Data Privacy and Security Term Paper

Total Length: 2026 words ( 7 double-spaced pages)

Total Sources: 3

Page 1 of 7

Security Management Plan

John's Hospital

Privacy of client information is an assurance that every patient wants and this assurance is what the hospital can build patient confidence on. The lack of it therefore may have consequences such as loss of confidence in the hospital, loss of clientele and the emergence of a poor reputation. This paper looks at the St. John's Hospital which has experienced the leakage of confidential information a problem that needs to be addressed. It highlights the steps the hospital must take in its management plan. In the first step, hospital must identify how widespread the problem is and where exactly there are weaknesses in the system. Secondly, the hospital's staff must receive adequate training in methods to deal with confidential information especially its destruction. A culture must be developed to deal with this information discreetly. In this same breadth breach must be understood by all staff as far as HIPAA is concerned. The hospital must also include methods of protecting information held from natural disasters. An information technology plan that makes room for offsite backups would work well here. The plan must also receive support right from the top of the organization's chain of command so as to be adopted throughout the organization. As with any other change, there are challenges highlighted in the paper that the hospital can anticipate. Resistance to change, inadequate resources to carry out the plan, lack of proper communication systems are just some of these challenges. However with support from the board, these challenges can be overcome.

Introduction

It is in the interest of every organization to ensure the security of its information. There can be grave consequences when information is handled carelessly.
An organization can lose the trust of its customers, and in the case of hospitals, patients will seek help where they feel that their information is not kept private. Therefore, in order to ensure that there are minimal risks of litigation, the business reputation is protected and profitability remains unaffected, security of information must be made a priority. A management plan ensures this by bringing together all the necessary processes, policies, technology and structures needed. It also ensures that where these are in place, there is an ongoing check to ensure that they are working. Organizations face the problem of information leakage, be it customer information or organizational secrets, every day. Rhodes (2009) proposes that there should be a breach notification process, and this will form part of the information security plan in the management plan.

Statement of the Problem

At St. John's Hospital, the issue of the leakage of confidential patient information needs to be attended to. Important information on patients in print form is left in accessible areas, where the cleaners have been able to read through it. This paper will look to address this issue by providing ways through which the hospital can protect this kind of information on a continuous basis.

Analysis of Response to the Situation

Those in charge of the information systems at St. John's Hospital can start this process by doing a thorough check on the current information security in place. This will involve establishing whether there is adequate security in existence and whether there are any loopholes, which need to be addressed. Thus, threats to security will be identified......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


Related Essays

Social Media Postings and the Internet Privacy

S., (2018). Data Privacy and Security Questions Answered with Scott Macdonald. Retrieved August 24, 2018 from https://www.ebsco.com/blog/article/gdpr-data-privacy-and-security-questions-with-scott-macdonald This is a journal article retrieved from EBSCO. Indeed it is an excerpt from an interview that was conducted with the vice president of information security and platform operations. It gives a technical and real life experience of the world of internet security, hence useful in this research. Ayala D., (2017). Dealing with the Loss of Internet Privacy. Retrieved August 24, 2018 from https://www.proquest.com/blog/pqblog/2017/Dealing-with-the-Loss-of-Internet-Privacy.html This is an article from ProQuest written by a contributor who… Continue Reading...

sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Data Privacy And Security" (2015, November 30) Retrieved April 27, 2024, from
https://www.aceyourpaper.com/essays/data-privacy-security-2158560

Latest MLA Format (8th edition)

Copy Reference
"Data Privacy And Security" 30 November 2015. Web.27 April. 2024. <
https://www.aceyourpaper.com/essays/data-privacy-security-2158560>

Latest Chicago Format (16th edition)

Copy Reference
"Data Privacy And Security", 30 November 2015, Accessed.27 April. 2024,
https://www.aceyourpaper.com/essays/data-privacy-security-2158560