StudentShare solutions
Triangle menu

Information sensitivity and protection of data - Essay Example

Nobody downloaded yet

Extract of sample
Information sensitivity and protection of data

It is important because organizations’ policies in some ways reflect the underlying culture and values. Modern organizations instill performance and cultural values such as mutual trust and confidence as an integrative mechanism (Fairholm & Fairholm, 2008: pp.103-104) rather than exercising sheer authority and control (Masters, 2005: p. 271). Mayo Foundation (referred to as Mayo in rest of paper) outlines a guidance oriented policy. In contrast to Mayo, Beth Israel Deaconess (referred to as Beth Israel in rest of paper) has a strongly authoritative tone in outlining its policy with strong worded phrases such as “Users have no expectation of personal privacy of any kind related to their use” compared with “contents will not be monitored, observed, viewed, displayed or reproduced in any form by anyone other than the sender or recipient unless specifically authorized by an officer” in Mayo for the same purpose. Georgetown University (referred to as Georgetown in rest of paper), on the other hand, presents a matter-of-factly and exhaustive policy covering several aspects of security separately. Amongst the three policies, Mayo was found to be the most well structured and easier to follow with cross referencing links leading to further details, such as local implementations or human resource policies, for specific areas where needed.
Some of the common themes followed in each policy are confidentiality, integrity and availability of information. These themes are also recognized by NIST as foundations for an information security policy (Ross et al, 2007: p. 4). At a specific level, prudent use of resources, data access control and physical security are found common in all three policies. While these themes are covered in each document, the way they are implemented and enforced is different. For example, in terms of confidentiality, Mayo clearly and concisely describes how information is to be accessible to authorized personnel at authorized ...Show more

Summary

The National Institute of Science and Technology (NIST) and Healthcare Information and Management Systems Society (HIMSS) have laid down guidelines for information and security policies for organizations in general and, in case of HIMSS, health organizations in particular. These…
Author : lolitahilll
Information sensitivity and protection of data essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Information sensitivity and protection of data"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Information Sensitivity and Protection of Data (M5C)
All the three policies discuss the security measures that should be taken to protect information that has been stored on technological devices, that is computer systems and networks, and ensures that the employees use proper passwords, softwares and firewalls to authorize data access.
2 pages (500 words) Essay
Information Sensitivity and Protection of Data
All the three policies discuss the security measures that should be taken to protect information that has been stored on technological devices, that is computer systems and networks, and ensures that the employees use proper passwords, softwares and firewalls to authorize data access.
2 pages (500 words) Essay
Information Sensitivity and Data Protection
All TRICARE operations of information collection, storage, transmission, and processing are in accordance with DoD Information Technology System Certification and Accreditation Process. TRICARE operates in a standardized secure environment that offers information security features like.
1 pages (250 words) Essay
Information Sensitivity and Protection of Data
This paper will proficiently assess some of the main aspects of information security and privacy management for the specified organizations. BIDMC (Beth Israel Deaconess Medical Center) has implemented a corporate information and data management policy which ensures the maximum protection and security management of the technological resources and services.
2 pages (500 words) Essay
Information Sensitivity and Protection of Data (SLP)
Takes care of millions of people in the US, the organization needs to manage its data and information of patients they serve with utmost care maintaining maximum security and efficiency. With regard to this, the organization has tied up with a leading data security service provider, which assures to protect each and every data and crucial information of the organization.
3 pages (750 words) Essay
Information Sensitivity and Protection of Data (M5C)
All the three policies discuss the security measures that should be taken to protect information that has been stored on technological devices, that is
2 pages (500 words) Essay
Information Sensitivity and Protection of Data
As the legal owner of the information, patients are considered by the various organizations as having total control as to how the
2 pages (500 words) Essay
SLP- Information Sensitivity and Protection of Data
r the present rating may be based on factors including the fact that the organization has already put in place an in-house learning system whereby all employees and other human resource personnel within the organization are getting themselves acquainted with the new information
2 pages (500 words) Essay
Information Sensitivity and Protection of Data
cies and in this case, we are going to be analyzing the strategies set by three leading healthcare organizations: Beth Israel Deaconess Medical Centre, Mayo foundation and Georgetown University by comparing their rules and regulations in data handling. The policies that Beth
3 pages (750 words) Essay
Information Sensitivity and Protection of Data (CASE) module 5
Initially the HIPAA was intended to ensure that limited cases of insurance fraud are reported, increase access to the health care, and guarantee administrative simplification. However, with the implementation of the HIPAA Act, various problems have been witnessed as
2 pages (500 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment