Organization of Information Security Policies Essay

Paper Type:  Essay
Pages:  3
Wordcount:  654 Words
Date:  2022-08-01

How my Organization is Developed concerning Information Security Policies?

American Public Health Association abbreviated as APHA started by upholding the privacy of the visitors of its website (APHA.,n. d.). The policy was used to explain how APHA planned to collect use and safeguard the personal information on the visitors of apha.org website. APHA collects various data which the members and visitors of the site provide knowingly (Lafky & Horan, 2011). The facility ensures that cookies do not access member accounts or approve any single financial transaction through a requirement of additional login. Another approach that the facility alludes to as a way of enhancing information security is avoiding the collection of members registration details, payment information, and publication of orders.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

The Policies and Measures Used to Enhance Confidentiality, Reliability, and Availability of Information and Data

Information on members and visitors is only used for the primary purpose that is specified. Additionally, the website offers a chance for changing their information preference on My APHA as a way of promoting information security. There is also an action center for reporting phishing activity or misuse of a visitor or a member's data (APHA.,n. d.). Another policy that is evident in APHA is opting for not providing sensitive data like one's ID, password and any other data that might result in compromising one's private information. The visitors are advised of the challenges of following links to other websites that usually collect personal data of the visitors. The visitors are also encouraged to be continually checking the privacy policies for possible chances of protecting their data.

Protection of Data from Loss, The Steps Taken to Make Sure that Data Remains Accessible in a Catastrophic Incident

APHA has adopted an enhanced approach towards coming up with Incidence Command System (ICS) that is capable of coordinating all possible response activities for various disaster services agencies. There is also a public health incident command system (PHICS) that is responsible for approving a memorandum of understanding in times of catastrophe. The accessibility of data during the emergence of a calamity is enhanced through an Emergency Information System abbreviated as EIS (Appari & Johnson, 2010). In case a catastrophe affects the flow of data to stakeholders, there are a platform and agencies that are responsible for determining the public health data that is fundamentally important in communicating ideas to health professionals, responders and the public.

What the Organization Could Do to Enhance Information Security

The facility should come up with research concerning the pre-impact analysis of information security breach. By carrying out a pre-impact analysis, the facility will be able to identify the gaps in the security frameworks amid focusing on ways to curb the red lights. There should be a frequent update of Information security systems as a way of minimizing the possibility of the hackers to affect the privacy of the facility's information (Lemos, 2015). On the other hand, firewalls should be checked frequently to ensure that no single problem ends up challenging the private data of the visitors and stakeholders of APHA facility (APHA.,n. d.). APHA should also enhance physical security to avoid logins from non-members of the facility as a way of promoting the general safety of APHA organization. The pre-impact analysis should check on the possibility of piggybacking to affect the privacy system of the facility. Security frameworks should accompany all development of the website for enhancing the privacy of the visitors to the site.

References

APHA. (n. d.). American Public Health Association. Private Policies. Retrieved from https://www.apha.org/privacy-policyAppari, A., & Johnson, M. E. (2010). Information security and privacy in healthcare: current state of research. International journal of Internet and enterprise management, 6(4), 279-314.

Lafky, D. B., & Horan, T. A. (2011). Personal health records: Consumer attitudes toward privacy and security of their personal health information. Health Informatics Journal, 17(1), 63-71.

Lemos, H. (2015). Ransomware prevention: Companies learned the hard way. Retrieved: http://www.pcworld.com/article/2901672/how-to-prevent-ransomware-what-one-company-learned-the-hard-way.html

Cite this page

Organization of Information Security Policies Essay. (2022, Aug 01). Retrieved from https://proessays.net/essays/organization-of-information-security-policies-essay

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism