logo

THE DEVELOPING POLICY

Insert policy verbiage here

6 Pages1084 Words17 Views
   

Added on  2022-09-08

THE DEVELOPING POLICY

Insert policy verbiage here

   Added on 2022-09-08

ShareRelated Documents
Running head: DEVELOPING SECURITY POLICIES
DEVELOPING POLICY
Name of the Student:
Name of the University:
Author Note:
THE      DEVELOPING       POLICY_1
DEVELOPING POLICY1
Overview
Regional ABC healthcare provider provides and delivers multiple remote healthcare
clinics within the entire region. The policy would help in securing the data and information of
patients and necessary confidential data (Dunn, 2015). There are higher risks of accessing
EPHI and storing EPHI. The risks include stolen login credentials, the practice of accessing
the EPHI outside the limited or restricted region, usage of EPHI in the personnel workstation,
which would give rise to improper access. A stolen laptop or any other personnel workstation
either accidentally or intentionally would have risen the increased risks of remote access
(Department of Health and Human Service, 2020). Therefore, an effective policy would help
in mitigating the risks and improves the practice of EPHI.
Purpose
The purpose of this policy is to build up rules explicitly relating to remote access to
ABC Healthcare Providers. Keeping unapproved access to organization information from
uncertain networks is of most extreme significance to ABC Healthcare Provider. This
approach is intended for medical staffs, or healthcare professionals can safely interface with
the corporate system unafraid of risk and to furnish the Company.
The main objectives of the policies are to mitigate the risks arises from the remote
access domain are as follows:
Multiple login entries
Unauthorized remote access to IT system
Confidential data are compromised
Stolen of any hardware
THE      DEVELOPING       POLICY_2
DEVELOPING POLICY2
Scope
The policy shall cover and apply to all the medical staff and the healthcare
professionals of ABC Healthcare Provider. The Contractors, voluntarily employees, vendors
of the organization, and any workstation used to connect the network of the organization are
covered under the policy (Fox & Vaidyanathan, 2016). Any other works that are undergoing
on behalf of ABC healthcare organization, starting from sending emails to viewing the
medical reports of patients, are also under the coverage of the policy. Additionally, this
policy would also cover every technical implementation used to connect ABC Healthcare
Provider.
Policy
Authorized medical staff or users must prevent or secure their login credentials and
must not share with any individuals for any reason.
If any authorized staff or workers are using the ABC healthcare provider networks in
their personnel devices, then it is their responsibility to prevent any leakage of
information (Andersson & Pettersson, 2015).
If there is found of any misconduct or any illegal activities while accessing the remote
network, then there would be strict action taken and may impact on the employment.
The appropriate usage of digital certificates which is a form of authentication
techniques for securing the SSL VPN
It is responsible for all the stakeholders of the organization to adhere to follow the
policy and implement it in practice.
There would be continual reviewing of the databases in a regular interval of time.
THE      DEVELOPING       POLICY_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Virtual Private Network (VPN) - Benefits, Risks and Components | Desklib
|14
|879
|437

Identity-Based Auditing Mechanism From RSA
|13
|2910
|12

Unit Cybersecurity Management
|14
|3497
|81

Network Security Plan Template- cyber security
|3
|451
|2880

Cybersecurity and its Importance to ABCT
|5
|959
|422

Virtual Private Network (VPN) | Literature Review
|6
|926
|72