Essay on The Issue Of Information Security Programs

Essay on The Issue Of Information Security Programs

Length: 1094 words (3.1 double-spaced pages)

Rating: Better Essays

Open Document

Essay Preview

As relates to the Issue of Information Security programs, the Department of Health and Human Sciences has formulated various different policies aimed at governing information handling and security as concerns all the departments’ resources. Common in the list of policies are the Policy on Information and Technology security for Remote Access which was established to ensure the information and technology departments resources are appropriately protected during the authorization of remote accessibility to the automated information and system of the department of human and health services. The policy for prevention ,detection, removal, and the reportage of malicious computer software, such as computer viruses whose main purpose is to assure the department of Health and Human Sciences that pro-active security measures are always taken to prevent malicious software attacks from occurring; to raise awareness for recognizing and immediately reporting the occurrence of malicious software; and also to ensure that appropriate action is taken in minimizing the consequences of malicious software attacks.

Among others is also the first issuance Policy for Privacy Impact Assessments for all Department of Health and Human Services, information technology systems which provides detailed instructions that aid in properly populating the Privacy Impact Assessments, and also a summary of the federal requirements and guidance laws that protect personally identifiable information (PII).which go a long way in helping to ensure privacy protections are incorporated into every stage of an IT system’s life cycle. There is also a departmental policy on the limited acceptable personal use of its information technology resources by federal staff, contracto...


... middle of paper ...


...e areas of application are still common to all. Policies apply to all Department Operating Divisions (OPDIVs) and Staff Divisions (STAFFDIVs), including the Offices of the Secretary and Office of the Inspector General, and also to all organizations operating IT systems on behalf of the Department






REFERENCES

i) United States Department of Health and Human Sciences Information Sharing Environment Privacy Policy. Retrieved from http://www.hhs.gov/ocio/policy/hhs-ocio-policy-2013-0002.pdf
ii) Policy For Impact Assesment. Retrieved from http://www.hhs.gov/ocio/policy/20090002.001.html
iii) HHS-OCIO Policy for Information Systems Security and Privacy.Retrieved from http://www.hhs.gov/ocio/policy/hhs-ocio-2011-0003.html
iv) HHS Policy for Personal Use of Information Technology Resources. Retrieved from http://www.hhs.gov/ocio/policy/pol-pers-use-it-resources.html


Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Essay about The Human Factor Of Physical Security

- The human factor of physical security consists of the people who own the property being protected, the people who work at the property or those that visit the property/protected area, and the security personnel guarding the property. As such the human factor of physical security is the most critical component; however it is also the most neglected aspect of most physical security programs. Physical security cannot be wholly successful without the human factor element and the active support of these user groups....   [tags: Security, Security guard, Risk, National security]

Better Essays
1226 words (3.5 pages)

Mobile And Cloud Security : Mobile Security Essay

- Mobile security, also called wireless security, refers to the protection of laptops, tablets, and smartphones, other computing devices as well as the networks they connect to from vulnerabilities and threats which are related to wireless computing. Mobile security is a broad term that entails several issues such as protecting a mobile device from malware threat, reducing risks and also securing the mobile device and its data in the incidences of theft, accidental loss of the device or unauthorized access....   [tags: Security, Computer security, Information security]

Better Essays
1126 words (3.2 pages)

Cyber Security Is Not Only An Issue For The World Essay

- It is clear the U.S. Government, after 9/11 had to rethink what port security really meant. It was no longer about drug smugglers and theft, it was now a broad based approach to securing the ports, protecting the people and infrastructure and reducing the likelihood of another attack, whereby preserving global economic activity. As outlined above many areas have been addressed to protect overall port security, maintain strict processes for port facility security and drive technology and cooperation to improve container security....   [tags: Security, Computer security, Port security]

Better Essays
1007 words (2.9 pages)

Cyber Security Is The Protection Of Networks, Computers, Programs And Data

- Cyber security is the protection of networks, computers, programs and data from attack, damage or unauthorized access. This is important because a great number of our confidential information is on computers and transmit that data across networks to other computers. As of now cyber-attack is one of the transnational issues that we are concern about in the United States. If these private networks were hack our national security infrastructure will be in distress. Cyber security is operating through the Department of homeland security (DHS) privacy office and the component privacy offices....   [tags: Security, National security]

Better Essays
737 words (2.1 pages)

Essay on The Issue Of Food Security

- In recent years, provincial and territorial governments across Canada have begun to develop programs and policies to address the issue of food security. These programs have the potential to play a role in reducing acute health care costs through preventative measures, support economic development and create jobs by developing local agri-food industries, raise the quality of life of residents by increasing access to safe, nutritious food, and promote environmental wellbeing through sustainable agriculture techniques or the promotion of local food....   [tags: Agriculture, Food, Food security, Poverty]

Better Essays
1014 words (2.9 pages)

Cyber Criminals And The Security Essay

- Cybersecurity is now an even bigger issue. As the measure of data being gathered keeps on developing, more organizations are building enormous data storehouses to store, total and concentrate importance from their data. Big data gives a gigantic upper hand to partnerships, helping organizations tailor their items to customer needs, assistance with identifying and minimize corporate inefficiencies, and offer data with client groups over the enterprise. Most organizations have significantly reinforced their cyber security capacities in the course of recent years....   [tags: Computer security, Security, Information security]

Better Essays
1267 words (3.6 pages)

An Effective Information Assurance Training Program Essay

- Training is the key to any program. Having a great program, no matter what it is used for, benefits no one if operators are unable to make it function as it was designed. This argument can be assigned to information security as well. Time has proven users are the weakest link to security programs. In a 2014 CSO reported 9 in 10 senior managers have sent sensitive data to the wrong destination, and also reported the same number of managers have intentionally uploaded files to a personal cloud or their personal email in order to continue working from home (Gonsalves, 2014)....   [tags: Security, Computer security, Information security]

Better Essays
1220 words (3.5 pages)

Essay on The Cyber Security Of Communications Systems

- The cyber security of communications systems is the vulnerability of our communications to information welfare. Communications systems are a critical component of our national security and emergency preparedness resources. Information exchange through voice data, video, and internet connectivity are the major supporting factors and constitute an important part of the overall national critical infrastructure. There are many different jobs within this field that require a broad range of knowledge, skills and abilities....   [tags: Security, National security, Computer security]

Better Essays
1226 words (3.5 pages)

Information Policy Essay

- Policy refers to those plans, positions and guidelines of government which influence decisions by government, for example policies in support of sustainable economic development or policies to enhance access to government services by persons with disabilities. There are various types and forms of policy. Among the range of policy type are: broad policy which enunciates government-wide direction; more specific policy which may be developed for a particular sector or issue-area; operational policy which may guide decisions on programs, and project selection....   [tags: government, Weingarten, ICT, information]

Better Essays
1156 words (3.3 pages)

Security And Privacy On The Internet Essay

- Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and other crimes. However, many users do not realize that they risk their security and privacy online....   [tags: Computer Security]

Better Essays
1474 words (4.2 pages)