HIPAA and information security risk: Implementing an enterprise-wide risk management strategy

被引:1
|
作者
Alberts, C [1 ]
Dorofee, A [1 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
关键词
HIPAA; information security risk; information security readiness; OCTAVE; practice; asset; threat; vulnerability;
D O I
10.1117/12.435462
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
The Health Insurance Portability and Accountability Act (IAA) of 1996 effectively establishes a standard of due care for healthcare information security. One of the challenges of implementing policies, procedures, and practices consistent with HIPAA requirements in the Department of Defense Military Health System (MHS) is the need for a method that can tailor the requirements to a variety of organizational contexts. This paper will describe a self-directed information security risk evaluation that will enable military healthcare providers to assess their risks and to develop mitigation strategies consistent with HIPAA guidelines. The self-directed risk assessment can be tailored for the ranges of operating environments found in the MHS. It will focus on both organizational and technological improvements using the HIPAA regulations as a benchmark for information security readiness. The evaluation will utilize a interdisciplinary team in an organization to oversee the process and apply recommendations generated by the team. In addition, staff from multiple organizational levels in the organization will contribute their unique knowledge of the enterprise's operations. This information combined with technology-based vulnerabilities yields the organization's risks. This paper will also describe the results of early field tests of the evaluation and provide a summary of lessons learned.
引用
收藏
页码:97 / 108
页数:12
相关论文
共 50 条
  • [1] Integrating enterprise-wide risk management
    Altman, Wilf
    Cooper, Cary
    [J]. Engineering Management, 2004, 14 (05): : 12 - 13
  • [2] Ten steps to enterprise-wide risk management
    Burnaby, Priscilla
    Hass, Susan
    [J]. CORPORATE GOVERNANCE-THE INTERNATIONAL JOURNAL OF BUSINESS IN SOCIETY, 2009, 9 (05): : 539 - +
  • [3] Implementing an enterprise-wide document management system
    Queen, P
    [J]. PROCEEDINGS OF THE ARMA INTERNATIONAL 43RD ANNUAL CONFERENCE, 1998, : 147 - 152
  • [4] UNIVERSITY OF GEORGIA ROUNDTABLE ON: Enterprise-Wide Risk Management
    Verbrugge, James
    Niehaus, Greg
    Coleman, Walter
    Lawder, Keith
    Smith, Cliff
    Briscoe, Christie
    Ramamurtie, Sailesh
    Chew, Don
    [J]. JOURNAL OF APPLIED CORPORATE FINANCE, 2020, 32 (01) : 14 - 35
  • [5] Enterprise-wide risk management and organizational fit: a comparative study
    Arnaboldi, Michela
    Lapsley, Irvine
    [J]. JOURNAL OF ORGANIZATIONAL EFFECTIVENESS-PEOPLE AND PERFORMANCE, 2014, 1 (04) : 365 - 377
  • [6] Knowledge management in an enterprise-wide information system
    Chan, KCC
    Chung, LML
    [J]. WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 1, PROCEEDINGS: INFORMATION SYSTEMS, 1999, : 109 - 116
  • [7] Enterprise Risk Management and Information Systems Security Risk
    Olson, David L.
    Wu, Desheng
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON RISK MANAGEMENT & GLOBAL E-BUSINESS, VOLS I AND II, 2009, : 1 - 5
  • [8] Information Conveyed in Hiring Announcements of Senior Executives Overseeing Enterprise-Wide Risk Management Processes
    Beasley, Mark
    Pagach, Don
    Warr, Richard
    [J]. JOURNAL OF ACCOUNTING AUDITING AND FINANCE, 2008, 22 (03): : 311 - 332
  • [9] Study on Enterprise-wide Risk Management Based on Risk Identification, Assessment and Countermeasures in China
    Shi, Chao
    Li, Jienan
    Chen, Jie
    Wu, Zongzhi
    [J]. NEW PERSPECTIVES ON RISK ANALYSIS AND CRISIS RESPONSE, 2009, : 333 - +
  • [10] Enterprise-wide security administration
    Essmayr, W
    Kapsammer, E
    Wagner, RR
    Pernul, G
    Tjoa, AM
    [J]. NINTH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 1998, : 267 - 272