SlideShare a Scribd company logo
Security Standards, Policies, and Procedures Manual Template
Instructions: Replace the information in brackets [ ] with
information relevant to your project.
Cyber Security Engineers are responsible for safeguarding
computer networks and systems in an organization in order to
protect the sensitive data they store.
Take on the role of Cyber Security Engineer for the
organization you chose in Week 1. Research the following
information for your chosen organization. Develop a Security
Standards, Policies, and Procedures Manual using this template
with recommendations to management of security standards,
polices, and procedures which should be implemented in your
organization.UPMC Hospital
Overview
Explain the importance to your organization of implementing
security policies, plans, and procedures. Discuss how security
policies, plans, and procedures will improve the overall security
of the organization.
Security policies for UPMC Hospital are a critical part of
maintaining compliance with health standards and regulations,
such as HIPAA. A security plan will improve the overall
security of the hospital by having a written documentation
containing protocols for maintaining a secure network,
protecting sensitive patient information, and providing a policy
of encryption which will ensure secure data transmissions.
Additionally, security plans and procedures assist in
implementing a patient tracking system using secured
technology to ensure patients are not abducted.
The following policies, standards, and procedures are meant to
protect UPMC’s data security environment. These Risk
Management Policies also serve as a reference document for
employees to ensure a cohesive response is followed by all
departments and personnel in the hospital system.
Data Privacy Policies and Procedures
This policy pertains to all hospital and medical personnel who
have access to patient/hospital data and information, whether
direct or indirect. This policy is meant to protect high-level data
and information and prevent those who do not have clearance
from accessing the information. This policy also meets the
requirements of the Patient Health Information (PHI)
requirements as found in the Health Insurance Health Insurance
Portability and Accountability Act (HIPAA). UPMC has
adopted this policy to ensure that employees of the hospital are
not given too much access to systems where they have no
purpose or related duties.
Policy: Least Privilege. Reasonable effort must be taken to
ensure PHI is secure and protected when using, accessing,
requesting, and disclosing the protected information. Each
hospital department must limit access to PHI least amount of
access to data of all personnel to ensure they are only allowed
to access the least amount needed to complete their job
responsibilities.
Data Isolation Policies and Procedures
A data isolation policy will assist the overall security of the
UPMC hospital by insuring that the data is secure by instilling a
database property to control the visibility of changes made to
the system. This property also controls when and how changes
are implemented and whether these changes are visible to users,
other properties, and the overall information systems.
Implementing this property also assists with system
performance since many transactions can occur simultaneously
in isolation of each other thereby not interacting or affecting
each other.
According to Livewire.com (2019), “Isolation is an integral part
of database transactional properties. It is the third property
of ACID (Atomicity, Consistency, Isolation, Durability) and
these properties ensure that data is consistent and accurate”
(Isolation Property in a Database, p. 1). Isolation is a set of
rules that isolates transactions that are happening concurrently
so that they do not affect each other. For example, if two users
are conducting database transactions at the same time, they
system performs one transaction in its entirety, then conducts
the other transaction in its entirety, and so on. This prevents the
database from accessing data in the middle of a transaction. The
data isolation does not determine the order of transactions but
does ensure that each transaction does not interfere with another
transaction, therefore they operate in isolation.
Non-Disclosure Agreement (NDA) Policies and Procedures
The hospital non-disclosure agreement (NDA) protects the
hospital by having each employee sign a document promising to
abide by conditions related to keeping secrets and confidential
information private. An example of the UPMC Non-Disclosure
Agreement (NDA) is as follows:
I agree to follow the NDA below as a condition of my
employment in regards to receiving and accessing electronic
information, sensitive documents, proprietary information, and
trade secrets.
1. I promise to not disclose any information to a third party that
I have access to in any form.
2. I will keep my computer login and password secret and will
not share or disclose this to anyone. Additionally, I agree that
my login has the same legal weight as my signature and I am
responsible for illegal or immoral files saved on my computer. I
also agree that I cannot expect to have full privacy on my work
computer and my employer has the right to view the contents of
my computer, including my emails, at any time with or without
my knowledge.
3. I agree that I will not attempt to access records or patient
medical information that I do not have a direct need to access in
my daily duties. Additionally, I will not access co-workers,
friends or family member’s records.
4. I will change my login and password information when I have
cause to believe it has been compromised.
5. I will abide by all other confidentiality procedures and
policies while employed at the UPMC hospital.
Intellectual Property (IP) Policies and Procedures
The Intellectual Property (IP) Policy should be implemented
because it covers IP’s created while in the employment of the
UPMC hospital. This includes inventions, copyrightable works,
tangible research, and all intellectual property
(healthcare.partners.org, 2019). This protects the hospital by
ensuring that all intellectual property created using hospital
equipment, materials, and resources is granted to the hospital as
owners of the property.
Employees agree that UPMC has the first option to own any
such IP and employees are in violation of this policy if they
seek to sell, contract, license, dispose of, or otherwise commit
any IP created while employee to a third party without the
approval of the UPMC hospital Board of Directors.
Password Policies and Procedures
This policy is used to safeguard UPMC information systems and
the data contained therein and is therefore a critical policy for
the hospital. The hospital relies on password and user logins
that are unique and complex and employees are expected to
keep passwords confidential. This policy aligns with the HIPAA
regulatory requirements.
The following policy must be adhered to by all employees of
UPMC hospital:
1. Employees must never leave their workstation while logged
into the system. If an employee must attend to a patient or leave
for lunch, they are expected to log out beforehand.
2. System passwords shall never be written down and left in the
open. Additionally, password programs such as Roboform shall
never be used as a means to save logins and passwords.
3. Passwords must be changed right away upon receiving login
information, on an employee’s first day of work.
4. Employees are not allowed to share logins and any reports of
this will lead to a mandatory security report that will be housed
in the employee’s permanent employment record. Repeated
violations will lead to termination.
5. Passwords must be changed every ninety days.
6. After five failed attempts to login to the system, the user
account will be locked.
Acceptable Use of Organizational Assets and Data Policies and
Procedures
An Acceptable Use policy is important to the security of the
UPMC hospital system because it establishes overall employee
behavior when using hospital networks, computers, etc. This
policy is meant to safeguard hospital systems, data, and
information. Inappropriate use can damage or open the system
up for hacking, data theft, etc. It also sets boundaries on
employee behavior in an effort to protect patient information
and health information, which is also a requirement of HIPAA.
By having the employees to re-sign this policy on an annual
basis, it reminds them, what is and what is not acceptable use
on the hospitals data systems.
An example Acceptable Use Policy for UPMC hospital is as
follows:
This policy includes computers, e-mail, Internet usage,
software, equipment, etc.
1. Personal Use of Computers. UPMC does not allow any
personal use of their resources or data systems.
2. Employees agree that any and all data, research, etc.
conducted on hospital equipment remains the property of UPMC
hospital.
3. Employees should not expect privacy when using company
computers or email services.
4. UPMC reserves the right to examine employee computers
with or without their knowledge at any time.
5. Employees are prohibited from participating in behavior that
is classified as offensive, harassing, or illegal. This includes
posting negative comments about the hospital on social media
outlets.
6. Employees may not install any software on their computer
without the written approval of management.
7. Employees may not modify computers or network systems at
any time.
8. Failure to comply with this policy will result in disciplinary
action, up to an including termination.
Employee Policies and Procedures (Separation of
Duties/Training)
UPMC will benefit from segregation of duties because this
policy will assist in preventing fraud and errors by separating
duties so that one person is not in total control of an internal
procedure. This puts a check and balances system into the
hospital environment and protects the patients, employees, and
the hospital as a whole.
All employees will participate in New Hire Orientation to learn
more about hospital policies and procedures. Additionally,
department Managers will assign individual training after ninety
days, to help employees perform adequately.
Risk Response Policies and Procedures
Define avoidance, transference, mitigation, and acceptance
strategies and criteria.
Risk Response Policies and Procedures are an important part of
developing a plan to have strategies in place so when a risk
does occur, written procedures assist in determining appropriate
actions to mitigate or eliminate it. A Risk Response policy
typically assigns an owner to watch over the risk and take
responsibility for leading the procedures to eliminate or
mitigate the risk.
Additionally, a Risk Register is used to document Risk
Responses. These responses include procedures and policies set
according to the type of risk that is encountered. The risk and
the risk response are entered into the register and an owner is
chosen to monitor and execute actions to reduce or eliminate the
risk, in a timely manner. Actions taken are also documented in
the Risk Register. Actions are chosen according to the intensity
of the risk and potential losses. Other considerations when
choosing actions are the cost effectiveness of the action,
according to long-term goals instead of short-term risk
annihilation.
The following definitions describe types of actions taken when
risk is encountered:
Avoidance – This is defined as avoiding the risk by removing
the cause of it.
Transference – This is defined as transferring the risk to a third
party to handle. The third party also bears the liability if the
risk infiltrates the systems and causes damage or loss of data.
This option gives the risk to an expert who is better able to
handle the risk.
Mitigation – This is defined as actions taken the lessen the
impact and probability that a risk will occur. An example of this
is installing an anti-virus software on a computer to lessen the
probability that the computer will get a virus.
Acceptance Strategies and Criteria – This is defined as a
strategy used in response to risk when other options are not
practical or possible. There is often a contingency plan
accompanying acceptance strategies so that managers can
handle the risk if and when it occurs.
Compliance (Regulatory, Advisory, Informative)
Examples could include: HIPPA, FERPA, ISO, NIST, SEC, and
Sarbanes/Oxley.
A Regulatory, Advisory, and Informative Compliance Security
standard assists hospital personnel by providing a documented
procedure that all employees can refer to when risk is
encountered. Because UPMC stores confidential patient medical
information, these policies must also comply with federal laws
and regulations, including HIPAA, ISO 27001, ISO 27799 and
HITRUST Common Security Framework.
This security framework applies to information security
management systems (ISMS), such as the one used by the
UPMC hospital system. This covers technical, physical, and
legal controls for the hospital in regards to risk management.
This is important to the hospital because it assists the hospital
in maintaining a secure environment for patient data. According
to TechTarget.com (2019), “ISO 27001 was developed to
provide a model for establishing, implementing, operating,
monitoring, reviewing, maintaining and improving an
information security management system (ISO27001, p. 1).
ISO 27001– Establishes requirements for an Information
Security Management System (ISMS) that utilizes specifications
to assist in the security and risk planning process, including:
defining a policy for security, defining the scope of an
Information Security Management System, risk assessment,
managing risks, and determining and implementing controls.
ISO 27799 - This is a set of Best Practices that the hospital can
utilize to protect patient information and data. Some of these
threats include: unauthorized use of health information, theft by
outsiders or insiders, willful damage by outsiders or insiders,
and masquerade by insiders, outsiders, and services providers,
to name a few.
EMTALA – This regulation is meant to comply with federal law
stating hospitals are required to offer treatment to all persons
who seek care without regard to whether the patient has
insurance or is able to pay for the treatment. This usually
applies to emergency care situations.
CMS Conditions of Participation – This regulation protects the
UPMC Hospital System by requiring a national background
check of all hospital employees who have access to patients.
According to CMS.gov (2019), “Title VI, Subtitle B, Part III,
Subtitle C, Section 6201 of the Affordable Care Act of 2010
established the framework for a nationwide program to conduct
background checks on a statewide basis on all prospective direct
patient access employees (Background Check, p. 1).
Incident Response Policies and Procedures
Include: Preparation, Identification, Containment, Eradication,
Recovery, and Lessons Learned
An Incident Response Plan is a critical document to the overall
security of the hospital environment. Below is a short overview
of the stages of an Incident Response Plan. Each is directly
related to a hospital information system risk management
policy.
Preparation – It is important that all employees participate in
training so they will know their role when a risk event occurs.
Cyber threats should be at the top of the training list. Preparing
begins with monitoring the network for obvious threats and
reviewing logs in detail to prepare a course of action to mitigate
the risk. Security policies should be updated on a regular basis.
Identification – Using equipment such as intrusion detection
systems (IDS) can greatly affect the success of identifying risks
and threats to the hospital. Employees should have a
documented procedure on common security events to take the
appropriate course of action. For example, if an employee’s
computer has an obvious virus, the document should provide
steps such as unplugging the computer from the network.
Containment - Once the computer is disconnected from the
network, as in the example above, the risk is now considered
contained. A virus scan would then be run to quarantine any
malware or virus threats. Documenting the incident is also an
important step.
Eradication – as in the example above, if the virus scan detects
malware or a virus, the anti-virus software can eliminate the
threat. Running diagnostics on the network server and affected
computer is a great place to continue eradication efforts.
Recovery - Validation tests should then be run on the computer
to make sure the threat has been removed from the computer or
network.
Lessons Learned – Documenting everything from beginning to
end can prove to be very useful for future threats. What may not
seem important today can quickly become extremely important
in a week or two.
Auditing Policies and Procedures
The UPMC hospital system utilizes auditing and monitoring
potential vulnerabilities and threats found in data systems and
electronic records. This audits helps to sustain the security of
the hospital and identifies threats to confidentiality, integrity,
and availability of confidential information. Audits are used by
hospital administrators to measure how well current security
policies are working while identifying potential future security
enhancements to the information systems. The hospital systems
include access auditing which are required software features to
protect patient health information (PHI).
Below are example audit policy and procedures for the hospital.
1. Monitoring will occur on hospital information systems to
identify unauthorized access, internal and external attempts to
access the system, and other intrusion efforts by unauthorized
users.
2. The hospital will track access and maintain system and event
logs regarding system changes in configuration.
3. Security events will be reported to the UPMC security team.
Environmental/Physical Policies and Procedures
Environmental and physical security policies and procedures are
especially important to UPMC hospital system since the hospital
maintains items such as infectious and radioactive materials,
narcotic and hazardous drugs, and hazardous chemicals. UPMC
must ensure they remain in compliance with the Occupational
Safety and Health Administration (OSHA) and protect staff,
patients, and visitors from accidental exposure to these
chemicals.
The Environmental Protection Agency (EPA) regulates these
types of security issues along with smoke and fire dangers in
connection with these chemicals, which can be deadly. The EPA
reviews the hospital’s policies every three years to ensure they
remain in compliance with the hundreds of rules and regulations
surrounding environmental security (Compliance.com, 2019).
Administrative Policies and Procedures
Administrative Security policies and procedures are needed to
control and protect the handling and distribution of
administrative data. Types of data included in this area patient
data, financial data, employee data, and hospital lab reports, to
name a few. Since this data is housed on the hospital’s
information system, it is imperative to protect the systems from
cyber threats or intrusions.
Configuration Policies and Procedures
Recommended configuration policies and procedures will ensure
information systems are safeguarded against cyber threats and
attacks. Failure to follow these procedures could lead to
unauthorized use of data, data unavailability, and data loss.
Configuration policies offer security for the hospital that
reduces security vulnerabilities, threats, and risks along with
saving hospital resources and valuable time spent protecting
patient data.
UPMC Hospital Configuration Policy
1. Information System Configurations
a. Documentation must be completed on each IS component
including:
i. Current operating system (OS), installed software, and
installed applications for mobile devices, computers, network
equipment, laptops, and servers.
ii. Update and patch information on each system
iii. Network diagrams, including logical and physical
placements
iv. Any configuration exceptions must also be documented.
b. Configuration Review and Updates
i. Review of configuration documentation must be done
annually
ii. Records must be updated to illustrate any changes to config
settings within the systems.
2. Configuration Devices.
a. HIPAA Security regulations are highly concerned with the
following devices, including: modems, wireless access points,
e-mail servers, web servers, virtual private networks, firewalls,
and routers (HIPAA-compliant configuration guidelines for
Information Security in a Medical Center environment, p. 4).
b. These devices above are a critical security factor since the
outside world will have to infiltrate them in order to gain access
to the hospital network. Protecting these devices is therefore
key to maintaining a secure environment.
3. Testing.
a. Intrusion prevention and testing devices is a key factor in
meeting compliance with HIPAA Security Guidelines.
Conclusion
While there is no single act that completely secures a hospital
information system, following policies that keep the hospital in
compliance with local and federal laws and regulations, is a
good place to start. Providing a secure environment is an on-
going effort and does not end. Cyber Security Engineers must
have the mindset of lifetime learning to ensure they are keeping
up-to-date with the newest threats along with the newest
technologies to protect the hospital from these threats.
Reference Page
CMS.gov (2019). Background Check. Retrieved from
https://www.cms.gov/Medicare/Provider-Enrollment-and-
Certification/SurveyCertificationGenInfo/BackgroundCheck.htm
l
Compliance.com (2019). Environmental Health and Safety.
Retrieved from https://compliance.com/publications/hospital-
risk-assessment-environmental-health-and-safety-compliance-
and-physical-security-standards/
Healthcare.Partners.org (2019). IP Policy. Retrieved from
http://healthcare.partners.org/OGCpolicies/IPPolicy.pdf
Sans.org (2019). HIPAA-compliant configuration guidelines for
Information Security in a Medical Center environment.
Retrieved from https://www.sans.org/reading-
room/whitepapers/hipaa/hipaa-compliant-configuration-
guidelines-information-security-medical-center-environment-
891
Livewire.com (2019). Isolation Property in a Database.
Retrieved from https://www.lifewire.com/isolation-definition-
1019173
MayoClinic.org (2019). Confidentiality Agreement. Retrieved
from https://www.mayoclinic.org/documents/confidentiality-
jax-pdf/doc-20079517
NC.gov (2019). Configuration Management Policy. Retrieved
from
https://files.nc.gov/ncdit/documents/Statewide_Policies/SCIO_C
onfiguration_Management.pdf
TechTarget (2019). ISO 27001. Retrieved from
https://whatis.techtarget.com/definition/ISO-27001
CMGT/400v7
Security Risk Mitigation Plan Template
CMGT/400 v7
Page 2 of 2Secure Staging Environment Design and Coding
Technique Standards Technical Guide Template
A Software Engineer designs, develop, tests, and evaluates the
software and the systems that allow computers to execute their
applications.
Take on the role of Software Engineer for the organization you
selected in Week 1, and create a Secure Staging Environment
Design and Coding Technique Standards Technical Guide using
this template for the organization.[Organization Name]
Diagram of Staging Environment
[Add or attach diagram. Include descriptions for each object in
your environment.]
Secure coding Technique/Quality and Testing StandardProper
Error Handling
[Response]Proper Input Validation
[Response]Normalization
[Response]Stored Procedures
[Response]Code Signing
[Response]Encryption
[Response]Obfuscation/Camouflage
[Response]Code Reuse/Dead Code
[Response]Server-side vs. Client-side Execution and Validation
[Response]Memory Management
[Response]Use of Third-Party Libraries and ADK’s
[Response]Data Exposure
[Response]Code Quality and Testing
[Response should include automation, static doe analyzers,
dynamic analysis such as fuzzing, stress testing, sandboxing,
model verification]
Copyright© 2018 by University of Phoenix. All rights reserved.
Copyright© 2018 by University of Phoenix. All rights reserved.

More Related Content

Similar to Security Standards, Policies, and Procedures Manual TemplateInstru.docx

IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
Ernest Staats
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness trainingRichard Chaney
 
Policy on ia 1st assignment
Policy on ia   1st assignmentPolicy on ia   1st assignment
Policy on ia 1st assignment
Timir Shah
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness trainingRichard Chaney
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
M2SYS Technology
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
chriscam2
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
adampcarr67227
 
List of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue beList of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue beJacob Adams
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
mohammedfootwear
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratch
Techugo
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
Provider Resources Group
 
IT Policy
IT PolicyIT Policy
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
amartya2087
 
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
Conference Panel
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
OnRamp
 
Cloud compliance test
Cloud compliance testCloud compliance test
Cloud compliance test
Prancer Io
 
Patient confidentiality 9.26.13
Patient confidentiality 9.26.13Patient confidentiality 9.26.13
Patient confidentiality 9.26.13pneville0629
 
Week 1 disc 2 pp presentation
Week 1 disc 2 pp presentationWeek 1 disc 2 pp presentation
Week 1 disc 2 pp presentation
AngelaDMolina
 
Mosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio White Paper: Simplifying HIPAA and SMS in Clinical ResearchMosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio
 
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Conference Panel
 

Similar to Security Standards, Policies, and Procedures Manual TemplateInstru.docx (20)

IT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality AgreementIT Staff NDA Template Employee Confidentiality Agreement
IT Staff NDA Template Employee Confidentiality Agreement
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness training
 
Policy on ia 1st assignment
Policy on ia   1st assignmentPolicy on ia   1st assignment
Policy on ia 1st assignment
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness training
 
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
Health IT Data Security – An Overview of Privacy, Compliance, and Technology ...
 
Confidentiality training
Confidentiality trainingConfidentiality training
Confidentiality training
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
 
List of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue beList of possible policies for inter institution dialogue be
List of possible policies for inter institution dialogue be
 
Describe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdfDescribe one safeguard that should be in place to protect the confid.pdf
Describe one safeguard that should be in place to protect the confid.pdf
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratch
 
how to really implement hipaa presentation
how to really implement hipaa presentationhow to really implement hipaa presentation
how to really implement hipaa presentation
 
IT Policy
IT PolicyIT Policy
IT Policy
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
HIPAA, Texting, and E-mail — Using Appropriate Patient and Professional Commu...
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
Cloud compliance test
Cloud compliance testCloud compliance test
Cloud compliance test
 
Patient confidentiality 9.26.13
Patient confidentiality 9.26.13Patient confidentiality 9.26.13
Patient confidentiality 9.26.13
 
Week 1 disc 2 pp presentation
Week 1 disc 2 pp presentationWeek 1 disc 2 pp presentation
Week 1 disc 2 pp presentation
 
Mosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio White Paper: Simplifying HIPAA and SMS in Clinical ResearchMosio White Paper: Simplifying HIPAA and SMS in Clinical Research
Mosio White Paper: Simplifying HIPAA and SMS in Clinical Research
 
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
 

More from jeffreye3

Select 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docxSelect 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docx
jeffreye3
 
Select 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docxSelect 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docx
jeffreye3
 
Select 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docxSelect 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docx
jeffreye3
 
Select 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docxSelect 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docx
jeffreye3
 
SeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docxSeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docx
jeffreye3
 
SeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docxSeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docx
jeffreye3
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxSegmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docx
jeffreye3
 
Seeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docxSeeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docx
jeffreye3
 
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docxSeeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docx
jeffreye3
 
Seeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docxSeeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docx
jeffreye3
 
Seeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docxSeeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docx
jeffreye3
 
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxSEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
jeffreye3
 
seek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docxseek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docx
jeffreye3
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxSeediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docx
jeffreye3
 
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docxSEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
jeffreye3
 
See ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docxSee ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docx
jeffreye3
 
Seed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docxSeed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docx
jeffreye3
 
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docxsee videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
jeffreye3
 
See Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docxSee Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docx
jeffreye3
 
See attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docxSee attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docx
jeffreye3
 

More from jeffreye3 (20)

Select 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docxSelect 2 particular media forum types from the following listNews.docx
Select 2 particular media forum types from the following listNews.docx
 
Select 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docxSelect 1 of the datasets.Set up a frequency table.docx
Select 1 of the datasets.Set up a frequency table.docx
 
Select 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docxSelect 1 alternative religion (e.g., Church of Scientology, Tr.docx
Select 1 alternative religion (e.g., Church of Scientology, Tr.docx
 
Select 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docxSelect 1 existing or defunct magazine or newspaper, and research its.docx
Select 1 existing or defunct magazine or newspaper, and research its.docx
 
SeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docxSeleccionarSelect the item that does not belong.¿Lógico o .docx
SeleccionarSelect the item that does not belong.¿Lógico o .docx
 
SeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docxSeleccionarSelecciona la respuesta que mejor completa cada oración.docx
SeleccionarSelecciona la respuesta que mejor completa cada oración.docx
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxSegmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docx
 
Seeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docxSeeking your ability to think about criminalsocial issues .docx
Seeking your ability to think about criminalsocial issues .docx
 
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docxSeeking help with week 4 UOP PSY525 team assignment.  Only one.docx
Seeking help with week 4 UOP PSY525 team assignment.  Only one.docx
 
Seeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docxSeeking a minimin of one page with scholarly in-text references with.docx
Seeking a minimin of one page with scholarly in-text references with.docx
 
Seeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docxSeeking a 500 word document that outlines(A) who most commonly .docx
Seeking a 500 word document that outlines(A) who most commonly .docx
 
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docxSEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
SEED Labs – Linux Firewall Exploration Lab 1Linux Firewall.docx
 
seek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docxseek limited’s group report &meetingiiTable of C.docx
seek limited’s group report &meetingiiTable of C.docx
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxSeediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docx
 
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docxSEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
SEE YELLOW HIGHLIGHTED AREA BELOWPart 1.Laying the Foundat.docx
 
See ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docxSee ENF450 Search Strategies and the Student Resources links and sup.docx
See ENF450 Search Strategies and the Student Resources links and sup.docx
 
Seed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docxSeed TagsCollect a variety of seed tags. Take photos of the .docx
Seed TagsCollect a variety of seed tags. Take photos of the .docx
 
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docxsee videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
see videohttpsyoutu.be-O5gsF5oylsconsider how hist.docx
 
See Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docxSee Topic on the project 1 paperTarget- Casemanager and care.docx
See Topic on the project 1 paperTarget- Casemanager and care.docx
 
See attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docxSee attachments for information.Looking for assistance on an assig.docx
See attachments for information.Looking for assistance on an assig.docx
 

Recently uploaded

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

Security Standards, Policies, and Procedures Manual TemplateInstru.docx

  • 1. Security Standards, Policies, and Procedures Manual Template Instructions: Replace the information in brackets [ ] with information relevant to your project. Cyber Security Engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store. Take on the role of Cyber Security Engineer for the organization you chose in Week 1. Research the following information for your chosen organization. Develop a Security Standards, Policies, and Procedures Manual using this template with recommendations to management of security standards, polices, and procedures which should be implemented in your organization.UPMC Hospital Overview Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization. Security policies for UPMC Hospital are a critical part of maintaining compliance with health standards and regulations, such as HIPAA. A security plan will improve the overall security of the hospital by having a written documentation containing protocols for maintaining a secure network, protecting sensitive patient information, and providing a policy of encryption which will ensure secure data transmissions. Additionally, security plans and procedures assist in implementing a patient tracking system using secured technology to ensure patients are not abducted. The following policies, standards, and procedures are meant to protect UPMC’s data security environment. These Risk Management Policies also serve as a reference document for employees to ensure a cohesive response is followed by all departments and personnel in the hospital system.
  • 2. Data Privacy Policies and Procedures This policy pertains to all hospital and medical personnel who have access to patient/hospital data and information, whether direct or indirect. This policy is meant to protect high-level data and information and prevent those who do not have clearance from accessing the information. This policy also meets the requirements of the Patient Health Information (PHI) requirements as found in the Health Insurance Health Insurance Portability and Accountability Act (HIPAA). UPMC has adopted this policy to ensure that employees of the hospital are not given too much access to systems where they have no purpose or related duties. Policy: Least Privilege. Reasonable effort must be taken to ensure PHI is secure and protected when using, accessing, requesting, and disclosing the protected information. Each hospital department must limit access to PHI least amount of access to data of all personnel to ensure they are only allowed to access the least amount needed to complete their job responsibilities. Data Isolation Policies and Procedures A data isolation policy will assist the overall security of the UPMC hospital by insuring that the data is secure by instilling a database property to control the visibility of changes made to the system. This property also controls when and how changes are implemented and whether these changes are visible to users, other properties, and the overall information systems. Implementing this property also assists with system performance since many transactions can occur simultaneously in isolation of each other thereby not interacting or affecting each other.
  • 3. According to Livewire.com (2019), “Isolation is an integral part of database transactional properties. It is the third property of ACID (Atomicity, Consistency, Isolation, Durability) and these properties ensure that data is consistent and accurate” (Isolation Property in a Database, p. 1). Isolation is a set of rules that isolates transactions that are happening concurrently so that they do not affect each other. For example, if two users are conducting database transactions at the same time, they system performs one transaction in its entirety, then conducts the other transaction in its entirety, and so on. This prevents the database from accessing data in the middle of a transaction. The data isolation does not determine the order of transactions but does ensure that each transaction does not interfere with another transaction, therefore they operate in isolation. Non-Disclosure Agreement (NDA) Policies and Procedures The hospital non-disclosure agreement (NDA) protects the hospital by having each employee sign a document promising to abide by conditions related to keeping secrets and confidential information private. An example of the UPMC Non-Disclosure Agreement (NDA) is as follows: I agree to follow the NDA below as a condition of my employment in regards to receiving and accessing electronic information, sensitive documents, proprietary information, and trade secrets. 1. I promise to not disclose any information to a third party that I have access to in any form. 2. I will keep my computer login and password secret and will not share or disclose this to anyone. Additionally, I agree that my login has the same legal weight as my signature and I am responsible for illegal or immoral files saved on my computer. I also agree that I cannot expect to have full privacy on my work computer and my employer has the right to view the contents of my computer, including my emails, at any time with or without my knowledge.
  • 4. 3. I agree that I will not attempt to access records or patient medical information that I do not have a direct need to access in my daily duties. Additionally, I will not access co-workers, friends or family member’s records. 4. I will change my login and password information when I have cause to believe it has been compromised. 5. I will abide by all other confidentiality procedures and policies while employed at the UPMC hospital. Intellectual Property (IP) Policies and Procedures The Intellectual Property (IP) Policy should be implemented because it covers IP’s created while in the employment of the UPMC hospital. This includes inventions, copyrightable works, tangible research, and all intellectual property (healthcare.partners.org, 2019). This protects the hospital by ensuring that all intellectual property created using hospital equipment, materials, and resources is granted to the hospital as owners of the property. Employees agree that UPMC has the first option to own any such IP and employees are in violation of this policy if they seek to sell, contract, license, dispose of, or otherwise commit any IP created while employee to a third party without the approval of the UPMC hospital Board of Directors. Password Policies and Procedures This policy is used to safeguard UPMC information systems and the data contained therein and is therefore a critical policy for the hospital. The hospital relies on password and user logins that are unique and complex and employees are expected to keep passwords confidential. This policy aligns with the HIPAA regulatory requirements.
  • 5. The following policy must be adhered to by all employees of UPMC hospital: 1. Employees must never leave their workstation while logged into the system. If an employee must attend to a patient or leave for lunch, they are expected to log out beforehand. 2. System passwords shall never be written down and left in the open. Additionally, password programs such as Roboform shall never be used as a means to save logins and passwords. 3. Passwords must be changed right away upon receiving login information, on an employee’s first day of work. 4. Employees are not allowed to share logins and any reports of this will lead to a mandatory security report that will be housed in the employee’s permanent employment record. Repeated violations will lead to termination. 5. Passwords must be changed every ninety days. 6. After five failed attempts to login to the system, the user account will be locked. Acceptable Use of Organizational Assets and Data Policies and Procedures An Acceptable Use policy is important to the security of the UPMC hospital system because it establishes overall employee behavior when using hospital networks, computers, etc. This policy is meant to safeguard hospital systems, data, and information. Inappropriate use can damage or open the system up for hacking, data theft, etc. It also sets boundaries on employee behavior in an effort to protect patient information and health information, which is also a requirement of HIPAA.
  • 6. By having the employees to re-sign this policy on an annual basis, it reminds them, what is and what is not acceptable use on the hospitals data systems. An example Acceptable Use Policy for UPMC hospital is as follows: This policy includes computers, e-mail, Internet usage, software, equipment, etc. 1. Personal Use of Computers. UPMC does not allow any personal use of their resources or data systems. 2. Employees agree that any and all data, research, etc. conducted on hospital equipment remains the property of UPMC hospital. 3. Employees should not expect privacy when using company computers or email services. 4. UPMC reserves the right to examine employee computers with or without their knowledge at any time. 5. Employees are prohibited from participating in behavior that is classified as offensive, harassing, or illegal. This includes posting negative comments about the hospital on social media outlets. 6. Employees may not install any software on their computer without the written approval of management. 7. Employees may not modify computers or network systems at any time. 8. Failure to comply with this policy will result in disciplinary action, up to an including termination.
  • 7. Employee Policies and Procedures (Separation of Duties/Training) UPMC will benefit from segregation of duties because this policy will assist in preventing fraud and errors by separating duties so that one person is not in total control of an internal procedure. This puts a check and balances system into the hospital environment and protects the patients, employees, and the hospital as a whole. All employees will participate in New Hire Orientation to learn more about hospital policies and procedures. Additionally, department Managers will assign individual training after ninety days, to help employees perform adequately. Risk Response Policies and Procedures Define avoidance, transference, mitigation, and acceptance strategies and criteria. Risk Response Policies and Procedures are an important part of developing a plan to have strategies in place so when a risk does occur, written procedures assist in determining appropriate actions to mitigate or eliminate it. A Risk Response policy typically assigns an owner to watch over the risk and take responsibility for leading the procedures to eliminate or mitigate the risk. Additionally, a Risk Register is used to document Risk Responses. These responses include procedures and policies set according to the type of risk that is encountered. The risk and the risk response are entered into the register and an owner is chosen to monitor and execute actions to reduce or eliminate the risk, in a timely manner. Actions taken are also documented in the Risk Register. Actions are chosen according to the intensity of the risk and potential losses. Other considerations when
  • 8. choosing actions are the cost effectiveness of the action, according to long-term goals instead of short-term risk annihilation. The following definitions describe types of actions taken when risk is encountered: Avoidance – This is defined as avoiding the risk by removing the cause of it. Transference – This is defined as transferring the risk to a third party to handle. The third party also bears the liability if the risk infiltrates the systems and causes damage or loss of data. This option gives the risk to an expert who is better able to handle the risk. Mitigation – This is defined as actions taken the lessen the impact and probability that a risk will occur. An example of this is installing an anti-virus software on a computer to lessen the probability that the computer will get a virus. Acceptance Strategies and Criteria – This is defined as a strategy used in response to risk when other options are not practical or possible. There is often a contingency plan accompanying acceptance strategies so that managers can handle the risk if and when it occurs. Compliance (Regulatory, Advisory, Informative) Examples could include: HIPPA, FERPA, ISO, NIST, SEC, and Sarbanes/Oxley. A Regulatory, Advisory, and Informative Compliance Security standard assists hospital personnel by providing a documented procedure that all employees can refer to when risk is encountered. Because UPMC stores confidential patient medical information, these policies must also comply with federal laws and regulations, including HIPAA, ISO 27001, ISO 27799 and HITRUST Common Security Framework. This security framework applies to information security management systems (ISMS), such as the one used by the
  • 9. UPMC hospital system. This covers technical, physical, and legal controls for the hospital in regards to risk management. This is important to the hospital because it assists the hospital in maintaining a secure environment for patient data. According to TechTarget.com (2019), “ISO 27001 was developed to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system (ISO27001, p. 1). ISO 27001– Establishes requirements for an Information Security Management System (ISMS) that utilizes specifications to assist in the security and risk planning process, including: defining a policy for security, defining the scope of an Information Security Management System, risk assessment, managing risks, and determining and implementing controls. ISO 27799 - This is a set of Best Practices that the hospital can utilize to protect patient information and data. Some of these threats include: unauthorized use of health information, theft by outsiders or insiders, willful damage by outsiders or insiders, and masquerade by insiders, outsiders, and services providers, to name a few. EMTALA – This regulation is meant to comply with federal law stating hospitals are required to offer treatment to all persons who seek care without regard to whether the patient has insurance or is able to pay for the treatment. This usually applies to emergency care situations. CMS Conditions of Participation – This regulation protects the UPMC Hospital System by requiring a national background check of all hospital employees who have access to patients. According to CMS.gov (2019), “Title VI, Subtitle B, Part III, Subtitle C, Section 6201 of the Affordable Care Act of 2010 established the framework for a nationwide program to conduct background checks on a statewide basis on all prospective direct patient access employees (Background Check, p. 1). Incident Response Policies and Procedures Include: Preparation, Identification, Containment, Eradication,
  • 10. Recovery, and Lessons Learned An Incident Response Plan is a critical document to the overall security of the hospital environment. Below is a short overview of the stages of an Incident Response Plan. Each is directly related to a hospital information system risk management policy. Preparation – It is important that all employees participate in training so they will know their role when a risk event occurs. Cyber threats should be at the top of the training list. Preparing begins with monitoring the network for obvious threats and reviewing logs in detail to prepare a course of action to mitigate the risk. Security policies should be updated on a regular basis. Identification – Using equipment such as intrusion detection systems (IDS) can greatly affect the success of identifying risks and threats to the hospital. Employees should have a documented procedure on common security events to take the appropriate course of action. For example, if an employee’s computer has an obvious virus, the document should provide steps such as unplugging the computer from the network. Containment - Once the computer is disconnected from the network, as in the example above, the risk is now considered contained. A virus scan would then be run to quarantine any malware or virus threats. Documenting the incident is also an important step. Eradication – as in the example above, if the virus scan detects malware or a virus, the anti-virus software can eliminate the threat. Running diagnostics on the network server and affected computer is a great place to continue eradication efforts. Recovery - Validation tests should then be run on the computer to make sure the threat has been removed from the computer or network. Lessons Learned – Documenting everything from beginning to end can prove to be very useful for future threats. What may not seem important today can quickly become extremely important
  • 11. in a week or two. Auditing Policies and Procedures The UPMC hospital system utilizes auditing and monitoring potential vulnerabilities and threats found in data systems and electronic records. This audits helps to sustain the security of the hospital and identifies threats to confidentiality, integrity, and availability of confidential information. Audits are used by hospital administrators to measure how well current security policies are working while identifying potential future security enhancements to the information systems. The hospital systems include access auditing which are required software features to protect patient health information (PHI). Below are example audit policy and procedures for the hospital. 1. Monitoring will occur on hospital information systems to identify unauthorized access, internal and external attempts to access the system, and other intrusion efforts by unauthorized users. 2. The hospital will track access and maintain system and event logs regarding system changes in configuration. 3. Security events will be reported to the UPMC security team. Environmental/Physical Policies and Procedures Environmental and physical security policies and procedures are especially important to UPMC hospital system since the hospital maintains items such as infectious and radioactive materials, narcotic and hazardous drugs, and hazardous chemicals. UPMC must ensure they remain in compliance with the Occupational Safety and Health Administration (OSHA) and protect staff, patients, and visitors from accidental exposure to these chemicals. The Environmental Protection Agency (EPA) regulates these types of security issues along with smoke and fire dangers in connection with these chemicals, which can be deadly. The EPA
  • 12. reviews the hospital’s policies every three years to ensure they remain in compliance with the hundreds of rules and regulations surrounding environmental security (Compliance.com, 2019). Administrative Policies and Procedures Administrative Security policies and procedures are needed to control and protect the handling and distribution of administrative data. Types of data included in this area patient data, financial data, employee data, and hospital lab reports, to name a few. Since this data is housed on the hospital’s information system, it is imperative to protect the systems from cyber threats or intrusions. Configuration Policies and Procedures Recommended configuration policies and procedures will ensure information systems are safeguarded against cyber threats and attacks. Failure to follow these procedures could lead to unauthorized use of data, data unavailability, and data loss. Configuration policies offer security for the hospital that reduces security vulnerabilities, threats, and risks along with saving hospital resources and valuable time spent protecting patient data. UPMC Hospital Configuration Policy 1. Information System Configurations a. Documentation must be completed on each IS component including: i. Current operating system (OS), installed software, and installed applications for mobile devices, computers, network equipment, laptops, and servers. ii. Update and patch information on each system iii. Network diagrams, including logical and physical placements iv. Any configuration exceptions must also be documented. b. Configuration Review and Updates i. Review of configuration documentation must be done
  • 13. annually ii. Records must be updated to illustrate any changes to config settings within the systems. 2. Configuration Devices. a. HIPAA Security regulations are highly concerned with the following devices, including: modems, wireless access points, e-mail servers, web servers, virtual private networks, firewalls, and routers (HIPAA-compliant configuration guidelines for Information Security in a Medical Center environment, p. 4). b. These devices above are a critical security factor since the outside world will have to infiltrate them in order to gain access to the hospital network. Protecting these devices is therefore key to maintaining a secure environment. 3. Testing. a. Intrusion prevention and testing devices is a key factor in meeting compliance with HIPAA Security Guidelines. Conclusion While there is no single act that completely secures a hospital information system, following policies that keep the hospital in compliance with local and federal laws and regulations, is a good place to start. Providing a secure environment is an on- going effort and does not end. Cyber Security Engineers must have the mindset of lifetime learning to ensure they are keeping up-to-date with the newest threats along with the newest technologies to protect the hospital from these threats.
  • 14. Reference Page CMS.gov (2019). Background Check. Retrieved from https://www.cms.gov/Medicare/Provider-Enrollment-and- Certification/SurveyCertificationGenInfo/BackgroundCheck.htm l Compliance.com (2019). Environmental Health and Safety. Retrieved from https://compliance.com/publications/hospital- risk-assessment-environmental-health-and-safety-compliance- and-physical-security-standards/ Healthcare.Partners.org (2019). IP Policy. Retrieved from http://healthcare.partners.org/OGCpolicies/IPPolicy.pdf Sans.org (2019). HIPAA-compliant configuration guidelines for Information Security in a Medical Center environment. Retrieved from https://www.sans.org/reading- room/whitepapers/hipaa/hipaa-compliant-configuration- guidelines-information-security-medical-center-environment-
  • 15. 891 Livewire.com (2019). Isolation Property in a Database. Retrieved from https://www.lifewire.com/isolation-definition- 1019173 MayoClinic.org (2019). Confidentiality Agreement. Retrieved from https://www.mayoclinic.org/documents/confidentiality- jax-pdf/doc-20079517 NC.gov (2019). Configuration Management Policy. Retrieved from https://files.nc.gov/ncdit/documents/Statewide_Policies/SCIO_C onfiguration_Management.pdf TechTarget (2019). ISO 27001. Retrieved from https://whatis.techtarget.com/definition/ISO-27001 CMGT/400v7 Security Risk Mitigation Plan Template CMGT/400 v7 Page 2 of 2Secure Staging Environment Design and Coding Technique Standards Technical Guide Template A Software Engineer designs, develop, tests, and evaluates the software and the systems that allow computers to execute their applications. Take on the role of Software Engineer for the organization you selected in Week 1, and create a Secure Staging Environment Design and Coding Technique Standards Technical Guide using this template for the organization.[Organization Name] Diagram of Staging Environment [Add or attach diagram. Include descriptions for each object in your environment.] Secure coding Technique/Quality and Testing StandardProper Error Handling [Response]Proper Input Validation [Response]Normalization [Response]Stored Procedures
  • 16. [Response]Code Signing [Response]Encryption [Response]Obfuscation/Camouflage [Response]Code Reuse/Dead Code [Response]Server-side vs. Client-side Execution and Validation [Response]Memory Management [Response]Use of Third-Party Libraries and ADK’s [Response]Data Exposure [Response]Code Quality and Testing [Response should include automation, static doe analyzers, dynamic analysis such as fuzzing, stress testing, sandboxing, model verification] Copyright© 2018 by University of Phoenix. All rights reserved. Copyright© 2018 by University of Phoenix. All rights reserved.