Essay Available:
You are here: Home → Essay → Technology
Pages:
1 page/≈275 words
Sources:
1 Source
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 4.5
Topic:
Using Audit Track to Prevent Unauthorized Access Research (Essay Sample)
Instructions:
the task was about audit trail evaluation
this sample is about Using Audit Track to Prevent Unauthorized Access
Content:
Using Audit Track to Prevent Unauthorized Access
Name:
Institution:
Using Audit Track to Prevent Unauthorized Access
A healthcare facility is an environment that needs players from varying backgrounds and expertise to ensure that the institution functions optimally. Hospitals employ the use of information technology to ensure efficiency and accuracy of the record but on the other hand, increase the risk of availing information to unauthorized persons. In the community hospital, janitorial accessed patients’ records thrice in a single date as the policy of the hospital prohibits access to patient’s information without a legitimate reason like affording treatment or for general administrative purposes. The work of a janitor does not in any way relate to patients’ treatment, and access of such information is unauthorized and malicious.
Audit trail for the purpose of this article is defined as a system that records an activity of a certain database showing details of how the users interact with the system. Audit trail and audit record tracks record time and details of the access done by a given individual (Sandra, 2009). For the system to work, every user should be assigned a unique log in combination that cannot be accessed by another. Electronically stored health information comes in handy beyond technical functionality to administrative and possible subsequent legal proceedings. Just like other institutions, healthcare facilities maintain a working force with varying scope of operation and professions. The role of an individual in an organization is defined, and the type of information system he/she required is availed. One the system is availed, the kind of information that may be required by a particular employee is availed. Each employee has a custom access to view or edit information (Sandra, 2009). More sensitive information may require the authorization of an officer of higher hierarchy or from a particular department as administrative protocol may require.
After establishing that an employee un-purposely access patient’s information, I would sermon the employee and ask him to the reasons why he had to access the patient’s information. The type of explanation the employee will give will be used to determine whether the employee actions should be condemned or not. The employee in question if found guilty may be issued with a warning letter or have his login credentials suspended. To prevent this type of unauthorized access, employees should be given access to information that only relates to their work. Login data should have different scopes and capabilities depending on the employee’s functions.
Employees ...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Research and Discuss Implications of Organizational BehavioursDescription: Insert table of contents and give implications of conflict on creating it organization and also on creating it organizations....4 pages/≈1100 words| 4 Sources | APA | Technology | Essay |
- Evaluation of the Steps that Dave Ballard and Nick Francesco Took in Response to the Theft o. . .Description: Evaluation of the Steps that Dave Ballard and Nick Francesco Took in Response to the Theft of the Deans Laptop...12 pages/≈3300 words| 2 Sources | APA | Technology | Essay |
- Features Comparison Between Mac Os and Windows 7 Os Description: Mac computers overall last longer than Windows PCs. However, one of the most basic cons for Mac OS compared to windows is that it is expensive...5 pages/≈1375 words| 5 Sources | APA | Technology | Essay |