You Decide

Submitted by: Submitted by

Views: 10

Words: 730

Pages: 3

Category: Other Topics

Date Submitted: 10/03/2015 02:06 PM

Report This Essay

CCSI 360 “You Decide” Assignment Week 2

DeVry University

Professor Koonjbearry

Michael Wisgoski

9/14/2015

Section 1- The Role of the Corporate Privacy Officer and Information Security Officer during Whistle-Blowing Events and Measures Used to Protect Whistle Blowers from Retaliation

The roles of the Company Privacy Officer, in this case, Mr. Bart Oliver and Information Security Officer, in this case, Mrs. Martha Massey should be as follows:

Company Privacy Officer- The Company Privacy Officer (CPO) shall oversee all of the activities related to the development, implementation, maintenance, and the adherence to the organization’s policies and procedures covering the privacy of, and the access to a patient’s health information. The CPO needs to make sure they’re in compliance with federal and state laws and the healthcare organization’s information privacy practices or HIPAA.

Information Security Officer- The Chief Information Security Officer (CISO) is a senior-level executive that is responsible for aligning security personnel and take actions with programs and the business objectives. The CISO needs to ensure that the information assets and technologies are adequately protected. The CISO will work with CPO to make sure compliance issues are followed properly. The CISO also is to work closely with the Network Security Manager.

Section 2- Relationships between IT workers, UT users, and employers

Maintaining a strong relationship between employer, IT workers and UT users can be the key to the success of an organization. If a strong relationship is in place, the employees will be more productive, more efficient, create less conflict and will be more loyal to the company.

Section 3- Malicious insiders and cyber-criminals

A malicious insider threat to an organization is a current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system, or data and intentionally or misused...