HIPAA and information security risk: Implementing an enterprise-wide risk management strategy

被引:1
|
作者
Alberts, C [1 ]
Dorofee, A [1 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
关键词
HIPAA; information security risk; information security readiness; OCTAVE; practice; asset; threat; vulnerability;
D O I
10.1117/12.435462
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
The Health Insurance Portability and Accountability Act (IAA) of 1996 effectively establishes a standard of due care for healthcare information security. One of the challenges of implementing policies, procedures, and practices consistent with HIPAA requirements in the Department of Defense Military Health System (MHS) is the need for a method that can tailor the requirements to a variety of organizational contexts. This paper will describe a self-directed information security risk evaluation that will enable military healthcare providers to assess their risks and to develop mitigation strategies consistent with HIPAA guidelines. The self-directed risk assessment can be tailored for the ranges of operating environments found in the MHS. It will focus on both organizational and technological improvements using the HIPAA regulations as a benchmark for information security readiness. The evaluation will utilize a interdisciplinary team in an organization to oversee the process and apply recommendations generated by the team. In addition, staff from multiple organizational levels in the organization will contribute their unique knowledge of the enterprise's operations. This information combined with technology-based vulnerabilities yields the organization's risks. This paper will also describe the results of early field tests of the evaluation and provide a summary of lessons learned.
引用
下载
收藏
页码:97 / 108
页数:12
相关论文
共 50 条
  • [21] A Case Study on Risk Management of Enterprise Information Security
    Huang, Rengen
    Zhu, Zhen
    2015 2nd International Conference on Creative Education (ICCE 2015), Pt 2, 2015, 11 : 201 - 208
  • [22] Interoperability and enterprise-wide information infrastructure
    Ginsburg, M
    ASSOCIATION FOR INFORMATION SYSTEMS PROCEEDING OF THE AMERICAS CONFERENCE ON INFORMATION SYSTEMS, 1997, : 1049 - 1049
  • [23] Recoupling work beyond COSO: A longitudinal case study of Enterprise-wide Risk Management
    Jemaa, Fatma
    ACCOUNTING ORGANIZATIONS AND SOCIETY, 2022, 103
  • [24] Developing a scaleable information architecture for an enterprise-wide consolidated information management platform
    van der Walt, P. W.
    du Toit, A. S. A.
    ASLIB PROCEEDINGS, 2007, 59 (01): : 80 - 96
  • [25] Security aspects of an enterprise-wide network architecture
    Loew, R
    Stengel, I
    Bleimann, U
    McDonald, A
    INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 1999, 9 (01): : 8 - 15
  • [26] ENTERPRISE-WIDE PROJECT-MANAGEMENT
    MCFARLANE, D
    INDUSTRIAL ENGINEERING, 1993, 25 (06): : 44 - 44
  • [27] Overview of Information Security Management-Based on Enterprise Risk Management
    She, Jing-Huai
    Zhang, Run-Qiang
    She, Yuan
    Hou, Bing-Xin
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 384 - 387
  • [28] Enterprise-wide adoption patterns of inventory management practices and information systems
    Rabinovich, E
    Evers, PT
    TRANSPORTATION RESEARCH PART E-LOGISTICS AND TRANSPORTATION REVIEW, 2002, 38 (06) : 389 - 404
  • [29] Enterprise risk management and information technology security in the financial sector
    Kwateng, Kwame Owusu
    Amanor, Christopher
    Tetteh, Francis Kamewor
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (03) : 422 - 451
  • [30] Enterprise architecture to enhance security and risk management of information systems
    School of Software, Tsinghua University, Beijing 100084, China
    Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2073-2086):