This assignment explores the social service aspect of a national healthcare organization, emphasizing risk assessment, mitigation, management, and compliance. It also discusses the importance of HIPAA and ISO 27001 standards in providing quality patient care.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
STRATEGIC INFORMATION SECURITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents STRATEGIC INFORMATION SECURITY..................................................................................1 INTRODUCTION...........................................................................................................................1 Main body........................................................................................................................................1 Health information and matters related to the privacy and security-..........................................1 Information security programme.................................................................................................1 Proper identification of the security and the privacy requirements............................................2 Information security policy.........................................................................................................3 Phases of the security policy development.................................................................................3 The system checked as per the accordance with the HIPPA compliance-.................................4 Layered approach to privacy and security..................................................................................4 Risk management assessment process........................................................................................6 Increasing of information security with management of roles and responsibility.....................7 CONCLUSION................................................................................................................................9 REFERENCES................................................................................................................................2
INTRODUCTION The term strategic information security defines objectives of an organisation. To maintain confidentiality of matter relating to business enterprise is essential for its growth and success. The company should focus on protecting data assets. It is necessary to build and maintain security programme of an organisation. In hospital, it is very hard to management because in this there are number of department with the variety of patients. In this file, there is description of the strategic information security of health organisation of National health service (Ahlholm. f., 2013). The data system ofbusiness enterprise should be well secured so that can be protected fromunauthorizedaccess.varioustopicshavebeenaddressedinthisassignmentlike improvement, risk management and to maintain integrity and confidentiality of services. Some kind of important information should be in access ofone person only. The National health services is taking various initiative in regard to maintain essential security of organisation. Main body Health information and matters related to the privacy and security- National health service is a kind of the social service which is taking various steps in relation to maintain the privacy of the patient record so that relationship exist between the diligent and with physician in the healthcare can be improvised. In this person should share the right kind of information to the medical practitioner so he/she can help him to diagnose the illness properly. To create trust and understanding between both of the hospital administration should overlook to maintain the confidentiality in the matter relate to their illness. It is the duty of the hospital information security programme for making improvement on the health care policies which are essential in the relation towards the maintaining patient privacy (Al-Alawi and et.al., 2016.). It is very hard to maintain the matter confidential because it passes with the help of the electronic medium. It isone kind of the challenge with regard to maintain the integrity and availability of the data. The NHS is a social care department which are working as treating the number of patients to make security management plan in order to have privacy and security in the data of the patients. Information security programme The information security programme should be taken in the health care organisation. This thing can be done on the basis of the proactive approach it helps in the way to have protection with regard to have unauthorised access. The identification of the process can be done on regular 1
basis. The administration should have their eyes on this matter in the regular basis. It is very essential to understand the subject matter and taking various steps in relation to make effective security management plan (Cooper, 2017). There are the various elements in order to make efficient and well defined secures plan in context of strategic data protection are: 1.Making number of implementation in relation to maintain the information security management program. 2.Development and proper identification of the security policies and the number of the procedures. 3.Make proper determination of the role and responsibilities of the various department to have protection in term to unauthorised assessed of the sensitive data of the patient. 4.The staff of the medical organisation should be effective trained that they maintain the work of the firm in the strict and discipline manner. 5.The working of the security staff should be well monitored and checked on the regular basis. In order to make this process more effective the management programme of the NHS is inclusive of eh three strategies are as- 1.Proper privacy and security programme. 2.Risk management 3.compliance The risk management strategy should work in well and effective manner in order to make well objective in relation to have proper identification and assessing the data from unauthorised access. The security control management are required to deal with the risk are as risk mitigation and risk avoidance. The effective benefit of the risk management strategy is to allow the hospital to make informed decision regarding the allocation of the different security resource and this kind of activity helps in manner to have improved data protection. The audit logs of the organisation should be well secured in relation to have protective data. Proper identification of the security and the privacy requirements The proactive approach should be opted by the health care organisation in order to deal with the security and the privacy instead of being reactive. The health organisation needs to do theactivity in such manner which can developboth kind of the approaches as preventive and proactive at the same time, so, the risk of the data assess can be well secured from unauthorised 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
accession of the information. In order To make this process various information security management programme are undertaken. The security programme is carried by the certain standards as such ISO 27001 and ISO 27002 for the terms like information management system and security techniques programme (Santee, 2017). The NHS should adopt the security standard of the ISO 27001 in order to make privacy regulation of HIPAA which deals with the health insurance portability and the accountability act. This function helps inmanner to make determination between the security policy and risk management. The approval from the senior management should be taken to make security and privacy policy it helps in the way to have risk assessment and treatment. These things are to be handled on the basis of the priority manner. Risk mitigation and risk avoidance are important measures which help in making the function in the properly analytical and cleared style. This kind of the data protection services should be based on the encryption standard. This function helps in the manner to have protection in related to the information and maintain the confidentiality of the data. Information security policy This function defines the various roles, responsibilities and procedures which are required to safeguard the information system (Yeow, Yuen and Loo, 2013). It is also inclusive of the policies in relation to the personal health info of the patient and this should be properly coalition of the information with business strategy of the hospital. The information should be passes in accordingly in the well and properly analysed manner. The legislature, and regulatory framework should also take their valuable step withtheview to maintain the information privacy and the security. Phases of the security policy development There are various kinds of stages in relation to the security policy development are as- Acquired executive support-At the time of making implementation and drafting there should have effective support (Sousa, Costa and Manso, 2013). The involvement of the senior executive management is very essential in relation to have policy development. Drafting and engagement-At the time of making draft of the security those people who get affected by Such policy can open the draft and review the content in relates to this matter so important information can have in this regard. 3
Review-To have the accurate and corrective information of the senior management should review the security in order to make policy draft in well-defined and corrective manner (Olijnyk, 2015). The changes can be made at the time initial stage. Approval and implementation-The approval can be taken with the help of the higher authority in relation to the making regulation of the policy development. The communication should be in the proper manner in the organisation (Rhee, Kim and Ryu, 2009). After having the approval, it is essential to implement the process as per the action plan to reach compliance and it can be monitored in the well-defined process. Maintenance and review- After completion of the all above process the policy should be maintained and review function is to be done on the regular periodical basis as per the changing environment, technologies, policies and business strategies. The system checked as per the accordance with the HIPPA compliance- This system of protecting information security and privacy ofconfidential method of medical reports of the patients should be in accordance with the rules and responsibilities under the department of the HIPAA. This is working towards the activities of making these activities as per the health insurance practice and managing the health information because firm in moving slowly to the electronic based manner. This is very helpful with regard to protect the data of patients and provide them the best quality of care. This activity helpsto enhance patients trust on the social service department of National health service. The matter of the confidentiality should be maintained in relation to enhance patient care in the good manner. To have the better risk management and assessment can be done with the help of the department of the HIPAA (Santee, 2017). They help in defining the accurate advise at the time of the potential risk. The security measures should be taken in relation to maintain the security and deal with the problem in relation to the threats and vulnerabilities. Layered approach to privacy and security Privacy is the main issue that can build strong relationship between care users and providers. It is very important that patients share their medical issues with the practitioner properly do that doctors can give them quality treatment. Information system can support in managing records of patients effectively but due to security issues nursing staff fails to manage this data properly. This kind information security and use of advanced technology can be beneficial in keeping the data secure and increasing trust of users on medical professionals. That 4
may support in improving their health and minimizing their health issues. But due to data leakage people do not share their problems with them intheproperly manner.(Chapman, 2017). The main risk that take place in the NHS and health and social care entities are administrative, physical and technical issues. It is essential forNHS to make effective control over these risks so that overall working of social services can be improved. Encryption of data cannot be able to perform well until there is an effective administrative control. It helps in maintaining data confidentiality. NHS needs to provide proper training to its staff members so that they can know about data protection and security. Physical control is another most important part of social services. Health and social care organisations need to adopt multi layered approach that assists in providing high performance hardware security. With the help of this tool NHS can handles complex threats and vulnerabilities easily (Al-Alawi, Al-Kandari and Abdel-Razek, 2016). It is the way that supports in re-busting of system. That assists in improving performance of hardware system. ď‚·NHS needs to use advanced encryption standards in order to improve their performance level. With the help of this, cited firm will be able to maintain confidentiality of private information. ď‚·Anti-theft application is another relevant option through which risk of informationcan be minimized in the social service companies. This technology supports in mitigating issues related to loss of sensitive information in the network. ď‚·In order to maintain integrity in the system NHS needs to use execution technology. That can assist in protecting sensitive data and minimizing risk. ď‚·Health and social care sector is the industry in which companies like NHS needs to manage remote desktop. NHS should maintain security measures and compliance as well. Entities which are engaged in the health and social services, they must deal with sensitive information. Encryption can be considered as effective counter measure that helps in maintaining security in the social service companies (Ahlholm, 2013.). With the help of this technology NHS can protect their data and can manage their sensitive information effectively. Most of the hospitals are facing issues in which they feel unable to keep secure their confidential details. 5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Risk management assessment process The risk management is the important aspects in relation maintain the control of the hazardous process which are inclusive of the functions like security purpose, legal issue and the safety concerns. It should be monitored on the regular basis to have the updates. This process should be followed in the effective manner in relation to the process of risk management which are based on the identification of threat and then defining the measure to have effective security aspects in the organisation (Zafar, 2013). His all function should be appropriate in order to deal with risk management of the firm. The data security risk management is kind of the coordinated activity in which identification of the type of the hazard can be identified, analysed and addressed in the easy manner the privacy legislation should be enhanced to reduce the problem of the breaches of the information confidentiality and security measure relates to it. The Proper identification should be made in relation to identification of the assets which are important with the context of the health care business needs which is to be evaluated in the well manner. 6
Increasing of information security with management of roles and responsibility Hospitality businesses needs to dominate information security which is required to set different roles and responsibilities. In this aspect, various people included who participates to accomplish security task with management structure. In the NHS, roles and responsibilities need to be clear for every person to maintain effective information activities. Further, healthcare employees have also pursued some specific obligation with specific policies and control employment. Healthcare workers need to take proper training to take proper medical care from qualified doctor to manage their conditions. Further, risk of them also need to be transmitting for patient and other people. Healthcare worker also counselled about information and facilities that enable to perform duties without ascertain risk. Information towards security manager 7 Illustration1: Risk assessment process (source:Sousa, Costa and Manso. 2013)
Information security manager of the chosen health care need to be assigned one senior manager who is responsible to create staff awareness and training for them as well. He/she should beresponsible to develop security policy,aim and connectivity with objectives. This is effective business strategy for information safety manager in NHS. Manager also works to make progress of implementation and drafting security program and address issues. Threats and incident to the management also cater that required to work in business. Compliance officer OfficeroftheNHSneedtomakeindependentinformationsecuritymanagement program. With the help of policies and procedures, they have responsible to review and monitor in accordance with the best security and practices. Compliance also assured with legislation and guidelines to govern health care security. Information technology users Information technology users in NHS also responsible to follow all security policy and procedures with the physical as well. In addition to this, they are also responsible to report security incident to information technology manager andneed to understand code of conduct with details information technology and policies standards as well. Information technology users need to make security also important part for every person in chosen business to adopt security procedures (Zafar, 2013). Operational duties In NHS, administrators also oversee human resource activities that create and manage ethics program facility to allocate resources. In addition to this, in different department leaders accountable to defines outcomes to concern different duties. Promote positive mental, physical and nutritional health To make effective functions and operations, NHS also create positive results to satisfy each patient. In this aspect, they play role to ascertain more profits and revenue at workplace. Personal care also undertakes in this way so that it required to make hygiene and comfort assistant in business unit. It creates opportunity to develop profits and revenue at workplace towards appropriate foundation degree (Zafar, 2013). Aware about maintenance personal records 8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Healthcare workers need to aware about requirement of each patient. Therefore, they can demonstrate proper treatment against diseases through maintains personal records. In specific circumstances, health and safety people also need to ensure safe work practices. This role plays a vital role to keep proper security in NHS. CONCLUSION The information security and privacy legislation plays the crucial role in relation to maintain the patients’ confidentiality and privacy in the health care organisation. This study has been focused on the aspect of social service of the National health care organisation. This process is covered the following things like the risk assessment, mitigation, management and compliance as per rules and responsibilities of the HIPAA department. In addition to this there is also give the ISO 2700 standard with should be op by the NHS to have the effective and efficient service in the health organisation and initiative steps should be taken for providing the quality patient care. 9
REFERENCES Journal & Book Ahlholm, T., 2013. Tietoturvallisuusnäkökohtien vaikutus muutostiedostojen hyväksymiseen avoimen lähdekoodin ohjelmistoprojekteissa. Al-Alawi, A.I., Al-Kandari, S.M. and Abdel-Razek, R.H., 2016. Evaluation of Information Systems Security Awareness in Higher Education: An Empirical Study of Kuwait University. Al-Alawi, A.I., Al-Kandari, S.M. and Abdel-Razek, R.H., 2016. Evaluation of Information Systems Security Awareness in Higher Education: An Empirical Study of Kuwait University. Chapman, C.L., 2017.The influence of leadership on business continuity planning: A qualitative phenomenological study(Doctoral dissertation, University of Phoenix). Cooper, P.K., 2017.Organisational Security Threats Related to Portable Data Storage Devices: Qualitative Exploratory Inquiry(Doctoral dissertation, University of Phoenix). Olijnyk, N.V., 2015. A quantitative examination of the intellectual profile and evolution of information security from 1965 to 2015.Scientometrics. 105(2). pp.883-904. Rhee, H.S., Kim, C. and Ryu, Y.U., 2009. Self-efficacy in information security: Its influence on end users' information security practice behavior.Computers & Security. 28(8). pp.816- 826. Santee, C.D., 2017.An Exploratory Study of the Approach to Bring Your Own Device (BYOD) in Assuring Information Security(Doctoral dissertation, Nova Southeastern University). Sousa, P., Costa, J. and Manso, V., 2013. Practical Approach for Data Breach Cases in ERP Systems.Organisational, Legal, and Technological Dimensions of Information System Administration. Yeow, P.H., Yuen, Y.Y. and Loo, W.H., 2013. Ergonomics issues in national identity card for homeland security.Applied ergonomics.44(5). pp.719-729. Zafar, H., 2013. Human resource information systems:Information security concerns for organisations.Human Resource Management Review.23(1). pp.105-113.
Online Theriskassessmentprocess,2017[Online].Availablethrough:< http://www.genre.com/knowledge/blog/steps-to-a-good-risk-assessment-en.html>. [assessed on 21stAugest]. 2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.