Reference no: EM13722178
As an information systems manager, you need to consider an important aspect of your operation--patient information, privacy, and security. Review the following case scenarios and select one to use for your management plan for security and privacy.
Case Scenario 1 (Security Breach)
The administration at St. John's Hospital takes pride in its sound policies and procedures for the protection of confidential client information. In fact, it serves as a model for other institutions in the area; however, printouts discarded in the restricted-access IS department are not shredded. On numerous occasions, personnel working late have observed the cleaning staff reading discarded printouts. What actions, if any, should these personnel take toward the actions of the cleaning staff? What actions, if any, should be taken by IS administration?
Case Scenario 2 (Natural Disaster)
Living on the Gulf Coast is a benefit that many residents of this small Southern town enjoy; however, natural disasters are a concern. The town has just been struck by a hurricane and the entire basement of your operation is flooded by the storm surge. Patient files were destroyed or washed away with the receding water. What actions do you take when patients ask for their health records? What processes did you have in place to protect your records in anticipation of such an event?
Choose one of the scenarios above and develop a process for maintaining patient privacy and security.
Include a detailed management plan in the case of a security breach (Case Scenario 1) or a natural disaster (Case Scenario 2). In your plan, address the following questions:
How can you respond to these situations?
What training can you provide to your staff?
How can you implement your management plan?
Include a code of conduct with your plan. The sample code of conduct should be an Appendix to your paper.
Write a 1,750- to 2,100-word description of your facility's patient data privacy and security plan.
Use a minimum of four peer-reviewed references, not counting the textbook, that directly support your analysis.
Format your paper consistent with APA guidelines.
Newly released vulnerabilities on a daily basis
: The world has to deal with newly released vulnerabilities on a daily basis. These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber security professionals to stop that from happening.
|
A development lifecycle for an ids system
: Write a 1-2 page paper on a development lifecycle for an IDS system, including the following: Inception Configuration Deployment
|
Final deliverable (network enterprise architecture plan
: Part 1: Final Deliverable (Network Enterprise Architecture Plan) 1. Summarize network changes to network architecture. 2. Create a schedule of change milestones. 3. Include an EAP plan in your Network Enterprise Architecture Plan document.
|
How much profit was earned by the companys shareholders
: How much profit was earned by the companys shareholders, on a per share basis, at the end of the financial year - what is the total number of ordinary shares that have been issued by the company as at the end of the financial year.
|
Important aspect of operation--patient information
: As an information systems manager, you need to consider an important aspect of your operation--patient information, privacy, and security. Review the following case scenarios and select one to use for your management plan for security and privacy.
|
Equilibrium with required return equal to expected return
: Simpkins Corporation does not pay any dividends because it is expanding rapidly and needs to retain all of its earnings. However, investors expect Simpkins to begin paying dividends, with the first dividend of $1.25 coming 3 years from today.
|
Use the university of phoenix material
: Use the University of Phoenix Material: Business Model and Strategic Planning Outline as a guide to complete sections of your capstone project each week. A final paper is due in Week 5. Cite your resources.
|
What is the value per share of your firms stock
: Assume that the average firm in your company's industry is expected to grow at a constant rate of 4% and that its dividend yield is 7%. Your company is about as risky as the average firm in the industry, but it has just successfully completed some R&..
|
How has david pinder embraced ethical leadership
: How has David Pinder embraced ethical leadership to create an ethical culture at Cardinal IG? How has Cardinal's principles and values shaped the ethical behavior of employees?
|