Review the following case scenarios for your management plan for security and pr
ID: 458232 • Letter: R
Question
Review the following case scenarios for your management plan for security and privacy. Case Scenario 1 (Security Breach) The administration at St. John's Hospital takes pride in its sound policies and procedures for the protection of confidential client information. In fact, it serves as a model for other institutions in the area; however, printouts discarded in the restricted-access information systems department are not shredded. On numerous occasions, personnel working late have observed the cleaning staff reading discarded printouts. What actions, if any, should these personnel take toward the actions of the cleaning staff? What actions, if any, should be taken by the information systems administration? Create a detailed management plan for patient data privacy and security in the case of a security breach. Write a 1,750 word paper that details your facility's management plan. Create a business problem statement. Analyze how you will respond to these situations. Evaluate the training you can provide to your staff. Analyze the considerations of HIPAA and patient privacy compliance requirements in planning. Analyze the need for an information technology management plan for natural disasters and security breaches. Evaluate how you will implement your management plan. Create a 350-to 700-word executive summary in which you review the management plan you designed. Explore possible challenges and the utilization of your plan.
Explanation / Answer
Actions towrads cleaning staff:
1. Cleaning staff should not be allowed to touch the offical documents placed on employee desk or near printer.
2. Cleaning staff should place the discarded prinouts at a particular place but not in dustbin and inform their supervisor about next course of action.
Information Management Should perform following activities:
1. Placing of Shreeder at appropriate loaction (near printer) so that employee doesn't find it dificult to shred the discarded printouts.
2.The officials should publish a security check stating that no documents should be placed in open either on emplyee's desk or at printer and if any such incident have been found then strict action should be taken against the employee.
3.Regular auditing should be performed about the follow-up of secuirty checks.
Detailed Management plan:
In case of security breach, the most important task for an organization is to save is patient data and its security.the company first need to identify about the server where security breach has been identified and how is is related or connected to patient data mangement database.If we have option of quarntine the patient database then we have to proceed and publish a message that patients cannot access their data because site is under maintanance.If the the primary data i.e patient data has been impacted by the breach then its better to put the complete system under offline and start cleaning up the mess.In this process ,the copy of data can be used for minimal function of site with limited feature. New database should be created and data will be copied from image and then make it functional.In this whole process, it will be great if the data are stored at central location and as well as a copy has been created at data center or somewhere into the clouds.In this whole incident a major part is coomunication because security breach can impact the company heavily anf result in serious damage to the reputation and business.Thus comapny needs to acess the situation and then communicate it to their patients accordingly.Security breach at remotest part doesn't impact the patient data and thus to be resolved within organization which making any external noise but direct impact to data privacy should be communicated to patient and what will be the next course of action on their part and also mention that what company is doing to minimize the loss and its future curse of action.mangement should focus on multi-layered solution approach and correct the faulty system.
author's note: Request you to be specific to questions which needs to be answered.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.