Preview

Information Security Article Evaluation: Henry Ford Health System Hospital

Better Essays
Open Document
Open Document
1028 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Article Evaluation: Henry Ford Health System Hospital
Information Security Article EvaluationDerek MatthewsCMGT/44109/08/2014Roger ElrodInformation Security Article EvaluationIntroduction
Security is the main concern for all enterprises and organizations. They have to monitor and manage all elements within the organization. Security breaches can cause harm to any organization by taking confidential information and giving that information to an outside source. The context of personal information is displayed by dates of birth, social security, names, and other ways to confirm him or her identity. A breach of security can bring pain to the pockets of any organization and injure one’s assets. This paper will explain the impacts a security breach can have on an organization, mainly within the Urology Medical office at the Henry Ford Health Systems hospital in Detroit, Michigan and will recommend strategies that will assist in avoiding future incidents.
Event Background
The day of September 24, 2010, an unidentified individual walked into Urology office at the Henry Ford Health Systems hospital, the door was unlocked. A laptop was stolen, but it did have password protection software, the protection it provided was not to complex a person that had advanced knowledge of computers will still be a threat. The information that was stored on the laptop did not provide
…show more content…

Training classes should be policy and standard. We can provide flexible scheduling for the training classes, so it can be more convenient to the staff and there are no excuses of why he or she is not up to date. We will provide registration logs to sign on, but if your name is on that session, you cannot miss. We will be implementing a computer sign in, which will require a password and user ID. This is to ensure the identity of he or she, which prevents falsification of attendance recordings and guarantee that employees are attending the training

You May Also Find These Documents Helpful

  • Powerful Essays

    MGT2 Task3

    • 5037 Words
    • 21 Pages

    Negative publicity of the company and loss of credibility in the eyes of existing and potential customers impacting overall business…

    • 5037 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    The medical group could face significant penalties due to security breaches of medical information. Physical safeguards should have been implemented to assure that equipment with electronic information systems that contained patient data are safe from unauthorized intrusion. Technical safeguards cover the electronic protected health information and control access to it. Advocate Medical Group has failed to ensure proper HIPAA policies and procedures were implemented in the…

    • 808 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The investigation followed a notice submitted by BCBST to HHS reporting that 57 unencrypted computer hard drives were stolen from a leased facility in Tennessee. The drives contained the protected health information (PHI) of over 1 million individuals, including member names, social security numbers, diagnosis codes, dates of birth, and health plan identification numbers. OCR’s investigation indicated BCBST failed to implement appropriate administrative safeguards to adequately protect information remaining at the leased facility by not performing the required security evaluation in response to operational changes. In addition, the investigation showed a failure to implement appropriate physical safeguards by not having adequate facility access controls; both of these safeguards are required by the HIPAA Security Rule.…

    • 554 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Anyone with a laptop or tablet could access the network and with only few basic network utilities could access all the servers and all the patient information. Most of these facilities are not implementing any Network Security because of the cost associated with it. “Most healthcare organizations nationwide, some 61 percent to be exact, reported a security related incident in the form of security breach, data loss or unplanned downtime at least once this past year, according to a new health IT report by MeriTalk, a public-private organization working to improve government information technology. These security events cost U.S. hospitals an estimated $1.6 billion each year. Breaking it down by incident, hospitals should expect to hand over on average $810,000 per security breach, which occurs at nearly one in five healthcare organizations nationwide” (healthcareitnews.com). I hope that with this project I can make clear the benefits of securing the network and the steps we need to take to set up and secure the…

    • 698 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The article was considerably valid as was demonstrated by credible news programs and other articles. The importance of keeping patches and antivirus signatures up to date, to help prevent these types of attacks was discussed in detail. Users selecting strong passwords was also discussed, and revealed as a key component in the ability to compromise these accounts. This article was valuable and affected a lot of people. It is clear that there are prevention methods that can be used, to secure your…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Bat1 Task 1

    • 1280 Words
    • 6 Pages

    IT staff can diminish security breaches by developing effective ways to teach clinical staff about securing their workstations when not in use. Mandatory in-service and power point presentations would be an effective way to do this. The importance of workstation security, not accessing another employee's computer while in use and not using another employee's password should be discussed. Along with how doing so would be in violation of company policy and the HIPAA Privacy Act. Disciplinary action should also be discussed.…

    • 1280 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Wgu Nut1 Task 1

    • 4110 Words
    • 17 Pages

    Bowman, D. (2012). Report: Data breaches from unencrypted devices up 525% in 2011. Retrieved from http://www.fiercehealthit.com/story/report-data-breachesunencrypted-devices-525-2011/2012-02-01?utm_medium=nl&utm_source=internal Dreyer, T. (2011, March 8). How bar coding and scanning at bedside ensure quality care and safety [Blog post]. Retrieved from http://blogs.zebra.com/blog/bid/51053/How-Bar-Coding-and-Scanning-at-BedsideEnsure-Quality-Care-and-Safety Dudley, G. (2004). Electronic records, patient confidentiality, and the impact of HIPAA. Retrieved from http://www.psqh.com/octdec04/dudley.html Durben Hirsch, M. (2012). EHRs a major cause of patient info breaches. Retrieved from http://www.fierceemr.com/story/ehrs-major-cause-patient-info-breaches/201204-12…

    • 4110 Words
    • 17 Pages
    Best Essays
  • Satisfactory Essays

    The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.…

    • 404 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Hrm/531 Week 1

    • 2047 Words
    • 9 Pages

    As a health care organization, it is important that the Saint John’s Hospital takes the security and privacy of its patients’ information very seriously. Patient information in the Saint John’s Hospital is electronic and managed by the information systems department. In the organization, the security and privacy of all information is the responsibility of the Information Systems (IS) Manager. As the IS Manager, based on the following information on security and privacy, a Management Plan has been developed to be used as the process for the maintenance of patient information privacy and security.…

    • 2047 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    The following risks, threats, and vulnerabilities were found in an IT infrastructure. Consider the scenario of a Healthcare provider under HIPPA compliance law and what compliance to HIPPA involves.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Dental Assistant

    • 656 Words
    • 3 Pages

    The record of each training session must include the date of the session, the name of the presenter, the topic, and the names of all employees who attended.…

    • 656 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Risk Management Success

    • 1462 Words
    • 5 Pages

    The paper is intended to inform the reader of the steps that a risk management program should take in order to ensure that safety and security are upheld. The security and protection of information is more difficult than ever before due to the expanse of technology that is used in the world. Information can be hacked in to and utilized for fraudulent purposes. Personal information of random populations is sought by convicted felons and illegal organizations for the purpose of identity theft and financial gain. The recent inception of identity theft pays tribute to the realization that modern technology truly presents higher risk in terms of security breaches. Alongside the need for security of information is the protection of safety of both staff and patients alike. This aspect of risk management holds a great amount of weight in terms of evaluating the success of a program, as adverse events can cost an organization their accreditation and often times their funding and viability can be negatively affected. The overall goal for this piece is to discuss risk managements involvement in the handling of infectious waste and the protection of private health information by assessing the role of a risk manager, the objectives set forth for a risk management team, and by reviewing the training provided to employees.…

    • 1462 Words
    • 5 Pages
    Powerful Essays