Preview

BYOD In Healthcare Organization: Case Study

Better Essays
Open Document
Open Document
1967 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
BYOD In Healthcare Organization: Case Study
Stanya Palmaro
ITM 350
Dr. Knapp
October 28, 2014
Risk Assessment:
BYOD in Healthcare Organization

Introduction:
For the past couple of years, a policy that allows employees to bring their own personal devices to work has become progressively popular. This policy is known as BYOD, an acronym that stands for “bring your own device”. One of the main reasons for the growing usage of the policy is the increase in employee productivity as they are already familiar with the equipment they are using at work. Although this reliance on technology is efficient and produces numerous benefits in the business sector, it also brings several problems along with it. Certainly, the risk of losing valuable data has become an imposing threat nowadays, making
…show more content…

They currently have 150 employees working for them; majority of which, are using their personal computers and devices on the job. According to SHHC, the company’s technological infrastructure is composed of 30% of laptops, 50% of tablets and 20% desktops. SHHC is currently benefitting from the BYOD policy as it allows employees to be more efficient and productive. The employees are already familiar with the devices they are using and can have the ability to use valuable third-party medical applications that companies do not know about and would therefore not be accessible with company-owned devices. An example of a third-party application as such would be UpToDate, which is a medical database that can significantly improve diagnosis of a disease as well as its treatment. Also, having personal devices makes it possible for employees to stay connected even if they are out of the office or on a business trip, which is especially important for the type of business SHHC is conducting, but also when the employees are on vacation or on sick leave. Despite all of the benefits and improvements in the business’s day-to-day operations, the security issues related to BYOD is still prominent and should be assessed if not …show more content…

Increasing its security may include purchasing programs such as Absolute Software, which would allow the company to remotely wipe devices. Since employees may use more than one personal device on the job, the company will have to account the cost of the software for about 250 devices, the software costs about $100 dollars each; which would add up to $2,500. Also, SHHC may want to create a separate body in their organization that will monitor the devices. This body will help enforce the company’s new BYOD policy, by for example making sure that all the devices are protected and that the data on those devices are encrypted. It will also be responsible of locating the lost devices, remotely wiping the data on them, or even monitor the traffic emitted by the devices. Creating this completely different sector in the organization will have a cost that will amount to about $5,500 or $8,000 total. Due to these measures, the Annual Rate of Occurrence is expected to drop by 3%, making the residual annual risk to be of 7%. If we add the $8,000 to the $375,000, it will create the new SLE of $383,000. Therefore, the new ALE will be of $26,810. This would reduce the costs from the initial risk by $10,690 if an event were to

You May Also Find These Documents Helpful

  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    While Mutandum’s current method of tracking computers (attaching assigned, unique tracking numbers directly to the equipment) is effective, it must be applied to all systems, regardless of the asset’s value at the time of purchase. The system itself is not what these unique tracking numbers are protecting, but rather the sensitive data stored on…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Bus 505

    • 490 Words
    • 2 Pages

    The possible implications of a decision about purchasing PDA devices for physicians it this medical center could be from the high-end PDA the price would put a strain on the administrators budget and would affect other needs of the medical center, and with a device on the low-end of quality an there is a higher level of security risk and a physicians are limited to certain functions due to the lower quality of software…

    • 490 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Agree to proper use of their devices when working with company data both on-site and off-site…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Most of the salespeople for Old Reliable Life Insurance are visiting customers in their homes or offices. Today, the salespeople carry a laptop computer to show value projections and cash flow summaries for various policies. Many of them also carry a PDA for appointments and a mobile phone. Julie would like to ensure that salespeople have access to the home office server computers while they are making their sales presentations to customers. In order to do this I have prepared three of the best options, to be reviewed, that I believe would benefit the customer as well as the salesperson.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    In the 1990’s Mobile Data commercial applications begin to appear with devices like pagers, personal digital assistants (PDA), cell phones with text messaging and laptops. Mobile data also started to disappear this was due to companies started offering better packages that could be used not just locally but nationwide. PDA’s Cellular phone and laptop computers are a huge part of the criminal justice system. (Magnuson, 2009).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Anyone with a laptop or tablet could access the network and with only few basic network utilities could access all the servers and all the patient information. Most of these facilities are not implementing any Network Security because of the cost associated with it. “Most healthcare organizations nationwide, some 61 percent to be exact, reported a security related incident in the form of security breach, data loss or unplanned downtime at least once this past year, according to a new health IT report by MeriTalk, a public-private organization working to improve government information technology. These security events cost U.S. hospitals an estimated $1.6 billion each year. Breaking it down by incident, hospitals should expect to hand over on average $810,000 per security breach, which occurs at nearly one in five healthcare organizations nationwide” (healthcareitnews.com). I hope that with this project I can make clear the benefits of securing the network and the steps we need to take to set up and secure the…

    • 698 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The nature of telework and remote access technologies – permitting access to protected resources from external networks and often external hosts as well, generally places them at higher risk than similar technologies only accessed from inside the organization, as well as increasing the risk to the internal…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Product lines include VPN, Firewall, Wireless LAN, Biometrics, and Access Control. Using the two sites that contain evaluated products (www.commoncriteriaportal.org or http://www.niap-ccevs.org/cc-scheme/) identify the products that will provide Sony with the optimal solution and use the Security Targets to describe the security functionality it provides, and state how this product reduces the potential risks identified in the media.…

    • 394 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Administrators at the University of Colorado found a way to comply HIPAA to protect the integrity of electronic patient records. In addition to meeting the Privacy requirement of HIPAA, they needed a system to deal with their staff of medical professionals who move from computer to computer throughout their shifts. To be better equipped to achieve compliance, the hospital chose to use technology via a…

    • 783 Words
    • 4 Pages
    Good Essays
  • Good Essays

    HIPPA Compliance

    • 117 Words
    • 1 Page

    HIPPA has suggested the diverse range of security implications for the hospital networks, as they need to have robust security framework to protect the integrity of patient’s record. In this regard, the most prominent security mechanisms have been identified to ensure hospital compliance with HIPPA requirements include the administrative safeguard, the technical safeguards of the hospital, as well as the physical safeguards of the hospital (HIPAA, n.d.). Therefore, in order to ensure whether or not the hospital is complying with HIPPA requirements, it is important to evaluate the administrative safeguards of the hospital, i.e., risk assessment approaches, BYOD policies, network policies, network security policies, as well as security management…

    • 117 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Once all the information is ironed out I will position each specific user group based on their role for eligibility. I will ensure all wireless and mobile devices are company owned. Write a policy against transferring their personal number to their company owned mobile device. This will help in keeping the company wireless environment protected and secure. Policy will also cover the health of the devices. Maintaining it for a year contract. A policy for storing inappropriate photographs/ images is prohibited. I will also include policies against texting and driving unless you use a hands free device…..but express the usage and a risk in such an event or situation is needed.…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Intel BYOD

    • 514 Words
    • 3 Pages

    Case : Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative. - By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue - The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours - Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity - Greater risk in data security - Intel neded control over to access and control company info.. But doing so on employee devices would violate privacy Benefits - Reduced intel's hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices - Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches - Do nithng.. And hope that bringing in own devices was a fad - Could say no to devices.. As a company policy - Supporting BYOD Plan - Had a 48 hr web jam where employees can voice about the BYOD trend.. - Create a 5 tier model to manage security ○ Lv 1.. Stock movements ○ Lv 2.. Slightly confidential info like payroll ○ Lv 3- call basic and had the least permissive level of access to corporate data ○ Lv4- intermediate- consisted of applications pertaining to specific lines of busines ○ Lv5- Managed equivalent.. Was most permissive level of…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Level 3 Business

    • 1150 Words
    • 5 Pages

    * Use of related mobile technology by business organisations: WiFi; Bluetooth®; 3G phones; PDAs; smartphones; Voice Over internet Protocol (VoIP)…

    • 1150 Words
    • 5 Pages
    Powerful Essays

Related Topics