Tuesday, December 24, 2019

Hci / 510 Systems Life Cycle - 920 Words

TaSharon L. Collins HCI/510 Systems Life Cycle September 22, 2014 Professor Eric Everard Data security is used to prevent anything that is unauthorized, and it helps to protect all of the data from any corruption. Almost daily, media reports highlight the failure of health care organizations to safeguard the privacy and security of patient data, whether electronic or paper. Preventing data breaches has become more complex, and at the same time, the fines being levied against health care organizations for violating the Health Insurance, (Zamosky, 2014).# In this paper, I will discuss the security measures, how the security measures used and how well did the security measure work. In an article, I read about the†¦show more content†¦Many healthcare facilities now find themselves in an almost paradoxical predicament: inherently insecure and complex systems are required to be supported to maintain quality of healthcare, while security by mandate must be implemented and insured, (Mulch, 2004).# What were the security measures? The security measures include password p rotection, software updates, firewalls, malware protection and Health Insurance Portability and Accountability Act (HIPAA). In order for protection of the information, it is important that the password is long with other required characteristics. Be sure to make the password strong enough so that the hacker will never be able to access our information. As for the software, it is crucial to keep computer updated. When pop-ups begin, that is a hint that the software needs an update. It is important that in the health care field, all of the systems must be protected by a firewall. A firewall either permits or blocks a requested network connection such as world wide web site, an email or a file transfer based on a set of policies determined by a network administrator or personal user, (Anonymous, 2014).# Keep the system updated at all times and watch out for malware. HIPAA is known to provide protection for the patients’ health information. Privacy is important, and it allows on ly the health care providers with the access. How are the security measures being used? In

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.