Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Secure staging environment design and coding technique standards technical guide

21/10/2021 Client: muhammad11 Deadline: 2 Day

C:\Users\djshirey\OneDrive - University of Phoenix\F_Drive\Style Guides\UPX Logos\Horizontal format\UOPX_Sig_Hor_Black_Medium.pngSecurity Standards, Policies, and Procedures Manual Template
Instructions: Replace the information in brackets [ ] with information relevant to your project.

Cyber Security Engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store.

Take on the role of Cyber Security Engineer for the organization you chose in Week 1. Research the following information for your chosen organization. Develop a Security Standards, Policies, and Procedures Manual using this template with recommendations to management of security standards, polices, and procedures which should be implemented in your organization.

UPMC Hospital
Overview
Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization.

Security policies for UPMC Hospital are a critical part of maintaining compliance with health standards and regulations, such as HIPAA. A security plan will improve the overall security of the hospital by having a written documentation containing protocols for maintaining a secure network, protecting sensitive patient information, and providing a policy of encryption which will ensure secure data transmissions. Additionally, security plans and procedures assist in implementing a patient tracking system using secured technology to ensure patients are not abducted.

The following policies, standards, and procedures are meant to protect UPMC’s data security environment. These Risk Management Policies also serve as a reference document for employees to ensure a cohesive response is followed by all departments and personnel in the hospital system.

Data Privacy Policies and Procedures
This policy pertains to all hospital and medical personnel who have access to patient/hospital data and information, whether direct or indirect. This policy is meant to protect high-level data and information and prevent those who do not have clearance from accessing the information. This policy also meets the requirements of the Patient Health Information (PHI) requirements as found in the Health Insurance Health Insurance Portability and Accountability Act (HIPAA). UPMC has adopted this policy to ensure that employees of the hospital are not given too much access to systems where they have no purpose or related duties.
Policy: Least Privilege. Reasonable effort must be taken to ensure PHI is secure and protected when using, accessing, requesting, and disclosing the protected information. Each hospital department must limit access to PHI least amount of access to data of all personnel to ensure they are only allowed to access the least amount needed to complete their job responsibilities.
Data Isolation Policies and Procedures
A data isolation policy will assist the overall security of the UPMC hospital by insuring that the data is secure by instilling a database property to control the visibility of changes made to the system. This property also controls when and how changes are implemented and whether these changes are visible to users, other properties, and the overall information systems. Implementing this property also assists with system performance since many transactions can occur simultaneously in isolation of each other thereby not interacting or affecting each other.
According to Livewire.com (2019), “Isolation is an integral part of database transactional properties. It is the third property of ACID (Atomicity, Consistency, Isolation, Durability) and these properties ensure that data is consistent and accurate” (Isolation Property in a Database, p. 1). Isolation is a set of rules that isolates transactions that are happening concurrently so that they do not affect each other. For example, if two users are conducting database transactions at the same time, they system performs one transaction in its entirety, then conducts the other transaction in its entirety, and so on. This prevents the database from accessing data in the middle of a transaction. The data isolation does not determine the order of transactions but does ensure that each transaction does not interfere with another transaction, therefore they operate in isolation.
Non-Disclosure Agreement (NDA) Policies and Procedures
The hospital non-disclosure agreement (NDA) protects the hospital by having each employee sign a document promising to abide by conditions related to keeping secrets and confidential information private. An example of the UPMC Non-Disclosure Agreement (NDA) is as follows:

I agree to follow the NDA below as a condition of my employment in regards to receiving and accessing electronic information, sensitive documents, proprietary information, and trade secrets.

1. I promise to not disclose any information to a third party that I have access to in any form.

2. I will keep my computer login and password secret and will not share or disclose this to anyone. Additionally, I agree that my login has the same legal weight as my signature and I am responsible for illegal or immoral files saved on my computer. I also agree that I cannot expect to have full privacy on my work computer and my employer has the right to view the contents of my computer, including my emails, at any time with or without my knowledge.

3. I agree that I will not attempt to access records or patient medical information that I do not have a direct need to access in my daily duties. Additionally, I will not access co-workers, friends or family member’s records.

4. I will change my login and password information when I have cause to believe it has been compromised.

5. I will abide by all other confidentiality procedures and policies while employed at the UPMC hospital.

Intellectual Property (IP) Policies and Procedures
The Intellectual Property (IP) Policy should be implemented because it covers IP’s created while in the employment of the UPMC hospital. This includes inventions, copyrightable works, tangible research, and all intellectual property (healthcare.partners.org, 2019). This protects the hospital by ensuring that all intellectual property created using hospital equipment, materials, and resources is granted to the hospital as owners of the property.
Employees agree that UPMC has the first option to own any such IP and employees are in violation of this policy if they seek to sell, contract, license, dispose of, or otherwise commit any IP created while employee to a third party without the approval of the UPMC hospital Board of Directors.
Password Policies and Procedures
This policy is used to safeguard UPMC information systems and the data contained therein and is therefore a critical policy for the hospital. The hospital relies on password and user logins that are unique and complex and employees are expected to keep passwords confidential. This policy aligns with the HIPAA regulatory requirements.
The following policy must be adhered to by all employees of UPMC hospital:
1. Employees must never leave their workstation while logged into the system. If an employee must attend to a patient or leave for lunch, they are expected to log out beforehand.
2. System passwords shall never be written down and left in the open. Additionally, password programs such as Roboform shall never be used as a means to save logins and passwords.
3. Passwords must be changed right away upon receiving login information, on an employee’s first day of work.
4. Employees are not allowed to share logins and any reports of this will lead to a mandatory security report that will be housed in the employee’s permanent employment record. Repeated violations will lead to termination.
5. Passwords must be changed every ninety days.
6. After five failed attempts to login to the system, the user account will be locked.
Acceptable Use of Organizational Assets and Data Policies and Procedures
An Acceptable Use policy is important to the security of the UPMC hospital system because it establishes overall employee behavior when using hospital networks, computers, etc. This policy is meant to safeguard hospital systems, data, and information. Inappropriate use can damage or open the system up for hacking, data theft, etc. It also sets boundaries on employee behavior in an effort to protect patient information and health information, which is also a requirement of HIPAA. By having the employees to re-sign this policy on an annual basis, it reminds them, what is and what is not acceptable use on the hospitals data systems.
An example Acceptable Use Policy for UPMC hospital is as follows:
This policy includes computers, e-mail, Internet usage, software, equipment, etc.
1. Personal Use of Computers. UPMC does not allow any personal use of their resources or data systems.
2. Employees agree that any and all data, research, etc. conducted on hospital equipment remains the property of UPMC hospital.
3. Employees should not expect privacy when using company computers or email services.
4. UPMC reserves the right to examine employee computers with or without their knowledge at any time.
5. Employees are prohibited from participating in behavior that is classified as offensive, harassing, or illegal. This includes posting negative comments about the hospital on social media outlets.
6. Employees may not install any software on their computer without the written approval of management.
7. Employees may not modify computers or network systems at any time.
8. Failure to comply with this policy will result in disciplinary action, up to an including termination.
Employee Policies and Procedures (Separation of Duties/Training)
UPMC will benefit from segregation of duties because this policy will assist in preventing fraud and errors by separating duties so that one person is not in total control of an internal procedure. This puts a check and balances system into the hospital environment and protects the patients, employees, and the hospital as a whole.

All employees will participate in New Hire Orientation to learn more about hospital policies and procedures. Additionally, department Managers will assign individual training after ninety days, to help employees perform adequately.

Risk Response Policies and Procedures
Define avoidance, transference, mitigation, and acceptance strategies and criteria.

Risk Response Policies and Procedures are an important part of developing a plan to have strategies in place so when a risk does occur, written procedures assist in determining appropriate actions to mitigate or eliminate it. A Risk Response policy typically assigns an owner to watch over the risk and take responsibility for leading the procedures to eliminate or mitigate the risk.

Additionally, a Risk Register is used to document Risk Responses. These responses include procedures and policies set according to the type of risk that is encountered. The risk and the risk response are entered into the register and an owner is chosen to monitor and execute actions to reduce or eliminate the risk, in a timely manner. Actions taken are also documented in the Risk Register. Actions are chosen according to the intensity of the risk and potential losses. Other considerations when choosing actions are the cost effectiveness of the action, according to long-term goals instead of short-term risk annihilation.

The following definitions describe types of actions taken when risk is encountered:

Avoidance – This is defined as avoiding the risk by removing the cause of it.

Transference – This is defined as transferring the risk to a third party to handle. The third party also bears the liability if the risk infiltrates the systems and causes damage or loss of data. This option gives the risk to an expert who is better able to handle the risk.

Mitigation – This is defined as actions taken the lessen the impact and probability that a risk will occur. An example of this is installing an anti-virus software on a computer to lessen the probability that the computer will get a virus.

Acceptance Strategies and Criteria – This is defined as a strategy used in response to risk when other options are not practical or possible. There is often a contingency plan accompanying acceptance strategies so that managers can handle the risk if and when it occurs.

Compliance (Regulatory, Advisory, Informative)
Examples could include: HIPPA, FERPA, ISO, NIST, SEC, and Sarbanes/Oxley.

A Regulatory, Advisory, and Informative Compliance Security standard assists hospital personnel by providing a documented procedure that all employees can refer to when risk is encountered. Because UPMC stores confidential patient medical information, these policies must also comply with federal laws and regulations, including HIPAA, ISO 27001, ISO 27799 and HITRUST Common Security Framework.

This security framework applies to information security management systems (ISMS), such as the one used by the UPMC hospital system. This covers technical, physical, and legal controls for the hospital in regards to risk management. This is important to the hospital because it assists the hospital in maintaining a secure environment for patient data. According to TechTarget.com (2019), “ISO 27001 was developed to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system (ISO27001, p. 1).

ISO 27001 – Establishes requirements for an Information Security Management System (ISMS) that utilizes specifications to assist in the security and risk planning process, including: defining a policy for security, defining the scope of an Information Security Management System, risk assessment, managing risks, and determining and implementing controls.

ISO 27799 - This is a set of Best Practices that the hospital can utilize to protect patient information and data. Some of these threats include: unauthorized use of health information, theft by outsiders or insiders, willful damage by outsiders or insiders, and masquerade by insiders, outsiders, and services providers, to name a few.

EMTALA – This regulation is meant to comply with federal law stating hospitals are required to offer treatment to all persons who seek care without regard to whether the patient has insurance or is able to pay for the treatment. This usually applies to emergency care situations.

CMS Conditions of Participation – This regulation protects the UPMC Hospital System by requiring a national background check of all hospital employees who have access to patients. According to CMS.gov (2019), “Title VI, Subtitle B, Part III, Subtitle C, Section 6201 of the Affordable Care Act of 2010 established the framework for a nationwide program to conduct background checks on a statewide basis on all prospective direct patient access employees (Background Check, p. 1).

Incident Response Policies and Procedures
Include: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned

An Incident Response Plan is a critical document to the overall security of the hospital environment. Below is a short overview of the stages of an Incident Response Plan. Each is directly related to a hospital information system risk management policy.

Preparation – It is important that all employees participate in training so they will know their role when a risk event occurs. Cyber threats should be at the top of the training list. Preparing begins with monitoring the network for obvious threats and reviewing logs in detail to prepare a course of action to mitigate the risk. Security policies should be updated on a regular basis.

Identification – Using equipment such as intrusion detection systems (IDS) can greatly affect the success of identifying risks and threats to the hospital. Employees should have a documented procedure on common security events to take the appropriate course of action. For example, if an employee’s computer has an obvious virus, the document should provide steps such as unplugging the computer from the network.

Containment - Once the computer is disconnected from the network, as in the example above, the risk is now considered contained. A virus scan would then be run to quarantine any malware or virus threats. Documenting the incident is also an important step.

Eradication – as in the example above, if the virus scan detects malware or a virus, the anti-virus software can eliminate the threat. Running diagnostics on the network server and affected computer is a great place to continue eradication efforts.

Recovery - Validation tests should then be run on the computer to make sure the threat has been removed from the computer or network.

Lessons Learned – Documenting everything from beginning to end can prove to be very useful for future threats. What may not seem important today can quickly become extremely important in a week or two.

Auditing Policies and Procedures
The UPMC hospital system utilizes auditing and monitoring potential vulnerabilities and threats found in data systems and electronic records. This audits helps to sustain the security of the hospital and identifies threats to confidentiality, integrity, and availability of confidential information. Audits are used by hospital administrators to measure how well current security policies are working while identifying potential future security enhancements to the information systems. The hospital systems include access auditing which are required software features to protect patient health information (PHI).

Below are example audit policy and procedures for the hospital.

1. Monitoring will occur on hospital information systems to identify unauthorized access, internal and external attempts to access the system, and other intrusion efforts by unauthorized users.

2. The hospital will track access and maintain system and event logs regarding system changes in configuration.

3. Security events will be reported to the UPMC security team.

Environmental/Physical Policies and Procedures
Environmental and physical security policies and procedures are especially important to UPMC hospital system since the hospital maintains items such as infectious and radioactive materials, narcotic and hazardous drugs, and hazardous chemicals. UPMC must ensure they remain in compliance with the Occupational Safety and Health Administration (OSHA) and protect staff, patients, and visitors from accidental exposure to these chemicals.

The Environmental Protection Agency (EPA) regulates these types of security issues along with smoke and fire dangers in connection with these chemicals, which can be deadly. The EPA reviews the hospital’s policies every three years to ensure they remain in compliance with the hundreds of rules and regulations surrounding environmental security (Compliance.com, 2019).

Administrative Policies and Procedures
Administrative Security policies and procedures are needed to control and protect the handling and distribution of administrative data. Types of data included in this area patient data, financial data, employee data, and hospital lab reports, to name a few. Since this data is housed on the hospital’s information system, it is imperative to protect the systems from cyber threats or intrusions.

Configuration Policies and Procedures
Recommended configuration policies and procedures will ensure information systems are safeguarded against cyber threats and attacks. Failure to follow these procedures could lead to unauthorized use of data, data unavailability, and data loss. Configuration policies offer security for the hospital that reduces security vulnerabilities, threats, and risks along with saving hospital resources and valuable time spent protecting patient data.

UPMC Hospital Configuration Policy

1. Information System Configurations

a. Documentation must be completed on each IS component including:

i. Current operating system (OS), installed software, and installed applications for mobile devices, computers, network equipment, laptops, and servers.

ii. Update and patch information on each system

iii. Network diagrams, including logical and physical placements

iv. Any configuration exceptions must also be documented.

b. Configuration Review and Updates

i. Review of configuration documentation must be done annually

ii. Records must be updated to illustrate any changes to config settings within the systems.

2. Configuration Devices.

a. HIPAA Security regulations are highly concerned with the following devices, including: modems, wireless access points, e-mail servers, web servers, virtual private networks, firewalls, and routers (HIPAA-compliant configuration guidelines for Information Security in a Medical Center environment, p. 4).

b. These devices above are a critical security factor since the outside world will have to infiltrate them in order to gain access to the hospital network. Protecting these devices is therefore key to maintaining a secure environment.

3. Testing.

a. Intrusion prevention and testing devices is a key factor in meeting compliance with HIPAA Security Guidelines.

Conclusion

While there is no single act that completely secures a hospital information system, following policies that keep the hospital in compliance with local and federal laws and regulations, is a good place to start. Providing a secure environment is an on-going effort and does not end. Cyber Security Engineers must have the mindset of lifetime learning to ensure they are keeping up-to-date with the newest threats along with the newest technologies to protect the hospital from these threats.

Reference Page
CMS.gov (2019). Background Check. Retrieved from https://www.cms.gov/Medicare/Provider-Enrollment-and-Certification/SurveyCertificationGenInfo/BackgroundCheck.html

Compliance.com (2019). Environmental Health and Safety. Retrieved from https://compliance.com/publications/hospital-risk-assessment-environmental-health-and-safety-compliance-and-physical-security-standards/

Healthcare.Partners.org (2019). IP Policy. Retrieved from http://healthcare.partners.org/OGCpolicies/IPPolicy.pdf

Sans.org (2019). HIPAA-compliant configuration guidelines for Information Security in a Medical Center environment. Retrieved from https://www.sans.org/reading-room/whitepapers/hipaa/hipaa-compliant-configuration-guidelines-information-security-medical-center-environment-891

Livewire.com (2019). Isolation Property in a Database. Retrieved from https://www.lifewire.com/isolation-definition-1019173

MayoClinic.org (2019). Confidentiality Agreement. Retrieved from https://www.mayoclinic.org/documents/confidentiality-jax-pdf/doc-20079517

NC.gov (2019). Configuration Management Policy. Retrieved from https://files.nc.gov/ncdit/documents/Statewide_Policies/SCIO_Configuration_Management.pdf

TechTarget (2019). ISO 27001. Retrieved from https://whatis.techtarget.com/definition/ISO-27001

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Pro Writer
Fatimah Syeda
Study Master
Top Academic Guru
Instant Assignment Writer
Supreme Essay Writer
Writer Writer Name Offer Chat
Pro Writer

ONLINE

Pro Writer

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$32 Chat With Writer
Fatimah Syeda

ONLINE

Fatimah Syeda

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$38 Chat With Writer
Study Master

ONLINE

Study Master

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$26 Chat With Writer
Top Academic Guru

ONLINE

Top Academic Guru

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$40 Chat With Writer
Instant Assignment Writer

ONLINE

Instant Assignment Writer

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$24 Chat With Writer
Supreme Essay Writer

ONLINE

Supreme Essay Writer

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$16 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Cadbury malaysia annual report - Dog star training witham - Bbc chemistry a volatile history episode 2 worksheet answer key - 21 39 melbourne street north adelaide south australia - Sodium bicarbonate is reacted with concentrated hydrochloric acid - Plural form of tableau - Summary and personal reflection(due on Sep 15th) - Wisconsin card sorting test computer version free - What is a level 2 merit equivalent to - Jcpenney long island - Assignment 3 cultural activity report - Is hacksaw ridge based on a true story - Foundations of business william pride pdf - Spring test thoracic spine - Case study 2 improving e mail marketing response - Case study - I need 2 pages on International Sales and Marketing . - Business strategy game login - Confucian oral traditions - The italicized words make up which type of verbal phrase - University of canterbury email - Is volleyball aerobic or anaerobic - Citation the bible in turabian liberty university - Bible study on 2 kings 4 1 7 - Air standard efficiency of brayton cycle - Metaphors in the lovely bones - Heart of darkness themes and symbols - Dermacos anti aging serum - Tonga toys manufactures and distributes a number - Themes in the odyssey - Genes - Tigerair philippines web check in - Marketing plan - Etisalat asiana package channel list - Soap note example well visit - Staffing issues interactive case study - Factor tree of 24 - United colors of benetton marketing strategy - Cyber Security - Wk8 DQ1 Discussion Question 1 - CLO 3, CLO 4 - What temperature does water boil at 10000 feet - Polit and beck 2008 reference - Calcium edta for birds - Juxtapose synonym and antonym - Dunkin donuts operations manager job description - CIPD: 7ELW Advanced 7ELW: Employment Law - Module 4 Writing assignment - Macewan residence services a risky accommodation - The village surgery harpenden - Schwartz model organizes values into - Swot analysis of plastic recycling company - Fall of humanity then and now worksheet part 2 - Business studies operations strategies essay - The ____ command is used to restore the table’s contents to their previous values. - What do they call the international hula hoop championships answers - When was hokusai born - Curveball the year i lost my grip sparknotes - Slavin & schunk learning theories educ 500 - 8 o clock military time - All in his hands lyrics florida mass choir - Army bfa standards australia - Asherah pole in washington dc - A world of mobile learning uwa - Gleniffer dog agility club - EXTRA CREDIT ASSIGNMENT - How to draw a space time diagram - Business Law - 2 Business letters - Arinc 429 bus architecture - Compare and contrast - 741 op amp equivalent - The vanishing coin comprehension questions - How many ml in a small styrofoam cup - Mount vesuvius eruption 1944 video - Wk 2 – Assessment and Student Learning Outcomes Worksheet Wk 2 – Assessment and Student Learning Outcomes Worksheet - Navigate to https eprescribe allscripts com activate default aspx - Danny and sue puberty blues - Stage 2 pdhpe units of work - Jasper jones jeffrey lu cricket - ART analysis video summery % - Edi separator adapter in sap pi - Red roofs surgery online booking - Pacific cataract and laser institute case study - In cell e15 enter a formula - Definition and Synthesis - Kepner tregoe decision analysis example - ANTH question - Enersys desert hog battery - Introduction to Speech - Bbva compass marketing resource allocation case solution - Nolo press how to form a nonprofit corporation - Power Point Assigment - Aon network diagram software - Kaffir boy book summary - In 2017, approximately how many people worked for the state bureaucracy in texas? - Global environment for network innovations - 520 paper - I am david book report - History of knowledge management - Girl scout cookie club