Hrm 531 Week 6 Personal Security Plan

Superior Essays
Physical security is one of the most important aspects of maintaining a business, especially when the company is handling large amounts of PII and NPPI. Any company handling sensitive information has to keep in mind all state and federal regulations that the business must adhere to, such as HIPPA and GLBA. Training and education of the employees is just as important to a company’s security plan as implementing safeguards and elaborate equipment. The whole team has to be on board with how important physical security is to the success of the company.
The first thing I noticed about this location it that it is downtown. This indicates that a lot of individuals will have access to the building, as well as data in the building. Furthermore, the location of this building could indicate that it would be more susceptible to other structure fire around that location. In more cases that one, when a fire occurs around closely grouped building other buildings with also catch fire. Something else I noticed about business is that the text mentions all the data being managed is under one central location, this could be problematic. I would suggest that the company invest in a cloud service
…show more content…
At no point in time should any sensitive documentation be left unattended by personnel. Employees should be trained on how to identify PII and NPPI. Along with locking up any hard copies of sensitive documentation employees should always encrypt any sensitive information. All company computer need to be password protected and have a strong password standard of two special characters, two numbers, two capital letters and be at least 14 characters long. The password should be required to be changed every 30 days. Furthermore, the employees must be trained to not share passwords or write them down. The company could choose to use the smart card system mentioned earlier in the text for building access as well as computer

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Other markets for these programs have vast testing and support groups that help to work out bugs in their Information systems. Using mainstream programs will limit the corporation on features that may be added or amended. An internal high performance team will look at all of the options, where the system has failed or performed, and new features that may be incorporate into the system. The plan will follow these steps: 1.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    To access to the computing device users will use their common access card to log on to the system. This will require them to provide a seven digit pin along with the digital certificate on the common access card. In addition to the login digital certificate there will also be an email certificate used for encrypting email traffic using a PKI system. Emails will also be required to be digitally signed ensure users are who they say they are. Users requiring access to the classified network will be issued an additional access…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Case Study 1 AIT 652 Sache Bond Executive summary: Towson University is responsible for complying with both Federal and Maryland state laws. It is essential that all employees are aware that the proper procedures must be followed to ensure that the legal action remains unrevised once the legal hold notice is issued. The legal holds notice will inform all necessary employees of their new profound obligation as an employee. The notice refers you to the policy written on the legal hold notices. The guidance of the legal holds notice supersedes all other retention policy guidelines (Records).…

    • 1033 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Triangle Shirtwaist Fire

    • 1152 Words
    • 5 Pages

    In the March of 1911, one hundred and forty five workers, the majority of which were women, perished in a textile fire due to the neglect of their employer to provide a safe working environment. (“Triangle Shirtwaist Fire”, 2009) This event became known to history as the Triangle Shirtwaist Factory Fire and was the catalyst for many progressive reforms in New York City such as the establishment of the Bureau of Fire Prevention, changing the Municipal Building Code and eventually the overhaul of the state’s labor code. (“Legislative Reform at State and Local Level”, n.d) Our inheritance from these reforms is that we as a society have placed the expectation upon employers to provide and ensure the health and safety of their employees in the workplace and that failing to do so has consequences.…

    • 1152 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 3

    • 781 Words
    • 4 Pages

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). When it comes to protecting patient information, it’s about getting employees to understand how to best protect it and what to do if there is a data breach. Training is essential and should include not only administrative employees, like medical office specialist, but also doctors, nurses, and other clinicians throughout the organization. All employees with access to patient information need to have the understanding of how to maintain security protocols when it comes to patient care. Many clinicians tend to look at PHI breaches as simply an IT issue.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Throughout our Risk Management Plan, we identified three possible risk with uniStuff.com that need to be address to avoid the project to fail. When running our SWOT analysis for the platform functionality and security, we noticed that online payment fraud and cyber security may impose major threats to the success of the project. Further analyzation of the services and legal paperwork, also allowed us to identify risks associated with customer satisfaction and refund policies. Online payment fraud risk presents a major profit loss and online purchasing fraud risk to uniStuff.com as false payment information or non funded payments could be possibly utilized for the transactions, thus threatening the profitability and reputation of the platform.…

    • 367 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The security policies should outline what employees are expected of in regards to complying with the security policies and the consequences…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Rhrop Analysis

    • 1719 Words
    • 7 Pages

    Administrative safeguards mandate that organizations create policy and procedures that will create programs such as risk management teams that will conduct ongoing risk assessments. In addition, administrative safeguards will require the proper IT systems and services. Physical Safeguards shield the hardware and the facilities that store protected health information (PHI) (HRSA, 2014). This includes: Computer security and who has access to each workstation, accountability of removable hardware such as handheld devices and physical limitation to the access of where health IT is stored. Technical Safeguards are safeguards that are installed in the health IT system to secure the health data and who has access to it.…

    • 1719 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Unnecessary personal health information on thumb drives, CDs or DVDs need to be destroyed. * Limit the access to personal health information to those who really need to see it. * Do what is necessary to prevent theft of equipment containing personal health records. * All passwords should expire in 180 days and all information is to be password-protected.…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Why Collect HR Data

    • 1110 Words
    • 5 Pages

    Data Protection Act This act applies to all organisations that process data relating to their staff and customers. It is the main legal framework in UK that protects personal data. The act contains 8 data protection principles which are: Personal data should be processed fairly and lawfully, this can be achieved by asking the employees to use their information, on the employment contract.…

    • 1110 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Serious Conundrum

    • 421 Words
    • 2 Pages

    You can also use a password manager from a managed IT company, such as our company in San…

    • 421 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Promote Fire Safety

    • 652 Words
    • 3 Pages

    There are alarms and door locks, lighting, signage, and symbols in different areas, there are also telephone and the internet that can be used in case of emergency. All these tools should protect employees and the elderly patients with dementia. 13.8 b to check the identity of the process is to understand what is the agreed legal ways to check their background if someone is requesting access to different work areas is to check on their identification or ID. They should also log-in during their entry and log-off during their exit. Badges must also be checked or kept on the counter or security area.…

    • 652 Words
    • 3 Pages
    Improved Essays