Security Breach Case Scenario 1 Security Breach Essay

Download this Essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Essay:

Security Breach

Case Scenario 1: Security Breach

Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential need to integrate valuable security issues with reference to patient data privacy and security. Currently, the organization faces critical security breaches as printouts in the restricted-access IS department are not shredded. It has come to the attention of the personnel who serve late into their routine that most cleaning staff read the printouts.

This is a reflection of invasion into private information of the patients thus affecting their confidentiality. It is essential for the organization to adopt and integrate an appropriate method of curbing these issues thus enhancing the security and confidentiality of the patients' information or data. This research exercise will focus on the most effective ways to respond to the problem, evaluation of quality training for the staff, and implementation of management plan for the organization in association with the development of the code of conduct.

How can you respond to these situations?

The security breach in this context requires an extensive response with the aim of enhancing confidentiality of the information or data pertaining to the consumers. One of the essential responses to the situation is provision of critical warning to the cleaning staff on invading confidential information or data of the patients. This is a spontaneous move to limit access of the data by the cleaning staff. The personnel should also raise this issues with the IS department on the need to shred printouts. Shredding of the printouts will limit accessibility of the patients' confidential information or data. This is a reflection of temporary purpose as the main objective of the organization should be adoption and implementation of Electronic Health Record (EHR). This will limit or eliminate accessibility of the patients' confidential information to the cleaners. Electronic Health Record will be essential in the realization of goals and objectives in enhancement confidentiality of the patients' information or data.

What training can you provide to your staff?

Electronic Health Record implementation plan requires critical training strategies in order to improve or maximize protection and security opportunities. Training of the staff is one of the greater investments in the achievement of electronic health record implementation. This aspect is essential in the realization of the full potential of the HER and employees with the aim of enhancing confidentiality of the patients' information or data. In the implementation of the electronic health record, it is essential to offer three critical training strategies to the staff. These include super user training, role-based training, and process-based training (Rothstein, 2007).

Super User Training

It is essential for the organization to maximize the opportunity of vendor training with the aim of creating group of 'super users'. Super users refer to health employees trained on the ability to move through the electronic health record quickly. These employees have the capacity to share quality hints and techniques to other users for the purposes of enhancing the security and confidentiality of the patients' information or data. The core group of the super users in relation to electronic health record will be effective in the provision of internal training to the clinicians and office staff. This is an essential component of an electronic health record (EHR) implementation plan. This is because of quality combination of the specialized EHR training and application of the EHR training within the organization to facilitate effective workflow and patient population interaction. Super users training is the foundation of adoption and implementation of the electronic health record.

Role-Based Training

It is also critical to focus on training the staff on their roles, expectations, and responsibilities while enhancing the security and confidentiality of the patients' data or information. This training should focus on how each group or staff members will adopt and integrate electronic health record in the execution of their duties within the organization. The training should focus on the role of the IT support staff, office staff, and clinical providers in relation to implementation of the electronic health record. The organization should consider tailoring the role-based training program to suit the needs of the staff groups within the health entity.

Process-Based Training

It is essential to note that integration of the electronic health record into the culture, practices, or hospital center will have great influence on the workflow. It is critical for the organization to train employees on working with the new workflows. Practice-based training is vital and critical in enhancing the understanding of the employees in relation to the new cases of workflows. For instance, the staff members should understand how to implement the new plan into provision of clinical summaries in relation to the patients' information or data. Training should also focus on sharing information across the relevant departments. This will also limit accessibility of vital information on the concept of authority.

How can you implement your management plan?

In implementation of the electronic health record, it is essential to adhere to the following five steps or stages with the aim of achieving full potential of the strategy.

Step 1: Conduct a Risk Analysis

In the implementation of the management plan, the first aspect should focus on the execution of effective and efficient risk analysis. This entails reviewing current protected health information safeguards with the aim of evaluating vulnerabilities. It is also essential to implement HITECH's for grid reporting on the risk analysis. In this first step, it is also critical for the organization to evaluate firewalls and virus protection with the aim of enhancing integrity and availability of patients' information or data. This is an attempt to review security measures in order to provide secure e-communications for the organization in protecting confidentiality of the patients' data or information. The organization should also consider reviewing its responsibilities in relation to the HIPAA security rule. This is essential to ensure that the organization is in accordance with the legal and health requirements (Prehe, 2008).

Step 2: Establishment of Administrative Safeguards

The second step should focus on the integration and establishment of the administrative safeguards. This would entail assigning an internal security leader to enhance implementation of the plan to provide adequate opportunity for the achievement of full potential. During this stage, the organization should also focus on the development of data security policies, objectives, and procedures to guide implementation of the plan by the staff members. The organization should also consider development of an effective plan aiming to update electronic systems with the aim of curbing potential web threats. This is vital for the enhancement of security, integrity, and availability of the patients' data or information by the organization through its staff members.

Step 3: Building of Technical Safeguards

The third step of the management plan should focus on the creation and development of the technical safeguards. This is through determination of the role-based access and implementation of the audit trails. This is vital towards the promotion of integrity and accountability of the electronic system in enhancing security and confidentiality of the patients' data. The organization should also focus on audit applications to enhance transparency and accountability of the systems in handling confidential information of the patients. During this stage, the organization should also focus on testing and reviewing vulnerabilities in relation to the networking systems. This is essential to enhance transmission of information or data on a secure networking systems thus prevention of invasion into confidential patients' information or data. The review of vulnerabilities will provide an accurate opportunity for the organization to address any security breach through implementation of extensive and quality solution to the problem.

Step 4: Creation of Physical Safeguards

The fourth step of the management implementation plan should focus on the development or establishment of physical safeguards towards the achievement of full potential. During this stage, the organization should focus on the creation of policies and procedures with the aim of protecting inventory. The policies should also control access to the communication systems such as desktops, servers, and information systems in order to enhance secure e-communication. During this stage, the organization should also focus on the development of accurate process for handling lost or stolen laptops and handheld communication devices. This is essential in the determination of integrity of the information and communication within the organization. It is also critical for the organization to adopt and integrate system backup and data recovery processes, policies, and procedures. This should focus on three critical aspects: environmental, natural, and unauthorized intrusions. Under natural aspects, the organization should adopt and implement policies to address issues such as flood, tornado, and earthquake. Unauthorized issues such as hackers, and burglary should follow critical procedures for data recovery and backup strategies. It is also essential to implement contingency plans in relation to…[continue]

Cite This Essay:

"Security Breach Case Scenario 1 Security Breach" (2013, March 25) Retrieved December 10, 2016, from http://www.paperdue.com/essay/security-breach-case-scenario-1-86942

"Security Breach Case Scenario 1 Security Breach" 25 March 2013. Web.10 December. 2016. <http://www.paperdue.com/essay/security-breach-case-scenario-1-86942>

"Security Breach Case Scenario 1 Security Breach", 25 March 2013, Accessed.10 December. 2016, http://www.paperdue.com/essay/security-breach-case-scenario-1-86942

Other Documents Pertaining To This Topic

  • Security Agip Kazakhstan North

    They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

  • Physical Security the Relevance of Physical Security

    Physical Security The relevance of physical security cannot be overstated when it comes to the prevention or minimization of instances of unauthorized access, loss, or even theft. In this text, I concern myself with physical security and the relevance of several of its components. The components I will address in this discussion are building security, grounds security, access control systems, perimeter security, and information systems and technology security. Physical Security: Brief

  • IT Security Assessments Process of Matching Security

    IT Security Assessments (Process of matching security policies against the architecture of the system in order to measure compliance The systems security assessment is the method of creating a security policy that would be complimentary to the architecture of the system and the method would allow for the measure of compliance. Security assessments are activities that belong to the phase of the design cycle, and that is because it is

  • Security in Cloud Computing

    Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

  • Security Manager Leadership Analysis & Assessment of

    Security Manager Leadership Analysis & Assessment of Main Management Skills of Security Managers The role of security managers and their progression to Chief Information Security Officers (CISO) in their careers is often delineated by a very broad base of experiences, expertise, skills and the continual development of management and leadership skills. The intent of this analysis and assessment is to define the most critically important management skills for security managers, including those

  • Security Risk Management Process

    Microsoft proposes six steps to enable proper reactive management of security risks which include: protecting safety and life, containing and assessing the damage, determining the cause of and repairing damage, reviewing risk response and updating procedures in the hopes of preventing risk in the future (Microsoft, 2004). A proactive approach is much more advantageous however as it enables corporations to prevent threats or minimize risks before negative occurrences happen within an

  • Security Implementation of Microsoft Windows

    Window Security Implementation Scenario NextGard Technologies specializes in the network consulting services for small, medium and large organizations inside and outside the United States. Currently, NextGard has approximately 250,000 employees in 5 countries and the company corporate headquarter is located at Phoenix, AZ. However, the company decides to secure and upgrade its current network to enhance organization efficiencies. Currently, the company has 5 district offices at the following locations: New York City, New


Read Full Essay
Copyright 2016 . All Rights Reserved