Tuesday, June 18, 2019
Security audit assignment Example | Topics and Well Written Essays - 750 words
Security audit - Assignment Examplesafeguards protect the confidentiality of information through enacting various policy regulations that must be followed by the organizational employees. First, the presidency policy provides that the records consisting of confidential information related to patients or any other stakeholder to the wellness institution should be disposed off immediately and in agreement with the information auspices procedures outlined. The information disposal procedures provides that once the confidential information that has been dispensed with, the user should dispose the information through shredding the papers if the record was in print, or formatting the hard disc for computerized information. Disaster recovery has also been taken c atomic number 18 of in the health institution. All important information are backed up in the back-up disks and stored in a lock-and-key safe, accessible only to the It manager of the hospital.Risk Management process is adequate ly implemented by the health institution. The risk management measure that is offered by the organization is the restriction on the information that should be posted online both regarding the employees or the clients to the health institution. Thus, the information security regulations have prohibited posting online information related to the social security number, driving license number, credit or debit card number, medical status, phantasmal or sexual orientation information related to anyone.Facility security is adequately catered for in the health institution. The staff gate has a technology governance that identifies the staff through their badges, and only then will the door open to allow entry or exit. On the main gate used by the public, physical security measures include personal identification through the personal ID, which is registered at the entry. The organizational regulation provides that employees are liable for disciplinary action, if they are touch on in any b reach of the policies and procedure guiding the protection of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.