Sunday, April 28, 2019
Information Sensitivity and Protection of Data Essay - 5
knowledge Sensitivity and Protection of Data - prove Exampleael Deaconess Medical Center uses in handling sensitive information, as appearing in Managing Information Privacy & Security Beth Israel Deaconess Medical Technology Resources Policy (2007) ar against the followingAccess to vital culture is a key concern by these organizations. There are policies put in place that stress of access of training to authorized personnel only. In most cases, there are access mark measures allowing specific personnel access to them. Hacking or breaking into somewhere are means of accessing information illegally, booster cable to further means of access control such as power switches and anti-hacking software.Disclosure of crucial information is critical in healthcare. It may have serious consequences on the patient or their relatives (Herdman, 2006). It is therefore discerning to keep it as discreet as possible. In large firms with different departments, restricting disclosure to the le ss(prenominal) involved ones is a possible way of curbing disclosure. There are also restrictions of unauthorized disclosure of institutional information beyond it, mostly by export through electronic means.The issue of data alteration is a key concerning the three organizations. Altering data interferes with crucial conclusions or actions of healthcare institutions (Iyer, Levin, Shea & Ashton, 2006). revisal occurs intentionally by malicious staff and is preventable by having monitoring systems such as CCTV cameras in safe rooms. Accidental alterations occur in some cases such as virus attacks on databases, star(p) to restriction of digital uses that may expose information to such. Destruction of data is likely to occur in any organization in form of crises such as fire, system failure, or virus attacks. Luckily, these are preventable by having fire-fighting equipment, computer back up systems and proper anti-virus software, or in the case of electronic data loss, data recovery m echanisms are available.It is evident that most of the policies applied in data
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.