Shijo Philip
Western Governers University
Heart-Healthy is a large health insurance company. It is often necessary to review and revise information security policies of the company to meet with updated policy changes, system changes, personal changes and audits. Information security professionals are responsible for ensuring the security policy in the company, checking in compliance with current information security laws and regulations. The report says that the manager of security analyst team being asked to review and provide recommendations for the changes to the company’s information security policy. The review is focused on to ensure that the policy is …show more content…
Also, documentation of everything undergone with the accounts is required. Documenting the account details is also compliance with FISMA and HIPAA standards.
Password Requirements and Justification.
The current password requirements section of the policy states that “Passwords must be at least eight characters long and contain a combination of upper- and lowercase letters. Shared passwords are not permitted on any system that contains patient information. When resetting a password, users cannot reuse any of the previous six passwords that were used. Users entering an incorrect password more than three times will be locked out for at least 15 minutes before the password can be reset.”
There are multiple strategies followed for password policy implementation. Combination of password is one which has at least eight characters, should have upper and lower case letters, need to include alpha and numeric characters. The account administrator will assign a default password for first time. The user can save a new password for First time …show more content…
The system will enable the insurance company to be in compliance with all the four standards of information security. The company can work more efficiently with more quality in service.
References:
(Wikipedia) User Account Policy. Retrieved from http://en.wikipedia.org/wiki/User_account_policy
(May 2003). SUMMARY OF THE HIPAA PRIVACY RULE. HIPAA Compliance Assistance, 05/03, 3-15. Retrieved from https://www.pcisecuritystandards.org/security_standards/documents.php
(November 2013). Requirements and Security Assessment Procedures. Payment Card Industry (PCI) Data Security Standard, Version 3.0, 61-72. Retrieved from https://www.pcisecuritystandards.org/security_standards/documents.php
Lummis, J. (November 2009). GLBA Information Security Program. Retrieved from http://policies.gatech.edu/glba-information-security-program
(Cyberlaw, Portfolio(June28, 2014). Portfolio: Heart-Healthy IIS Policy. Retrieved from