Wednesday, October 30, 2019

Department of Health and Human Services IT Security Program Research Paper

Department of Health and Human Services IT Security Program - Research Paper Example This policy outlines the framework by which the department ensures that its IT resources are protected when accessed remotely. The resources mentioned include all levels of sensitivity all existing automated information and systems. The policy includes mandatory rules for all organizational units, employees and other stakeholders. The roles and responsibilities are also outlined for the managers, security and IT officers. Building on the fact that pro-active security measures are implemented and maintained effectively, this policy outlines the rules by which malware or malicious computer applications and data are prevented from entering the system, detected and rooted out immediately. This policy is particularly directed at the employees who are tasked to gather, process and transmit HHS information and infrastructure resources such as the Chief Information Officer (CIO), the Deputy Assistant Secretary for Information Resources management and Senior Information Systems Security Officer. Through this policy, the Department of Health and Human Services, effectively, created the PII Breach Response Team. Consequently, the policy outlined the responsibilities, tasks, and mandate of the team such as the identification, management, and response to suspected or confirmed security breaches. This policy also created the HHS Information Security and Privacy Program, which was developed to support the Breach Re sponse Team. This is one of the several major policies that came from the office of the Chief Information Officer. It outlines the implementation for machine-readable policy for the agency’s websites. A core component of this policy is the satisfaction of best practices standards in terms of satisfying web privacy security, legal and regulatory requirements as well as the collection and protection of data.  

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.