Example of an effective enforcement of security policies

Assignment Help Other Subject
Reference no: EM13844447

1. Please read the Critical Infrastructure Case Study below.

2. You have been hired by the Veterans Affairs (VA) to address and write a policy to ensure that this kind of activity does not happen again.

3. Write a 1 page policy to deals with the problems

• Minimum of 2 outside sources
• Follow APA guideline

Critical Infrastructure Case Study

A report in March 2010 indicated that the Veterans Affairs (VA) department had a security breach. The breach involved a physician assistant who was accused of copying two sets of recorded patient data onto a personal laptop. The assistant was doing research. One set included three years of patient data and another held 18 years of medical information.

There was an incident with the VA in 2006 in which 26.5 million patient records were downloaded to an unsecured computer. Later that computer was stolen. Because of the incident in 2006, the VA instituted new policies that all patient data stored on department computers must be encrypted.

The assistant was discovered and stopped by a nurse-scientist visiting the medical center. The nurse-scientist discovered that the physician assistant was part of an unapproved project. On February 8, 2010, the nurse-scientist reported the incident to the compliance officer. On February 26, the physician assistant resigned.

This case study is an example of an effective enforcement of security policies. Although there was an original violation of policy by the physician assistant, the breach was quickly stopped by a coworker. It's a clear indication that security awareness was at the top of the nurse-scientist's mind. The quick action of that person prevented data loss. In this case all the data was recovered.

Reference no: EM13844447

Questions Cloud

Problem regarding the negotiation plan : As representatives of the Local H-56 of the International Union of Service Workers, the following are the bargaining subjects included in our negotiation:
How emphases of financial and management accounting differ : How emphases of financial and management accounting differ. Name the six primary business functions (excluding support functions) that make up the value chain, and briefly describe each.
How can the bank reconciliation be used as a control device : How can the bank reconciliation be used as a control device? Create a spreadsheet model to show a bank reconciliation statement.
What is the name of the company : What is the name of the company? What is the industry sector? What are the operating risks of the company? What is the financial risk of the company (the debt to total capitalization ratio)?
Example of an effective enforcement of security policies : This case study is an example of an effective enforcement of security policies. Although there was an original violation of policy by the physician assistant, the breach was quickly stopped by a coworker
How critical thinking can be used in everyday life : Write a 350-word paper about how critical thinking can be used in everyday life. Include the following in your paper: Identify three lessons that you learned from this course. Describe each of them and explain why they are meaningful to you
Identify deficiencies in queensland health payroll system : Identify 5 deficiencies in the Queensland Health Payroll System project, and provide recommendations on how these deficiencies may be overcome in future projects.
Define the kernel mode in operating system : Define the kernel mode in operating system
Discuss why important to identify for estimation errors : Discuss why these three areas are important to identify for estimation errors when you are considering an investment project.

Reviews

Write a Review

 

Other Subject Questions & Answers

  How forensic psychologists used in civil legal matters

Discuss how forensic psychologists can be used in civil legal matters. Also discuss the various civil cases in which psychologists can participate, including child custody.

  Identify the topic of the argument and present that

1.consider an argument you have recently had with a friend family member manager co-worker or someone else. identify

  While nationally the crime rate is stable

While nationally the crime rate is stable or going down, the violent crime rate in Chicago has gone up remarkably over the past year. Using your sociological imagination, describe how you might research the problem, use at least two terms on methodol..

  Occurrence of crime and why people commit crime

Write a 700- to 1,050-word paper describing your personal criminological theory. Address the following in your paper: How would you explain the occurrence of crime and why people commit crime?

  Primary and secondary research methods

What is the difference between primary and secondary research methods? Provide an example of how each of these could be used.

  Supply chain inventories and profitability

A firm improves its forecast accuracy using better market intelligence. What impact will this have on supply chain inventories and profitability? Make answer as brief as possible.

  Vicarious learning in personality development

Explain how vicarious learning occurs and what are some of the things that determine whether or not a learned behavior is actually performed, and give an example of vicarious learning in personality development.

  Explain small business management and entrepreneurship

If a friend told you that entrepreneurs are high risk takers, how would you set the story straight. How are small business management different from entrepreneurship.

  Explain process to estimate information

Explain the process which you will use to estimate information that you collect. What kinds of things will you consider as you estimate the information (for example, perspective and validity)?

  Consumer food product-invested heavily-national advertising

Suppose you introduced a new consumer food product and invested heavily in (1) national advertising (pull strategy) and (2) motivating your field salesforce to sell the product to food stores (push strategy).  What kinds of feedback would you receive..

  Difference between psychology and physiology

Identify abused substances and their various effects. Include the following: Explain the psychology and physiology of addiction and identify specific drug substances covering the following categories

  What is the role of trust in the ehealth transaction

What is the role of trust in the eHealth transaction between consumers and providers, providers and payers, and consumers and public health? Name three technologies that if properly implemented, may inspire trust in the eHealth delivery model? ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd