Thursday, June 11, 2020
Using Audit Track to Prevent Unauthorized Access Research - 275 Words
Using Audit Track to Prevent Unauthorized Access Research (Essay Sample) Content: Using Audit Track to Prevent Unauthorized AccessName:Institution:Using Audit Track to Prevent Unauthorized AccessA healthcare facility is an environment that needs players from varying backgrounds and expertise to ensure that the institution functions optimally. Hospitals employ the use of information technology to ensure efficiency and accuracy of the record but on the other hand, increase the risk of availing information to unauthorized persons. In the community hospital, janitorial accessed patientsà ¢Ã¢â ¬ records thrice in a single date as the policy of the hospital prohibits access to patientà ¢Ã¢â ¬s information without a legitimate reason like affording treatment or for general administrative purposes. The work of a janitor does not in any way relate to patientsà ¢Ã¢â ¬ treatment, and access of such information is unauthorized and malicious.Audit trail for the purpose of this article is defined as a system that records an activity of a certain databas e showing details of how the users interact with the system. Audit trail and audit record tracks record time and details of the access done by a given individual (Sandra, 2009). For the system to work, every user should be assigned a unique log in combination that cannot be accessed by another. Electronically stored health information comes in handy beyond technical functionality to administrative and possible subsequent legal proceedings. Just like other institutions, healthcare facilities maintain a working force with varying scope of operation and professions. The role of an individual in an organization is defined, and the type of information system he/she required is availed. One the system is availed, the kind of information that may be required by a particular employee is availed. Each employee has a custom access to view or edit information (Sandra, 2009). More sensitive information may require the authorization of an officer of higher hierarchy or from a particular departm ent as administrative protocol may require.After establishing that an employee un-purposely access patientà ¢Ã¢â ¬s information, I would sermon the employee and ask him to the reasons why he had to access the patientà ¢Ã¢â ¬s information. The type of explanation the employee will give will be used to determine whether the employee actions should be condemned or not. The employee in question if found guilty may be issued with a warning letter or have his login credentials suspended. To prevent this type of unauthorized access, employees should be given access to information that only relates to their work. Login data should have different scopes and capabilities depending on the employeeà ¢Ã¢â ¬s functions.Employees ...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment