Example of an effective enforcement of security policies

Assignment Help Other Subject
Reference no: EM13844447

1. Please read the Critical Infrastructure Case Study below.

2. You have been hired by the Veterans Affairs (VA) to address and write a policy to ensure that this kind of activity does not happen again.

3. Write a 1 page policy to deals with the problems

• Minimum of 2 outside sources
• Follow APA guideline

Critical Infrastructure Case Study

A report in March 2010 indicated that the Veterans Affairs (VA) department had a security breach. The breach involved a physician assistant who was accused of copying two sets of recorded patient data onto a personal laptop. The assistant was doing research. One set included three years of patient data and another held 18 years of medical information.

There was an incident with the VA in 2006 in which 26.5 million patient records were downloaded to an unsecured computer. Later that computer was stolen. Because of the incident in 2006, the VA instituted new policies that all patient data stored on department computers must be encrypted.

The assistant was discovered and stopped by a nurse-scientist visiting the medical center. The nurse-scientist discovered that the physician assistant was part of an unapproved project. On February 8, 2010, the nurse-scientist reported the incident to the compliance officer. On February 26, the physician assistant resigned.

This case study is an example of an effective enforcement of security policies. Although there was an original violation of policy by the physician assistant, the breach was quickly stopped by a coworker. It's a clear indication that security awareness was at the top of the nurse-scientist's mind. The quick action of that person prevented data loss. In this case all the data was recovered.

Reference no: EM13844447

Questions Cloud

Problem regarding the negotiation plan : As representatives of the Local H-56 of the International Union of Service Workers, the following are the bargaining subjects included in our negotiation:
How emphases of financial and management accounting differ : How emphases of financial and management accounting differ. Name the six primary business functions (excluding support functions) that make up the value chain, and briefly describe each.
How can the bank reconciliation be used as a control device : How can the bank reconciliation be used as a control device? Create a spreadsheet model to show a bank reconciliation statement.
What is the name of the company : What is the name of the company? What is the industry sector? What are the operating risks of the company? What is the financial risk of the company (the debt to total capitalization ratio)?
Example of an effective enforcement of security policies : This case study is an example of an effective enforcement of security policies. Although there was an original violation of policy by the physician assistant, the breach was quickly stopped by a coworker
How critical thinking can be used in everyday life : Write a 350-word paper about how critical thinking can be used in everyday life. Include the following in your paper: Identify three lessons that you learned from this course. Describe each of them and explain why they are meaningful to you
Identify deficiencies in queensland health payroll system : Identify 5 deficiencies in the Queensland Health Payroll System project, and provide recommendations on how these deficiencies may be overcome in future projects.
Define the kernel mode in operating system : Define the kernel mode in operating system
Discuss why important to identify for estimation errors : Discuss why these three areas are important to identify for estimation errors when you are considering an investment project.

Reviews

Write a Review

Other Subject Questions & Answers

  Strong correlation between armed robbery and ice cream sales

A psychology class found a strong correlation between armed robbery and ice cream sales. What could they conclude from their data?

  Analyze the major developments in international politics

Analyze the major developments in international politics and how they have evolved. Assess how the major assumptions of international relations have shaped public policy.

  Create an online application form

Gomez wants to create an online application form in which users are able to select the best calendar date that they can begin work. He should create a field named “Date you can begin employment,” and that field should be which one of the following ty..

  Apply the elements of negligence to this fact pattern

The designated units shall provide a minimum of 3.5 hours of direct care to each resident every day.  Happy Valley Nursing Facility operates an Alzheimer unit licensed by the Tennessee Department of Health. Jane Jones was a resident on this unit.

  Various relationships established by organized crime

Identify the problems presented and the various relationships established by organized crime. Describe the legal limitations associated with combating organized crime.

  Securities and exchange commission

Will the offering need to be registered with the Securities and Exchange Commission (SEC) under the Securities Act of 1933? Explain. Does your answer differ if "Shares in Learning" are issued by Private College, a proprietary for-profit institutio..

  Differences and similarities between futures and forwards

What are the differences and similarities between futures and forwards. Distinguish between exchange traded instruments and over the counter instruments

  Basic characteristics and components of religion

What are the basic characteristics or elements of religion? Can these characteristics be found in culture or daily life where they are not usually identified as religious?

  Provides clear evidence of unlawful adverse impact

Which of the following provides clear evidence of unlawful adverse impact?

  In philosophical papers it is always best to present both

three important sub-disciplines of philosophy are addressed in this course ethics epistemology and religion. for this

  Looking at childhood in global perspective

Looking at childhood in global perspective, we find that:

  Types of violations in your own life

Give an example of a time you witnessed or experienced one of those kinds of violations in your own life.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd