Follow us on Instagram

Security Basics (Part Five) INFORMATION SECURITY AND ACCESS CONTROLS

Posted by Thomas Davon on

Security Basics (Part Five) INFORMATION SECURITY AND ACCESS CONTROLS

Access controls is a very important aspect of information security. This is concerned with the way a health care provider controls the level of access and who gets access to Protected Health Information. No everyone should be able to view certain information especially not without the necessary permission from the right persons. A good and adequate access control by a health care provider would ensure privacy and security of information. A good access control practice by health care provider would be one that allows even authorized persons to only gain access to the information that is necessary for just the...

Read more →

Security Basics (Part Four) INFORMATION SECURITY AND DATA PROTECTION

Posted by Thomas Davon on

Security Basics (Part Four) INFORMATION SECURITY AND DATA PROTECTION

Information security also known as InfoSec is a set of strategies that is used for the managing of the different processes, tools and policies that are needed for the prevention, detection, documentation and countering of any form of threats to digital and non-digital information. Information security has several responsibilities which include the establishment of a set of business processes that will protect information assets whether the information is in an electronic format, paper format or oral format. It is also responsible for protecting information that is currently being processed, in transit or in a storage device. The fundamentals of information...

Read more →

Security Basics (Part Three) THE DIFFERENCE BETWEEN INFORMATION SECURITY AND DATA PROTECTION

Posted by Thomas Davon on

Security Basics (Part Three) THE DIFFERENCE BETWEEN INFORMATION SECURITY AND DATA PROTECTION

People often use the term data protection interchangeably with information security, however, both of them are not the same. Information security and data protection were both established by different Acts. The Data Protection Act (DPA) which established data protection rules to a large extent also included information security in the lists of its 8 principles of data protection.   The principles of data protection Personal data shall be processed fairly and within the law. Personal data can only be held for specific and lawful purposes. Personal data shall be adequate, relevant and not excessive in relation to the purpose or...

Read more →

Security Basics (Part Two) INFORMATION SECURITY IDENTIFIERS

Posted by Thomas Davon on

Security Basics (Part Two) INFORMATION SECURITY IDENTIFIERS

In information security, the Stanford Data Classification Guidelines is what is used to classify information as either having no risk at all, or having a low risk or having a high risk. The guidelines highlight health information as having a high risk. According to the guidelines, the Protected Health Information (PHI) is a High-Risk Data which must be protected against any form of risk. According to the guidelines, a PHI is any information relating to the past, present or future of an individual and can be used to identify the individual. Such information must be treated with utmost privacy. It...

Read more →

Security Basics (Part One)

Posted by Thomas Davon on

Security Basics (Part One)

SOME CORE AREAS OF INFORMATION SECURITY Information security has been a major issue in recent times. The use and disclosure of information in such a way that the information does not cause any harm to the persons concerned is very important. There different areas of information security, these include:   Access: This is the ability to use, manipulate, modify, or affect another subject or object. Information access is only granted to those considered as authorized users. Any user who accesses information without authorization is considered a hacker and such an act is a violation of the information security laws.  ...

Read more →