Sample Essay on:
Data Security Policies: A Comparison of Three Health Care Facility Policies

Here is the synopsis of our sample research paper on Data Security Policies: A Comparison of Three Health Care Facility Policies. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

A 4 page comparison of information security documents from Beth Israel Deaconess Medical Center, Georgetown University, and the Mayo Foundation. No additional sources are listed.

Page Count:

4 pages (~225 words per page)

File: AM2_PPcmpSecurityHlth.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

will reveal both similarities and differences. This is certainly the case for documents from Beth Israel Deaconess Medical Center, Georgetown University, and the Mayo Foundation. The Technology Resources Policy at Beth Israel Deaconess Medical Center specifically allows personal use of technology resources as long as that use is "occasional", "limited" and "appropriate". Furthermore, that use can not interfere with work performance, "unduly" affect the operation of Technology Resources, or violate any other part of the Technology Resources Policy. Interestingly, the term "unduly" would seem to preclude that some impact would occur as a result of this personal use. The Policy specifically informs users, however, that personal use comes with no guarantee of personal privacy and that, in fact, the facility reserves the right to monitor any personal data. This includes email, Internet usage, and stored files. Even more interesting is the provision that all of the personal information stored on the facilitys computer system becomes the property of the facility! There are also specifically prohibited activities for personal use. These include such things as pornography, fraud, defamatory and any unlawful or inappropriate use. Nor may such use result in "personal financial gain or the benefit of any third party", waste resources, conduct untimely transfers of large files or mailings that would interfere with normal facility operations during peak times of use, misuse software, copy software, install screen savers or any other type of software on facility computers, download any type of software, or alter software in any way. The Technology Resources Policy at Beth Israel Deaconess Medical Center also devotes considerable space to clarifying what copyrighted ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now