Difference between revisions of "Security Standards"

From Clinfowiki
Jump to: navigation, search
(References)
Line 1: Line 1:
=Security standards=
+
 
  
 
Information security management standards are among the most widely used methods of security management. They focus on ensuring that certain information security processes or activities exist, while they are unconcerned about and fail to give advice on how these security processes can be accomplished in practice. <ref name=" Siponen 2006 "> Siponen, M. (2006). Information security standards focus on the existence of process, not its content. H.W. Wilson - Applied Science & Technology Abstracts.
 
Information security management standards are among the most widely used methods of security management. They focus on ensuring that certain information security processes or activities exist, while they are unconcerned about and fail to give advice on how these security processes can be accomplished in practice. <ref name=" Siponen 2006 "> Siponen, M. (2006). Information security standards focus on the existence of process, not its content. H.W. Wilson - Applied Science & Technology Abstracts.

Revision as of 04:40, 23 November 2015


Information security management standards are among the most widely used methods of security management. They focus on ensuring that certain information security processes or activities exist, while they are unconcerned about and fail to give advice on how these security processes can be accomplished in practice. [1]

The HIPAA Security Standards require physicians to protect the security of patients' electronic medical information through the use of procedures and mechanisms that protect the confidentiality, integrity, and availability of information. As of 2005, physicians must have in place administrative, physical, and technical safeguards that will protect electronic health information that the physician collects, maintains, uses, and transmits. [2]


References

  1. Siponen, M. (2006). Information security standards focus on the existence of process, not its content. H.W. Wilson - Applied Science & Technology Abstracts.
  2. American Medical Association. Security Standards and Risk Analysis. Retrieved from http://www.ama-assn.org/ama/pub/physician-resources/solutions-managing-your-practice/coding-billing-insurance/hipaahealth-insurance-portability-accountability-act/security-standards.page?