Preview

Rlht Task 2

Better Essays
Open Document
Open Document
529 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Rlht Task 2
A. Create three organizational policy statements that may have prevented the security breach.

During a routine audit of the electronic health record system, a security breach was discovered. The lack of a log retention, log audit, or remote access policy contributed to the unauthorized access.

* Log retention policy statement: The intent of this policy statement is to provide the organization guidance on information systems security log retention. Log rotation will be conducted on a daily basis with rotated logs stored on a shared network resource. Daily backups of the rotated logs will be conducted. The backups will be retained for 12 months locally with a weekly copy stored offsite.

* Log auditing policy statement: The intent of this policy statement is to provide the organization guidance on information systems security log auditing. The purpose of routine log review is to identify possible security incidents, potential operational problems, or policy violations. Security logs will be reviewed daily. Careful attention will be made to events pertaining to account creation and account modification.

* Remote access policy statement: The intent of this policy statement is to provide the organization guidance on information systems remote access. Due to the sensitive nature of the information stored on the electronic health record system remote access needs to be better secured and controlled. Two-factor authentication for will be used when accessing network resources remotely. Additionally, role based access will be used to determine what resources will be accessed remotely.

1. Justify each organizational policy statement on a nationally or internationally recognized standard.

Log Retention: In this scenario the attacker patiently executed his or her plan to gain access over several months, avoiding detection, and exploiting the lack of long term security log retention. The Guide to Computer Security Log Management,



References: Kent, K. & Souppaya, M. (2006) Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology. Gaithersburg, MD: National Institute of Standards and Technology. Retrieved May 28 2012, from http://csrc.nist.gov/publications/nistpubs/800-92/SP800- 92.pdf HIPAA Security Guidance (2006). Retrieved May 28 2012, from http://www.hhs.gov/ ocr/privacy/hipaa/administrative/securityrule/remoteuse.pdf

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    RTT TASK 2

    • 7486 Words
    • 19 Pages

    In the case of Mr. J, these were multiple issues that led to and contributed to his unexpected demise after what is usually considered a routinely performed procedure in an emergency department setting. The JCHAO (Joint Commission on Accreditation of Healthcare) defines a sentinel event as “an unexpected occurrence involving death or serious physical or psychological injury”, (Frain, Murphy, Dash, & Kassai, ∂ 1) and in the case of Mr. B, his death would be considered a sentinel event which would warrant a review by a team of interdisciplinary members of the hospital. In this particular case members of the team would include one or more ED physicians, the RN in the scenario and the LPN, a respiratory therapist, a nursing supervisor, a hospital administrator, the ED nurse manager, a hospital pharmacist, and a risk manager. More staff nurses from the ER could also be involved. A credible and successful root cause analysis will identify all of the elements that contributed to the event, an action plan will be developed to prevent the event from reoccurring and ensure that those actions are completed. Action plans should be based on best practices and appropriate standards. (Frain et al., ∂ 10)…

    • 7486 Words
    • 19 Pages
    Better Essays
  • Good Essays

    Cheryl Fahrenholz throughout chapter 3 discusses various laws and acts that govern electronic health records and the principal functions that they provide. I picked five of these terms that I believe are the most important. Case management, Credentialing, informed consent, health record and performance improvement. Case-management is one of the most vital parts of any clinical faciality as it is through these individuals that the goals and livelihood of the patient are heard and responded to with corrective measures. The book describes this as an “ongoing review of clinical care conducted” safeguarding the patient against any treatment that is not in their best care (Fahrenholz, page 78 chapter 3).…

    • 591 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Rlt2 Task 4

    • 3059 Words
    • 13 Pages

    ''A physician owes to his patient the duty to disclose in a reasonable manner all significant medical information that the physician possesses that is material to an intelligent decision by the patient whether to undergo a procedure ''. Marvin V Lowney, 401 Mass. 1006 (1988).…

    • 3059 Words
    • 13 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Rlt2 Task 3

    • 273 Words
    • 2 Pages

    Angela really needs support as she is finding very difficult coping with the children’s, and she get so stressed some times and takes it out on Ricky .Getting support will help her to be less stressed. Angela and Ricky can have a mother and child healthy relationships. Des should take the kids out of the house more affiant and have him staying with him for the weekend just to give Angela time out to relax and not having to worrying about them. Everybody needs time to them self; Since Ricky doesn’t go to play school could stay with Angela’s mother some times. Angela is…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    MIS565 You Decide abc

    • 648 Words
    • 2 Pages

    As the Chief Compliance Officer it is very important that business associates (covered entities) make a supreme effort to ensure the safe keeping of a patient’s health information. Considering three key areas that will affect the decision whether a hospital receives its accreditation consist of the release of information, protection of privacy/maintenance of confidentiality/protection of data security, and management of sensitive health information. The Joint Commission on Accreditation of Healthcare Organizations (JCAHO) requires this privacy and security rules including 18 types of identifiers for individuals must be secured at all times to include Electronic protected health information (ePHI).…

    • 648 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    In the move toward electronic health records for patient’s there are obstacles that have to be addressed, procedures implemented into the process, and security maintained at the highest level.…

    • 749 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    Security guidance must exist in the form of formal written policies and procedures that define…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    The government firmly believes in the benefits of using electronic health records and is ready to invest federal resources to proliferate its use. Paper information increase the risk of unauthorized accessed due to human factor risks – leaving information on desk, leaving information on printer/fax, out where information can be viewed by cleaning people, dumpster incidents, and unlocked file cabinets/drawers and shared working areas. These are examples of…

    • 1188 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Communication Modalities

    • 1870 Words
    • 8 Pages

    References: Goldberg, I. (2000). Electronic medical records and patient privacy. Health Care Manager, 18(3), 63-69. Retrieved from EBSCOhost.…

    • 1870 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Electronic Health Records (EHRs) increase ethical issues in security and protecting the privacy rights of patients.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Patient Privacy

    • 1151 Words
    • 5 Pages

    Mishandling patient privacy is high; therefore it is very important that hospitals have a system to protect files from being released to unauthorized personnel and the public. This is when the Health Insurance Portability and Accountability Act come into effect. HIPPA sets a standard for electronic transfers of health data and should be handled according to the law. The law deals with privacy, information standards, data integrity, confidentiality, and data security. With details shared between physicians and patients and should strictly be confidential verbally as well as electronically. With personal health data evolving it has become a concern with the public having access to those records online, cell phones, or memory cards. The thought of viewing private information by a click of a button required rules and regulations to be enforced.…

    • 1151 Words
    • 5 Pages
    Better Essays