E-Mail Security Breach? Why Did Research Paper

Total Length: 894 words ( 3 double-spaced pages)

Total Sources: 4

Page 1 of 3

The next thing is to immediately contact the FOIP Coordinator, Privacy Officer, Responsible Affiliate as well as any other person who is responsible for the organization's it security.

Evaluation of the Risks Associated with the Breach

There is a need to evaluate the risks associated with the privacy breach. This should be done with a consideration of personal as well as health information (Social Insurance Number, financial information or any other sensitive information) that are involved, the cause as well as extent of the privacy breach, the individuals who have been affected by the breach as well as the operations that have been affected by the breach.

Notification

In this stage, the team must decide whether or not to notify the people who have been affected by the privacy breach.

Prevention

At this stage, all the necessary steps are taken to prevent the system from any further privacy breaches. The cause of the breach is mended and the system is restored after thorough testing.

3. How likely do you think future security breaches would be if Kaiser Permanente did not take steps to resolve the underlying group and organizational issues? Why?

Future security breaches would be worse if the Permanente did not take steps to resolve the underlying group and organizational issues.

Stuck Writing Your "E-Mail Security Breach? Why Did" Research Paper?

This is because the same structures, processes (organizational culture) and techniques (compartmentalization) would yield the same or more serious security breaches.

4. What role should the administrative leadership of Kaiser Permanente take to ensure that KP Online is secure?.Apart from security and HIPAA training for all personnel, what steps should be taken to at the organizational level to improve the security of KP Online.

The administrative leadership of Kaiser Permanente should ensure that there are constant security checks of the KP Online system before they get deployed at the application level. The organizational culture should also encourage a centralized testing of all the system modules. Apart from security and HIPAA training for all personnel, the steps that taken to at the organizational level to improve the security of KP Online include relying on a single and uniform organizational structure that does not encourage compartmentalization......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"E-Mail Security Breach Why Did" (2012, August 20) Retrieved April 28, 2024, from
https://www.aceyourpaper.com/essays/e-mail-security-breach-75229

Latest MLA Format (8th edition)

Copy Reference
"E-Mail Security Breach Why Did" 20 August 2012. Web.28 April. 2024. <
https://www.aceyourpaper.com/essays/e-mail-security-breach-75229>

Latest Chicago Format (16th edition)

Copy Reference
"E-Mail Security Breach Why Did", 20 August 2012, Accessed.28 April. 2024,
https://www.aceyourpaper.com/essays/e-mail-security-breach-75229