Here is the synopsis of our sample research paper on Information Security at Mayo Foundation. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
A 3 page overview of the security policies that have been put in place to protect data integrity. This paper points out the strengths and the weaknesses of those policies. Bibliography lists 1 source.
Page Count:
3 pages (~225 words per page)
File: AM2_PPcmpSecMayoFoundation.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
well-developed security policies and standards. Mayo Foundation is exemplary in this regard yet even their policies have considerable room for improvement. Mayo has implemented numerous protective measures to
control access to what they term "individually identifiable health information and "protected health information". The purpose of Mayos policies and standards is, of course, to prevent that information from
being modified, disclosed or destroyed. One of the primary strengths of Mayos information security provisions is its designation of one specific entity for
devising and implementing those provisions. This entity is the Foundation Information Security Office. That office represents a single point of contact and acts in the coordination and development
of security policies and activities. It works closely, however, with other security entities within Mayo such as Physical Security, Internal Audit Services, Information Services, and Mayos Legal Department.
The Foundation Information Security Office also works closely with outside law enforcement agencies to further insure the security of their internal information. Systems
administrators are charged with a variety of responsibilities at Mayo. These include obvious security measures like designating workstation orientation and printer location and less obvious measures like monitoring Internet
usage and document designations. While Mayo has an identified office that handles security affairs, the Foundation places the primary responsibility for the protection of information on the information stewards
or owner themselves. Much of this responsibility relates to identifying the appropriate use of a particular set of information and who is allowed to access the information for that
use. Another responsibility of the information steward/owner is reviewing security violation reports and following reporting procedures. This last responsibility, perhaps,
...