Difference between revisions of "Security Standards"

From Clinfowiki
Jump to: navigation, search
Line 1: Line 1:
  
Information security management standards are among the most widely used methods of security management. These standards are essential in any successful information security management activities. It is important to note these standards have an important limitation. They focus on ensuring that certain information security processes or activities exist, but not on how these security processes can be accomplished in practice. <ref name=" Siponen 2006 "> Siponen, M. (2006). Information security standards focus on the existence of process, not its content. H.W. Wilson - Applied Science & Technology Abstracts.
+
Information security management standards are among the most widely used methods of security management. These standards are essential in any successful information security management activities. It is important to note these standards have a limitation. They focus on ensuring that certain information security processes or activities exist, but not on how these security processes can be accomplished in practice. <ref name=" Siponen 2006 "> Siponen, M. (2006). Information security standards focus on the existence of process, not its content. H.W. Wilson - Applied Science & Technology Abstracts.
 
</ref>
 
</ref>
  

Revision as of 03:26, 24 November 2015

Information security management standards are among the most widely used methods of security management. These standards are essential in any successful information security management activities. It is important to note these standards have a limitation. They focus on ensuring that certain information security processes or activities exist, but not on how these security processes can be accomplished in practice. [1]


The HIPAA Security Standards require physicians to protect the security of patients' electronic medical information through the use of procedures and mechanisms that protect the confidentiality, integrity, and availability of information. As of 2005, physicians must have in place administrative, physical, and technical safeguards that will protect electronic health information that the physician collects, maintains, uses, and transmits. [2]


References

  1. Siponen, M. (2006). Information security standards focus on the existence of process, not its content. H.W. Wilson - Applied Science & Technology Abstracts.
  2. American Medical Association. Security Standards and Risk Analysis. Retrieved from http://www.ama-assn.org/ama/pub/physician-resources/solutions-managing-your-practice/coding-billing-insurance/hipaahealth-insurance-portability-accountability-act/security-standards.page?