HIPAA and information security risk: Implementing an enterprise-wide risk management strategy

被引:1
|
作者
Alberts, C [1 ]
Dorofee, A [1 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
关键词
HIPAA; information security risk; information security readiness; OCTAVE; practice; asset; threat; vulnerability;
D O I
10.1117/12.435462
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
The Health Insurance Portability and Accountability Act (IAA) of 1996 effectively establishes a standard of due care for healthcare information security. One of the challenges of implementing policies, procedures, and practices consistent with HIPAA requirements in the Department of Defense Military Health System (MHS) is the need for a method that can tailor the requirements to a variety of organizational contexts. This paper will describe a self-directed information security risk evaluation that will enable military healthcare providers to assess their risks and to develop mitigation strategies consistent with HIPAA guidelines. The self-directed risk assessment can be tailored for the ranges of operating environments found in the MHS. It will focus on both organizational and technological improvements using the HIPAA regulations as a benchmark for information security readiness. The evaluation will utilize a interdisciplinary team in an organization to oversee the process and apply recommendations generated by the team. In addition, staff from multiple organizational levels in the organization will contribute their unique knowledge of the enterprise's operations. This information combined with technology-based vulnerabilities yields the organization's risks. This paper will also describe the results of early field tests of the evaluation and provide a summary of lessons learned.
引用
收藏
页码:97 / 108
页数:12
相关论文
共 50 条
  • [41] 1 Enterprise-wide Requirements & Decision Management
    DeGregorio, Gary
    INCOSE International Symposium, 1999, 9 (01): : 644 - 650
  • [42] Constructing Enterprise Information Network Security Risk Management Mechanism by Ontology
    Liu, Fong-Hao
    Lee, Wei-Tsong
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2010, 13 (01): : 79 - 87
  • [43] Virtual enterprise risk and security management
    Feglar, T
    ISC'2005: 3rd Industrial Simulation Conference 2005, 2005, : 145 - 149
  • [44] Improving Information Security Through Risk Management and Enterprise Architecture Integration
    Nather, Sarah
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 420 - 426
  • [45] The challenges of and solutions for implementing enterprise risk management
    Fraser, John R. S.
    Simkins, Betty J.
    BUSINESS HORIZONS, 2016, 59 (06) : 689 - 698
  • [46] Research on Information Security Strategy and Risk Management for Smart Grid
    Wang, Rui
    2014 CHINA INTERNATIONAL CONFERENCE ON ELECTRICITY DISTRIBUTION (CICED), 2014,
  • [47] Why use communication training as enterprise-wide project risk mitigation tool?
    Pretorius, Hedre
    Zaaiman, Hermien
    2013 ENTERPRISE SYSTEMS CONFERENCE (ES), 2013,
  • [48] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [49] Towards an Integration of Information Security Management, Risk Management and Enterprise Architecture Management - a Literature Review
    Diefenbach, Thomas
    Lucke, Carsten
    Lechner, Ulrike
    11TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2019), 2019, : 326 - 333
  • [50] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68