Friday, May 10, 2019

Information Security Program Survey Research Paper - 1

data Security Program Survey - Research Paper ExampleIn defend its data data, the department involves five offices in its organization to effectively secure data in their possession. These offices atomic number 18 the chief technology officers council, the chief information officers council, the chief information security measures officers workgroup, and the enterprises architecture workgroup. This paper seeks to analyze information security concepts in coincidence to the roles of the Chief Information Officers Council (HHS.gov, 2012).Information security programs protect the information the organization gathers, creates, processes, transmits and stores. One of the information security programs the organization applies is the use of computerized system to store cutting information concerning to personal employee information, various departments financial and counseling operations, information pertaining to the medical records of millions of American seeking financial aid th rough the various insurance programs it operates, such as medicare (HHS.gov, 2012).Computerized system of storing and disseminating data is vulnerable to unwarranted entry and hackers from the cyber space. This has an effect of loss of data, and availability of sensitive and highly confidential information to unwarranted recipients. To protect against these risks, the United States congress, in 2002 passed a legislature requiring altogether Federal institutions to initiate security measures, aimed at protecting their information systems.The statute is referred to as Federal Information Security Management Act, of 2002. In response to this act, the department of Health and Human Services formed the department of the Chief Information Officer (HHS OCIO), whose role is to advice the secretary, and his assistant on all issues pertaining to information security that pertain to the achievement of the organizations goals (HHS.gov, 2012).The office of OCIO develops programs that protect t he

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.