Explore BrainMass

privacy and security policies

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Briefly review the sample privacy and security policies from the following three highly recognized healthcare organizations:

Beth Israel 1

Mayo 2

Georgetown 3

Be sure to focus on the similarities and differences among them. Once you have completed your brief assessment, answer the following questions in two-three (full) pages:

What are the obvious themes common among each organization's policies?
Do any of the policies differ significantly between organizations? If so, how?
Identify what key security principles and elements you feel are most important and describe why.
There are many items to cover in this assignment, so do not worry that you have captured every aspect in your paper. However, be sure to identify what you find most interesting and important and elaborate accordingly.

© BrainMass Inc. brainmass.com October 25, 2018, 1:58 am ad1c9bdddf


Solution Preview

The response for this assignment will be posted in its entirety in a follow-up edit to this post due to the time constraints of the deadline.
The common theme among all these organizational policies is the protection of the health information maintained by the facility, access to the network systems containing the information and proper use of the systems by employees and staff members of the organization in accordance with the Health Insurance Portability and Accountability Act of 1996. The policies apply to all health information regardless of the form in which it is created or maintained. Each facility's policy clearly outlines the definitions that pertain to the document and set forth full expectations of access and usability of both the information and the systems themselves.

Continued in the follow-up edit...

Beth Israel Deaconess Medical Center (BIDMC) Technology Resources Policy:

This policy primarily focuses upon the proper use of the system's resources by clearly defining such things as the expectation of privacy. This is one aspect that sets itself apart from the other policies in that BIDMC retains the right to monitor each user's activities, to include email, without notice to the end user. They state that any information created or stored by the user can be reviewed and/or deleted at the sole discretion of BIDMC and that users should have no expectation of personal privacy.

The Internet use and allowance policies ...

Solution Summary

Briefly review the sample privacy and security policies from the following three highly recognized healthcare organizations:

Beth Israel

See Also This Related BrainMass Solution

Major Corporations Government Agencies

Most major corporations, as well as government agencies, have an online presence for organizational and product information, marketing, sales, communication, and customer loyalty. Balancing effective marketing, sales, and communication with security is a major challenge. An organization's Web site also has a privacy/security policy and uses programs tools designed to protect those who visit the site and put in their information. However, numerous accounts of minor to serious security breaches are reported each year.
Select a major corporation that markets and sells through its Web site and which has experienced a security breach in the past three years.
1. Describe and evaluate a major corporation's Website in these four areas: (1) product information, (2) corporation's contact information, (3) customization of products for customers, and (4) customer information at purchase.
2. Describe and evaluate three (3) of the corporation's Internet marketing strategies and the competitive advantages its Website provides.
3. Analyze and evaluate the corporation's privacy / security policy and the corporation's response to the security breach.
4. Recommend and provide rationale for two (2) methods and/or tools to ensure greater security for customers.
5. Use a minimum of three (3) quality external resources from the last three (3) years to support the content of the paper.

View Full Posting Details