Security Policies : The Healthcare Industry Implementation Of Security Policy

815 Words May 8th, 2016 4 Pages
IT Security PolicyIn the Healthcare industry implementation of security policies is important to remain compliant with Food and Drug Administration (FDA) regulations. For Information Technology specifically, security policies often are associated with IT Security guidelines, rules and parameters users of devices attached to the corporate network must operate within. In order to gain a better understanding of how security policies are implemented and enforced in the Healthcare industry, an interview was conducted with an IT Security Analyst working for a CRO focusing on Clinical Research. The discussion included a focus on the Mobile Device Management (MDM) system used to enforce security policies on mobile devices attempting to attach to the corporate network for various services. Topics reviewed were PIN/password policies, data encryption and lost or stolen device procedures.Security policies can apply to many difference facets of Information Technology. The security policy is a document that outlines specific requirements or rules that must be met.(Ciampa, 200). In a CRO there is typically a document that is written by someone in IT Security or the business that outlines mobile device requirements for use in the corporation. Mobile Device Management or MDM allows network managers, administrators, engineers, and other information technology personnel to manage, control, and secure multiplatform device environments that may be used on the network. (Bartz 442,443). In a CRO…

Related Documents