Preview

Curk University Hospital Risk Analysis

Good Essays
Open Document
Open Document
787 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Curk University Hospital Risk Analysis
One of the most important issues in relation to moving UCC’s patient information to the cloud is privacy and security. Cork University Hospital (CUH) must be aware of the data regulations within Ireland and all storage must adhere to the laws upheld by the Data Protection Commissioner. Before implementing the system, a risk analysis should be conducted. Compare the current security measures against legal requirements. The analysis will highlight high priority threats and vulnerabilities.
The sensitivity of the personal information stored must be considered at all stages of developing all elements of the EHR, especially when it comes to privacy and security. A trusting relationship between CUH and the vendor is essential for a smooth transition
…show more content…
At the outset, make the physical system inaccessible to unauthorised users. Identification and verification must be required for all users of the system. This can be done using user passwords or personal identification numbers (PINs). Procedures for automatic shutdown routines when the system has a confirmed breach. The next phase in conjunction with monitoring the system is identifying what each work station is used for. This allows the system administration to specify privacy settings and distinguish the capabilities of each work station.
Through auditing and monitoring the users of the systems CUH can identify weaknesses and detect security breaches or attempts. CUH must regularly audit all users of the systems. All employees must be aware of the punishments, i.e. suspension that will be enforced if the compliance regulations and policies are not followed.
Along with controlling who access the system, the administration must control the media and devices. CUH is advised to construct a security plan that includes the disposal of data. Any hardware that is being disposed of or recycled during the transition, must be formatted of all data. All the repossessed hardware must be monitored by the administration in CUH. All data must be backed

You May Also Find These Documents Helpful

  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    While Mutandum’s current method of tracking computers (attaching assigned, unique tracking numbers directly to the equipment) is effective, it must be applied to all systems, regardless of the asset’s value at the time of purchase. The system itself is not what these unique tracking numbers are protecting, but rather the sensitive data stored on…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    3. Who will have access to the systems and how will this access be monitored?…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    A priority to the LAN domain is proper security of physical equipment. Only authorized personnel are allowed to gain access into...…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    • Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics)…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    MIS565 You Decide abc

    • 648 Words
    • 2 Pages

    As the Chief Compliance Officer it is very important that business associates (covered entities) make a supreme effort to ensure the safe keeping of a patient’s health information. Considering three key areas that will affect the decision whether a hospital receives its accreditation consist of the release of information, protection of privacy/maintenance of confidentiality/protection of data security, and management of sensitive health information. The Joint Commission on Accreditation of Healthcare Organizations (JCAHO) requires this privacy and security rules including 18 types of identifiers for individuals must be secured at all times to include Electronic protected health information (ePHI).…

    • 648 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    Patient privacy and security is one of the most important aspects of the St. Johns Hospital code of conduct, they take pride in the sound policies and procedures set to maintain customer confidentiality. Each employee is held to a high standard of maintaining the highest level of privacy and confidentiality when it comes to patient health information (PHI). This paper will outline the plan that St. John’s hospital has created in case of a security breach or security threat in the facility. The primary cause of a security breach is usually related to the people or business side of and organization (Rhoades, MBA, RHIA, CHPS, CPHIMS, FHIMA, 2009).…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Good Essays

    1. Everyone has the right to respect for his private and family life, his home and his correspondence.…

    • 559 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In the move toward electronic health records for patient’s there are obstacles that have to be addressed, procedures implemented into the process, and security maintained at the highest level.…

    • 749 Words
    • 3 Pages
    Good Essays
  • Good Essays

    HIPAA CIA And Safeguards

    • 599 Words
    • 3 Pages

    HIPAA, CIA, and Safeguards Medical data are increasingly computerized, which means, inevitably, medical data are increasingly subject to the risks associated with computer security, namely: •Confidentiality: data revealed to people not authorized to see them •Integrity: unauthorized changes to data, intentional or otherwise •Availability: access to data denied by persons or events…

    • 599 Words
    • 3 Pages
    Good Essays
  • Good Essays

    External Drivers

    • 467 Words
    • 2 Pages

    Technology can transform healthcare and increase productivity. However, it also raises issues around cost, staff training and data security at…

    • 467 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Handle Information Level2

    • 748 Words
    • 3 Pages

    Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.…

    • 748 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Handle information

    • 579 Words
    • 2 Pages

    It is important to have secure systems for recording and storing information in a health and social care setting so that service users and staff’s private information will be protected from unauthorised viewing. It is to comply with legislation; it is the right of service users and staff for their private information to be protected.…

    • 579 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A man stands before a crowd of two million, as he looks out over a podium on the steps of the capitol building. American flags adorn his stage. This man is Barack Hussein Obama, and he is about to be the 44th president of the United States. The two cities, Chicago, and Honolulu, Obama lived in show how different kinds of racism can affect the lives of black Americans.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cdr Electrical Engineer

    • 439 Words
    • 2 Pages

    The project was planned as a response for the application which presented to us by the factory reporting us that there is a fully locking of the computers and the malfunction equipments in the factory.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays