Featuring 12 Papers as of June 5, 2013
Electronic Medical Records: Success Requires an Information Security Culture
Thomas Roberts - June 5, 2013
The increased use of electronic medical records (EMR's) is certainly impacting the world of healthcare.
Incident Handling in the Healthcare Cloud: Liquid Data and the Need for Adaptive Patient Consent Management Masters
Barbara Filkins - October 18, 2012
The increasing use of electronic health record (EHR) systems, health information exchange (HIE) networks, and cloud computing significantly increases the exposure of sensitive medical information to loss of confidentiality, integrity, and availability due to data-related attacks, such as medical identity theft or insider threats (Ponemon Institute, 2011).
Risk Analysis for HIPAA Compliancy
Chris Ralph - March 9, 2005
This document describes the policy and procedure established by a small hospital, GIAC Health, for meeting the Risk Analysis Administrative Safeguard requirement for HIPAA compliancy.
Security Awareness and Training: Security Reminders
Kevin Sackett - January 17, 2005
Although an organization may have the means to purchase the best firewall technology, deploy the hardest encryption standards, and implement multi-factor authentication schemes, it still needs the complement of enlightened workforce members who understand what measures they can take to help reduce security risks.
A Small Business Search for HIPAA Compliant E-mail Security
Dayle Alsbury - July 25, 2004
This case study is of a small insurance business providing both health and non-health related products which are separated by divisions. HIPAA regulations impact approximately half of the user base in the business.
Developing & Implementing an Information Security Policy and Standard Framework
Peni Smith - June 9, 2004
Attacks against computers, in both home and business environments, have grown steadily over the past several years.
The Shift to Security Implementation in a HealthCare facility
Sean Mulch - June 8, 2004
There are a number of challenges presented to healthcare facilities as they begin the shift to implementing Information Security. One of these is that they have often been among the first to adopt new technologies.
Disaster Recovery in Healthcare Organizations: The Impact of HIPAA Security
James Murphy - March 4, 2004
Healthcare organizations are facing increasing regulatory burdens, and the latest to demand response is HIPAA Security. One major aspect of HIPAA Security is the disaster recovery plan, which seeks to restore appropriate access to information after a major calamity.
HIPAA-compliant configuration guidelines for Information Security in a Medical Center environment
Robert Grenert - October 31, 2003
This paper will show that information security is an on-going project and encompasses more than just a few pieces of hardware plugged into a network.
Case Study in Implementing Security for HIPAA Privacy Compliance
Ellen Robinson - October 31, 2003
The Health Insurance Portability and Accountability Act of 1996, otherwise known as HIPAA, set forth new standards for the privacy and security of protected health information (PHI).
Getting Started: The Impacts of Privacy and Security Under HIPAA - A Case Study Masters
Barbara Filkins - October 31, 2003
The paper describes how the Agency established an on-going, cost-effective security program integrated with current Agency business practices.
HIPAA Security Compliance Project - Identification of Logging and Auditing Requirements
Kurt Patti - October 31, 2003
This discussion will outline a project "plan of attack" for a covered entity to identify and address the electronic logging and auditing requirements within the Final HIPAA Security Rule.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact firstname.lastname@example.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.