Sample Essay on:
Internal IT Security in a Healthcare Organization

Here is the synopsis of our sample research paper on Internal IT Security in a Healthcare Organization. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 3 page paper looks at an issue concerning internal IT security for a healthcare organization. The organization is facing problems with patients records being accessed by unauthorized staff. The paper looks at the different measures which may be adopted to reduce or prevent the unnecessary accessing of patient files. The bibliography cites 4 sources.

Page Count:

3 pages (~225 words per page)

File: TS65_TEIThealthsec.doc

Buy This Term Paper »

 

Unformatted sample text from the term paper:

totally secure. While a great deal of attention has been paid to threats such as hacking and other external threats, a serious concern for many organizations are internal threats. With increasing complex data laws as well as ethical obligations, firms need to protect the confidently of their customers data. This is particularly true in medical environment, with the need to protect the confidentiality of patient records (Colling, 2009). If an organization has a security issues with staff members inappropriately accessing patient records there are a number of measures that can be taken to reduce the problem. It should be noted that this type of problem needs to be dealt with at both a practical level in terms of security measures, as well as a cultural level, with employees understanding the difference between appropriate and unappreciated accessing of records. The first consideration may be the practical controls. Practical controls may include ensuring that there is the correct use of passwords, the use of different type and level authorization and the logging of which users are accessing patient records. Each of these may be considered separately. Passwords are a basic security measure, which are in place in most organizations. In order to access any of the organizations system which are not available to the general public, which will include the patient records it should be necessary for the user to log in with a user name and matching password. The passwords given should be unique to each individual user, without this there is an inability to hold any individual accountable for any breaches. By ensuring that user names and passwords are unique the system has the ability to manage and monitor the individual users. For the password system to operate it is most effective is the users have strong passwords, these ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now