Posted in Best Practices Policies & Procedures

Breach Notification Policy for Healthcare Organizations and Business Associates

One of the provisions of the HITECH Act is the notification of individuals affected by a breach of their electronic protected health information. There are…

Continue Reading... Breach Notification Policy for Healthcare Organizations and Business Associates
Exception Management Policy
Posted in Best Practices Compliance Program Policies & Procedures

Exception Management Policy – Best Practices

There may be times that business operations require certain exceptions be made to information security policies and procedures. This article provides some guidance and best…

Continue Reading... Exception Management Policy – Best Practices
personnel security policy
Posted in Best Practices Policies & Procedures

Personnel Security Policy – Best Practices

The purpose of the personnel security policy should be to establish controls on the hiring, training, and termination of all personnel (e.g. employees, contractors) to…

Continue Reading... Personnel Security Policy – Best Practices
Wireless Access Security Policy
Posted in Best Practices Checklist How-To Policies & Procedures

Wireless Access Security Policy – Best Practices

Wireless networks have become mainstream and are being widely deployed throughout many different environments; however, special considerations should be made in deploying a wireless network….

Continue Reading... Wireless Access Security Policy – Best Practices
Online Social Media Policy
Posted in Best Practices Compliance Program Policies & Procedures Security Program

Online Social Media Policy: Best Practices and Template

What is a social media policy? The growing importance of online social media networks as a communication tool is highly recognized. The good social media…

Continue Reading... Online Social Media Policy: Best Practices and Template
Internet Use Policy
Posted in Best Practices Compliance Program Policies & Procedures Security Program

Internet Use Policy: Best Practices and Template

This article provides some insights and guidance on the best practices when developing an Internet Use Policy. You can you the information in this article…

Continue Reading... Internet Use Policy: Best Practices and Template
Acceptable Use Policy Best Practices
Posted in Best Practices Policies & Procedures Security Program

Acceptable Use Policy: Best Practices and Template

An acceptable use policy or access agreement should been adopted to ensure uniform and appropriate use of an organization’s network, computer, information assets, and other…

Continue Reading... Acceptable Use Policy: Best Practices and Template
Access Control Best Practices
Posted in Best Practices How-To Policies & Procedures Security Program

Access Control Best Practices

Why is access control important? Without proper access control, unauthorized users could obtain confidential information and misuse it, and authorized users could fail to follow…

Continue Reading... Access Control Best Practices