StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Compromised and Lost Data - Assignment Example

Cite this document
Summary
Nemours is a company, which manages the children’s health systems information data. In 2011, the firm claims to have lost some computer encoded backup tapes, which were been stored in the company’s facility based in Wilmington. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Compromised and Lost Data
Read Text Preview

Extract of sample "Compromised and Lost Data"

Data compromise and loss affiliation Data compromise and loss Nemours is a company, which manages the children’s health systems information data. In 2011, the firm claims to have lost some computer encoded backup tapes, which were been stored in the company’s facility based in Wilmington. The ultimate consequence was the loss of huge information totalling to around 1.6 million of its patients, vendors, guarantors and employees who have ever worked at the company from the year 1994 to 2004 at its various facilities in Pennsylvania, Delaware, New Jersey and Florida.

Those missing encrypted backup tapes comprised of social security numbers, names, bank account information on direct deposit, information on insurance, addresses, medical treatment data and the date of births. Due to alterations in computer systems in the year 2004 the computer encoded tapes were kept in locked cabinets. Nemours says it lost the computer tapes during the period of remodelling its facility, which took place in August 10, 2004. It could have prevented loss of data by tagging the cabinets and put them in a register containing the name of the person who did the tagging, where they kept the cabinets and at what time, thus this could bring to accountability of the workers who did the tagging process and easy traceability of the cabinets.

The cabins could also be moved to one single location in order to avoid tampering by the workers during the renovation process. In order to prevent data from being compromised and lost, the right security measures should be put in place. In specific, there should be data recovery policy to respond effectively and swiftly to security breach. Moreover, there is need to appoint personnel who will be responsible in ensuring data quality data maintenance. In addition, strong procedures, rules and well-trained staff who are reliable should also be put in place in order to minimize data loss.

Lastly, security measures should be organized and designed according to the data’s composition (Liu & Kuhn, 2010). Due to numerous information loss, there also exists numerous ways of taking precautions to prevent data loss, for example, numerous power circuits with a generator and battery backup can only prevent loss of information emanating from power failures. Likewise, redundant array of independent disks storage and the journal filing system only prevent data loss arising from specific hardware and software failures.

Consistent backup of information are a significant asset when trying to recover from loss of data. Nevertheless, they do not curb system failures and user mistakes. Good approaches to protection of information ensure incidents of data loss are avoided completely. Such approaches includes procedures like sustaining network firewalls and antiviral protection, equally applying all printed system patches and security repairs. However, the most hard and important aspect of avoiding information loss is by educating the users on how to avoid making errors that endanger the security of information making it prone vulnerability.

However, when an organizations data is lost or compromised, there exists steps that need to be taken to increase its chances of recovering the lost information. Firstly, whenever a storage media is affected, all operations that tend to alter or create data should be avoided completely. This comprises of activities like booting the system that is linked to the device that is affected. This is because in numerous operating systems booting may generate temporary files which occupy the region of information loss and this can make the retrieval of lost data completely impossible.

Equally, also avoid operations like copying, altering and deletion of files whenever there are occurrences of data loss. The best thing to do in such situations is switching off the computer and taking away the drive containing data from the computer and re-attaching it to a lesser computer machine which has a write blocker device and try to recover the lost data to your level best (Hawkins, Yen, & Chou, 2000). Often data recovery is carried out by experts who have already established effective recovery methods to retrieve data from impaired media.

This experts provide specialized services and their charges usually depend on the type of security procedures required to be carried out on the damaged media and also the size of the media also counts a lot. For successful retrieval of information lost, an operational backup strategy is required. In the absence of this effective strategy the process of recovering data entails reinstalling programs and redeveloping data. The cost of retaining the capability of recovering data lost for long durations should also be considered when formulating an operational backup strategy.

Even with good backup strategies, reinstating a system to its previous state can be an uphill task thus data recovery procedures also consider the time when the loss of information occurred and logically, data loss that occurred long ago tend to be difficult to recover compared to recent information loss. Lastly an operational backup strategy has proportionalities between the amount of effort required and the degree of information loss, for instance it is easier to recover single files that have been lost compared to recovering an entire system (Strunk, Goodson, Scheinholtz, Soules, & Ganger, 2003).

References Hawkins, S. M., Yen, D. C., & Chou, D. C. (2000). Disaster recovery planning: a strategy for data security. Information Management & Computer Security. doi:10.1108/09685220010353150 Liu, S., & Kuhn, R. (2010). Data Loss Prevention. IT Professional, 12. doi:10.1109/MITP.2010.52 Strunk, J. D., Goodson, G. R., Scheinholtz, M. L., Soules, C. A. N., & Ganger, G. R. (2003). Self-securing storage: protecting data in compromised systems. Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]. doi:10.1109/FITS.2003.1264933 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Compromised and Lost Data Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Compromised and Lost Data Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/health-sciences-medicine/1675456-compromised-and-lost-data
(Compromised and Lost Data Assignment Example | Topics and Well Written Essays - 750 Words)
Compromised and Lost Data Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/health-sciences-medicine/1675456-compromised-and-lost-data.
“Compromised and Lost Data Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/health-sciences-medicine/1675456-compromised-and-lost-data.
  • Cited: 0 times

CHECK THESE SAMPLES OF Compromised and Lost Data

Risk Management

By definition, "To be defined as an Electronic Health Record, an electronic approach to collecting storing and manipulating data must be able to accomplish: collection of patient health information and data, results management, order entry management, and decision support" (Health, 2007).... In this ethical mix, "As information technology expands throughout healthcare, opportunities for breach of confidentiality become abundant, from information left on the fax machine and patient data left visible on a computer screen" (Jenkins, 2002)....
4 Pages (1000 words) Essay

Security practices not meeting the challenges (info technology)

Passwords are easily compromised and are often shared for the purposes of convenience.... Illegal attacks can make corporate secrets There is a long line of self-interested intruders ready and willing to capture this valuable data, and as our reliance on digital information has grown, so have the threats.... Large concentrations of data, mobile devices, and the need to keep the data useful has all added to the vulnerability of our information technology....
4 Pages (1000 words) Essay

The Data Protection Act and Role of the Information Commissioner in this Act

The paper "The data Protection Act and Role of the Information Commissioner in this Act" describes that the commissioner is able to perform activities outside the agreed scope and customer instruction as well as using the customer data for his/ her own product development, research or any other purpose that is appropriate.... This information does not only apply to college situation but also another place of work since at one moment an individual would either lose all data due to ignorance and malice....
5 Pages (1250 words) Coursework

Doctoral Study Topic

elevant data and How to Collect the Same: Relevant data for a research paper of this nature can be obtained through literature already published on the topic.... Besides, if necessary, primary data may also be obtained by interviewing healthcare managers, providers etc.... However, when the quality of patient care gets compromised the organization's reputation will be tarnished and its profitability will suffer....
2 Pages (500 words) Essay

Business Ethics Cases

Inaccurate usage of models, over-reliance on past project's data and information and subjective impression generates flawed results.... The morals of CSR and stakeholder theory argue that stakeholder's benefits such as, those of customers, workers and employees, should not be compromised....
5 Pages (1250 words) Essay

Portability of the C Program Language and the Unix System

These could not expressed portable because the original c compilers lacked the ability to represent the relative sizes of floating-point data and integers in a machine-independent way.... In addition Honeywell 6000, Inter-data 8/32, SEL86 or even in eclipse and DEC VAX-11/780....
3 Pages (750 words) Essay

SQL Injection Vulnerabilities

The SQL injection attack vectors are represented by data passed to the vulnerable web application from the user and which is processed by supporting database.... Practically, the most common SQL injection attack vectors arise from the data transmitted through HTTP POST and HTTP GET.... Other attack vectors are HTTP User-Agent, HTTP cookie data, and Referer header values....
5 Pages (1250 words) Research Paper

Treatment And Prevention Data Of Chlamydia

The paper "Treatment And Prevention data Of Chlamydia" contains some of the challenges faced in the collection of the treatment and prevention data, other development issues and concerns about chlamydia.... Additionally, the collection of data from physicians was compromised by fact that most of them never carried out treatment for chlamydia patients unless they were willing to pay.... As a result of this, providers were unable to have the correct representation of patient data....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us