Independence work 2 (Jami 20 ball ) Student: Toirov Rakhmatillo Group: 612-22


Download 126.87 Kb.
bet8/14
Sana18.06.2023
Hajmi126.87 Kb.
#1591713
1   ...   4   5   6   7   8   9   10   11   ...   14
Bog'liq
Independent work 2 612-22 Toirov R

V. IT SUPPORT. REPORTING


Task 1. Based on the information in the pictures and your notes, present your report after the inspections. Write down an incident report about health and safety and network security in the workplace .


Dear sir!
This is the picture of our workspace in your company. As you see in the picture there is a great mesh in the room. On the right there is a table we have our lunch. After lunch usually the workers do not clean the table and it is always dirty. On the left there is a long table on which we prepare our lunch and make coffee or tea. Besides we connect our fan to the socket above the table. The network cables hang on the ceiling and they are connected to the computers. As you see in the photo it is not right to use an office in this way. As a result we had electricity problem and everything that is connected burned down. We ask you to do something about the workplace we use.

VI. SECURITY AND SAFETY
Task 1. Read the text “Information Technology and Security” and give your own opinions about security and safety.
Physical security is a complex of tools and methods that are used to guarantee the safety of particular facilities that contain confidential information (Forte & Power, 2007). Technical security is a range of activities that are focused on the safety of modern technologies with a use of such methods and encryption, authentication, and others (Azuwa, 2015). Data redundancy is the availability of confidential information at more than one place at a time (Huang, Chen, Lin, You, & Peng, 2015). It is imperative to consider the fact that it is quite important in case an emergency happens. However, it should be minimized most of the time because it dramatically increased the risks, and it should be addressed. Overall, physical security is the most important and should be focused on because it is not possible for third parties to try and hack data if they are not able to get access to it in the first place, and it is hard to argue with importance of such measures. Currently, some laws are focused on the privacy of health care information and are regulated by The Office for Civil Rights (U.S. Department of Health & Human Services, 2015).
It needs to be said that they are quite reasonable because there is a possibility that it can be used for a range of criminal activities. It is also paramount to make sure that such information stays confidential because it may cause issues in personal life. However, it needs to be said that current system is in need of improvement because data is not as secure as it should be, and it is evident that numerous issues are present.
Identifiable patient information is a kind of data that can be used to locate an individual (U.S. Department of Health & Human Services, 2015). It should be said that health care institutions are mostly in compliance with the rules. However, some issues are present. Private practices are especially hard to regulate, and this fact should be considered. It is interesting that there may have been numerous instances of information disclosure, and most patients do not know about it. Also, it is imperative that various scientists pay attention to current issues and try to develop tools and methods that would help to resolve such problems (Prada et al., 2011).
It is especially dangerous if criminals are able to access such information because it can be used in various ways. The government makes sure that such instances are limited. However, it needs to be said that it is still possible, and the information is not as confidential as one may expect. New technologies make it easier to protect data, but there numerous complications may occur. Also, attorneys may have access to the information about the patients if they make a request, and there is a severe responsibility for the disclosure (Miller & Schlatter, 2011).

Download 126.87 Kb.

Do'stlaringiz bilan baham:
1   ...   4   5   6   7   8   9   10   11   ...   14




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling