Preview

Ethical Legal Decision Making Informatics Disaster Plan Proposal

Good Essays
Open Document
Open Document
1049 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethical Legal Decision Making Informatics Disaster Plan Proposal
Ethical Legal Decision Making Informatics Disaster Plan Proposal, Part 2
The following paper is a literature review that shall focus on disaster. Numerous studies have shown that disasters disrupt the smooth running of things. The first part of this paper shall focus on business continuity steps, risk management and risk assessment that support data security and confidentiality during a disaster. The second part of the paper shall be an education outline for consumers and the public on access to, security, privacy and maintenance of PHRs (Public Health Records), legalities and requirements before, during and during a disaster.
Risk assessment
Pipkin (2000) points out that a risk assessment should not focus on the creation of large amounts of information, but rather it should help to identify sensible measures to control the threats on data security and confidentiality that may brought on by a disaster. A risk assessment should include steps that will help to save the security and confidentiality of data.
According to Cherdantseva and Hilton (2013) one of the most essential facets that should be included in the risk assessment is correctly making out possible threats to the security and confidentiality of data. This should include looking around the data storage system and thinking about possible threats that were not identified before a threat occurred. Venter and Eloff (2003) say that the risk assessment should think about the activities and processes that are involved in manipulation of the data because these two facets give leeway to the compromising of data security and confidentiality. Pipkin (2000) states that the risk assessment should include reliable outside people because they cannot easily overlook the threats that are facing the security and confidentiality of data in a workplace that they are not actively involved. Risk management Pipkin (2000) says that risk management is the prioritization, assessment and identification of threats followed up

You May Also Find These Documents Helpful

  • Satisfactory Essays

    images to use as references. You can use your mouse to roll over the images and click on the highlighted…

    • 269 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    There are many types of risks that a company has to confront each day in information technology (IT). The four main types of risk are business, audit, security, and continuity risks. A business risk is when a company will not be able to achieve its goals and objectives; this could be union issues, a competing company, fraud, or production equipment failure. Audit risks include misstatement of financials by an auditor or a failure by an auditor to uncover fraud or material errors. A security risk can be a host of things that would ruin the integrity and access of the data, which can also lead to fraud or misuse of other information from internal (like employees) to external (like hackers) sources. And, finally, continuity risks are information system risks that have to do with backup, recovery and day to day availability of the system. When unplanned risks occur, management and auditor need to act quickly to intercept the risk, balance the risk with cost-effective countermeasures, since it is impossible to plan all risks (Hunton, Bryant, & Bagranoff, 2004).…

    • 1178 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    This disaster plan was put together to try and protect valuable information should it be attacked by hackers or threatened by a natural disaster. As this company grows, so will the value of the network and the information it retains. We want to ensure to the customer and the employee that this information is safe and not vulnerable to an attack. This plan was devised to help protect against failures such as the complexity of the system, accidental failure or a breech by hostile intent.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Supply Disruption  Customer Disruption  Employee Disruption Communication Utilities Contingency Planning Process High Level Contingency and Disaster Recovery Planning Strategy • Develop the Business Contingency Planning • • • • • • • Policy and Business Process Priorities Conduct a Risk Assessment Conduct the Business Impact Analysis (BIA) Develop Business Continuity and Recovery Strategies Develop Business Continuity Plans Conduct awareness, testing, and training of the DRP Conduct Disaster Recovery Plan maintenance and exercise Identify business processes Industry Standards ISO 27001 : Requirements for Information Security Management Systems. Section 14 addresses business continuity management.…

    • 1114 Words
    • 10 Pages
    Better Essays
  • Good Essays

    4. To prevent risk or threats of any kind you must safeguard all information stored on the database server. Employees have private information regarding business and customers stored on the database server and the loss or accidental leak of data could be a major hit to the company. This is why it is so important to use the risk management techniques of avoidance, transfer,…

    • 388 Words
    • 2 Pages
    Good Essays
  • Good Essays

    1. Why is risk mitigation and filling in critical security gaps an important next step after the security assessment is performed?…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Proper documentation of these instances and usage of the data observed from this catastrophe will allow for better preparedness in the future as well as more accurate predictive capability. This will increase the functionality and effectiveness of these health nodes/cells within the city. Additionally, proper use of the data will optimize the emergency preparedness and faith-based assets deployed after a natural disaster…

    • 910 Words
    • 4 Pages
    Good Essays
  • Good Essays

    [242.1] Select and use appropriate methods to minimise security risk to IT systems and data…

    • 793 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Risk assessments contain details of the risk, who is at risk, what action is to be taken, and the timescale that it will be dealt with when necessary.…

    • 1959 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental lost or destruction of, or damage to personal data.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is 3110 Lab 7

    • 949 Words
    • 4 Pages

    Disaster recovery risk assessment and business impact analysis (BIA) are crucial steps in the development of a disaster recovery plan. But, we need to locate disaster recovery risk assessment and business impact assessment in the overall planning process. To do that, let us remind ourselves of the overall goals of disaster recovery planning, which are to provide strategies and procedures that can help return IT operations to an acceptable level of performance as quickly as possible following a disruptive event. The speed at which IT assets can be returned to normal or near-normal performance will impact how quickly the organization can return to business as usual or an acceptable interim state of operations.…

    • 949 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Risks can come in many different forms including; financial markets, failures with IT or business projects, legal liabilities, credit risk, accidents and mistakes, natural causes and disasters as well as deliberate attacks from an adversary such as hacking.…

    • 2160 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Protection of data from a natural disaster such as a tornado is a network management issue.…

    • 812 Words
    • 4 Pages
    Satisfactory Essays