We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Information Sensitivity and Protection Policies of Different Organizations Essay Sample

essay
  • Pages: 3
  • Word count: 773
  • Rewriting Possibility: 99% (excellent)
  • Category: policy protection

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

Introduction of TOPIC

            The information generated by organizations always has certain levels of confidentiality depending on the risk and dangers involved upon disclosure of the data. It is therefore appropriate that information security policies are implemented within the organizations. Beth Israel Deaconess Medical Center (BIDMC), Mayo Foundation and Georgetown University Medical Centers have employed such security policies.

            The BIDMC policy encompasses all data available in their technology resources. Information on this organization is mainly for research and related literature that can help further the development of projects and professionalism of its employees. Security is tight concerning outsiders who are not part of the organization. However, within the BIDMC, information is almost available to everyone. This can be perceived with their no expectation to privacy policy wherein the employees should not assume that the information they upload into the system is private rather, the uploaded information can be available to everyone (BIMDC Policy).

            On the other hand, the Mayo Foundation policy involves not only information for research in general but also patients’ information. The foundation is strict in implementation of the policies involving the medical records of patients. Violations are strictly reprimanded by termination of employment and criminal persecution (Mayo Policy). Unlike the BIDMC policy, the foundation’s policy is very specific and meticulous. Even outgoing and incoming emails and viewed websites by the employees are monitored by the office in charge of information security (Mayo Policy).

            Meanwhile, the Georgetown Policy precisely comprises health information of patients. It does not include any research litera

ture as the Mayo and BIDMC policies. The policy only limits the information protected to patients’

Sorry, but full essay samples are available only for registered users

Choose a Membership Plan
medical and other related data (Georgetown Policy). It also focuses on not only electronic but also other forms of information storage and transport such as oral and written forms. Because of this, the records are very confidential and not easily accessible to everyone. Levels of access are maintained and limited people can only view the information. Even this limited people need to acquire permits from the management before they avail of the information.

            All the organizations protect information that is vital to the transactions done by each. Therefore, protection and security are very significant. Nevertheless, each organization has a different set of information, which they protect. For example, BIDMC protects all sorts of information from general information to medical records that can be of help academically to its employees. Mayo on the other hand, protects patients’ information for use in transactions requiring medical benefits of the patients involved. Whereas, Georgetown only protects medical information of patients that are admitted to the medical center or are part of research projects of the medical center.

            In the three policies, however, emphasis is given on the unsafe characteristics of e-mail. Each organization discourages the use of email for information dissemination especially of very confidential information. In the BIDMC and Mayo policies where information storage facilities are mostly electronic, management recognizes the need for passwords that are not prone to hacking. Nonetheless, the BIDMC policy prohibits the use of encryption within the system in line with their no expectation of privacy policy while Mayo foundation encourages encryption. Georgetown policy is significantly different from the two policies since it particularly handles medical records. These medical records are only accessible if the persons asking for permission are involved in the treatment of patients. Another difference between the three policies is the bestowal of responsibility for the protection of information. BIDMC only has a chief information officer; Mayo has a group of people collectively known as the Foundation Information Security Subcommittee while Georgetown only has a Privacy Official responsible for the transport and security of information from the organization.

References

Beth Israel Deaconess Medical Center. (2007). Beth Israel Deaconess Medical Technology Resources Policy.Retrieved May 11, 2008, from http://www.himss.org/content/files/CPRIToolkit/version6/v6%20pdf/D39a_Beth_Israel_Deaconess_Medical_Center_Technology_Resources_Policies.pdf.

Georgetown University Medical Center. (2003, April 12). Georgetown University Protection of Health Information Policies and Procedures Manual. Retrieved May 11, 2008, from http://www.himss.org/ASP/privacySecurityTree.asp?faid=78&tid=4 and http://www.georgetown.edu/policy/hipaa/privacy.html

Mayo Foundation. (2002, September 9). Mayo Foundation Information Security Policies and Standards. Retrieved May 11, 2008, from http://www.himss.org/content/files/CPRIToolkit/version6/v6%20pdf/D39e_Mayo_Foundation_Information_Security_Policies.pdf.

We can write a custom essay on

Information Sensitivity and Protection Policies of ...
According to Your Specific Requirements.

Order an essay

You May Also Find These Documents Helpful

The Thucydides Trap – Foreign Policy

Introduction: In the real-world division of power between two superpower states is not really possible. But it is still a threat to the ruling states from the rising power state. But if we go back to Machiavelli’s state of nature then we must need to agree that the prince can do whatever he needs to do to keep the power since he can’t trust anybody. Power is the center to rule the state and to be secured from the enemy. On the other hand, if we take the opinion of Thomas Hobbes then we must need to agree that the state of nature is the state of war. The state always needs to be secure from its enemy. Because there is no common power exist or there is no law. So, by gaining power is the only way to secure the state. To answer the question, I want to make...

How serious case reviews inform practice?

Some of the results of serious case reviews show that there were no policies and procedures in place to safeguard children and staff or there was violation of policies which led to cause death or gave serious harm to children by abusing or neglecting them. For example, there are a number of lessons to learn from the review of Vanessa George case who abused children under her care at Little Ted\'s nursery. Where some policies were not in place and others were not being followed. Safeguarding Training: The staff working at little teds nursery had no safeguarding training. Venessa George used to share inappropriate pictures (pictures of sexual activities) with the other members of staff. If the members of staff had safeguarding training, they could have been able to blow the whistle against sexualised behaviour of Venessa George. "Staff had attended no safeguarding training.\"  Nurseryworld,2017 This informs practice of early...

Central banking and monetary policy

1.1 Background Central banks were first established in the 17th century, with the primary purpose of providing war finance to governments and managing their debts. Their role in the economy has since evolved in a very different direction. Central banks perform several tasks such as; providing settlement services to large-value payments, oversee banks for the sake of financial stability, act as lenders-of-last-resort and implement monetary policy. These tasks and their mode of operations have been repeatedly redefined in order to resolve specific monetary and financial crises. Central banking is nowadays primarily an agency for monetary policy. It usually also has important financial stability functions, and those become more prominent during times of financial turmoil. 1.2 Objective of research The rise of China has resulted into unique ways a financial system can grow to solve financial and monetary challenges across developing countries. This paper tries to illustrate the following points The...

Popular Essays

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?