Sample Essay on:
SECURITY AT ST. JOHN’S HOSPITAL

Here is the synopsis of our sample research paper on SECURITY AT ST. JOHN’S HOSPITAL. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 7-page paper discusses information technology security protocols for St. John's Hospital. Bibliography lists 4 sources.

Page Count:

7 pages (~225 words per page)

File: AS43_MTsecustjo.doc

Buy This Term Paper »

 

Unformatted sample text from the term paper:

among these information systems. This, in turn, has led to a booming business in IT security tools, ranging from firewalls and password protection to keep out hackers, to anti-virus software to catch and prevent worms, Trojan Horses, spyware and other malicious stuff from destroying records and software. Ultimately, though, all the anti-virus programs and firewalls arent going to mean a thing if IT end users arent well-versed in their own roles in preventing breaches. This is the situation well examine with St. Johns Hospital. St. Johns has implemented sound policies and procedures for the protection of confidential patient and client information. This organization is so strong in security protection, it serves as a role model for other institutions in the area. However, its recently been discovered that printouts to be discarded in the restricted-access information systems department arent destroyed or shredded - but simply tossed. On many occasions, St. Johns employees working late have noticed the cleaning staff reading discarded printouts. In other words, the restricted-access IS department isnt quite so restricted-accessed as it might seem. The point here is that something needs to be done so sensitive information isnt being seen - and read - by unauthorized personnel (such as the cleaning crew or perhaps the cleaning crews friends). The likelihood is strong that these documents arent shredded because it didnt occur to anyone that unauthorized personnel had access to the premises. This is clearly a false assumption, and management will need to take quick action to prevent sensitive information from being viewed, or even stolen. Managements Response Most experts agree that the largest security breach is the human one. This ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now