Your SlideShare is downloading. ×
Information security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Information security

397
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
397
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
14
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Information Security
    • Protecting Electronic Information is Everyone’s Responsibility
  • 2. The HIPAA Security Rule
    • Designed to protect Electronic Protected Health Information (EPHI) .
    • Three principles for protection of EPHI:
      • Confidentiality (keeping it secret)
      • Integrity (keeping it from being improperly altered or destroyed)
      • Availability (making sure it is readily available to those who need it to perform their jobs)
    • Administrative, technical and physical safeguards
    • Federal Law
    • Penalties (fines & imprisonment)
  • 3. Plans & Policies to Protect EPHI
    • Electronic Information Protection Plan
    • Technology Usage Policy
    • E-mail Usage Policy
    • HIPAA Information Security
    • Policies and Procedures
    • Progressive Discipline Policy
    • Required Annual Training
  • 4. Your Role in Protecting Information
    • Confidential logins/passwords
      • Your Confidential Password is the First Line of Defense in Protecting Electronic Information!
      • Choosing a STRONG password.
        • at least 6 characters
        • at least one number and one special character (non-alphabetic symbol)
        • at least one capital letter
  • 5. Examples of a Strong Password MickeyMinniePlutoHueyLouieDeweyDonaldGoofySacramento 8 characters, 1 capital Mary had a little lamb! Why are you late? May I help you too? Phrase Mh@l1! Mihy2? Yrul8? Example Time I get up Engine size $1000 Instead of No. of pets England John 3:16 Instead of @5:30Am Cats+4 427Cu" Eng1@nd 4X$250 John3:16 children My4kid$ first car #1Ford Derrick Thomas (Hief58 Tickler Use the first letters of each word in a phrase, adding a letter or a symbol... Password Password Password (NOT a personal identifier like your employee number or social security number) and insert or add a letter and a number. from a song, a poem, a Bible verse, popular saying, geographic name or any other word of your choosing. Substitute a number or symbol for one of the letters, or insert a number or symbol in the middle of the word. like first car or favorite sports player.  Insert a number or special character in place of some of the letters.  While you should never write down a password, you can write down a tickler (reminder) phrase.  For example: Pick numbers that have meaning to you... Pick a favorite word.. Pick a little known fact about yourself...
  • 6.
    • No illegal, commercial,
    • fraudulent, or harmful activity
    • No unlicensed software
    • Log out of applications
    • Location of computers
    • Take responsibility for information you access
    • Appropriate Internet use
    Your Role in Protecting Information and Systems
  • 7. Specific Email Guidelines
    • Primarily for business and appropriate personal use
    • Chain email and excessive FW: prohibited by policy
    • Abuse of hospital email address affects all of NKCH
    • Keep it clean and professional
    • All inbound email is scanned for malware and content
    • Encrypt outbound confidential information (EPHI)
    • All email is property of NKCH
    • Be wary of e-mail from unknown or strange address
    • Never open attachment unless expected and from known source (virus possibility)
    Shark Infested Waters!
  • 8. Running a Tight Ship
    • Computer System User Responsibilities
      • Use information appropriately and only for job duties
      • Comply with all policies
      • Do not disclose EPHI or any information unless authorized
      • Keep logon/password confidential
      • Report computer problems and security concerns to Help Desk ext. 4357 “HELP”