We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Information Sensitivity and Protection Policies of Different Organizations Essay Sample

essay
The whole doc is available only for registered users OPEN DOC

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

Information Sensitivity and Protection Policies of Different Organizations Essay Sample

            The information generated by organizations always has certain levels of confidentiality depending on the risk and dangers involved upon disclosure of the data. It is therefore appropriate that information security policies are implemented within the organizations. Beth Israel Deaconess Medical Center (BIDMC), Mayo Foundation and Georgetown University Medical Centers have employed such security policies.

            The BIDMC policy encompasses all data available in their technology resources. Information on this organization is mainly for research and related literature that can help further the development of projects and professionalism of its employees. Security is tight concerning outsiders who are not part of the organization. However, within the BIDMC, information is almost available to everyone. This can be perceived with their no expectation to privacy policy wherein the employees should not assume that the information they upload into the system is private rather, the uploaded information can be available to everyone (BIMDC Policy).

            On the other hand, the Mayo Foundation policy involves not only information for research in general but also patients’ information. The foundation is strict in implementation of the policies involving the medical records of patients. Violations are strictly reprimanded by termination of employment and criminal persecution (Mayo Policy). Unlike the BIDMC policy, the foundation’s policy is very specific and meticulous. Even outgoing and incoming emails and viewed websites by the employees are monitored by the office in charge of information security (Mayo Policy).

            Meanwhile, the Georgetown Policy precisely comprises health information of patients. It does not include any research literature as the Mayo and BIDMC policies. The policy only limits the information protected to patients’ medical and other related data (Georgetown Policy). It also focuses on not only electronic but also other forms of information storage and transport such as oral and written forms. Because of this, the records are very confidential and not easily accessible to everyone. Levels of access are maintained and limited people can only view the information. Even this limited people need to acquire permits from the management before they avail of the information.

            All the organizations protect information that is vital to the transactions done by each. Therefore, protection and security are very significant. Nevertheless, each organization has a different set of information, which they protect. For example, BIDMC protects all sorts of information from general information to medical records that can be of help academically to its employees. Mayo on the other hand, protects patients’ information for use in transactions requiring medical benefits of the patients involved. Whereas, Georgetown only protects medical information of patients that are admitted to the medical center or are part of research projects of the medical center.

            In the three policies, however, emphasis is given on the unsafe characteristics of e-mail. Each organization discourages the use of email for information dissemination especially of very confidential information. In the BIDMC and Mayo policies where information storage facilities are mostly electronic, management recognizes the need for passwords that are not prone to hacking. Nonetheless, the BIDMC policy prohibits the use of encryption within the system in line with their no expectation of privacy policy while Mayo foundation encourages encryption. Georgetown policy is significantly different from the two policies since it particularly handles medical records. These medical records are only accessible if the persons asking for permission are involved in the treatment of patients. Another difference between the three policies is the bestowal of responsibility for the protection of information. BIDMC only has a chief information officer; Mayo has a group of people collectively known as the Foundation Information Security Subcommittee while Georgetown only has a Privacy Official responsible for the transport and security of information from the organization.

References

Beth Israel Deaconess Medical Center. (2007). Beth Israel Deaconess Medical Technology Resources Policy.Retrieved May 11, 2008, from http://www.himss.org/content/files/CPRIToolkit/version6/v6%20pdf/D39a_Beth_Israel_Deaconess_Medical_Center_Technology_Resources_Policies.pdf.

Georgetown University Medical Center. (2003, April 12). Georgetown University Protection of Health Information Policies and Procedures Manual. Retrieved May 11, 2008, from http://www.himss.org/ASP/privacySecurityTree.asp?faid=78&tid=4 and http://www.georgetown.edu/policy/hipaa/privacy.html

Mayo Foundation. (2002, September 9). Mayo Foundation Information Security Policies and Standards. Retrieved May 11, 2008, from http://www.himss.org/content/files/CPRIToolkit/version6/v6%20pdf/D39e_Mayo_Foundation_Information_Security_Policies.pdf.

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

The Thucydides Trap – Foreign Policy

Introduction: In the real-world division of power between two superpower states is not really possible. But it is still a threat to the ruling states from the rising power state. But if we go back to Machiavelli’s state of nature then we must need to agree that the prince can do whatever he needs to do to keep the power since he can’t trust anybody....

How serious case reviews inform practice?

Some of the results of serious case reviews show that there were no policies and procedures in place to safeguard children and staff or there was violation of policies which led to cause death or gave serious harm to children by abusing or neglecting them. For example, there are a number of lessons to learn from the review of Vanessa George case who abused children...

Central banking and monetary policy

1.1 Background Central banks were first established in the 17th century, with the primary purpose of providing war finance to governments and managing their debts. Their role in the economy has since evolved in a very different direction. Central banks perform several tasks such as; providing settlement services to large-value payments, oversee banks for the sake of financial stability, act as lenders-of-last-resort and implement monetary...

Probation and Parole

Faculties are not required to give make-up assignments or tests. All make up request will be considered on an individual documented, medical emergency basis only. Unless otherwise agreed upon, make-ups will not be given. Academic Integrity: University of Maryland Eastern Shore is committed to providing an educational experience designed to develop professional competencies, including habits of personal and professional integrity. The College expects all members...

Planning Permission/Policy

1:- INTRODUCTION Briggs & Mortar have commissioned Spencer Property to carry out a local survey for land in Withernsea, which could be used for their latest project. The inspection was carried out on 9th February 2004, by Mr Whiteley. Brief a. Identify a suitable site for mixed-use development, including appropriate supporting local plan policies, whether they are site specific or general. b. Give appropriate design...

Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Couldn't Find What You Looking For?

Get access to our huge knowledge base which is continuously updated

Next Update Will Be About:
14 : 59 : 59
Become a Member