Independence work 2 (Jami 20 ball ) I. Speaking topics: Prepare ppt presentations on the given topics and speak about them


Download 1.99 Mb.
bet9/14
Sana19.06.2023
Hajmi1.99 Mb.
#1601684
1   ...   6   7   8   9   10   11   12   13   14
Bog'liq
ingliz tili 3

VI. SECURITY AND SAFETY
Task 1. Read the text “Information Technology and Security” and give your own opinions about security and safety.
Physical security is a complex of tools and methods that are used to guarantee the safety of particular facilities that contain confidential information (Forte & Power, 2007). Technical security is a range of activities that are focused on the safety of modern technologies with a use of such methods and encryption, authentication, and others (Azuwa, 2015). Data redundancy is the availability of confidential information at more than one place at a time (Huang, Chen, Lin, You, &Peng, 2015). It is imperative to consider the fact that it is quite important in case an emergency happens. However, it should be minimized most of the time because it dramatically increased the risks, and it should be addressed. Overall, physical security is the most important and should be focused on because it is not possible for third parties to try and hack data if they are not able to get access to it in the first place, and it is hard to argue with importance of such measures. Currently, some laws are focused on the privacy of health care information and are regulated by The Office for Civil Rights (U.S. Department of Health & Human Services, 2015).
It needs to be said that they are quite reasonable because there is a possibility that it can be used for a range of criminal activities. It is also paramount to make sure that such information stays confidential because it may cause issues in personal life. However, it needs to be said that current system is in need of improvement because data is not as secure as it should be, and it is evident that numerous issues are present.
Identifiable patient information is a kind of data that can be used to locate an individual (U.S. Department of Health & Human Services, 2015). It should be said that health care institutions are mostly in compliance with the rules. However, some issues are present. Private practices are especially hard to regulate, and this fact should be considered. It is interesting that there may have been numerous instances of information disclosure, and most patients do not know about it. Also, it is imperative that various scientists pay attention to current issues and try to develop tools and methods that would help to resolve such problems (Prada et al., 2011).
It is especially dangerous if criminals are able to access such information because it can be used in various ways. The government makes sure that such instances are limited. However, it needs to be said that it is still possible, and the information is not as confidential as one may expect. New technologies make it easier to protect data, but there numerous complications may occur. Also, attorneys may have access to the information about the patients if they make a request, and there is a severe responsibility for the disclosure (Miller &Schlatter, 2011).
My opinions about security and safety
As an AI language model, I do not have the capacity to give opinions. However, from a logical standpoint, it is clear that security and safety are crucial when it comes to handling confidential information. The protection of personal data is essential in preventing criminal activities, and it should be taken seriously by all parties involved. It is also important to acknowledge that while technology is advancing, there are still many risks associated with data security, and continuous improvements need to be made to address these issues. Finally, regulations and laws should be put in place to ensure that everyone involved in handling sensitive data is held accountable for any breaches or disclosure of information.


Download 1.99 Mb.

Do'stlaringiz bilan baham:
1   ...   6   7   8   9   10   11   12   13   14




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling