Workstation Security Policy Paper

Improved Essays
Workstation Security Policy
A workstation policy provides standards for access to information inside the facility in a controlled manner, respecting guidelines set by the Health Insurance Portability and Accountability Act (HIPPA). The purpose of this policy is to provide guidelines to properly ensure workstation security within healthcare companies. Workstation security policy ensures the security of information on the workstation and information accessed by the workstation. Additionally, this policy provides guidelines on how to ensure that the requirements of HIPPA are met.
Implementation of policy
Appropriate measures must be taken when using workstations to ensure the confidentiality, integrity, and availability of sensitive information, including protected health information (PHI). These measures must ensure that access to sensitive information is restricted to authorized users
…show more content…
- Securing workstations with screen lock or logout screens before leaving the workstation to prevent unauthorized access.
- Allow a password-protected screen saver with a short timeout period to ensure that workstations will be protected.
- Password need to comply with the Company’s Password requirements.
- Ensuring that the workstation is used for intended purposes only.
- Employees need to avoid installing unauthorized software on workstations.
- Employees need to store sensitive information, including protected health information (PHI) on protected network servers only.
- Employees need to avoid accidental spills by keeping food and drink away from workstations.
- Laptops that contain sensitive information need to be secured by using cable locks or by locking them in drawers or cabinets.
- Employees need to comply with the Portable Workstation Encryption

Related Documents

  • Improved Essays

    The lock should require multi-factor authentication, such as a card swipe and an access PIN, or a biometric id check and a PIN. Preferably, the PIN entry keypad would randomize the position of the digits for each PIN entry attempt. The system should be connected to the network, be centrally configured and record all access attempts in a log. c) Video Surveillance System: In order to keep records of who is physically accessing critical areas and devices, video monitoring cameras should be installed with good views of those areas. At a minimum, cameras should have a view of the inside of the wiring closet / server room, the entry point to the wiring closet / server room, and the main entrance to the company…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This person is trained in the legal procedures for release of PHI. There are three ways that PHI, in electronic form, is protected in a facility, they are; Administrative Safeguards, Physical Safeguards, and Technical Safeguards. These make up the functional framework for protecting health information. These are mandated by the Security Rule of HIPAA. The medical office specialist needs to understand the roles that these safeguards play in the office environment.…

    • 957 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    PennyMac Loan Services, LLC is required to have physical safeguarding controls in place to secure consumer, employee, and Company Sensitive Information and maintains an Information Security Policy to do so. All individuals granted physical access to any Licensee facility are provided a badge, and must scan their badge prior to entering the premises. Individuals who are not issued a badge must log-in with the Security Desk prior to entering a facility. All employees must maintain a Clean Workspace, which includes desks, computer screens, printers and printer rooms, mail bins, conference rooms, cubicles and offices. All employees must keep workspaces free and clear of any documentation containing Sensitive Information, maintain locked drawers…

    • 433 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 781 Words
    • 4 Pages

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). When it comes to protecting patient information, it’s about getting employees to understand how to best protect it and what to do if there is a data breach. Training is essential and should include not only administrative employees, like medical office specialist, but also doctors, nurses, and other clinicians throughout the organization. All employees with access to patient information need to have the understanding of how to maintain security protocols when it comes to patient care. Many clinicians tend to look at PHI breaches as simply an IT issue.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Any organization, including ABC healthcare Information technology (IT) infrastructures are exceedingly powerless against potential assaults or harm caused from internal and external threats. Meeting standardize compliance requirements developed by the Sarbanes-Oxley (SOX) Act and the Health Insurance Portability and Accountability Act (HIPAA) is critical to reduce potentials assaults to guarantee their infrastructures are secure to the best degree possible by substituting data frameworks regulations. Technical security recommendations to improve ABC Healthcare information security can enhance their information security without significantly increasing management or cause difficulty in the organization. Healthcare industries store and have…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The security policies should outline what employees are expected of in regards to complying with the security policies and the consequences…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2) Do not use cloud based applications to store company information. These services may transfer data to not secure parties. 3) Do not share your data (do not synchronize) with other devices at home or any other places; not even with family and friends. By doing this you are inviting others to your share your network and facilitating the way for intrusions. 4) Throughout work hours, employees must keep to the minimum the usage of private devices for personal motives.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Some of the components involved with the HIPAA Security Rule applies to health plans, healthcare clearinghouses, and to any healthcare provider that transmits health information in an electronic form (HHS.org). These entities are affected and applied under the HIPAA Security Rule. The information that is protected includes individual health information in which “an entity creates, receives, maintains or transmits health records in the electronic form” (HHS.org). There are three fundamental areas that the HIPAA Security Rule address in which include technical safeguards, physical safeguards, and administrative safeguards. Technical safeguards must be implemented in order for electronic health information to be properly and safely transmitted.…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    HIPAA Code Of Privacy

    • 1119 Words
    • 5 Pages

    Computer with patient information on them should also be put in a place where patients and visitors could not view them. This meant the doctors’ offices needed to place their computers in a secured location away from other patients and or visitors. If a computer was going to be used in a public place where other might be able to see. Then a 3M privacy screen should be used in order to keep other patients and or visitors from seeing what might be on the screen at any giving…

    • 1119 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    HIPAA mandates certain privacy and security protections to encourage the realization of administrative efficiencies through healthcare information technologies (Withrow, 2010). The HIPAA Privacy has been controversial but Health and Human Services (HHS) has continued to clarify the complicated privacy rule through the…

    • 945 Words
    • 4 Pages
    Superior Essays