Difference between revisions of "System Security"
From Clinfowiki
Line 1: | Line 1: | ||
− | ''' | + | '''System Security'''- The totality of safeguards including hardware, software, personnel policies, information practice policies, disaster preparedness, and oversight of these components. |
− | + | ||
+ | Security protects both the system and the information contained within from unauthorized access from without and from misuse from within. | ||
+ | |||
+ | Security enables the entity or system to protect the confidential information it stores from unauthorized access, disclosure, or misuse, thereby protecting the privacy of the individuals who are the subjects of the stored information.<ref name="System Security">Suzy A. Buckovich , Helga E. Rippen , Michael J. Rozen. Driving Toward Guiding Principles A Goal for Privacy, Confidentiality, and Security of Health Information. Journal of the American Medical Informatics Association Mar 1999, 6 (2) 122-133; DOI: 10.1136/jamia.1999.0060122 Retrieved from http://jamia.oxfordjournals.org/content/6/2/122</ref> | ||
== References == | == References == | ||
<references/> | <references/> |
Revision as of 17:06, 8 April 2015
System Security- The totality of safeguards including hardware, software, personnel policies, information practice policies, disaster preparedness, and oversight of these components.
Security protects both the system and the information contained within from unauthorized access from without and from misuse from within.
Security enables the entity or system to protect the confidential information it stores from unauthorized access, disclosure, or misuse, thereby protecting the privacy of the individuals who are the subjects of the stored information.[1]
References
- ↑ Suzy A. Buckovich , Helga E. Rippen , Michael J. Rozen. Driving Toward Guiding Principles A Goal for Privacy, Confidentiality, and Security of Health Information. Journal of the American Medical Informatics Association Mar 1999, 6 (2) 122-133; DOI: 10.1136/jamia.1999.0060122 Retrieved from http://jamia.oxfordjournals.org/content/6/2/122