions doing their daily task, which include writing reports, the task that has to do with investigating, also patrol areas as well. The different roles that they do are public agencies,......

Words: 1590 - Pages: 7

Premium Essay

Email Security Policy Paper

...Email Security Policies Introduction: Email is the feature where we can send or receive messages with a valid email address anywhere in the world.Electronic plays a vital role in todays communication. In the corporate world, security for information and for the whole organization is very necessary.Data security is of primary concern of an enterprise nowadays. Protecting data from unauthorized access by users and software applications is known as privacy.Thus it is important for users to gain knowledge about the use of electronic communications. Purpose: The purpose of Email policy is to ensure that this critical service remains available and reliable, and is used for purposes appropriate to the...

Words: 1160 - Pages: 5

Free Essay

Social Security Paper

...History The U.S. Social Security program is designed to aid residents in need through welfare subsidies. The programs are provided by organizations on federal, state, local, and private levels; and help to provide eligible residents with food, shelter, healthcare, education and money. Aid is provided through financial aid for college education, unemployment disability insurance, food stamps, pensions for eligible low-wage workers, subsidies for housing, and health insurance programs for public employees (Feldstein, 2005; Krugman, 2007). President Franklin D. Roosevelt enacted the Social Security Act on August 14, 1935 as a means to battle the Great Depression of the 1930’s. Beginning in 1932, the government had started providing loans and grants to States to pay for direct relief and work relief, since States, local communities, and private charities did not have the financial resources to cope with the growing needs of the American people. Then in 1935, when the Social Security Act was created, two social insurance programs were established on a national level for the American people. One of these Federal systems provided benefits for the elderly and retired workers who had been employed in industry or commerce. The second was a Federal-State system that would provide insurance to the unemployed (Historical Development, n.d.). Since its conception, the Social Security Administration has grown and developed programs shaped by America’s changing economic and social......

Words: 987 - Pages: 4

Premium Essay

Social Security Research Paper

...Social Security and Private Retirement Accounts Kivi Poteat Econ 2302 Central Texas College October 31, 2015 Abstract With dwindling Social Security funds provided by the Federal Government, they are sure to run out in the future. Younger generations need to consider alternative methods. One of these methods that should be looked into is personal retirement accounts. This would not benefit older people much due to their reliance on Social Security, but when young workers reach retirement age, it would be greatly beneficial. Investments are something that requires much knowledge and experience, but the returns on private accounts are much higher than Social Security could offer. Private accounts also do not hold the risk of government...

Words: 841 - Pages: 4

Premium Essay

Perimeter Security Research Paper

...Perimeter Security includes devices that control the functions of preventive comfortable advantage to detect, delay or refuse. Password firewall from simple to complex analysis model, but all are designed to order society highly techno and allow access to authorized staff, and show that they are entitled to. You cannot protect anything until you know what you want to protect. Determining the basis of a risk assessment system must limit their liability, what should be the outside edge and how you defend against theft, privacy violations and corruption unauthorized access. A firewall is a protective device that controls the incursion of information and data to and from the network or PC, and works just like its real physical counterpart. Firewalls...

Words: 254 - Pages: 2

Premium Essay

Cis438 - Term Paper - Security Regulation Compliance

...Term Paper: Security Regulation Compliance Giancarlos Guerra Strayer University CIS 438 - Information Security Legal Issues Abstract: In this paper I shall provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: i. FISMA; ii. Sarbanes-Oxley Act; iii. Gramm-Leach-Bliley Act; iv. PCI DSS; v. HIPAA; vi. Intellectual Property Law. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements. Term Paper: Security Regulation Compliance Introduction In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance.” A Chief Information Officer in a government agency should realize the need to educate for senior leadership on some of the primary regulatory requirements, and realize the need to ensure that the employees in the......

Words: 2284 - Pages: 10